text-only page produced automatically by LIFT Text
Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation HomeNational Science Foundation - Directorate for Computer & Information Science & Engineering (CISE)
Computer & Network Systems (CNS)
design element
CNS Home
About CNS
Funding Opportunities
Career Opportunities
View CNS Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office

The Washington Area Trustworthy Computing Hour (WATCH) seminar series

About the WATCH series:


Today we are regularly obliged to trust a cyberinfrastructure that is in fact untrustworthy. Transforming today’s infrastructure into one that can meet society’s growing demands is major national challenge and opportunity. Meeting the challenge requires not only technical advances in the fabric of computing and communication but also improved understanding of how individuals and organizations comprehend and use technology, how economic and policy incentives can affect adoption of new technology, and how to develop human-centered systems that can serve users with different national, cultural, and technical backgrounds around the planet. WATCH aims to provide a series of thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Trustworthy Computing Program

Video and Audio will be available one month after each meeting. You can also visit the CISE webinar/webcast page for more WATCH information at: http://www.nsf.gov/events/event_group.jsp?group_id=20018&org=CISE

To join our listserv and receive WATCH Series by email, please send a blank email to:


You should receive an email to confirm your subscription within an hour.

Next WATCH series:

Mary Ellen Callahan
Cybersecurity and Privacy: Complementary -- Not Mutually Exclusive -- Concepts
Jenner & Block LLP
March 19, 2015

To attend virtually, please register at:http://www.tvworldwide.com/events/nsf/150319/.

Past WATCH series:

1/15/15 - Salil Vadhan, "Differential Privacy: Theoretical and Practical Challenges"

11/13/14 - Dana Chisnell, "The burden of authentication: What friction points reveal"

7/17/14 - Crispin Cowen, "Reflections on Decades of Defending Imperfect Software"

5/15/14 - Dan Wallach, "STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System"

4/17/14 - Deb Frincke, "Education and Training - NSA/CSS Style"

3/20/14 - Maya Bernstein, "Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems"

2/20/14 - Deanna Caputo, "Going Spear phishing: Exploring Embedded Training & Awareness"

1/14/14 - Roger Dingledine, "The Tor Project in 2013"

11/25/13 - Alessandro Acquisti, "An Experiment in Hiring Discrimination via Online Social Networks"

7/18/13 - Stewart Baker, "Cyberwar -- Without the Magical Thinking"

3/21/13 - Cormac Herley, "Security, Cybercrime and Scale"

1/17/13 - Patrick Lincoln, "Ultra Paranoid Computing"

11/15/12 - Kevin Fu, "Medical Device Cybersecurity: The First 164 Years"

10/18/12 - Jeff Hancock, "Deception and Cybersecurity"

8/16/12 - Ernest McDuffie, "National Initiative for Cybersecurity Education (NICE) Overview"

4/19/12 - Lorrie Cranor, "Security, Privacy, and Usability: Better Together"

3/15/12 - Tom Longstaff, "Barriers to the.Science of Security"

2/16/12 - Paul Barford, "Challenges and Opportunities in Cyber Security Innovation"

1/19/12 - Vitaly Shmatikov, "The End of Anonymity, the Beginning of Privacy"

12/1/11 - Fabian Monrose, "Hooked On Phonics: Learning to Read Encrypted VoIP Conversations"

11/3/11 - Stefan Savage, Why the hard problem of computer security needs the soft sciences"

10/6/11 - Douglas Maughan, "So what if I take over a botnet to do my research?"

9/1/11 - Marshall Van Alstyne, "Fighting Fraud from an Economic Perspective"

8/4/11 - Ken Klingenstein, "Trust and Turtles All the Way Down..."

7/7/11 - Paul L. Harris, "Selective Credulity"

6/1/11 - Fred B. Schneider, "Doctrine for Cybersecurity."


Questions/comments about WATCH? Contact Keith Marzullo


Email this pagePrint this page
Back to Top of page