In the first two of these three columns, I introduced the course and research materials on my Web site, < https:\/\/www2.norwich.edu\/mkabay >. In this column, I\u2019d like to show you some of the papers on security and ethics topics there.Start with the \u201cEthics\u201d link anywhere you see it. There\u2019s a short paper that many people find helpful on how normal human beings make decisions about ethical problems; contrary to some people\u2019s opinions, there\u2019s more to it than the decision-making process involved in choosing flavors of ice cream.The harangues in \u201cThe Napster Cantata,\u201d \u201cWhy Kids Shouldn\u2019t Be Criminal Hackers,\u201d and \u201cHackers are Enemies\u201d have made me a number of enemies and generated some hate mail over the years, including one massive diatribe by a famous criminal hacker who threatened me with lawsuits, boasted about his lack of concern for normal human empathy, and generally showed signs of serious mental disorders.\u201cTotem and Taboo\u201d is a much more serious paper looking at the development of a moral code in the use of any developing technology and focusing on information technology in particular.Finally, the \u201cAnonymity and Pseudonymity\u201d paper eventually became Chapter 53 of the _Computer Security Handbook, 4th Edition_ and includes some practical suggestions which have been completely ignored for several years on how ISPs could help stop spam and anonymous abuse of the Internet. Interestingly, \u201cVox clamantis in deserto\u201d (a voice crying in the wilderness) is the motto of my doctoral alma mater, Dartmouth College. I seem to be illustrating its meaning. Perhaps some of you readers will be interested in pursuing the ideas I put forth in that paper.Another section I hope you will find helpful and interesting is \u201cMethods.\u201d The most important file there is \u201cCATA: Computer-Aided Thematic Analysis,\u201d a blindingly simply technique for organizing information that everyone I have taught it to seems to find helpful. You know it\u2019s a good idea when the universal response is, \u201cHey, neat! Why didn\u2019t I think of that?\u201dThe recent ACM _Ubiquity_ publication \u201cOrganizing and Safeguarding Information on Disk\u201d will help the organizationally challenged make sense of their disk files (\u201cWhere did I put that darned file? I know it was around here among these 18,000 other files somewhere\u2026\u201d). The two papers on statistics became Chapter 4 of the _Computer Security Handbook_ and provide non-specialists with the proper dose of skepticism about all those security surveys we always hear about every year - the ones with self-selected participants, huge levels of non-response and no validation of results.So that\u2019s all for now. You can also explore the other sections of the site, including \u201cSecurity Management\u201d and \u201cOpinion\u201d (as if you don\u2019t get enough of those in this column).Welcome to my world!