Computers, Information Technology, the Internet, Ethics, Society and Human Values Philip Pecorino, Ph.D. Queensborough Community College, CUNY Chapter 7 Secrecy and Security |
|||
Resources
WEBLIOGRAPHY Readings on Encryption and National Security-MIT Open Source
eDiscovery, Privacy and Cybersecurity legal resource: Concord Law
School, Purdue Unversity: : Privacy, Security, Crypto, and Surveillance Archive. by The Electronic Frontier Foundation A Plain Text on Crypto Policy John Perry Barlow 1993 Why I Wrote PGP Pretty Good Privacy encryption program Philip Zimmerman, Interview with Philip Zimmerman after 9/11 attacks m-o-o-t i s a free open-source computer system that boots from a CD and contains all the cryptographic code needed to defeat GAK (Government Access to Keys) laws. We believe that people should and can have access to electronic privacy even from their Governments.Click Here to become an Arms Trafficker Now you can just click on a web page to export 3lines of text for an encryption program and become an International Arms Trafficker!
A Declaration of the Independence of Cyberspace by John Perry Barlow BIBLIOGRAPHIES Counterpane Systems' WWW Cryptography Article Database SOCIETIES and Organizations Comparitech listing of Cybersecurity institutes, associations, and events around the world Published by Aimee O'Driscoll on October 26, 2017 in Information Security
Ethical, Social and Professional
Issues in the Undergraduate Currriculum
CERIAS: The Center for Education and Research in Information Assurance
and Security This site has several useful sections: * A Framework for
Integrating Ethical and Values-Based Instruction into the ACM Computing
Curricula 2001 Learning and Teaching with Case Studies Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, Eugene H. Spafford, Director Computer Security Group, Cambridge University, UK Computer Security Research Center, London School of Economics The Risks Digest: Forum On Risks To The Public In Computers And Related Systems, ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator Encryption Policy Resource Page
Internet Privacy Coalition EPIC Contains articles, reports, and
government policies relating to encryption and privacy on the Internet.
EDUCATION Cyber Security Why Is Cybersecurity Important? published by Grand Canyon University. There is interest in the field from both the government and students (http://www.whitehouse.gov/the-press-office/2015/01/15/vice-president-biden-announces-25-million-funding-cybersecurity-educatio). Department of Homeland Security's National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/research/resource-links-education Educational Programs
-
http://cybersecuritydegrees.org/ Cyber Security Jobs and Careers: https://cyberdegreesedu.org/jobs/ Central Resource site at : CyberDegrees.org.
The Definitive Guide to Internet Privacy & Online Security OTHER
|
|||
Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution. ppecorino@qcc.cuny.edu @copyright 2006 Philip A. Pecorino Last updated 8-2006 Return to Table of Contents |
|||