- Max Abrahms, Northeastern University, Professor:
What Does ISIS Want?
Why the Islamic State Actually Stinks at Social Media
Explaining Terrorism: Leadership Deficits and Militant Group Tactics
Why the Conventional Wisdom on ISIS Has Been Totally Wrong - Alessandro Acquisti, Carnegie Mellon University, Professor of Information Technology and Public Policy
The Economics of Privacy - Andrew Adams, Centre for Business Information Ethics, Meiji University, Deputy Director:
Possessing Mobile Devices
Facebook Code: Social Network Sites Platform Affordances and Privacy - Bonnie Anderson, Brigham Young University, Professor of Information Systems:
BYU Neurosecurity Lab
What Does the Brain Tell Us About the Timing of Security Messages? Insights from an fMRI and Web-based Experiment
Eyes Glazed Over: Using Eye Tracking and fMRI to Measure Habituation to Warnings over a Workweek - Ross Anderson, Cambridge, Professor of Security Engineering:
Cambridge Cybercrime Centre
Ethics of doing research with big data
Psychological impact of online fraud
Surveillance policy - William Arkin, Vice News; NBC; etc., National Security Consultant:
Unmanned: Drones, Data and the Illusion of Perfect Warfare
The Most Militarized Universities in America
Top Secret America - Robert Axelrod
- Lara Ballard, U.S. Department of State, Special Advisor for Privacy and Technology:
The European Origins of American Intelligence - Yochai Benkler, Harvard University, Professor of Law:
A Public Accountability Defense for National Security Leakers and Whistleblowers, 8(2) Harv. L. & Policy Rev. 2014.
Networks of Power, Degrees of Freedom, International Journal of Communications 5. 2011. 721-755
Practical Anarchism: Peer Mutualism, Market Power, and the Fallible State, Politics and Society 4(2) 213-251. 2013.
Peer Production of Survivable Critical Infrastructures, in The Law and Economics of Cybersecurity, M. Grady and F. Parisi, eds. Cambridge University Press 2005. - Fareed Ben-Youssef, University of California, Berkeley (Film & Media), Doctoral Candidate:
‘Beautiful, isn’t it?’: On the Allure and Trap of State Surveillance in The Dark Knight - Howard Bowman, School of Computing, University of Kent, Professor:
Subliminal Salience Search Illustrated: EEG Identity and Deception Detection on the Fringe of Awareness
Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough
The simultaneous type, serial token model of temporal attention and working memory - Laura Brandimarte, University of Arizona, Assistant Professor of Management Information Systems
- John Chuang, UC Berkeley, Professor
- David Clark, MIT CSAIL, Senior Research Scientist
- Sunny Consolvo, Google
- Robin Dillon-Merrill, McDonough School of Business, Georgetown University, Professor
- Richard Danzig, Johns Hopkins Advanced Physical Laboratory, Senior Advisor:
Surviving on a Diet of Poison Fruit: The National Security Implications of America’s Cyber Dependencies - Judith Donath, Berkman Center, Harvard University, Advisory Affiliate:
book in progress about how arms race of honesty and deception shapes our world, from ancient evolved features to futuristic gadgets - Serge Egelman, ICSI, Senior Researcher:
The Myth of the Average User: Improving Privacy and Security Systems through Individualization
Android Permissions Remystified: A Field Study on Contextual Integrity
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
Android Permissions: User Attention, Comprehension, and Behavior - Michael Egnoto, START, University of Maryland, Assistant Clinical Professor and Researcher
- Shannon French, Case Western Reserve University, Inamori Professor in Ethics and Director, Inamori International Center for Ethics and Excellence:
Military Ethics and the Code of the Warrior
“Dehumanizing the Enemy: The Intersection of Neuroethics and Military Ethics”
The US Army Ethic
Distinguishing Warriors from Murders and Terrorists - Giorgio Ganis, University of Plymouth (UK), Associate Professor in Neuroscience:
Electroencephalographic study of different types of concealed information
Effect of covert countermeasures on deception detection by neuroimaging - Jack Goldsmith, Harvard Law School, Professor
- Adam Harvey, Undisclosed LLC, Artist:
a marketplace for creative countersurveillance
camouflage from face detection (part of privacy gift shop) - Alex Imas, Carnegie Mellon University, Assistant Professor:
Do People Anticipate Loss Aversion?
A History of Violence: Field Evidence on Trauma, Discounting and Present Bias - Richard John, University of Southern California, Associate Professor:
Identifying and Structuring the Objectives of the “Islamic State of Iraq and the Levant” (ISIL) and its Followers
Attacker Deterrence and Perceived Risk in a Stackelberg
Security Game
The effects of attacker identity and individual user characteristics on the value of information privacy
Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games - Jennifer King, UC Berkeley School of Information, PhD Candidate:
I will be discussing in-progress research on using social exchange theory to provide an alternative means for analyzing privacy decison-making - Butler Lampson, Microsoft Research, Technical Fellow:
Personal Control of Data
Retroactive Security
Practical principles for computer security
Perspectives on Security - Eliot Lear, Cisco Systems, Principal Engineer:
Manufacturer Usage Descriptions - Steven LeBlanc, Peabody Museum, Research Associate
- Karen Levy, Cornell University, Assistant Professor:
Intimate Surveillance
Relational Big Data
Workplace Surveillance - Ewout Meijer, Maastricht University, PhD/Assistant Professor:
A Call for Evidence-Based Security Tools
Extracting Concealed Information from Groups
Conceptual and methodological considerations in deception detection - Vera Mironova
- Tyler Moore, University of Tulsa, Tandy Assistant Professor of Cyber Security:
Identifying how firms manage cybersecurity investment
Understanding the role of sender reputation in abuse reporting and cleanup
The Bitcoin brain drain: a short paper on the use and abuse of Bitcoin brain wallets - John Mueller, Ohio State University/Cato Institute, Senior Fellow:
Book: Chasing Ghosts: The Policing of Terrorism, Oxford UP, 2016
Scrutinizing the costs of counterterrorism - David Murakami Wood, Queen’s University, Department of Sociology
Urban surveillance after the end of globalization - Helen Nissenbaum, New York University, Professor
- Joseph Nye, Harvard Kennedy School, Professor:
Is the American Century Over?
The Regime Complex for Managing Cyber Activities - Silvia Saccardo, Carnegie Mellon University, Assistant Professor:
Motivated Self-deception, Identity and Unethical Behavior
Bribery: Greed versus Reciprocity - Martina Angela Sasse, University College London, Professor:
Scaring and bullying users into security won’t work
Shadow Security as a tool for the Learning Organisation
Why much ‘usable security’ research is misguided
NIST study on impact of authentication
Rule breakers, excuse makers and security champions: Mapping the risk perceptions and emotions that drive security behaviors - Molly Sauter, McGill University, PhD Candidate:
Book on the use of DDoS as a tool of online activism - Stuart Schechter, Microsoft Research, Researcher:
Learning Assigned Secrets for Unlocking Mobile Devices
Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance
Ethical-Response Survey Report: Fall 2014
Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It - John Scott-Railton, Citizen Lab, Senior Researcher:
Packrat: Seven Years of a South American Threat Actor
London Calling: Two-Factor Authentication Phishing From Iran
China’s Great Cannon
Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation - David Smith, University of New England, Professor of Philosophy:
Website for my 2011 book: Less Than Human: Why We Demean, Enslave, and Exterminate Others
The Politics of Illusion: From Socrates and Psychoanalysis to Donald Trump
The Essence of Evil
Paradoxes of Dehumanization - Jessica Stern, Boston University Pardee School of Global Studies, Research Professor:
New York Times: How Terror Hardens Us
Politico: The Islamic State Paradox
HSGAC Testimony
Journal of Orthopsychiatry: Relation of Psychosocial Factors to Diverse Behaviors and Attitudes Among Somali Refugees - Deepti Sunder Prakash, Apple Inc., CoreOS Security Researcher
- Elena Svetieva, Center for Creative Leadership, Postdoctoral Research Fellow:
The Choice to Lie or Tell the Truth: Studying Individual and Situational Influences on Deception in an Economic Decision Game
Empathy, emotion dysregulation and enhanced microexpression recognition ability
Anger mediates the effect of ostracism on risk-taking - Michael Tschantz, International Computer Science Institute, Researcher:
Discrimination and Opacity in Online Behavioral Advertising
Formalizing and Enforcing Purpose Restrictions in Privacy Policies
Grounding Censorship Circumvention in Empiricism - Catherine Tucker, MIT, Professor:
Government Surveillance and Internet Search Behavior
Privacy Regulation and Online Advertising
Social Networks, Personalized Advertising, and Privacy Controls
Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records - Sophie van der Zee, TNO, Dr. / medior researcher cyber crime:
Lying to Survive
Mining bodily cues to deception
AMAB: Automated measurement and analysis of body motion
To freeze or not to freeze: A motion-capture approach to detecting deceit
When lying feels the right thing to do - Tony Vance, Brigham Young University, Associate Professor of Information Systems:
BYU Neurosecurity Lab
It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings
How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda and Empirical Study - Ric Wash, Michigan State University, Associate Professor:
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences
Folk Models of Home Computer Security - Jonathan Zittrain, Harvard Univ. Berkman Center for Internet & Society, Professor:
Algorithmic accountability