UIC CS 491/Kent Law Special Topics on Security: Reading Assignments

  • Week of January 12: Introduction to law for UIC students only
  • Week of January 19:
    • Asimov, "The Dead Past", distributed to class.
    • Warner, The Problem of Mass Surveillance (this and all the rest of the readings for this week are up at Prof. Warner's course web site)
    • Warner, Why Mandating Consent Will Not Work
    • Helen Nissenbaum, Privacy as Contextual Integrity
    • Dwyer v. American Express
    • Daniel Solove, A Taxonomy of Privacy
    • Bartow, “A Feeling of Unease about Privacy” (a response to Solove) (recommended)
    • Topheavy Studios, Inc. v. Jane Doe (recommended)
    • Remsberg v. Docusearch, Inc. (recommended)
  • For Tuesday, January 26
  • For Thursday, January 28
    • A. Odlyzko, Economics, Psychology and Sociology of Security, in Financial Cryptography: 7th International Conference, FC 2003, Lecture Notes in Computer Science #2742, Springer, 2003, pp. 182-18, Course Google Group, file Odlyzko2003.
    • Anderson book, Chapter 25.5, Risk Management
  • Probably will start Thursday January 28, maybe not until following Tuesday:
  • Starting sometime week of February 1: Privacy: What Technology has changed:
  • Tuesday, February 9
  • For Tuesday February 9 if possible, else for Thursday February 11: Foundations of Information Security
    • Anderson book, Chapter 1–2.2, 25.1–25.2
  • For Thursday, February 18: Economics and Information Security:
    • Anderson, Chapter 7
    • Schneier, "A Lemons Market for Security," http://www.schneier.com/crypto-gram-0705.html#1
    • Anderson and Moore, "Information security: where computer science, economics and psychology meet," Philosophical Transactions of the Royal Society, 2009, Sections 5–8. On course's Google Group site. (Sections 1–4 have very large overlap with the book chapter.)
    • And a little on Psychology on Information Security: Anderson, Chapter 2.3.
  • Week of February 23: Readings from Prof. Warner.
  • Tuesday March 2:
    • Inevitability of Software Flaws: Anderson 25.3 (and remember the start of this chapter)
    • Legal Responses to same: Readings from Prof. Warner
  • Thursday, March 4: Prediction markets. 3 Readings, all including Wolfers and Zitzewitz among the author list, all available from http://bpp.wharton.upenn.edu/jwolfers/research.shtml#PM
    1. "The Promise of Prediction Markets," Arrow, Forsythe, Gorham, Hahn, Hanson, Ledyard, Levmore, Litan, Milgrom, Nelson, Neumann, Ottaviani, Schelling, Shiller, Smith, Snowberg, Sunstein, Tetlock, Tetlock, Varian, Wolfers and Zitzewitz, Science, 320, p.877, May 16 2008.
    2. Wolfers and Zitzewitz,, "Five Open Questions About Prediction Markets, Working Paper.
    3. Wolfers and Zitzewitz, "Prediction Markets," Journal of Economic Perspectives, 18(2), Spring 2004
  • For March 30: ProCD v. Zeidenberg
  • For March 30 and April 1: Authentication, Passwords, Protocols: Anderson book, Chapters 2 and 3, omitting last section of Chapter 3.
  • Tuesday, April 6: Access control and cryptography
    • Anderson, Chapter 4, skipping section 4.3 on hardware
    • Anderson, Chapter 5.1-5.3
    • Abelson et al. Blown to Bits, Chapter 5 ("Secret Bits")
  • Thursdays April 15 and 22: Malware, Network attacks and defenses, firewalls: Anderson, Chapters 6.3.4 and all of 21.
  • Final week:April 25-30:
    • Tuesday: eBay v. Bidders' Edge, distributed via email
    • Thursday: Anderson, Chapter 23: Terror, Justice, and Freedom

-- Main.sloan - 23 Jan 2010

Topic attachments
I Attachment Action Size Date WhoSorted ascending Comment
Microsoft Word filedoc Primer_on_the_Internet.doc manage 93.5 K 2010-01-27 - 17:07 UnknownUser  
Microsoft Word filedoc The_Law_and_Economics_of_Liability_for_Unauthorized_Access.doc manage 43.0 K 2010-01-23 - 19:37 UnknownUser Sloan and Warner, The Economics of Liability for Unauthorized Access
 
Copyright 2016 The Board of Trustees
of the University of Illinois.webmaster@cs.uic.edu
WISEST
Helping Women Faculty Advance
Funded by NSF