- Alessandro Acquisti, Carnegie Mellon University, Associate Professor:
Privacy in Electronic Commerce and the Economics of Immediate Gratification
The Economics of Personal Data and the Economics of Privacy
Silent Listeners: The Evolution of Privacy and Disclosure on Facebook - Andrew Adams, Meiji University, Professor:
Emerging Social Norms in the UK and Japan on Privacy and Revelation in SNS
A Non-Militarised Approach to Cyber-Security
Student assessment in the ubiquitously connected world - Ross Anderson, Cambridge University, Professor of Security Engineering
- Maria Armoudin, University of Southern California, Fellow:
Kill the Messenger: The Media’s Role in the Fate of the World explores how mass media framing impacts war and peacemaking and human rights violations or protections - Zinaida Benenson, University of Erlangen-Nuremberg
- Laura Brandimarte, Heinz College – Carnegie Mellon University, Post-doctoral Fellow
- william burns, Decision Research/CSUSM, Professor
- L. Jean Camp, Indiana University, Professor
- David Clark, MIT CSAIL, Senior Research Scientist
- Sandy Clark, University of Pennsylvania
- Richard Clayton, University of Cambridge, Security Researcher
- Chris Cocking, University of Brighton, Senior Lecturer:
Don’t Panic! Blog - Robin Dillon-Merrill, Georgetown University, Associate Professor
- Esther Dyson, EDventure, Chairman
- Paul Ekblom, Dept of Security & Crime Science University College London, Visiting Professor:
5Is framework – generic detailed process model/knowledge capture for crime prevention
Gearing up against Crime: a Dynamic Framework to Help Designers Keep up with the Adaptive Criminal in a Changing World
Can we Make Crime Prevention Adaptive by Learning from other Evolutionary Struggles?
What Do You Mean, “Is It Secure?” Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods - Don Fallis, University of Arizona, Professor:
What is Lying?
Toward an Epistemology of Wikipedia
Floridi on Disinformation - Mark Frank, University at Buffalo, State University of New York, Professor
- Shannon French, Case Western Reserve University, Inamori
- Vaibhav Garg, Drexel University, Postdoc
- Jeff Hancock, Cornell University, Associate Professor:
Publications listing - Cormac Herley, Microsoft Research, Principal Researcher:
Why do Nigerian Scammers Say They are from Nigeria?
So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users - Dustin Ho, Facebook, Software Engineer
- Jonathan Ito, Institute for Creative Technologies, Postdoc Research Associate:
Context dependent utility: modeling decision behavior across contexts - Richard John, Univ of Southern California, Assoc. Professor
- David Kahn, self, Ph.D.
- Jerry Kang, UCLA, Prof. of Law:
Seeing through Colorblindness: Implicit Bias and the Law (2010)
Self-Surveillance Privacy (2012)
Trojan Horses of Race (2005)
Information Privacy in Cyberspace Transactions (1998) - Mark Latonero, USC Annenberg School – Center on Communication Leadership & Policy, Research Director/Research Assistant Professor:
The Rise of Mobile and the Diffusion of Technology-Facilitated Human Trafficking
Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds
Emergency Management, Twitter, and Social Media Evangelism - Steven LeBlanc, Peabody Museum, Harvard University, Director of Collections
- Karen Levy, Princeton University, PhD Candidate
- David Modic, University of Exeter, Graduate Fellow:
How neurotic are scam victims, really? The big five and Internet scams
Preferences Between Risky Prospects with Virtual Tender - Harvey Molotch, NYU, Professor of sociology
- Tyler Moore, Southern Methodist University, Assistant Professor:
How Do Consumers React to Cybercrime?
Do malware reports expedite cleanup? An experimental study
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs - John Mueller, Ohio State University/Cato Institute, Senior Fellow:
The Terrorism Delusion
Terror, Security, and Money (with Mark Stewart) - Andrew Odlyzko, University of Minnesota, Professor:
Providing security with insecure systems, WiSec’10
Privacy, economics, and price discrimination on the Internet, ICEC2003
Economics, psychology, and sociology of security, Financial Cryptography 2003 - Patrick Olivier, Newcastle University, Professor of Human-Computer Interaction
- Christopher Palow, Facebook, Engineering Manager
- Charles Ransford, Cure Violence, Senior Researcher:
Early intervention through curing communities of violence
Cure Violence: A Disease Control Approach to Reduce Violence and Change Behaviour
Examination of the Role of CeaseFire, the Chicago Police, Project Safe Neighborhoods, and Displacement in the Reduction in Homicide in Chicago in 2004 - Peter Robinson, Cambridge, Professor of Computer Technology
Emotionally intelligent interfaces - Heather Rosoff, CREATE, Research Professor
- Angela Sasse, UCL, Professor:
Security Education against Phishing: A Modest Proposal for a Major Rethink
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising - Molly Sauter, Center for Civic Media, MIT, Research Assistant:
“LOIC Will Tear Us Apart”: The Impact of Tool Design and Media Portrayals in the Success of Activist DDOS Attacks - Bruce Schneier, BT, Chief Security Technology Officer:
When It Comes to Security, We’re Back to Feudalism
Power and the Internet - Paul Slovic, Decision Research, President
- John Scott-Railton, Citizen Lab, Research Fellow:
Planet Blue Coat: Mapping Global Censorship and Surveillance Tools
The Voices Projects - David Smith, University of New England, Professor of Philosophy:
Man’s First War
Rethinking G20
Less Than Human - Christopher Soghoian, ACLU Speech Privacy & Technology Project, Principal Technologist:
The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance
Can You See Me Now: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
ACLU Files FTC Complaint Over Android Smartphone Security - Ashkan Soltani, Soltani LLC, Independent Researcher/Consultant:
Websites Vary Prices, Deals Based on Users’ Information
They Know What You’re Shopping For - Frank Stajano, University of Cambridge, Senior Lecturer:
Understanding scam victims: seven principles for systems security
Pico: no more passwords
The quest to replace passwords - Milind Tambe, USC, Professor:
Game-theoretic Randomization for Security Patrolling with Dynamic Execution Uncertainty
A Deployed Quantal Response Based Patrol Planning System for the US Coast Guard
Improving Resource Allocation Strategies Against Human Adversaries in Security Games: An Extended Study - Terence Taylor, International Council for the Life Sciences, President
- Jodok Troy, Department of Political Science, University of Innsbruck, Lecturer
- Rick Wash, Michigan State University, Assistant Professor:
Folk Models of Home Computer Security
Stories as Informal Lessons about Security - Detlof Winterfeldt, USC