Lecture30 - EthicalIssuesinComputer Science CSCI 328, Fall...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Ethical Issues in Computer  Science   CSCI 328, Fall 2011 Session 30 Security, Knowledge and Freedom of Expression
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Is Security an Intrinsic or Instrumental Value? Different types of security: Computer security: Instrumental or intrinsic? If instrumental, what good is it instrumental to?
Background image of page 2
3 Security is Sociotechnical Hardware and software security tools combine with human behavior. Example: Password protections. Combination of hardware and software requirements. Can be foiled by careless users. Users find work-arounds for convenience. Coshaping: Security systems developed based on who is a threat. Criminals shaped by security systems. Security arms race.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Who is to blame for security breaches? Who is to blame for security breaches? 1. Intruder 2. Those responsible for security 3. Personal computer owner. May cost time and money to protect computer from computers, so is it fair to blame owners? Analogy:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2012 for the course CSCI 328 taught by Professor Staff during the Fall '11 term at Holy Cross College.

Page1 / 10

Lecture30 - EthicalIssuesinComputer Science CSCI 328, Fall...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online