Author: University of Cambridge
Description
S08 – Session 8 Discussion
2014-06-0937:01
S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
2014-06-0910:10
S08 – John Kaag, UML: The moral hazard of drones
2014-06-0910:18
S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
2014-06-0909:44
S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
2014-06-0910:51
S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer
2014-06-0912:03
Session 7 Discussion
2014-06-0936:33
S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
2014-06-0906:45
S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
2014-06-0911:08
S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
2014-06-0908:49
S07 – David Livingstone Smith, Maine: Making monsters
2014-06-0910:57
Session 6 Discussion
2014-06-0930:07
S06 – Masashi Crete-Nishihata, Toronto: Targeted Threats against Human Rights Groups
2014-06-0911:06
S06 – David Murakami Wood, Queens: Vanishing Security and Ambient Government
2014-06-0913:39
S06 – Laura Brandimarte, CMU: Privacy Trade-Offs of Geo-Location – General Population Concerns and an Application to the 2020 US Census
2014-06-0909:00
Session 5 Discussion
2014-06-0928:09
S05 – Angela Sasse, UCL: Usable Security - Time for a Reboot
2014-06-0912:56
S05 – Jeff Yan, Newcastle: Security and usability of CAPTCHAs
2014-06-0912:43
S05 – Yuliy Pisetski, Facebook: OAuth2: Sharing (Not So) Secrets
2014-06-0909:51
S05 – Serge Egelman, Berkeley: Individualizing Privacy and Security Mechanisms
2014-06-0908:03