CSC 379 SUM2008:Topics
New Topics
Smart Mobs
social/smartmobs (space exists, no content) Include information on important instances of smart mobs and the future of smart mobs.
Social Dossiers
social/lifebits (space exists, no content) General.
Phishing
abuse/spam/phishing (space exists, no content) General.
Encryption
privacy/encryption (space exists, no content) General.
Voting Receipts
risks/reliability/voting/receipts (space exists, no content) General.
Existing Topics
Cyberwarfare
risks/security/cyberwar (update) Examine new methods of cyberwarfare, include recent instances, and ethical considerations.
Intellectual Property Law
intellectual/law (update) Include information on trade secrets.
Cyberlicenses / Shrinkwrap Licenses
intellectual/licensing/cyberlicenses and intellectual/licensing/shrinkwrap (update) Expand on licensing related to ownership of content created through web services.
Computer Modeling
risks/models (update) Include new ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.
Depersonalization
social/technoharm (update, add studyguide) General.
Privacy of Medical Information
privacy/medical (update) General.
Electronic Voting
risks/reliability/voting/electronic (update) General.
Instant Messaging
commerce/anticompetitive/instant
Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.
Current Main Page | Current Study Guide |
Security Precautions
risks/security/precautions
What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.
Social Engineering should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.
Current Main Page | Current Study Guide |