The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2012 vol.10)
pp: 3-5
Jeremy Epstein , Associate Editor in Chief
How can we know if a technology's risk or benefit is greater? From electronic voting machines to backscatter machines, our ever increasing technology is raising issues we must address.
cybersecurity, backscatter, risk tradeoff, computer security
Jeremy Epstein, "Can We Be Too Careful?", IEEE Security & Privacy, vol.10, no. 2, pp. 3-5, March/April 2012, doi:10.1109/MSP.2012.33
1. M. Clayton, "Cyberattack on Illinois Water Utility May Confirm Stuxnet Warnings," Christian Science Monitor,18 Nov. 2011.
2. K. Zetter, "Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report," Wired,30 Nov. 2011.
3. M. Bell, "Full Body Scanner Images Released Online—Just Not Images from an Airport Scanners," Washington Post,17 Nov. 2010; 2010/11full_body_scanner_images_relea.html .
4. E. Lazarus et al., "Applying a Reusable Election Threat Model at the County Level," Proc. EVT/WOTE 2011; .
5. The Risks Digest: Forum on Risks to the Public in Computers and Related Systems,12 Feb. 2012; .
6. I. Klotz, "Programming Error Doomed Russian Mars Probe," Discovery News,7 Feb. 2012; .
7. D. Shiga, "Space Radiation Killed Russian Mars Mission," New Scientist,7 Feb. 2012; 2012/02space-radiation-killed-russian.html .
8. J. Oberg, "Did Bad Memory Chips Down Russia's Mars Probe?," IEEE Spectrum, Feb. 2012; did-bad-memory-chips-down-russias-mars-probe .
9. E. Chabrow, "Putting to Rest RSA Key Security Worries," Bank Info Security,20 Feb. 2012; www.bankinfosecurity.cominterviews.php?interviewID=1395 .
10. "Armored SUV Could Not Protect US Agents in Mexico," Washington Post,15 Feb. 2012; 2012/ 02/13gIQACv1KFR_story.html.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool