Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
S08 – Session 8 Discussion
|
Jun 09, 2014 |
|
S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
|
Jun 09, 2014 |
|
S08 – John Kaag, UML: The moral hazard of drones
|
Jun 09, 2014 |
|
S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
|
Jun 09, 2014 |
|
S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
|
Jun 09, 2014 |
|
S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer
|
Jun 09, 2014 |
|
Session 7 Discussion
|
Jun 09, 2014 |
|
S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
|
Jun 09, 2014 |
|
S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
|
Jun 09, 2014 |
|
S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
|
Jun 09, 2014 |
|
S07 – David Livingstone Smith, Maine: Making monsters
|
Jun 09, 2014 |
|
Session 6 Discussion
|
Jun 09, 2014 |
|
S06 – Masashi Crete-Nishihata, Toronto: Targeted Threats against Human Rights Groups
|
Jun 09, 2014 |
|
S06 – David Murakami Wood, Queens: Vanishing Security and Ambient Government
|
Jun 09, 2014 |
|
S06 – Laura Brandimarte, CMU: Privacy Trade-Offs of Geo-Location – General Population Concerns and an Application to the 2020 US Census
|
Jun 09, 2014 |
|
Session 5 Discussion
|
Jun 09, 2014 |
|
S05 – Angela Sasse, UCL: Usable Security - Time for a Reboot
|
Jun 09, 2014 |
|
S05 – Jeff Yan, Newcastle: Security and usability of CAPTCHAs
|
Jun 09, 2014 |
|
S05 – Yuliy Pisetski, Facebook: OAuth2: Sharing (Not So) Secrets
|
Jun 09, 2014 |
|
S05 – Serge Egelman, Berkeley: Individualizing Privacy and Security Mechanisms
|
Jun 09, 2014 |
|
Session 4 Discussion
|
Jun 09, 2014 |
|
S04 – David Modic, Cambridge: We Will Make You Like Our Research
|
Jun 09, 2014 |
|
S04 – Shannon French, Case Western: The Obligation of Officers to Preserve the Humanity of their Troops
|
Jun 09, 2014 |
|
S04 – Chris Cocking, Brighton: Collective insecurity? Overcoming society’s fear of the crowd
|
Jun 09, 2014 |
|
S04 – Scott Atran, John Jay College, CNRS and University of Michigan: Sacred values and cultural conflict
|
Jun 09, 2014 |
|
Session 3 Discussion
|
Jun 09, 2014 |
|
S03 – Tyler Moore, SMU: Increasing the impact of voluntary action against cybercrime
|
Jun 09, 2014 |
|
S03 – John Lyle, Facebook: The User Is Not The Enemy, But They May Be An Accomplice – Understanding Human-Transmitted Malware
|
Jun 09, 2014 |
|
S03 – Richard Harper, Microsoft: glancephones, wayve devices and the cloud mouse
|
Jun 09, 2014 |
|
S03 – Cormac Herley, Microsoft: Is Everything We Know About Password Stealing Wrong?
|
Jun 09, 2014 |
|
S03 – Nicolas Christin, CMU: It's All About the Benjamins – An Empirical Study on Incentivizing Users to Ignore Security Advice
|
Jun 09, 2014 |
|
S03 – Harold Thimbleby, Swansea: Improving safety in medical devices and systems
|
Jun 09, 2014 |
|
Session 2 Discussion
|
Jun 09, 2014 |
|
S02 – Diego Gambetta, EUI: Natural and Strategic Generosity as Signals of Trustworthiness
|
Jun 09, 2014 |
|
S02 – Bhismadev Chakrabarti, Reading: What determines who we mimic spontaneously? Impact of reward on empathy
|
Jun 09, 2014 |
|
S02 – Brian Glass, UCL: Modelling Misrepresentation in Online Seller-Buyer Interactions
|
Jun 09, 2014 |
|
S02 – Michelle Baddeley: A Behavioural Analysis of Online Privacy and Security
|
Jun 09, 2014 |
|
S02 – Bonnie Anderson, BYU: How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda
|
Jun 09, 2014 |
|
Session 1 Discussion
|
Jun 09, 2014 |
|
S01 – Jussi Palomaki, Newcastle: Deception, Machiavellianism and poker
|
Jun 09, 2014 |
|
S01 – Aldert Vrij, Portsmouth: A Cognitive Approach to Elicit Nonverbal and Verbal Cues to Deceit
|
Jun 09, 2014 |
|
S01 – Sophie van der Zee, Cambridge: When lying feels the right thing to do
|
Jun 09, 2014 |
|
S01 – Frank Stajano, Cambridge: Understanding scam victims – seven principles for systems security
|
Jun 09, 2014 |
|
S01 – Mark Frank, Buffalo: Mythperceptions: deception and security
|
Jun 09, 2014 |