Security and Human Behaviour (SHB 2014)

By University of Cambridge

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Courses

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 44

Description

Recordings from talks at the 7th Workshop on Security and Human Behaviour (SHB 2014)

Episode Date
S08 – Session 8 Discussion
Jun 09, 2014
S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
Jun 09, 2014
S08 – John Kaag, UML: The moral hazard of drones
Jun 09, 2014
S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
Jun 09, 2014
S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
Jun 09, 2014
S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer
Jun 09, 2014
Session 7 Discussion
Jun 09, 2014
S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
Jun 09, 2014
S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
Jun 09, 2014
S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
Jun 09, 2014
S07 – David Livingstone Smith, Maine: Making monsters
Jun 09, 2014
Session 6 Discussion
Jun 09, 2014
S06 – Masashi Crete-Nishihata, Toronto: Targeted Threats against Human Rights Groups
Jun 09, 2014
S06 – David Murakami Wood, Queens: Vanishing Security and Ambient Government
Jun 09, 2014
S06 – Laura Brandimarte, CMU: Privacy Trade-Offs of Geo-Location – General Population Concerns and an Application to the 2020 US Census
Jun 09, 2014
Session 5 Discussion
Jun 09, 2014
S05 – Angela Sasse, UCL: Usable Security - Time for a Reboot
Jun 09, 2014
S05 – Jeff Yan, Newcastle: Security and usability of CAPTCHAs
Jun 09, 2014
S05 – Yuliy Pisetski, Facebook: OAuth2: Sharing (Not So) Secrets
Jun 09, 2014
S05 – Serge Egelman, Berkeley: Individualizing Privacy and Security Mechanisms
Jun 09, 2014
Session 4 Discussion
Jun 09, 2014
S04 – David Modic, Cambridge: We Will Make You Like Our Research
Jun 09, 2014
S04 – Shannon French, Case Western: The Obligation of Officers to Preserve the Humanity of their Troops
Jun 09, 2014
S04 – Chris Cocking, Brighton: Collective insecurity? Overcoming society’s fear of the crowd
Jun 09, 2014
S04 – Scott Atran, John Jay College, CNRS and University of Michigan: Sacred values and cultural conflict
Jun 09, 2014
Session 3 Discussion
Jun 09, 2014
S03 – Tyler Moore, SMU: Increasing the impact of voluntary action against cybercrime
Jun 09, 2014
S03 – John Lyle, Facebook: The User Is Not The Enemy, But They May Be An Accomplice – Understanding Human-Transmitted Malware
Jun 09, 2014
S03 – Richard Harper, Microsoft: glancephones, wayve devices and the cloud mouse
Jun 09, 2014
S03 – Cormac Herley, Microsoft: Is Everything We Know About Password Stealing Wrong?
Jun 09, 2014
S03 – Nicolas Christin, CMU: It's All About the Benjamins – An Empirical Study on Incentivizing Users to Ignore Security Advice
Jun 09, 2014
S03 – Harold Thimbleby, Swansea: Improving safety in medical devices and systems
Jun 09, 2014
Session 2 Discussion
Jun 09, 2014
S02 – Diego Gambetta, EUI: Natural and Strategic Generosity as Signals of Trustworthiness
Jun 09, 2014
S02 – Bhismadev Chakrabarti, Reading: What determines who we mimic spontaneously? Impact of reward on empathy
Jun 09, 2014
S02 – Brian Glass, UCL: Modelling Misrepresentation in Online Seller-Buyer Interactions
Jun 09, 2014
S02 – Michelle Baddeley: A Behavioural Analysis of Online Privacy and Security
Jun 09, 2014
S02 – Bonnie Anderson, BYU: How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda
Jun 09, 2014
Session 1 Discussion
Jun 09, 2014
S01 – Jussi Palomaki, Newcastle: Deception, Machiavellianism and poker
Jun 09, 2014
S01 – Aldert Vrij, Portsmouth: A Cognitive Approach to Elicit Nonverbal and Verbal Cues to Deceit
Jun 09, 2014
S01 – Sophie van der Zee, Cambridge: When lying feels the right thing to do
Jun 09, 2014
S01 – Frank Stajano, Cambridge: Understanding scam victims – seven principles for systems security
Jun 09, 2014
S01 – Mark Frank, Buffalo: Mythperceptions: deception and security
Jun 09, 2014