The IRE Resource Center is a major research library containing more than 23,250 investigative stories — both print and broadcast. These stories are searchable online or by contacting the Resource Center directly (573-882-3364 or firstname.lastname@example.org) where a researcher can help you pinpoint what you need. Browse or search the tipsheet section of our library below. Stories are not available for download but can be easily ordered by contacting the Resource Center:
The IRE Resource Center is a major research library containing more than 23,250 investigative stories — both print and broadcast.
These stories are searchable online or by contacting the Resource Center directly (573-882-3364 or email@example.com) where a researcher can help you pinpoint what you need.
Browse or search the tipsheet section of our library below. Stories are not available for download but can be easily ordered by contacting the Resource Center:
Search results for "e-commerce" ...
"60 Minutes showed how hackers easily steal customer personal and financial data from retailers, through stores' wireless systems. And while both the retail industry and the credit card companies know this is a growing problems, they are caught up in a fight as to who's to blame, and who should pay to fix it."
DOA.COM: In the Great Dot-Com Meltdown of 2000-01, some Connecticut start-ups had a plan-they just didn't have a clue. How will the survivors learn from their mistakes?
Article talks about the rise and fall of dot-com companies in Connecticut. Companies based in Connecticut (which are mentioned in the article) include Priceline.com, Outpost.com, Carepackages.com, JobDirect.com, iBirthday.com, iMix.com, Jasperon.com.
Tags: dot-com; dot com; computer; website; e-commerce; Connecticut; priceline.com; outpost.com; carepackages.com; jobdirect.com; iBirthday.com; iMix.com; Jasperon.com; business; computer industry; online; online sales; companies; online companies
A Time cover story looks at the increasing risks posed by identity thieves on the Net. Reporter Adam Cohen uses a quite nontraditional approach: he steals the identity of his colleague Joel Stein, with the editors' knowledge, and reveals what it feels like to peek in somebody else's e-mails and computer hard drive. The story lists nine Internet's threats to privacy, followed by ten ways individuals can defend themselves. "Microsoft conceded that all versions of Windows 2000, and early "beta" viruses of its new XP operating system... have a "serious vulnerability," Time reports. In conclusion, Cohen's co-worker Joel Stein tells a real story about his AmEx credit card identity being stolen and charged with hundreds of dollars in the past.
This ABCNews.com investigative show focuses on "the very lucrative business of on-line prostitution." It reveals that "the majority of clientele ... includes very wealthy dot-commers that are purchasing sex on-line who otherwise would never have solicited prostitutes." The show features "interviews with an LA vice cop who reveals that the Los Angeles Police Department will often not pursue or prosecute internet prostitutes because of the difficulty involved in tracking them down."
In this special e-commerce report, Business Week details how "companies are using your personal data to limit your choices - and force you to pay more for profits." Increasing use of "profiling" allows companies to compile detailed information on anyone using the Internet, and classify them according to their buying power. A related article lists the top ten scams waiting to rip off novice web surfers.