Edward Freeman - Academia.edu (original) (raw)

Papers by Edward Freeman

Research paper thumbnail of Regulatory Compliance and the Chief Compliance Officer

Information Systems Security, 2007

Research paper thumbnail of Computer Hackers and Search and Seizure:United States v. Jarrett

Information Systems Security, 2007

Research paper thumbnail of Anonymity on the Internet

Research paper thumbnail of The “Business Sucks” Story

Humanistic Management Journal, 2018

The purpose of this essay is to suggest that one of the dominant modes of thought in our society ... more The purpose of this essay is to suggest that one of the dominant modes of thought in our society is a profound mistrust and misunderstanding of the role of business. A dominant myth in society is that business occupies the moral low ground, separate from ethics or a moral point of view. This position is characterized as the “business sucks” story, and the essay shows how the enactment of this story underlies business thinking among managers and business theorists. The essay concludes with a suggestion to rethink and reinvent this story along more realistic and more empowering lines. Values based capitalism, or stakeholder capitalism, offers a better way to understand the complex role that business does and should play in modern society.

Research paper thumbnail of Prosecution of Computer Virus Authors

Http Dx Doi Org 10 1201 1086 43325 12 1 20030301 41475 2, Dec 21, 2006

Research paper thumbnail of Internet Gripe Sites

Information Security Management Handbook, Four Volume Set, 2000

Research paper thumbnail of Information Security Management Handbook

Information Security Management Handbook, Four Volume Set, 2000

Research paper thumbnail of Electronic reprints of freelance works: New York times v. Tasini

Publishing Research Quarterly, 2001

Research paper thumbnail of WHEN TECHNOLOGY AND PRIVACY COLLIDE Encoded Encryption and the Clipper

Information Systems Management, 1995

The government' s use of the Clipper Chip has managed to offend civil libertarians, law enfor... more The government' s use of the Clipper Chip has managed to offend civil libertarians, law enforcement, politicians, and the computer industry. This new technology raises old questions regarding encryption requirements, standards, and protection. Legal aspects of computing, especially encoded encryption, are examined

Research paper thumbnail of Disclosure of Information Theft: The ChoicePoint Security Breach

Information Systems Security, 2006

Research paper thumbnail of Vulnerability Disclosure: The Strange Case of Bret McDanel

Information Systems Security, 2007

Research paper thumbnail of RFIDs and Personal Privacy

Information Systems Security, 2007

It's not true that life is one damn thing after another; it is one damn thing over and over.—... more It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...

Research paper thumbnail of Holistic Information Security: ISO 27001 and Due Care

Information Systems Security, 2007

Abstract" The only truly secure system is one that is powered off, cast in a block of co... more Abstract" The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards-and even then I have my doubts."-Gene Spafford, Professor of Computer Science, Purdue University

Research paper thumbnail of Service of Process by Email

Information Systems Security, 2006

Abstract The Internet is firmly established as a primary method of communications. Documents and ... more Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.

Research paper thumbnail of Click Fraud: Google v. Auctions Expert International

Information Systems Security, 2005

Research paper thumbnail of Retention of Corporate E-Documents under Sarbanes—Oxley

Information Systems Security, 2005

Abstract In recent years, the press has reported many high-profile corporate frauds, leading in t... more Abstract In recent years, the press has reported many high-profile corporate frauds, leading in turn to major bankruptcies. Congressional committees have investigated widespread financial misstatements in some of America's most trusted organizations. Employees saw their pension funds and life savings evaporate after unscrupulous executives pocketed the last remaining assets. The fall of Arthur Andersen, Enron, Tyco, Healthsouth, Global Crossing, World- Com, and others have cost investors and taxpayers billions.

Research paper thumbnail of Cyber Courts and the Future of Justice

Information Systems Security, 2005

Abstract A real need exists to use the benefits of modern technology intelligently to reduce the ... more Abstract A real need exists to use the benefits of modern technology intelligently to reduce the court backlogs. Cyber courts are a viable alternative to the endless delays that plague court dockets, but only if they succeed in making courts more efficient.

Research paper thumbnail of Anonymity on the Internet: ACLU of Georgia v. Miller

Information Systems Security, 2000

The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhe... more The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhere in the world. In the pure democracy of the Internet, chat sessions can become virtual masquerade parties, where users can express their own personalities or create new ones, depending on the circumstances and their individual whims. This can all take place based on

Research paper thumbnail of Freedom of Speech in Cyberspace: Intel v. Hamidi

Information Systems Security, 2000

Abstract The development of cyberspace and the Internet have changed how we communicate to a larg... more Abstract The development of cyberspace and the Internet have changed how we communicate to a large audience. Television advertising or bulk mailings are extremely expensive, but an individual or organization can send out thousands of e- mails at virtually no cost. Many charitable and business organizations use e-mail to communicate worldwide with their employees, supporters, clients, potential customers, or other interested parties. As the U.S. Supreme Court noted in a recent decision, “any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox.”1

Research paper thumbnail of Director Liability in Computer Negligence Cases

Information Systems Security, 2000

... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West ... more ... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West Hartford, Connecticut. ... FAILURE TO USE TECHNOLOGY — THE TJ HOOPER Clearly, directors have the responsibility of due care to ensure that all reasonable steps are ...

Research paper thumbnail of Regulatory Compliance and the Chief Compliance Officer

Information Systems Security, 2007

Research paper thumbnail of Computer Hackers and Search and Seizure:United States v. Jarrett

Information Systems Security, 2007

Research paper thumbnail of Anonymity on the Internet

Research paper thumbnail of The “Business Sucks” Story

Humanistic Management Journal, 2018

The purpose of this essay is to suggest that one of the dominant modes of thought in our society ... more The purpose of this essay is to suggest that one of the dominant modes of thought in our society is a profound mistrust and misunderstanding of the role of business. A dominant myth in society is that business occupies the moral low ground, separate from ethics or a moral point of view. This position is characterized as the “business sucks” story, and the essay shows how the enactment of this story underlies business thinking among managers and business theorists. The essay concludes with a suggestion to rethink and reinvent this story along more realistic and more empowering lines. Values based capitalism, or stakeholder capitalism, offers a better way to understand the complex role that business does and should play in modern society.

Research paper thumbnail of Prosecution of Computer Virus Authors

Http Dx Doi Org 10 1201 1086 43325 12 1 20030301 41475 2, Dec 21, 2006

Research paper thumbnail of Internet Gripe Sites

Information Security Management Handbook, Four Volume Set, 2000

Research paper thumbnail of Information Security Management Handbook

Information Security Management Handbook, Four Volume Set, 2000

Research paper thumbnail of Electronic reprints of freelance works: New York times v. Tasini

Publishing Research Quarterly, 2001

Research paper thumbnail of WHEN TECHNOLOGY AND PRIVACY COLLIDE Encoded Encryption and the Clipper

Information Systems Management, 1995

The government' s use of the Clipper Chip has managed to offend civil libertarians, law enfor... more The government' s use of the Clipper Chip has managed to offend civil libertarians, law enforcement, politicians, and the computer industry. This new technology raises old questions regarding encryption requirements, standards, and protection. Legal aspects of computing, especially encoded encryption, are examined

Research paper thumbnail of Disclosure of Information Theft: The ChoicePoint Security Breach

Information Systems Security, 2006

Research paper thumbnail of Vulnerability Disclosure: The Strange Case of Bret McDanel

Information Systems Security, 2007

Research paper thumbnail of RFIDs and Personal Privacy

Information Systems Security, 2007

It's not true that life is one damn thing after another; it is one damn thing over and over.—... more It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...

Research paper thumbnail of Holistic Information Security: ISO 27001 and Due Care

Information Systems Security, 2007

Abstract" The only truly secure system is one that is powered off, cast in a block of co... more Abstract" The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards-and even then I have my doubts."-Gene Spafford, Professor of Computer Science, Purdue University

Research paper thumbnail of Service of Process by Email

Information Systems Security, 2006

Abstract The Internet is firmly established as a primary method of communications. Documents and ... more Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.

Research paper thumbnail of Click Fraud: Google v. Auctions Expert International

Information Systems Security, 2005

Research paper thumbnail of Retention of Corporate E-Documents under Sarbanes—Oxley

Information Systems Security, 2005

Abstract In recent years, the press has reported many high-profile corporate frauds, leading in t... more Abstract In recent years, the press has reported many high-profile corporate frauds, leading in turn to major bankruptcies. Congressional committees have investigated widespread financial misstatements in some of America's most trusted organizations. Employees saw their pension funds and life savings evaporate after unscrupulous executives pocketed the last remaining assets. The fall of Arthur Andersen, Enron, Tyco, Healthsouth, Global Crossing, World- Com, and others have cost investors and taxpayers billions.

Research paper thumbnail of Cyber Courts and the Future of Justice

Information Systems Security, 2005

Abstract A real need exists to use the benefits of modern technology intelligently to reduce the ... more Abstract A real need exists to use the benefits of modern technology intelligently to reduce the court backlogs. Cyber courts are a viable alternative to the endless delays that plague court dockets, but only if they succeed in making courts more efficient.

Research paper thumbnail of Anonymity on the Internet: ACLU of Georgia v. Miller

Information Systems Security, 2000

The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhe... more The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhere in the world. In the pure democracy of the Internet, chat sessions can become virtual masquerade parties, where users can express their own personalities or create new ones, depending on the circumstances and their individual whims. This can all take place based on

Research paper thumbnail of Freedom of Speech in Cyberspace: Intel v. Hamidi

Information Systems Security, 2000

Abstract The development of cyberspace and the Internet have changed how we communicate to a larg... more Abstract The development of cyberspace and the Internet have changed how we communicate to a large audience. Television advertising or bulk mailings are extremely expensive, but an individual or organization can send out thousands of e- mails at virtually no cost. Many charitable and business organizations use e-mail to communicate worldwide with their employees, supporters, clients, potential customers, or other interested parties. As the U.S. Supreme Court noted in a recent decision, “any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox.”1

Research paper thumbnail of Director Liability in Computer Negligence Cases

Information Systems Security, 2000

... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West ... more ... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West Hartford, Connecticut. ... FAILURE TO USE TECHNOLOGY — THE TJ HOOPER Clearly, directors have the responsibility of due care to ensure that all reasonable steps are ...