This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
March/April 2012 (vol. 10 no. 2)
pp. 3-5
Jeremy Epstein, Associate Editor in Chief
How can we know if a technology's risk or benefit is greater? From electronic voting machines to backscatter machines, our ever increasing technology is raising issues we must address.

1. M. Clayton, "Cyberattack on Illinois Water Utility May Confirm Stuxnet Warnings," Christian Science Monitor,18 Nov. 2011.
2. K. Zetter, "Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report," Wired,30 Nov. 2011.
3. M. Bell, "Full Body Scanner Images Released Online—Just Not Images from an Airport Scanners," Washington Post,17 Nov. 2010; http://voices.washingtonpost.com/blog-post/ 2010/11full_body_scanner_images_relea.html .
4. E. Lazarus et al., "Applying a Reusable Election Threat Model at the County Level," Proc. EVT/WOTE 2011; http://josephhall.org/papersdill-evtwote11.pdf .
5. The Risks Digest: Forum on Risks to the Public in Computers and Related Systems,12 Feb. 2012; http://catless.ncl.ac.uk/Risks26.72.html .
6. I. Klotz, "Programming Error Doomed Russian Mars Probe," Discovery News,7 Feb. 2012; http://news.discovery.com/spaceprogramming-error-doomed-mars-probe.html .
7. D. Shiga, "Space Radiation Killed Russian Mars Mission," New Scientist,7 Feb. 2012; www.newscientist.com/blogs/shortsharpscience/ 2012/02space-radiation-killed-russian.html .
8. J. Oberg, "Did Bad Memory Chips Down Russia's Mars Probe?," IEEE Spectrum, Feb. 2012; http://spectrum.ieee.org/aerospace/space-flight did-bad-memory-chips-down-russias-mars-probe .
9. E. Chabrow, "Putting to Rest RSA Key Security Worries," Bank Info Security,20 Feb. 2012; www.bankinfosecurity.cominterviews.php?interviewID=1395 .
10. "Armored SUV Could Not Protect US Agents in Mexico," Washington Post,15 Feb. 2012; www.washingtonpost.com/world/armored-suv-could-not-protect-us-agents-in-mexico/ 2012/ 02/13gIQACv1KFR_story.html.

Index Terms:
cybersecurity, backscatter, risk tradeoff, computer security
Citation:
Jeremy Epstein, "Can We Be Too Careful?," IEEE Security & Privacy, vol. 10, no. 2, pp. 3-5, March-April 2012, doi:10.1109/MSP.2012.33
Usage of this product signifies your acceptance of the Terms of Use.