The Washington Area Trustworthy Computing Hour (WATCH) seminar series
About the WATCH series:
Today we are regularly obliged to trust a cyberinfrastructure that is in fact untrustworthy. Transforming today’s infrastructure into one that can meet society’s growing demands is major national challenge and opportunity. Meeting the challenge requires not only technical advances in the fabric of computing and communication but also improved understanding of how individuals and organizations comprehend and use technology, how economic and policy incentives can affect adoption of new technology, and how to develop human-centered systems that can serve users with different national, cultural, and technical backgrounds around the planet. WATCH aims to provide a series of thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Trustworthy Computing Program
Video and Audio will be available one month after each meeting. You can also visit the CISE webinar/webcast page for more WATCH information at: http://www.nsf.gov/events/event_group.jsp?group_id=20018&org=CISE
To join our listserv and receive WATCH Series by email, please send a blank email to:
You should receive an email to confirm your subscription within an hour.
Next WATCH series:
Reflections on Decades of Defending Imperfect Software
July 17, 2014
To attend virtually, please register at:http://www.tvworldwide.com/events/nsf/140717/.
Upcoming WATCH series:
Past WATCH series:
5/15/14 - Dan Wallach, "STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System"
4/17/14 - Deb Frincke, "Education and Training - NSA/CSS Style"
3/20/14 - Maya Bernstein, "Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems"
2/20/14 - Deanna Caputo, "Going Spear phishing: Exploring Embedded Training & Awareness"
1/14/14 - Roger Dingledine, "The Tor Project in 2013"
11/25/13 - Alessandro Acquisti, "An Experiment in Hiring Discrimination via Online Social Networks"
7/18/13 - Stewart Baker, "Cyberwar -- Without the Magical Thinking"
3/21/13 - Cormac Herley, "Security, Cybercrime and Scale"
1/17/13 - Patrick Lincoln, "Ultra Paranoid Computing"
11/15/12 - Kevin Fu, "Medical Device Cybersecurity: The First 164 Years"
10/18/12 - Jeff Hancock, "Deception and Cybersecurity"
8/16/12 - Ernest McDuffie, "National Initiative for Cybersecurity Education (NICE) Overview"
4/19/12 - Lorrie Cranor, "Security, Privacy, and Usability: Better Together"
3/15/12 - Tom Longstaff, "Barriers to the.Science of Security"
2/16/12 - Paul Barford, "Challenges and Opportunities in Cyber Security Innovation"
1/19/12 - Vitaly Shmatikov, "The End of Anonymity, the Beginning of Privacy"
12/1/11 - Fabian Monrose, "Hooked On Phonics: Learning to Read Encrypted VoIP Conversations"
11/3/11 - Stefan Savage, Why the hard problem of computer security needs the soft sciences"
10/6/11 - Douglas Maughan, "So what if I take over a botnet to do my research?"
9/1/11 - Marshall Van Alstyne, "Fighting Fraud from an Economic Perspective"
8/4/11 - Ken Klingenstein, "Trust and Turtles All the Way Down..."
7/7/11 - Paul L. Harris, "Selective Credulity"
6/1/11 - Fred B. Schneider, "Doctrine for Cybersecurity."
Questions/comments about WATCH? Contact Keith Marzullo