- Max Abrahms, Northeastern University, Political Science Prof:
New book about militant groups - Yasemin Acar, Leibniz University Hannover and NIST:
Comparing the Usability of Cryptographic APIs
You get where you’re looking for: The impact of information sources on code security - Alessandro Acquisti, Carnegie Mellon University H. John III College, Professor of Information Technology and Public Policy; PwC William W. Cooper Prof of Risk and Regulatory Innovation:
The Economics of Privacy
Privacy and human behavior in the age of information - Andrew Adams, Centre for Business Information Ethics, Meiji University, Deputy Director:
Following Snowden: A Cross-cultural Study on the Social Impact of Snowden’s Revelations
Possessing Mobile Devices
RRING: Responsible Research and Innovation Networking Globally - Bonnie Anderson, Brigham Young University, Professor of Information Systems:
Neurosecurity—Using neurophysiological tools to examine security behavior - Ross Anderson, Cambridge University, Professor of Security Engineering:
Reconciling the multiple objectives of security design in the context of institutions and cultures
How can we make security sustainable
Gullibility, online and off
What goes around comes around - Robert Axelrod, University of Michigan, Professor
- Zinaida Benenson:
Security Lifetime Labels—Overcoming Information Asymmetry in Security of IoT Consumer Products
Unpacking Spear Phishing Susceptibility
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Malicious IoT Implants: Tampering with Serial Communication over the Internet - Matt Blaze
- Laura Brandimarte, University of Arizona, Assistant Professor
- Maria Brincker, University of Massachusetts Boston, Associate Professor of Philosophy:
Privacy in public and the contextual conditions of agency (2017)
Dynamics of Perceptible Agency: The Case of Social Robots (2016) in Minds and Machines - Jon Callas
- L. Jean Camp
Reconceptualizing the Role of Security User, Daedalus 140.4
“Mental Models of Privacy and Security,” IEEE Technology & Society, Vol 28 (3)
“Personalized WhatsApp Privacy: Demographic and Cultural Influences on Saudi and Indian Users,” in press - Richard Clayton, University of Cambridge, Director Cambridge Cybercrime Centre:
How do people end up running booters
Are some links to malware clicked on more than others
Some conference attendees make bookings with criminals! - Julie Cohen, Georgetown Law, Mark Claster Mamolen Professor of Law & Technology:
Between Truth and Power: Legal Constructions of Informational Capitalism (forthcoming, OUP)
Law for the Platform Economy
The Regulatory State in the Information Age - Jayati Dev
- Judith Donath:
The persuasive power of cute and sociable bots
Believing the counterfactual binds tight-knit groups - Patrick Dowd, AWS, Director, Information Security
- Jeremy Epstein, National Science Foundation, Deputy Division Director, Computer & Network Systems
- Charles Fennell, Michigan State University, PhD student:
Emotional Impact: How Stories Affect Password Behavior
Can People Self-Report Security Accurately? Agreement Between Self-Report and Behavioral Measures - Shannon French, Case Western Reserve University and CGSC Foundation, Inamori Professor in Ethics and Gen. Hugh Shelton Distinguished Chair in Ethics:
Artificial Intelligence in Military Decision-Making: Avoiding Ethical and Strategic Perils with an Option-Generator Model
Neuro-interventions and the Military: Solving the Right Problems
Dehumanizing the Enemy: The Intersection of Neuroethics and Military Ethics - Allan Friedman, NTIA, US Dept of Commerce, Director of Cybersecurity:
An innovative process to set cybersecurity market norms around “Software Bill of Materials”
Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences - Alisa Frik, UC Berkeley/International Computer Science Institute, Postdoctoral Fellow:
Better late(r) than never: Increasing cyber-security compliance by reducing present bias - Vaibhav Garg
- Krishna Gummadi, Max Planck Institute for Software Systems, Faculty:
Human Perceptions of Fairness in Algorithmic Decision Making:A Case Study of Criminal Risk Prediction
Investigation Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
Forgetting in Social Media: Understanding and Controlling Longitudinal exposure of Socially Shared Data
The Many Shade of Anonymity: Characterizing Anonymous Social Media Content - Ian Harris, University of California, Irvine, Professor:
“Catch me, Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time” – This is a BlackHat 2018 briefing on using natural language understanding to detect social engineering attacks - Richard John, University of Southern California, Professor:
Insights for Critical Alarm-Based Warning Systems from a Risk Analysis of Commercial Aviation Passenger Screening
Causal evidence in risk and policy perceptions: Applying the covariation/ mechanism framework
Gradients of Fear and Anger in the Social Media Response to Terrorism
Lay judgements of the probable cause standard - Patrick Gage Kelley, Google, Security, Privacy, and Anti-abuse Researcher
- Rutger Leukfeldt, Netherlands Institute for the Study of Crime and Law Enforcement, Senior Researcher:
The Human Factor in Cybercrime and Cybersecurity
Organised Crime and IT - David Levari, Harvard Business School, Postdoctoral Researcher:
Prevalence-induced concept change in human judgment - John Lyle, Facebook, Software Engineering Manager:
Fighting Abuse @ Scale Conference
Facebook’s Community Standards Enforcement on Fake Accounts - Alan Mislove, Northeastern University, Associate Professor and Associate Dean:
Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface
Investigating sources of PII used in Facebook’s targeted advertising
Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
On the Potential for Discrimination in Online Targeted Advertising - Harvey Molotch, NYU, Professor Emeritus, Sociology and Metropolitan Studies:
The New Arab Urban (book)
Against Security (book) - Tyler Moore, The University of Tulsa, Tandy Associate Professor of Cyber Security:
Price manipulation in the Bitcoin ecosystem
The rise and fall of cryptocurrencies
Cybersecurity research datasets: Taxonomy and empirical analysis
Herding vulnerable cats: A statistical approach to disentangle joint responsibility for web security in shared hosting - John Mueller, Ohio State University/Cato Institute, Senior Fellow:
Terrorism and Bathtubs: Comparing and Assessing the Risks
Risk, Reaction, Elite Cues, and Perceived Threat in International Politics
Public Opinion and Counterterrorism Policy
Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks - Christof Paar, Ruhr University Bochum, Professor:
Hardware Reverse Engineering: Overview and Open Challenges - Tage Rai, MIT, Research Associate:
Virtuous Violence/My book analyzing moral motives of violent perpetrators
Dehumanization increases instrumental violence, but not moral violence/PNAS 2017 on limits of dehumanization as an explanation of violence
Organizations elicit blame but not sympathy when they can think but not feel/OBHDP 2015 on corporate reputation and data breaches
Moral psychology is Relationship Regulation/Psychological Review 2011 on moral psychology across cultures - Nikol Rummel, Ruhr-Universität Bochum, Prof. Dr./Full Professor
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights - Molly Sauter, McGill University, PhD Candidate:
Google’s Guinea-Pig City/Atlantic Feature on the Sidewalk Toronto Smart City Project
Instant Recall/Essay on algorithmic reminiscence systems
Persuasion and the other thing: a critique of big data methodologies in politics - Stuart Schechter, Entrepreneur:
Before You Use a Password Manager
Before You Turn On Two-Factor Authentication… - Bruce Schneier, Harvard Kennedy School, Fellow:
Defending Democratic Mechanisms and Institutions against Information Attacks
Common-Knowledge Attacks on Democracy
Democracy’s Dilemma
Toward an Information Operations Kill Chain - David Sidi, The University of Arizona, PhD student:
Automated Adversarial Privacy Technology with The Data Underminer Project - David Smith, University of New England, Professor of Philosophy:
Donald Trump, dangerous speech, and the legacy of white supremacist terrorism
Manufacturing monsters: dehumanization and public policy
How media makes, ignites, and breaks ideology
Interview on dehumanization - Tony Vance, Temple University, Associate Professor:
Generalization of Habituation: When Non-essential Notifications Cause Users to Tune Out Critical Security Warnings
Tuning Out Security Warnings: A Longitudinal Examination of Habituation through fMRI, Eye Tracking, and Field Experiments - Arun Vishwanath:
List of all papers published on cyber security issues stemming from human cyber vulnerability
Article on getting phished on social media
Model explaining how and why people fall for phishing
Paper explaining the limitation of present training techniques - Jim Waldo, Harvard University, Professor of the Practice
- Logan Warberg, Carnegie Mellon University, Doctoral Student
- Rick Wash, Michigan State University, Associate Professor:
Who Provides Phishing Training?
Human Interdependencies in Security Systems
Folk Models of Home Computer Security - Lydia Wilson, University of Oxford, Research Fellow:
Understanding the Appeal of ISIS - Jeff Yan, Linköping University, Professor of Cyber Security:
From Sicilian mafia to Chinese “scam villages” - Leting Zhang, Temple University, PhD student:
Online Hacker Forum Censorship: Would Banning the Bad Guys Attract Good Guys?
Does Sharing Make My Data More Insecure?An Empirical Study on Health Information Exchange and Data Breaches - Jonathan Zittrain, Harvard Law School, George Bemis Professor of International Law:
Harvard Business Review article on information fiduciaries