Abstract
We believe that the handling of information security in fiction is, in general, neither technically realistic nor dramatically interesting. Furthermore, we believe that technically realistic treatment of information security could be an effective plot device. We provide examples (and one counterexample) from well regarded television shows to support our beliefs. We conclude with a short fictional work of our own creation that attempts to use information security in a technically realistic and dramatically interesting manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Royals and Loyals: NCIS, Season 8, Episode 4. Oct. 12, (2010)
Berlin, NCIS, Season 10, Episode 21, 23 April 2013
Let’s Get to Scooping, How to Get Away With Murder, Season 1, Episode 4, 16 October 2014
911, Law and Order SVU: Season 7, Episode 3, 4 October 2005
Broken Hearts, Homeland, Season 2, Episode 10, 2 December 2012
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 29th Symposium on Security and Privacy, pp. 129–142. IEEE, Piscataway (2008)
Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. In: 28th SIGCHI Conference on Human Factors in Computing Systems, pp. 917–926. ACM Press, New York (2010)
Valasek, C., Miller, C.: A Survey of Remote Automotive Attack Surfaces (2014). http://illmatics.com/remote%20attack%20surfaces.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Feigenbaum, J., Rosen, B. (2015). On the Use of Security and Privacy Technology as a Plot Device. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-26096-9_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26095-2
Online ISBN: 978-3-319-26096-9
eBook Packages: Computer ScienceComputer Science (R0)