Team for Research in
Ubiquitous Secure Technology

What Price Insularity? Dialogs about Computer Security Failings
Fred Schneider

Citation
Fred Schneider. "What Price Insularity? Dialogs about Computer Security Failings". Talk or presentation, 4, October, 2006.

Abstract
It is risky for technologists to ignore the non-technical context in which their systems will be deployed, just as it is risky for policy makers to ignore the limits and potential of technology. Yet such insularity is all too common. The results are unfortunate but not surprising. This lecture explores the structure dialogs take to bring about what might be termed "security failings" by revisiting: identity theft, electronic voting, digital right management, and the overall vulnerabilities of today's deployed software.

Electronic downloads

Citation formats  
  • HTML
    Fred Schneider. <a
    href="http://www.truststc.org/pubs/120.html"
    ><i>What Price Insularity? Dialogs about Computer
    Security Failings</i></a>, Talk or presentation,
     4, October, 2006.
  • Plain text
    Fred Schneider. "What Price Insularity? Dialogs about
    Computer Security Failings". Talk or presentation,  4,
    October, 2006.
  • BibTeX
    @presentation{Schneider06_WhatPriceInsularityDialogsAboutComputerSecurityFailings,
        author = {Fred Schneider},
        title = {What Price Insularity? Dialogs about Computer
                  Security Failings},
        day = {4},
        month = {October},
        year = {2006},
        abstract = {It is risky for technologists to ignore the
                  non-technical context in which their systems will
                  be deployed, just as it is risky for policy makers
                  to ignore the limits and potential of technology.
                  Yet such insularity is all too common. The results
                  are unfortunate but not surprising. This lecture
                  explores the structure dialogs take to bring about
                  what might be termed "security failings" by
                  revisiting: identity theft, electronic voting,
                  digital right management, and the overall
                  vulnerabilities of today's deployed software.},
        URL = {http://www.truststc.org/pubs/120.html}
    }
    

Posted by Christopher Brooks on 7 Oct 2006.
Groups: trustseminar
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.