Security and Human Behaviour (SHB 2014)

Follow Security and Human Behaviour (SHB 2014)
Share on
Copy link to clipboard

Recordings from talks at the 7th Workshop on Security and Human Behaviour (SHB 2014)

University of Cambridge


    • Jun 8, 2014 LATEST EPISODE
    • infrequent NEW EPISODES
    • 14m AVG DURATION
    • 44 EPISODES


    Search for episodes from Security and Human Behaviour (SHB 2014) with a specific topic:

    Latest episodes from Security and Human Behaviour (SHB 2014)

    S08 – Session 8 Discussion

    Play Episode Listen Later Jun 8, 2014 37:01


    S08 – Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do

    Play Episode Listen Later Jun 8, 2014 10:10


    S08 – John Kaag, UML: The moral hazard of drones

    Play Episode Listen Later Jun 8, 2014 10:18


    S08 – Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work

    Play Episode Listen Later Jun 8, 2014 9:44


    S08 – Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords

    Play Episode Listen Later Jun 8, 2014 10:51


    S08 – Ross Anderson, Cambridge: Reading this May Harm Your Computer

    Play Episode Listen Later Jun 8, 2014 12:03


    Session 7 Discussion

    Play Episode Listen Later Jun 8, 2014 36:33


    S07 – Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security

    Play Episode Listen Later Jun 8, 2014 6:45


    S07 – Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics

    Play Episode Listen Later Jun 8, 2014 11:08


    S07 – Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness

    Play Episode Listen Later Jun 8, 2014 8:49


    S07 – David Livingstone Smith, Maine: Making monsters

    Play Episode Listen Later Jun 8, 2014 10:57


    Session 6 Discussion

    Play Episode Listen Later Jun 8, 2014 30:07


    S06 – Masashi Crete-Nishihata, Toronto: Targeted Threats against Human Rights Groups

    Play Episode Listen Later Jun 8, 2014 11:06


    S06 – David Murakami Wood, Queens: Vanishing Security and Ambient Government

    Play Episode Listen Later Jun 8, 2014 13:39


    S06 – Laura Brandimarte, CMU: Privacy Trade-Offs of Geo-Location – General Population Concerns and an Application to the 2020 US Census

    Play Episode Listen Later Jun 8, 2014 9:00


    Session 5 Discussion

    Play Episode Listen Later Jun 8, 2014 28:09


    S05 – Angela Sasse, UCL: Usable Security - Time for a Reboot

    Play Episode Listen Later Jun 8, 2014 12:56


    S05 – Jeff Yan, Newcastle: Security and usability of CAPTCHAs

    Play Episode Listen Later Jun 8, 2014 12:43


    S05 – Yuliy Pisetski, Facebook: OAuth2: Sharing (Not So) Secrets

    Play Episode Listen Later Jun 8, 2014 9:51


    S05 – Serge Egelman, Berkeley: Individualizing Privacy and Security Mechanisms

    Play Episode Listen Later Jun 8, 2014 8:03


    Session 4 Discussion

    Play Episode Listen Later Jun 8, 2014 36:38


    S04 – David Modic, Cambridge: We Will Make You Like Our Research

    Play Episode Listen Later Jun 8, 2014 6:09


    S04 – Shannon French, Case Western: The Obligation of Officers to Preserve the Humanity of their Troops

    Play Episode Listen Later Jun 8, 2014 12:58


    S04 – Chris Cocking, Brighton: Collective insecurity? Overcoming society’s fear of the crowd

    Play Episode Listen Later Jun 8, 2014 13:49


    S04 – Scott Atran, John Jay College, CNRS and University of Michigan: Sacred values and cultural conflict

    Play Episode Listen Later Jun 8, 2014 14:25


    Session 3 Discussion

    Play Episode Listen Later Jun 8, 2014 24:12


    S03 – Tyler Moore, SMU: Increasing the impact of voluntary action against cybercrime

    Play Episode Listen Later Jun 8, 2014 11:36


    S03 – John Lyle, Facebook: The User Is Not The Enemy, But They May Be An Accomplice – Understanding Human-Transmitted Malware

    Play Episode Listen Later Jun 8, 2014 9:46


    S03 – Richard Harper, Microsoft: glancephones, wayve devices and the cloud mouse

    Play Episode Listen Later Jun 8, 2014 7:14


    S03 – Cormac Herley, Microsoft: Is Everything We Know About Password Stealing Wrong?

    Play Episode Listen Later Jun 8, 2014 9:03


    S03 – Nicolas Christin, CMU: It's All About the Benjamins – An Empirical Study on Incentivizing Users to Ignore Security Advice

    Play Episode Listen Later Jun 8, 2014 10:17


    S03 – Harold Thimbleby, Swansea: Improving safety in medical devices and systems

    Play Episode Listen Later Jun 8, 2014 12:39


    Session 2 Discussion

    Play Episode Listen Later Jun 8, 2014 34:17


    S02 – Diego Gambetta, EUI: Natural and Strategic Generosity as Signals of Trustworthiness

    Play Episode Listen Later Jun 8, 2014 12:06


    S02 – Bhismadev Chakrabarti, Reading: What determines who we mimic spontaneously? Impact of reward on empathy

    Play Episode Listen Later Jun 8, 2014 10:19


    S02 – Brian Glass, UCL: Modelling Misrepresentation in Online Seller-Buyer Interactions

    Play Episode Listen Later Jun 8, 2014 6:30


    S02 – Michelle Baddeley: A Behavioural Analysis of Online Privacy and Security

    Play Episode Listen Later Jun 8, 2014 8:37


    S02 – Bonnie Anderson, BYU: How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda

    Play Episode Listen Later Jun 8, 2014 11:44


    Session 1 Discussion

    Play Episode Listen Later Jun 8, 2014 21:52


    S01 – Jussi Palomaki, Newcastle: Deception, Machiavellianism and poker

    Play Episode Listen Later Jun 8, 2014 10:47


    S01 – Aldert Vrij, Portsmouth: A Cognitive Approach to Elicit Nonverbal and Verbal Cues to Deceit

    Play Episode Listen Later Jun 8, 2014 13:12


    S01 – Sophie van der Zee, Cambridge: When lying feels the right thing to do

    Play Episode Listen Later Jun 8, 2014 10:00


    S01 – Frank Stajano, Cambridge: Understanding scam victims – seven principles for systems security

    Play Episode Listen Later Jun 8, 2014 11:44


    S01 – Mark Frank, Buffalo: Mythperceptions: deception and security

    Play Episode Listen Later Jun 8, 2014 9:13


    Claim Security and Human Behaviour (SHB 2014)

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel