Cybersecurity and Computer Crimes

From Technologies and Politics of Control
Revision as of 16:22, 24 March 2015 by Andy (talk | contribs)
Jump to navigation Jump to search

March 31

Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the various responses to it. Hacking at its heart involves modifying or intruding upon another’s system. But not all intrusion is socially harmful, and writing laws against hacking have a troubling (and at times, tragic) history of being misused. How big a threat is hacking, really? How should systems respond to hacking? What, if anything, should be the role of government? In what ways can we govern those who don’t consider code to be a governing influence?

Assignment 3

Assignment 3 is due before class today. You can upload that here.


Readings

Cybersecurity
Computer Crimes
Case studies

Optional Readings



Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 10:28, 17 December 2013 (EST)