Ethical Dilemmas in Teaching Computer and Internet Security | SpringerLink
Skip to main content

Ethical Dilemmas in Teaching Computer and Internet Security

  • Conference paper
Information Security and Digital Forensics (ISDF 2009)

Abstract

This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analysis hosted by City University. These are valid concerns about the nature of material taught to computer science students in the area of security.

The questions are also important ethical dilemmas for any professional working in the computer and internet security field. These are also applicable when discussing such security risks with the media, members of the public and even legislators. Information on vulnerabilities has to be presented so that it informs programmers and computer users about the areas of risk, but without providing recipes for them to use to conduct criminal activities or mischief themselves.

The paper will look at several case studies from the curriculum at the University of Hull at both undergraduate and postgraduate level. Some specific problem areas of email forgery, security of the Windows operating system and exploitation of buffer overflows, and deception in online auctions, will be explored.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Boyd, C.: Profile: Gary McKinnon, BBC News Online (30 July 2008), http://news.bbc.co.uk/1/hi/technology/4715612.stm

  2. BBC News: Estonia fines man for ‘cyber war’, BBC News Online (25 January 2008), http://news.bbc.co.uk/1/hi/technology/7208511.stm

  3. Gont, F.: Security Assessment of the Internet Protocol, CPNI (July 2008), http://www.cpni.gov.uk/Docs/InternetProtocol.pdf

  4. CPNI: Security Assessment of the Transmission Control Protocol, CPNI Technical Note 3/2009 (2009), http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf

  5. Trusted Computing Group: Trusted Platform Module (2009), http://www.trustedcomputinggroup.org/developers/trusted_platform_module

  6. Li, H.K.: Security Ethics, Letter to the Editor, IT Now, British Computer Society, p. 32 (May 2009)

    Google Scholar 

  7. Wanigaratne, S.: Teaching Security, Letter to the Editor, IT Now, British Computer Society, p. 32 (July 2009)

    Google Scholar 

  8. House of Lords Science and Technology Committee: Personal Internet Security, 5th Report of Session 2006-07, HL Paper 165, TSO (2007)

    Google Scholar 

  9. House of Lords Science and Technology Committee: Personal Internet Security: Follow-up, 4th Report of Session 2007-2008, HL Paper 131, TSO (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Tompsett, B. (2010). Ethical Dilemmas in Teaching Computer and Internet Security. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11530-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11529-5

  • Online ISBN: 978-3-642-11530-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics