This Article 
 Bibliographic References 
 Add to: 
March/April 2012 (vol. 10 no. 2)
pp. 3-5
Jeremy Epstein, Associate Editor in Chief
How can we know if a technology's risk or benefit is greater? From electronic voting machines to backscatter machines, our ever increasing technology is raising issues we must address.

1. M. Clayton, "Cyberattack on Illinois Water Utility May Confirm Stuxnet Warnings," Christian Science Monitor,18 Nov. 2011.
2. K. Zetter, "Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report," Wired,30 Nov. 2011.
3. M. Bell, "Full Body Scanner Images Released Online—Just Not Images from an Airport Scanners," Washington Post,17 Nov. 2010; 2010/11full_body_scanner_images_relea.html .
4. E. Lazarus et al., "Applying a Reusable Election Threat Model at the County Level," Proc. EVT/WOTE 2011; .
5. The Risks Digest: Forum on Risks to the Public in Computers and Related Systems,12 Feb. 2012; .
6. I. Klotz, "Programming Error Doomed Russian Mars Probe," Discovery News,7 Feb. 2012; .
7. D. Shiga, "Space Radiation Killed Russian Mars Mission," New Scientist,7 Feb. 2012; 2012/02space-radiation-killed-russian.html .
8. J. Oberg, "Did Bad Memory Chips Down Russia's Mars Probe?," IEEE Spectrum, Feb. 2012; did-bad-memory-chips-down-russias-mars-probe .
9. E. Chabrow, "Putting to Rest RSA Key Security Worries," Bank Info Security,20 Feb. 2012; www.bankinfosecurity.cominterviews.php?interviewID=1395 .
10. "Armored SUV Could Not Protect US Agents in Mexico," Washington Post,15 Feb. 2012; 2012/ 02/13gIQACv1KFR_story.html.

Index Terms:
cybersecurity, backscatter, risk tradeoff, computer security
Jeremy Epstein, "Can We Be Too Careful?," IEEE Security & Privacy, vol. 10, no. 2, pp. 3-5, March-April 2012, doi:10.1109/MSP.2012.33
Usage of this product signifies your acceptance of the Terms of Use.