Prof. Blair MacIntyre Prof. Peter Swire CS4803 & 6725; MGT4803 & 8803 January 5, 2015 Information Security Strategies and Policy.

Slides:



Advertisements
Similar presentations
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Advertisements

The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Online Profiling and Consumer Choice Peter P. Swire Center for American Progress Ohio State University ATL Hill Briefing April 28, 2008.
“Privacy and Antitrust”
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2010.
CIT396B – Advanced Information Technology for Accounting Applications Dr. Catherine Dwyer Fall 2010.
CIT341 – Foundations of Enterprise Information Systems Dr. Catherine Dwyer Fall 2011.
IS612 – Object Oriented Concepts and Development Dr. Catherine Dwyer Fall 2010.
Class Materials Dr. Catherine Dwyer Spring Catherine Dwyer Associate Professor Seidenberg School, Department of Information Technology  Full.
Introduction to Computers. Michael R. Izzo
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Rutgers CIMIC 1 JOINT M. S. PROGRAM IN EC- UMBC/Rutgers Nabil R. Adam Rutgers University CIMIC Center for Information Management, Integration, and Connectivity.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
CS4455 CS4455: Video Game Design and Architecture Blair MacIntyre
Jan 9, Spring 2004CS4455 CS4455 -Video Game Design and Programming Blair MacIntyre
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
CS 150 PERSONAL PRODUCTIVITY USING TECHNOLOGY Instructor: Dr. Xenia Mountrouidou.
1 Mixed Reality Design Overview Instructors: Blair MacIntyre, CoC Jay Bolter, LCC TA: Hafez Rouzati, CoC (others helping out)
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
HCI Yonsei University, Korea The Role of Human Computer Interaction (HCI) in the Information Systems (IS) Curriculum Jinwoo.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
12 in 12: A Dozen Technologies to Bet On Presenter: David Ellzey Creative Director, Xpletive.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
IS223 – Foundations of Programming Dr. Catherine Dwyer Fall 2009.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
1 Technologies for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. FEMBA 290 Winter 2003.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
CIT312 – Introduction to Programming Dr. Catherine Dwyer Fall 2011.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
CS4455 CS4455: Video Game Design and Architecture Maribeth Gandy Blair MacIntyre
International Relations (1) 국제관계의 이해 Course Orientation Byung-Koo Kim (BK, 김 병 구 )
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
1 PARCC Data Privacy & Security Policy December 2013.
Prof. James A. Landay Computer Science Department Stanford University Winter 2016 dt+UX 2 : USER EXPERIENCE DESIGN PROJECT Introduction & Course Overview.
INT197B: CyberCitizenship Spring 2010 Class Catherine Dwyer Assoc. Prof. Seidenberg School Full time since Fall 2000 Other classes taught: CS121,
EGL Research Overview Celia Pearce Turner Broadcasting, March 2008.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
The republic of Tatarstan
Peter Swire Holder Chair of Law and Ethics
Cyberwar Becomes a Reality
Making Learning Visible in Computer Science Classrooms
North Carolina Law Review Symposium
JP Projects (Stefan Poslad)
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
CMGT 582 Competitive Success/tutorialrank.com
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- tutorialrank.com.
BCC 403 Teaching Effectively-- snaptutorial.com
CMGT 582 STUDY Education for Service--cmgt582study.com.
CMGT 582 Teaching Effectively-- snaptutorial.com
Networking Specialization Overview
Networking Specialization Overview
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
CS 140 Lecture Notes: Introduction
CS 140 Lecture Notes: Introduction
Schoolnet Data Protection Policies
Presentation transcript:

Prof. Blair MacIntyre Prof. Peter Swire CS4803 & 6725; MGT4803 & 8803 January 5, 2015 Information Security Strategies and Policy

Overview of Today’s Class  Introduction to the course  MacIntyre  Swire  Tech: Wearables and cybersecurity  trackers-fail/  Policy/Law: Sony and North Korea – what is a “proportionate response”?

CS 4455 Blair MacIntyre  CM co-designer, now Program Director  Teaching  CS4455 Game Design and Programming  CS4803GS Game Studio (w/ Ian Bogost)  CS4803HAR Handheld AR Game Design (w/ SCAD)  CS4750 Mixed Reality Experience Design (w/ Jay Bolter)  Research in HCI and 3D Graphics, Augmented and Mixed Reality (“interactive 3D in the world”)  Professor in IC and Adjunt Professor in LMC  Design of MR/AR experiences  Background in math, CS, 3D graphics  PhD research in distributed interactive 3D software design

Swire Background for Cyber  Internet law, policy, tech since early 90s  Pres. Clinton Chief Counselor for Privacy  Encryption, intrusion detection, cybercrime, surveillance  Security & privacy advisory boards for Intel, Microsoft, Google, IBM and start-ups  President Obama’s Review Group on Intelligence and Communications Technology (post-Snowden)

December 2013: The Situation Room

Syllabus and Readings  Questions/comments?

Wearables  fail/

Sony & North Korea  Facts  Assume North Korea government source of attacks  Group assignment:  What is proper response by US government?  Any different if independent sympathizers with NK?  Any different if China helped NK substantially?  Any steps by Sony against NK?

Obama Administration response  bama_orders_sanctions_against_north_korea_o ver_cyberattack_on_sony.html bama_orders_sanctions_against_north_korea_o ver_cyberattack_on_sony.html