Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo


Upcoming Events   

 Craig Shue



Managing User-Level Compromises in Enterprise Networks
Craig Shue
Worcester Polytechnic Institute
Tuesday March 31, 2015 @4:15pm
Carson L01

 Harold Thimbleby




The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
Thursday April 23, 2015 @4:15pm

Carson L01

Mary Ellen Zurko



User-Centered Security: From Grand Challenge to Technology Transfer
Mary Ellen Zurko
Tuesday May 12, 2015 @4:15pm
Carson L01

Scout Sinclair Brody



Open-Sourcing Usable Security
Scout Sinclair Brody D'13 Ph.D.
Simply Secure
Tuesday June 2, 2015 @4:15pm
Carson L01

Recent Talks  

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
May 28, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013



Feb news 2015


ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

2010 Presentations

Download eCampus 2010 presentations and complementing documents here.

Training Sessions

Into the Cloud: A Hands-on Workshop Exploring the Pros and Cons of Hosting Servers in Public, Private, and Hybrid Clouds
Adam Goldstein

Data Driven Security: A Different Approach to Determining Security Requirements
Steve Nyman


Picking Policy Priorities: Porn, Privacy, Procurement, P2P, or IP
Greg Jackson

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
Cormac Herley

Characterizing the Cyberthreat Landscape
Matthew Devost

Panel Discussion: Cloud Computing - Pros and Cons
David Bucciero, John Calkins, Greg Jackson, and Sheri Stahler

Three Approaches to Awareness: Unified Messaging, Local Responses, and National Cybersecurity Awareness Month
Michael Kaiser

How Should Colleges Respond to RIAA and Other File Sharing Subpoenas?
Ray Beckerman

  • Overview

American Privacy: Can a 19th Century Right Survive 21st Century Technology
Frederick Lane

Break-out Sessions

Botnets: A Look Into Today's Malware Battle Front
Marc Evans

eDiscovery: A Panel Discussion
Adam Goldstein, George Moore, and Frederick Lane

Hacking Tools and the Hacker Curriculum
Far McKon and Sergey Bratus

Social Media and College Students: Understanding the Millennial Generation's Staying Connected Mindset
Davina Pruitt-Mentle




Last Updated: 12/18/14