1 / 16

CSE 190 / Spring 2002 Ethical, Legal and Social Issues Of Computer Security Applications

This course explores the ethical, legal, and social implications of computer security applications. It covers topics such as ethics, codes of ethics, laws, intellectual property, transparency, and privacy. Case studies and guest lectures provide real-world examples.

Download Presentation

CSE 190 / Spring 2002 Ethical, Legal and Social Issues Of Computer Security Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSE 190 / Spring 2002 Ethical, Legal and Social Issues Of Computer Security Applications Prof. Sid Karin skarin@ucsd.edu SDSC 432 / APM 3816 534-5075

  2. Office Hours Tuesdays & Thursdays 4 PM until class starts or by appointment. Room: SDSC 432

  3. Teaching Assistants Rakesh Kumar rakumar@cs.ucsd.edu Aditya Ojha aojha@cs.ucsd.edu

  4. Rough Course Outline Introduction & Overview Definitions & Background Ethics, Codes of Ethics Laws Intellectual Property

  5. Rough Course Outline, cont’d. Concepts: Code as Law Transparency Privacy

  6. Rough Course Outline, cont’d. May 28, 30, June 4, 6; Case Studies (Team Presentations)

  7. Guest Lecturers April 4: Dr. Michael Kalichman Prof., UCSD School of Medicine http://www.google.com/search?q=cache:pqkUrsAv6psC: www.primr.org/Library/kalichman.pdf+michael+ kalichman&hl=en May 2: Dr. David Brin Author http://www.davidbrin.com/

  8. April 30: Erin Kenneally Attorney, Forensic Analyst, member of SDSC security group May 16: Michael Robertson Founder, mp3.com & Lindows.com http://www.mp3.com/bio/michael.html

  9. Grading Midterm: 25% Quizzes: 20% Class Participation: 15% Paper & Presentation: 40% (Paper/Presentations by teams ~3)

  10. Teams and Cases Paper/Presentation Topics: Relevant Recent and/or Current Cases Research and present both sides. (There are two sides.) Ethical Considerations Legal Considerations Social Considerations

  11. Teams and Cases Approximately 1/2 hour class presentation for each team. Paper approximately 20 pages, Single spaced, 12 pt. The important criterion is to accurately, clearly and fairly present the arguments

  12. Teams and Cases 1. Feel free to suggest your own case. 2. Feel free to form your own team. 3. Do not proceed without approval. 4. You can’t all work on the same case. 5. Plan to work in teams of ~three. 6. Those who don’t form a team and Select a case will be assigned to a team and a case.

  13. Potential Cases To Examine Felton / RIAA Adobe / Elcomsoft MP3.com / RIAA Clipper Carnivore Magic Lantern PGP/Export Control Napster (your suggestion here)

  14. Daily Reading Dave Farber’s Interesting People List Declan McCullagh’s Politech List The New York Times The Wall Street Journal

  15. Additional Reading Code And Other Laws Of Cyberspace Lawrence Lessig Basic Books, 1999 The Transparent Society David Brin Perseus Books, 1998

  16. Legal, Ethical and Social Issues: (Some examples from my own experience. Or, how did I get interested in this?) Burglary vs. Cybercrime Data Mining vs Human Subjects Research Cost of worms & viruses Unauthorized Access The Mitnick Case

More Related