Table of Contents
Security
Agenda
Two Types of Social Issues
Computing for Social Processes
Limiting the Use of Computing/IT
Techniques for Limiting Use
Anonymity
Nettiquite
Computing/IT as a Social Process
Ownership
Identity
Authentication
Good Passwords
Integrity
Privacy
Encryption
Cookies
Copyright
Access Control Issues
Denial of Service Attacks
Policy Solutions
Crisis Management
Complex System Issues
Social and Economic Impact
Midterm Structure
Midter Advice
Questions
|