Interdisciplinary Studies in Information Security and Privacy Workshop
Creating trustworthy information systems is one of the major challenges of our networked society, demanding interdisciplinary solutions that are globally robust but responsive to particular needs and constraints of different cultures. The secure systems we design will interact with legal, policy, business, and technical environments in many countries. This workshop brings together an interdisciplinary and international set of researchers and practitioners to meet this challenge, including experts in the business, public administration, economic, legal and technological aspects of security and privacy. Internationally recognized security expert Eugene Spafford will deliver a keynote address. The workshop will foster collaboration among academics and experts with deep understanding of the non-technical issues in various nations and cultures, developing local approaches to enhancing security and privacy.
[USER:336|profilelink] Professor, NYU-Poly; Director, Information Systems and Internet Security Lab
[USER:441|profilelink] Research Professor, Computer Science and Engineering; Technology Management Department, NYU-Poly
The Center for Interdisciplinary Studies in Security and Privacy (CRISSP) is a collaboration that includes NYU Poly, NYU Wagner, the Courant Institute of Mathematical Sciences, the Steinhardt School of Culture, Education and Human Development, NYU Law, and NYU Stern School of Business. CRISSP combines security technology strengths with experts in psychology, law, public policy, and business from NYU, to build new approaches that look beyond technology for solutions to security and privacy problems.
October 3, 2010
Session 1: Keynote by Gene Spafford, Professor, Purdue University; Executive Director, Purdue Center for Education and Research in Information Assurance and Security
Session 2: Security and Privacy in Ecommerce
Session 3: Digital Forensics and Law
Session 4: Legal, Policy, and Economic Issues in Trusted Platforms
October 4, 2010
Session 5: Critical Infrastructure and Cybersecurity
Session 6: Privacy: Expectations and Realities
Session 7: Wrap-up Discussion