Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Upcoming Events   

 Craig Shue

 

 

Managing User-Level Compromises in Enterprise Networks
Craig Shue
Worcester Polytechnic Institute
Tuesday March 31, 2015 @4:15pm

 Harold Thimbleby

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
Tuesday April 21, 2015 @4:15pm

Mary Ellen Zurko

 

 

User-Centered Security: From Grand Challenge to Technology Transfer
Mary Ellen Zurko
Cisco
Tuesday May 12, 2015 @4:15pm

Scout Sinclair Brody

 

 

Open-Sourcing Usable Security
Scout Sinclair Brody
Simply Secure
Tuesday June 2, 2015 @4:15pm

Recent Talks  

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
May 28, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 

Newsletter 

Feb news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2010 Presentations

Download eCampus 2010 presentations and complementing documents here.

Training Sessions

Into the Cloud: A Hands-on Workshop Exploring the Pros and Cons of Hosting Servers in Public, Private, and Hybrid Clouds
Adam Goldstein

Data Driven Security: A Different Approach to Determining Security Requirements
Steve Nyman

Presentations

Picking Policy Priorities: Porn, Privacy, Procurement, P2P, or IP
Greg Jackson

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
Cormac Herley

Characterizing the Cyberthreat Landscape
Matthew Devost

Panel Discussion: Cloud Computing - Pros and Cons
David Bucciero, John Calkins, Greg Jackson, and Sheri Stahler

Three Approaches to Awareness: Unified Messaging, Local Responses, and National Cybersecurity Awareness Month
Michael Kaiser

How Should Colleges Respond to RIAA and Other File Sharing Subpoenas?
Ray Beckerman

  • Overview

American Privacy: Can a 19th Century Right Survive 21st Century Technology
Frederick Lane

Break-out Sessions

Botnets: A Look Into Today's Malware Battle Front
Marc Evans

eDiscovery: A Panel Discussion
Adam Goldstein, George Moore, and Frederick Lane

Hacking Tools and the Hacker Curriculum
Far McKon and Sergey Bratus

Social Media and College Students: Understanding the Millennial Generation's Staying Connected Mindset
Davina Pruitt-Mentle

 

 

 

Last Updated: 12/18/14