Ranked #1
S08 – Session 8 Discussion
S08 – Session 8 Discussion
9 Jun 2014
•
37mins
Ranked #2
S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
9 Jun 2014
•
10mins
Ranked #3
S08 – John Kaag, UML: The moral hazard of drones
S08 – John Kaag, UML: The moral hazard of drones
9 Jun 2014
•
10mins
Ranked #4
S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
9 Jun 2014
•
9mins
Ranked #5
S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
9 Jun 2014
•
10mins
Ranked #6
S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer
S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer
9 Jun 2014
•
12mins
Ranked #7
Session 7 Discussion
Session 7 Discussion
9 Jun 2014
•
36mins
Ranked #8
S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
9 Jun 2014
•
6mins
Ranked #9
S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
9 Jun 2014
•
11mins
Ranked #10
S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
9 Jun 2014
•
8mins