CSC 379 SUM2008:Week 3, Group 3: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
(add of initial content)
 
Line 4: Line 4:
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).


* TBA
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]
* TBA
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]
* TBA
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]
* TBA
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]

Revision as of 20:15, 23 July 2008

Costs and Benefits Password Regulations

“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits. An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency. Evaluate these popular password regulations. Do they provide adequate benefits for costs incurred? What ethical considerations do poorly evaluated “best practices” raise? Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted? A responsibility to re-evaluate existing practices?

Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).