{"id":495,"date":"2012-06-06T04:35:41","date_gmt":"2012-06-05T20:35:41","guid":{"rendered":"http:\/\/blog.a-cubed.info\/?p=495"},"modified":"2012-06-06T04:35:41","modified_gmt":"2012-06-05T20:35:41","slug":"security-and-human-behaviour-session-8-future","status":"publish","type":"post","link":"http:\/\/blog.a-cubed.info\/?p=495","title":{"rendered":"Security and Human Behaviour &#8211; Session 8 Future"},"content":{"rendered":"<p><strong>Ross Anderson, Cambridge<\/strong><br \/>\n<strong><\/strong><\/p>\n<p>Deception: Would personalising payment pages reduce small scale fraud?<\/p>\n<p>How is being watched by humans different to being watched by software?<\/p>\n<p>Blackstone: The law is the long march from status to contract. Are we now towards the end of the long march from honour codes to ubiquitous technical surveillance?<\/p>\n<p><strong>Dave Clark, MIT<\/strong><br \/>\n<strong>Reactions to Prior Talks<\/strong><\/p>\n<p>A lot of the stories we tell are move\/counter-move systems? Why are we in an equilibrium and it&#8217;s not that one side won? Perhaps it&#8217;s just that if one side won, the question is not interesting.<\/p>\n<p>The way to reduce crime is not to build perfect systems, but to make sure crime doesn&#8217;t pay.<\/p>\n<p><strong>Peter Robinson, Cambridge<\/strong><br \/>\n<strong>The Eyes Have It<\/strong><\/p>\n<p>There is something that can be done with eye gaze in detecting speakers&#8217; state of mind.<\/p>\n<p>Identifying people who are cognitively overloaded (e,.g. while driving, to reduce interupptions from navigation systems or the like).<\/p>\n<p><strong>Peter Swire, Ohio State<\/strong><br \/>\n<strong>Tour of Projects<\/strong><\/p>\n<p>Encryption and globalisation paper, particularly the attempts by China and India to repeat the US mistakes.<\/p>\n<p>Going Dark v. the Golden Access of Surveillance.<\/p>\n<p>USvJones.com: Help judges by suggesting usable doctrine.<\/p>\n<p>Are Hackers Inefficient?<\/p>\n<p>The Right to Data Portability<\/p>\n<p>Pretty Good De-identification<\/p>\n<p>The Second Wave of Global Privacy Protection (Ohio State, Nov 2012) conference<\/p>\n<p><strong>Rahul Telang, Carnegie Mellon<\/strong><br \/>\n<strong>Competition and Security<\/strong><\/p>\n<p>Does (can) competition increase security and\/or privacy?<\/p>\n<p>Hospitals are under incrasing pressure to invest in patient security and privacy.<\/p>\n<p>In a more competitive healthcare market, there is evidence of more data breaches.<\/p>\n<p>On most other measures, more competition increases quality.<\/p>\n<p><strong>Alma Whitten, Google<br \/>\nWhen is the Future?<\/strong><\/p>\n<p>The future is at most ten years from now. Meaningfully, five or ten years from now is the future, because things move so fast.<\/p>\n<p>Technologists have a fair amount of power to build the future. But technologists are often taking their subtle direction from artists: particularly from science fiction.<\/p>\n<p>Shows the &#8220;Expo&#8221; sequence from Iron Man 2. &#8220;I really want that interface&#8221;.<\/p>\n<p>Some questions: Where are the boundaries? Who maintains it? Who pays for it?<\/p>\n<p>Easy answers in the fiction (an eccentric techno-genius billionnaire), but if we want those tools for everyone these questions become more difficult to answer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ross Anderson, Cambridge Deception: Would personalising payment pages reduce small scale fraud? How is being watched by humans different to being watched by software? Blackstone: The law is the long march from status to contract. Are we now towards the end of the long march from honour codes to ubiquitous technical surveillance? Dave Clark, MIT [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,43,5],"tags":[],"class_list":["post-495","post","type-post","status-publish","format-standard","hentry","category-academia","category-security","category-legal-and-ethical"],"_links":{"self":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=495"}],"version-history":[{"count":1,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/495\/revisions"}],"predecessor-version":[{"id":496,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=\/wp\/v2\/posts\/495\/revisions\/496"}],"wp:attachment":[{"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=495"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.a-cubed.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}