Computing/IT as a Social Process
Programs must implement social norms
Ownership
Identity
Integrity
Privacy
Two basic techniques are used
Authentication
Encryption
Previous slide
Next slide
Back to first slide
View graphic version