CSC 379 SUM2008:Topics: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 50: Line 50:
==Electronic Voting==
==Electronic Voting==
risks/reliability/voting/electronic (update)
risks/reliability/voting/electronic (update)
General.
==Internet Gambling==
commerce/gambling (update)
General.
General.



Revision as of 21:34, 23 July 2008

New Topics

Smart Mobs

social/smartmobs (space exists, no content) Include information on important instances of smart mobs and the future of smart mobs.

Social Dossiers

social/lifebits (space exists, no content) General.

Phishing

abuse/spam/phishing (space exists, no content) General.

Encryption

privacy/encryption (space exists, no content) General.

Voting Receipts

risks/reliability/voting/receipts (space exists, no content) General.


Existing Topics

Cyberwarfare

risks/security/cyberwar (update) Examine new methods of cyberwarfare, include recent instances, and ethical considerations.

Intellectual Property Law

intellectual/law (update) Include information on trade secrets.

Cyberlicenses / Shrinkwrap Licenses

intellectual/licensing/cyberlicenses and intellectual/licensing/shrinkwrap (update) Expand on licensing related to ownership of content created through web services.

Computer Modeling

risks/models (update) Include new ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.

Depersonalization

social/technoharm (update, add studyguide) General.

Privacy of Medical Information

privacy/medical (update) General.

Electronic Voting

risks/reliability/voting/electronic (update) General.


Instant Messaging

commerce/anticompetitive/instant

Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.

Current Main Page Current Study Guide


Security Precautions

risks/security/precautions

What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.

Social Engineering should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.

Current Main Page Current Study Guide