CS 491 Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations

You have zero privacy anyway. Get over it.

Scott Mcnealy, CEO Sun Microsystems, January 1999

History will record what we, here in the early decades of the information age, did to foster freedom, liberty, and democracy. Did we build information technologies that protected people’s freedoms even during times when society tried to subvert them? Or did we build technologies that could easily be modified to watch and control?

Bruce Schneier, Risks of Data Reuse, CRYPTO-GRAM, July 15, 2007

Technopolicy involves a complex interplay betweeen science, engineering, psychology, law and economics. There is altogether too little serious cross-disciplinary research. . . . It's extraordiarily easy for technopolicy arguments to get detached at one or more corners from reality.

Ross Anderson, Security Engineering, 2nd edition, p. 813

Welcome to this team-taught course between UIC's Computer Science Department and Kent-IIT Law School. As there are two instructors, there are two course web pages. You'll need to follow both. This is Prof. Sloan's UIC page; you also need to look at Prof. Warner's course page. Most readings are posted only there.

Prof. Richard Warner, Kent IIT Law School and Prof. Robert H. Sloan, University of Illinois at Chicago Department of Computer Science.

Class: Tuesdays and Thursdays, 2:00–3:15 p.m.

Tuesdays: Kent IIT Law School Adams & Clinton; Kent Classroom: 170
(UIC students: Walk North on Halsted, turn right at Adams; if you get to Union Station you've overshot.)
Thursdays: UIC classroom: Lecture Center A4.

January 12 and 14, only UIC students will meet at UIC for a tutorial on law.
No class for UIC students week of March 23–25 (Spring break).
All other weeks: Tuesday class at Kent; Thursday class at UIC.

Prof. Sloan office hours: Mondays 11–12, and additionally both drop ins and appointments very very welcome.


Required Book for technological side of course:

  • Ross Anderson, Security Engineering, Wiley, 2nd edition, 2009. (2001 edition will not be sufficient.)

Except for that book, unless otherwise indicated, all readings are available on the course websites, mostly on Prof. Warner's course page.

Assigned Reading

Current list by date of reading assignments


Clike here for current version of syllabus

Lecture Slides from Prof. Sloan's Lectures

Will appear as they are given

Useful links (a few may be required or optional readings)

Academic Integrity; Plagiarism

For UIC students, this is a 400-level course with much more writing than a typical graduate course. The minimum penalty for any acts of academic dishonesty will be a grade of F for the course; the maximum expulsion from UIC.

Plagiarism is using another's ideas or words without proper acknowledgment. You must cite any sources you have used. In addition to citing a source generally in a bibliography, you must indicate any phrases you use from sources by putting them in quotation marks (short to medium quotes) or setting them as block quotes (longer excerpts) with an immediately following citation.

Back to UIC CS Home page

-- Main.sloan - 17 Jan 2010

Copyright 2014 The Board of Trustees
of the University of Illinois.webmaster@cs.uic.edu
Helping Women Faculty Advance
Funded by NSF