Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Upcoming Events

Peter Singer

Cybersecurity and CyberWar: What Everyone Needs to Know
Peter Singer
Brookings Institution
Monday May 5, 2014 @5:15
Filene Auditorium, Moore Hall

Daniel Weitzner

Privacy Policy Implications of "Big Data" Surveillance
Daniel Weitzner
MIT
Wednesday May 7, 2014 @4:15
Steele 006

John DeLong

National Security Implications of "Big Data" Surveillance
John DeLong
National Security Agency
Wednesday May 14, 2014 @4:15
Steele 006

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
Wednesday May 28, 2014 @4:15
Steele 006 

 

Recent Talks  

weird machines

"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata
Rebecca Shapiro
Dartmouth CS Graduate Student
at USENIX WOOT '13
August 13, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 

Newsletter 

ists newsletter fall 2013

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2010 Presentations

Download eCampus 2010 presentations and complementing documents here.

Training Sessions

Into the Cloud: A Hands-on Workshop Exploring the Pros and Cons of Hosting Servers in Public, Private, and Hybrid Clouds
Adam Goldstein

Data Driven Security: A Different Approach to Determining Security Requirements
Steve Nyman

Presentations

Picking Policy Priorities: Porn, Privacy, Procurement, P2P, or IP
Greg Jackson

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
Cormac Herley

Characterizing the Cyberthreat Landscape
Matthew Devost

Panel Discussion: Cloud Computing - Pros and Cons
David Bucciero, John Calkins, Greg Jackson, and Sheri Stahler

Three Approaches to Awareness: Unified Messaging, Local Responses, and National Cybersecurity Awareness Month
Michael Kaiser

How Should Colleges Respond to RIAA and Other File Sharing Subpoenas?
Ray Beckerman

American Privacy: Can a 19th Century Right Survive 21st Century Technology
Frederick Lane

Break-out Sessions

Botnets: A Look Into Today's Malware Battle Front
Marc Evans

eDiscovery: A Panel Discussion
Adam Goldstein, George Moore, and Frederick Lane

Hacking Tools and the Hacker Curriculum
Far McKon and Sergey Bratus

Social Media and College Students: Understanding the Millennial Generation's Staying Connected Mindset
Davina Pruitt-Mentle

 

 

 

Last Updated: 8/30/12