<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Biometrics on Ariadne</title>
    <link>http://www.ariadne.ac.uk/buzz/biometrics/</link>
    <description>Recent content in Biometrics on Ariadne</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <lastBuildDate>Wed, 30 Jan 2008 00:00:00 +0000</lastBuildDate>
    
	<atom:link href="http://www.ariadne.ac.uk/buzz/biometrics/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>News and Events</title>
      <link>http://www.ariadne.ac.uk/issue/54/newsline/</link>
      <pubDate>Wed, 30 Jan 2008 00:00:00 +0000</pubDate>
      
      <guid>http://www.ariadne.ac.uk/issue/54/newsline/</guid>
      <description>UkeiG Course: Information Law for Information ProfessionalsInformation Law for Information Professionals:
What you need to know about Copyright, Data Protection, Freedom of Information and Accessibility and Disability Discrimination Laws
CILIP, 7 Ridgmount Street, London, WC1E 7AE
19 February 2008, 9.30-16.30
Course outline
In particular, four key legal areas currently affect the work of many information professionals in the digital environment - copyright, data protection, freedom of information, and disability discrimination and accessibility.</description>
    </item>
    
    <item>
      <title>Do They Need to Know?</title>
      <link>http://www.ariadne.ac.uk/issue/30/web-security/</link>
      <pubDate>Fri, 25 Jan 2002 00:00:00 +0000</pubDate>
      
      <guid>http://www.ariadne.ac.uk/issue/30/web-security/</guid>
      <description>Do users need to know about computer security? The vast and growing literature of computer security suggests that solutions to most security issues are currently being sought purely through technology. Humanity obtrudes into the literature primarily in the guise of hackers and disaffected administrators, in the debate over which is the greater threat. The average user is strangely absent, like the labourer in eighteenth century landscape painting. True, a little consideration has been given to the special problems of making security software useable, and some thought has been given to how to raise security awareness.</description>
    </item>
    
    <item>
      <title>ACM / IEEE Joint Conference on Digital Libraries</title>
      <link>http://www.ariadne.ac.uk/issue/29/maccoll/</link>
      <pubDate>Tue, 02 Oct 2001 23:00:00 +0000</pubDate>
      
      <guid>http://www.ariadne.ac.uk/issue/29/maccoll/</guid>
      <description>This report covers a selection of the papers at the above conference, from those which I chose and was able to attend in a three-strand conference held over three days (with two additional days for workshops, which I did not attend). It includes the three keynote papers, as well as the paper which won the Vannevar Bush award for best conference paper.
The conference was held in Roanoke, Virginia, in the Roanoke Hotel and Conference Center, which is owned by Virginia Tech (located in Blacksburg, some 40 miles away).</description>
    </item>
    
  </channel>
</rss>