The lectures and readings listed here are subject to change, including
in response to current events (i.e., major new security holes).
- Jan 26
-
Ethics I
- Text, chapter 9
- Paul Berg, David Baltimore, Sydney Brenner,
Richard O. Roblin, and Maxine F. Singer,
Summary
Statement of the Asilomar Conference on Recombinant DNA Molecules PNAS 72:6,
June 1975.
- David L. Parnas, "Software
aspects of strategic defense systems",
Comm. ACM 28:12, December 1985.
- Philip M. Boffey, Software
Seen as Obstacle in Developing 'Star Wars',
New York Times, September 16, 1986.
- U.S. Public Health Service Syphilis Study at Tuskegee",
Center for Disease Control.
- Institutional Review Board Guidebook,
Introduction,
Office of Human Subjects Research, Department of
Health and Human Services.
- Feb 09
-
Wiretapping II
- The Athens Affair,
Vassilis Prevelakis and Diomidis Spinellis, IEEE Spectrum, July 2007.
- Security
Implications of Applying the Communications Assistance to Law
Enforcement Act to Voice over IP, Steven Bellovin, Matt Blaze, Ernest
Brickell, Clinton Brooks, Vinton Cerf, Whitfield Diffie, Susan Landau, Jon
Peterson, and John Treichler, June 2006.
- Feb 11
-
Privacy: Legal Issues
- Ordering Pizza,
ACLU. (Note: blatant propaganda piece...)
- FBI
wants records kept of Web sites visited, Declan McCullagh,
CNET News, Feb 5, 2010.
- Obama's
Nominee for T.S.A. Withdraws,
New York Times, Jan 20, 2010.
- Identifying
John Doe: It might be easier than you think,
blog posting, Feb 8, 2010.
- What
Third Parties Know About John Doe,
blog posting, Feb 9, 2010.
- The
Traceability of an Anonymous Online Comment,
blog posting, Feb 10, 2010.
- Google
Buzz: Privacy nightmare,
CNET blog posting, Feb 10, 2010
- Feb 23
-
Free Speech: Accountability
- Exploiting
Linkages for Good, blog posting, Dec 31, 2007.
- Cyber
Civil Rights, Danielle Citron,
89 Boston University Law Review 61 (2009).
(Related article that isn't required reading:
Law's
Expressive Value in Combating Cyber Gender Harassment,
Danielle Citron,
108 Michigan Law Review 373 (2009).)
- Anonymity
and traceability in cyberspace, Richard Clayton, PhD dissertation,
University of Cambridge, November 2005,
technical report UCAM-CL-TR-653 — read Chapter 3.
- Mar 04
-
Online Behavior
- Hackers
Assault Epilepsy Patients via Computer,
Wired Magazine, 28 March 2008.
- Judge
Acquits Lori Drew in Cyberbullying Case, Overrules Jury,
Wired Magazine, 2 July 2009.
- Facebook
Users Keep it Real in Online Profiles,
Science News, 26 February 2010
- Hey,
You're Breaking Up on Me!,
Washington Post, 13 February 2007.
- The
Boundaries of a Breakup,
New York Times, 20 November 2009.
- Mar 09
-
Voluntary Disclosures
- Israeli
Raid Canceled After Facebook Leak,
Robert Mackey,
New York Times Lede Blog, 3 March 2010.
- Project
'Gaydar',
Carolyn Y. Johnson,
Boston Globe, 20 September 2009.
- I
Am Here: One Man's Experiment With the Location-Aware Lifestyle,
Mathew Honan,
Wired Magazine,
19 January 2009.
- FTC
Warns of Data Breaches from P2P File Sharing,
Brian Prince,
eWeek, 23 February 2010.
- S. 3027,
P2P Cyber Protection and Informed User Act, 111th Congress.
- Facebook
tosses graph privacy into the bin,
Joseph Bonneau,
Light Blue Touchpaper blog,
11 December 2009.
- What
Does Facebook's Privacy Transition Mean For You?, ACLU.
- Mar 30
-
Copyrights; Patents
- Math
of Publishing Meets the E-Book, New York
Times, Feb 28, 2010.
- Entertainment
Industry Asks White House for Vast New Internet Monitoring,
Filtering, and Takedown Powers,
Lauren Weinstein's blog, 25 March 2010.
- Method
of exercising a cat, Kevin T. Amiss and Martin H. Abbott,
U.S. patent 5,443,036, issued Aug 22, 1995.
- Business
method protecting jokes, Timothy Wace Roberts,
U.S. patent application 10/569,506, filed Aug 24, 2004. (skim).
- What
is a Patent?, up to but not including the section
titled "The United States Patent And Trademark Office"
- For
Texas Instruments, Calculator Hackers Don't Add Up,
D. Kushner,
IEEE Spectrum 46:12, December 2009.
- Unintended
Consequences: Twelve Years under the DMCA,
Electronic Frontier Foundation,
March 2010. (optional)
- Apr 06
-
Risks of Computers
- Textbook, chapter 8
- An
Experimental Evaluation of the Assumption of
Independence in Multi-Version Programming, John Knight and
Nancy Leveson, IEEE Transactions on Software Engineering
SE-12:1, January 1986, pp. 96-109.
- Analysis
of faults in an N-version software experiment,
S.S. Brilliant, J.C. Knight, and N.G. Leveson,
IEEE Transactions on Software Engineering 16:2,
February 1990. (optional)
- The
Bug Heard 'Round the World, Jack Garman,
ACM Software Engineering Notes, October, 1981, pp. 3-10.
- Vulnerabilities
of network control protocols: an example,
Eric C. Rosen,
ACM SIGCOMM Computer Communication Review 11:3,
July 1981.
- Who
Needs Hackers?, John Schwartz,
New York Times,
September 12, 2007.
- Technical
background on AT&T's network slowdown, January 15, 1990
- Prius
software problems? Is the Prius stopping or stalling on
the Highway?, October 13, 2005.
- Going
Ballistic! A hacker tourist explores the deep recesses
of fabled Air Force stronghold Cheyenne Mountain, where
the Cold War never stops., Phil Patton,
Wired magazine 7:11, November 1999.
- 20
Mishaps That Might Have Started Accidental Nuclear
War, Alan F. Phillips. See #18 and #19.
- 'I
Had A Funny Feeling in My Gut',
David Hoffman,
Washington Post Foreign Service,
February 10, 1999.
- History's
Worst Software Bugs, Simson Garfinkel,
Wired magazine, November 2005.
- 50
Plus Blue Screen of Death Displays in Public,
Hiroshi, 14 June 2009.
- An ACM Digital Library error,
which I got while working on this lecture...
- Apr 08
-
Risks: Security
- Hacking
the Hill,
Shane Harris, National Journal Magazine,
Dec. 20, 2008.
- Researchers
Trace Data Theft to Intruders in China,
John Markoff and David Barboza,
New York Times, April 5, 2010.
- Jan.
28, 2001: Hey, Don’t Tampa With My Privacy,
Ryan Singel,
Wired Magazine,
This Day In Tech: Events That Shaped the Wired World,
Jan 28, 2010.
- Police
secretly snapping up to 14m drivers a day,
Times Online, April 4, 2010.
- Apr 15
-
Risks: What do we Do?
- Anatomy
of an IT disaster: How the FBI blew it,
InfoWorld, 21 March 2005
- Guest View: It's Not Too Late to Learn,
James Shore,
Software Development Times on the Web,
15 August 2005.
- The FBI’s
Trilogy Information Technology Modernization Program —
Summary,
Computer Science and Telecommunications Board,
National Academies, May 2004.
- IRS
trudges on with aging computers,
CNET News,
12 April 2007.
- Apr 27
-
Gender Issues
- Barriers
to the Advancement of Technical Women: A Review of the Literature,
Caroline Simard, Anita Borg Institute for Women and Technology,
2007.
- Women
in IT: The Facts, by NCWIT,
Catherine Ashcraft and Sarah Blithe,
National Center for Women & Information Technology (NCWIT),
2009.
- Gender:
Integrated Report of Findings,
Dawn Nafus, James Leach, and Bernhard Krieger,
FLOSSPOLS Project,
2006.
- Out
of the Loop in Silicon Valley,
Claire Cain Miller,
New York Times, 18 April 2010.