skip to main content
10.1145/1121341.1121506acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

An ethics and security course for students in computer science and information technology

Published:03 March 2006Publication History

ABSTRACT

This paper describes an undergraduate course in computer security that has a strong ethical component. Ethical and related security topics are interwoven. The emphasis is on the kind of research that computer scientists and information technologists are conducting in order to address the fundamental problems in computer security. There is also a great emphasis on encouraging student creativity.

References

  1. Florida, Richard, The Rise of the Creative Class, Basic Books, New York, 2002, 434 pp.Google ScholarGoogle Scholar
  2. Cranor, Lorrie F., "P3P: Making Privacy Policies More Useful", IEEE Security and Privacy, November/December 2003, pp. 50--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Reiter, Michael K. and Rubin, Aviel D., "Anonymous Web Transactions with Crowds", Communications of the ACM, February 1999, pp. 32--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bowyer, Kevin W., "Face Recognition Technology: Security versus Privacy", IEEE Technology and Society Magazine, Spring 2004, pp. 9--20.Google ScholarGoogle Scholar
  5. Naumovich, Gleb and Memon, Nasir, "Preventing Piracy, Reverse Engineering, and Tampering", IEEE Computer, July 2003, pp. 64--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Denning, Dorothy E., Information Warfare and Security, Addison-Wesley, Reading, MA, 1999, 522 pp. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jajodia, Sushil, Ammann, Paul, and McCollum, Catherine D., "Surviving Information Warfare Attacks", IEEE Computer, April 1999, pp. 57--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Householder, Allen, Houle, Kevin, and Dougherty, Chad, "Computer Attack Trends Challenge Internet Security", Security and Privacy supplement to IEEE Computer, 2002, pp. 5--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chen, Thomas M. and Jean-Marc, Robert, "Worm Epidemics in High-Speed Networks", IEEE Computer, June 2004, pp. 48--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Arce, Ivan, "The Shellcode Generation", IEEE Security and Privacy, September/October 2004, pp. 72--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Arce, Ivan, "The Weakest Link Revisited", IEEE Security and Privacy, March/April 2003, pp. 72--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cybenko, George, Giani, Annarita, and Thompson, Paul, "Cognitive Hacking: A Battle for the Mind", IEEE Computer, August 2002, pp. 50--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Forrest, Stephanie, Hofmeyr, Steven, and Somayaji, Anil, "Computer Immunology", Communications of the ACM, October 1997, pp. 88--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Arbaugh, William A., Fithen, William L., and McHugh, John, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, December 2000, pp. 52--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Austin, Rob and Devin, Lee, Artful Making: What Managers Need to Know About How Artists Work, Prentice-Hall, Upper Saddle River, NJ, 2003, 201 pp. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An ethics and security course for students in computer science and information technology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '06: Proceedings of the 37th SIGCSE technical symposium on Computer science education
      March 2006
      612 pages
      ISBN:1595932593
      DOI:10.1145/1121341

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 March 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader