Information Technology Reference
In-Depth Information
State officials conclude the electoral fraud may have changed the outcome of the
election, but they cannot say for sure. They have no evidence that candidate X knew
anything about this scheme to increase his vote tally.
Divide the class into groups representing President X, the other presidential candi-
dates, citizens of East Dakota, and citizens of other states to discuss the proper response
to this revelation. For guidance, consult Article II, Section 1, and Amendment XII to the
United States Constitution.
Further Reading and Viewing
Tom Bearden. “Preventing a 'Cyber-Pearl Harbor.'” PBS NewsHour , April 16, 2012. 7:45.
video.pbs.org.
John Brunner. The Shockwave Rider . Harper & Row, New York, NY, 1975.
Annie Machon (interview). “Anonymous Ops 'a New Front in Protest.'” RT, April 7, 2013.
4:18. rt.com/op-edge/.
Avi Rubin. “All Your Devices Can Be Hacked.” TED Talk, February 2012. 16:56. www.ted
.com/talks/.
Ray Suarez. “US Fed Up with China's Cyber Theft, Say Analysts.” PBS NewsHour , July 8, 2013.
9:39. video.pbs.org.
References
[1]
Steven Levy. Hackers: Heroes of the Computer Revolution . Anchor Press/Doubleday,
Garden City, NY, 1984.
[2]
G. Malkin and T. LaQuey Parker, editors. “Hacker.” Internet Users' Glossary , January
1993. www.rfc-editor.org.
[3]
Dan Verton. “Corporate America Is Lazy, Say Hackers; Vandalism of USA Today Site a
Warning.” Computerworld , July 22, 2002.
[4]
Marcia Savage. “Mitnick Turns Gamekeeper.” Te c hWe b. c om , October 30, 2000.
[5]
William Cheswick. “Rethinking Passwords.” Communications of the ACM , February
2013.
[6]
Mat Honan. “Hacked.” Wired , December 2012.
[7]
Michael Arnone. “Hacker Steals Personal Data on Foreign Students at U. of Kansas.”
Chronicle of Higher Education , January 24, 2003.
[8]
Sara Lipka. “Hacker Breaks into Database for Tracking International Students at
UNLV.” Chronicle of Higher Education , March 21, 2005.
[9]
Dan Carnevale. “Harvard and MIT Join Carnegie Mellon in Rejecting Applicants Who
Broke into Business-School Networks.” Chronicle of Higher Education , March 9, 2005.
[10]
John P. Mello Jr. “Sesame Street Hacked, Porn Posted.” PCWorld , October 17, 2011.
[11]
Eric Butler. “Firesheep.” {codebutler} (blog), October 24, 2010. codebutler.com.
[12]
Bob Brown. “Father of Firesheep Fires Away after Wild Week in WiFi Security.” Net-
workWorld , November 2, 2011. www.networkworld.com.
[13]
Tom Anderson. “Firesheep in Wolves' Clothing: Extension Lets You Hack into Twitter,
Facebook Accounts Easily.” TechCrunch , October 24, 2010. techcrunch.com.
 
 
 
Search WWH ::




Custom Search