- Full text PDF available (7)
- This year (0)
- Last 5 years (3)
- Last 10 years (4)
Journals and Conferences
Programming in Java can be a daunting task for introductory students, one that is only compounded by the cryptic compiler error messages they see when they first start to write actual code. This… (More)
Regulations intended to improve health care data access have created new security risks along with headaches for patients and practitioners.
Following the 2000 presidential election debacle in Florida, government officials promised sweeping reforms that would prevent such chaos from reoccurring. Indeed, the Florida election code was… (More)
Quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs.
The computer's role in identity theft incidents may have been misgauged through overestimates of reported losses.
The disparity between the code of election law and the code that comprises election equipment reflects inherent problems in the translation of social policies into computer procedures and overseeing… (More)
T he belief that code secrecy can make a system more secure is commonly known as security by obscurity. Certainly, vendors have the right to use trade secret protection for their products in order to… (More)
In providing security assurances, transparency and trust are inherently intertwined concepts, but their relationship is not well understood.
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts… (More)