Eur Ing Brian Tompsett B.C.Tompsett@hull.ac.uk
Lecturer
Ethical dilemmas in teaching computer and internet security
Tompsett, Brian
Authors
Abstract
This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analysis hosted by City University. These are valid concerns about the nature of material taught to computer science students in the area of security. The questions are also important ethical dilemmas for any professional working in the computer and internet security field. These are also applicable when discussing such security risks with the media, members of the public and even legislators. Information on vulnerabilities has to be presented so that it informs programmers and computer users about the areas of risk, but without providing recipes for them to use to conduct criminal activities or mischief themselves. The paper will look at several case studies from the curriculum at the University of Hull at both undergraduate and postgraduate level. Some specific problem areas of email forgery, security of the Windows operating system and exploitation of buffer overflows, and deception in online auctions, will be explored.
Citation
Tompsett, B. (2010). Ethical dilemmas in teaching computer and internet security. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Information Security and Digital Forensics (76-81). Springer-Verlag. https://doi.org/10.1007/978-3-642-11530-1_9
Publication Date | Dec 1, 2010 |
---|---|
Print ISSN | 1867-8211 |
Volume | 41 |
Pages | 76-81 |
Series Number | 41 |
Series ISSN | 1867-8211 |
Book Title | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Information Security and Digital Forensics |
ISBN | 9783642115295; 9783642115301 |
DOI | https://doi.org/10.1007/978-3-642-11530-1_9 |
Keywords | Security, Internet, Computers |
Public URL | https://hull-repository.worktribe.com/output/405576 |
Publisher URL | https://link.springer.com/chapter/10.1007%2F978-3-642-11530-1_9 |
Contract Date | Jan 1, 2010 |
You might also like
The metaverse—Not a new frontier for crime.
(2023)
Journal Article
Ontology‐driven disability‐aware e‐learning personalisation with ONTODAPS
(2012)
Journal Article
Describing and assessing image descriptions for visually impaired web users with IDAT
(2012)
Presentation / Conference Contribution
Ontology-based e-learning personalisation for disabled students in higher education
(2011)
Journal Article
Downloadable Citations
About Repository@Hull
Administrator e-mail: repository@hull.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search