ABSTRACT
This paper describes an undergraduate course in computer security that has a strong ethical component. Ethical and related security topics are interwoven. The emphasis is on the kind of research that computer scientists and information technologists are conducting in order to address the fundamental problems in computer security. There is also a great emphasis on encouraging student creativity.
- Florida, Richard, The Rise of the Creative Class, Basic Books, New York, 2002, 434 pp.Google Scholar
- Cranor, Lorrie F., "P3P: Making Privacy Policies More Useful", IEEE Security and Privacy, November/December 2003, pp. 50--55. Google ScholarDigital Library
- Reiter, Michael K. and Rubin, Aviel D., "Anonymous Web Transactions with Crowds", Communications of the ACM, February 1999, pp. 32--38. Google ScholarDigital Library
- Bowyer, Kevin W., "Face Recognition Technology: Security versus Privacy", IEEE Technology and Society Magazine, Spring 2004, pp. 9--20.Google Scholar
- Naumovich, Gleb and Memon, Nasir, "Preventing Piracy, Reverse Engineering, and Tampering", IEEE Computer, July 2003, pp. 64--71. Google ScholarDigital Library
- Denning, Dorothy E., Information Warfare and Security, Addison-Wesley, Reading, MA, 1999, 522 pp. Google ScholarDigital Library
- Jajodia, Sushil, Ammann, Paul, and McCollum, Catherine D., "Surviving Information Warfare Attacks", IEEE Computer, April 1999, pp. 57--63. Google ScholarDigital Library
- Householder, Allen, Houle, Kevin, and Dougherty, Chad, "Computer Attack Trends Challenge Internet Security", Security and Privacy supplement to IEEE Computer, 2002, pp. 5--7. Google ScholarDigital Library
- Chen, Thomas M. and Jean-Marc, Robert, "Worm Epidemics in High-Speed Networks", IEEE Computer, June 2004, pp. 48--53. Google ScholarDigital Library
- Arce, Ivan, "The Shellcode Generation", IEEE Security and Privacy, September/October 2004, pp. 72--76. Google ScholarDigital Library
- Arce, Ivan, "The Weakest Link Revisited", IEEE Security and Privacy, March/April 2003, pp. 72--76. Google ScholarDigital Library
- Cybenko, George, Giani, Annarita, and Thompson, Paul, "Cognitive Hacking: A Battle for the Mind", IEEE Computer, August 2002, pp. 50--56. Google ScholarDigital Library
- Forrest, Stephanie, Hofmeyr, Steven, and Somayaji, Anil, "Computer Immunology", Communications of the ACM, October 1997, pp. 88--96. Google ScholarDigital Library
- Arbaugh, William A., Fithen, William L., and McHugh, John, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, December 2000, pp. 52--59. Google ScholarDigital Library
- Austin, Rob and Devin, Lee, Artful Making: What Managers Need to Know About How Artists Work, Prentice-Hall, Upper Saddle River, NJ, 2003, 201 pp. Google ScholarDigital Library
Index Terms
- An ethics and security course for students in computer science and information technology
Recommendations
An ethics and security course for students in computer science and information technology
This paper describes an undergraduate course in computer security that has a strong ethical component. Ethical and related security topics are interwoven. The emphasis is on the kind of research that computer scientists and information technologists are ...
Subjectivity and information ethics
In “A Brief History of Information Ethics,” Thomas Froehlich (2004) quickly surveyed under several broad categories some of the many issues that constitute information ethics: under the category of librarianship—censorship, privacy, access, balance in ...
From ethics washing to ethics bashing: a view on tech ethics from within moral philosophy
FAT* '20: Proceedings of the 2020 Conference on Fairness, Accountability, and TransparencyThe word 'ethics' is under siege in technology policy circles. Weaponized in support of deregulation, self-regulation or handsoff governance, "ethics" is increasingly identified with technology companies' self-regulatory efforts and with shallow ...
Comments