SlideShare a Scribd company logo
1 of 27
©2009CarnegieMellonUniversity:1
Computer Human Interaction:
Mobility, Privacy, and Security
Jason Hong
jasonh@cs.cmu.edu
©2011CarnegieMellonUniversity:2
Two Major Research Thrusts
• Streamlining Authentication
– How to simplify and strengthen
authentication using sensor data?
• Understanding Human Behavior at
Large Scales
– What can we infer about people and
places based on lots of sensor data?
©2011CarnegieMellonUniversity:3
Too many passwords!!!
©2011CarnegieMellonUniversity:4
Problems with Passwords
• People forget passwords
• Susceptible to social engineering
• People re-use passwords
• Passwords tend to be weak in practice
©2011CarnegieMellonUniversity:5
WebTicket
• Cheap printable tokens
for a reliable way to log in
• Browser plug-in for
creating new accounts
– Strong passwords are assigned
• Print out ticket
– Ticket is encrypted to work
only with specific computer(s)
– QRCode: URL, user name,
password
©2011CarnegieMellonUniversity:6
Logging In with WebTicket
©2011CarnegieMellonUniversity:7
WebTicket
• Design:
– Very cheap (paper + printer + webcam)
– Compatible with existing systems
– Easy to deploy
– Easy to teach: treat it like a house key
• Weaknesses:
– Not meant for commonly used passwords
– Tickets can get damaged or lost
– Need to store main encryption key
– Scale (about 15 accounts on average)
©2011CarnegieMellonUniversity:8
WebTicket User Study
• Three studies, 59 people total
– Study 1: Lab study
– Study 2: Lab study (phishing too)
– Study 3: Field trial
• Experiment
– Two conditions: password and WebTicket
– Create a few new accounts
– Login to a few sites
– Come back a week later, login again
©2011CarnegieMellonUniversity:9
WebTicket Study Results
• 1/4 of people using passwords could
not login again a week later
– Didn’t restrict what passwords people used
• Login time for WebTicket slower at first,
faster a week later
• WebTicket perceived as easier and faster
• Simulated phishing attack
– All in password condition fell for it
– 30% of people using WebTicket did
(though data still encrypted)
©2011CarnegieMellonUniversity:10
Ongoing and Future Work
• Mobile phone version to scale up
– A strong password manager
– Can’t fall for phish too
©2011CarnegieMellonUniversity:11
Ongoing Work
• Can encode 3k data with QR codes
– Ex. “Login only if in Cylab office or home”
– Ex. “Login only if between 5-8pm”
– Ex. “Login only if parents at home”
– Ex. “Notify parents when you login”
– Ex. Include face biometric data
©2011CarnegieMellonUniversity:12
Casual Authentication
• Use commodity sensors + behavioral
models for cheap, passive, multi-factor
authentication
• Modulate level of authentication needed
– In likely situations, make logins fast
– In unlikely situations, make it reliable
©2011CarnegieMellonUniversity:13
Example Scenarios
• Scenario 1 – Mobile device
– If in office is high, make login fast
– If in Brazil, make login reliable
– Location, IP address, WiFi MAC,
Bluetooth devices nearby, tilt
• Scenario 2 – Home
– Wake up in morning, go to computer
– Weight sensor in chair, height sensor
via Kinect, mobile devices nearby
– Use face recognition to login (fast)
©2011CarnegieMellonUniversity:14
Casual Authentication
• Location as a passive factor
– (a) Diary study with 20 people
– (b) Location traces of 30 people
(a) Where
people login
(Hayashi and Hong, CHI 2011)
(b) Where people
spend time
(Amini et al, Mobisys 2011)
©2011CarnegieMellonUniversity:15
• Location entropy
– Concept taken from ecology
– Number of unique people seen in a place
– Approximates public vs private
• Locaccino data
– 489 participants
– 2.8m location sightings
Characterizing Places
©2011CarnegieMellonUniversity:16
©2011CarnegieMellonUniversity:17
Using Location Data
• Characterizing individuals
– Personal frequency
– Personal mobility pattern
• Characterizing places
– Entropy – number of unique people
– Churn – same people or different
– Transience – amount of time spent
– Burst – regularity of people seen
• Building models of people and places
©2011CarnegieMellonUniversity:18
Ongoing Work
• Evaluating passive factors
• Developing threat models
– How well person knows you
– How skilled a hacker they are
• Developing prototypes
– Mobile case
– Work/Home
• Evaluating security and usability
– Ease of use, time to login
– False accept rates, expert analysis
©2011CarnegieMellonUniversity:19
Understanding Human Behavior
at Very Large Scales
• Capabilities of today’s mobile devices
– Location, sound, proximity, motion
– Call logs, SMS logs, pictures
• We can now analyze real-world social
networks and human behaviors at
unprecedented fidelity and scale
©2011CarnegieMellonUniversity:20
• Insert graph here
• Describe entropy
©2011CarnegieMellonUniversity:21
Entropy Related to Location Privacy
©2011CarnegieMellonUniversity:22
Results of Location Analysis
• Entropy related to location privacy
– Fewer concerns in “public” places
(Toch et al, Ubicomp 2010)
• Can predict Facebook friendships
based on co-location patterns
– Not just frequency, but also where
– 92% accuracy
(Cranshaw et al, Ubicomp 2010)
• Can predict number of friends based
on mobility patterns
– Go out often and to high entropy places
©2011CarnegieMellonUniversity:23
Augmented Social Graph
©2011CarnegieMellonUniversity:24
Augmented Social Graph
©2011CarnegieMellonUniversity:25
Augmented Social Graph
• Online social network information +
smartphone communication
– Infer tie strength, roles, groups
©2011CarnegieMellonUniversity:26
Potential Scenarios
• Secure invitations
– Who is this person friending me?
– How do my friends know her?
• Communication triage
• Configuration of privacy policies
– Tie strength strongly correlated with what
personal info people willing to share
(Wiese et al, Ubicomp 2011)
– Communication and co-location can be
used to predict tie strength
• Depression / Leadership
©2011CarnegieMellonUniversity:27
Summary
• WebTicket
– Printable tokens to login
• Casual authentication
– Use sensor data and models to
characterize people and places
– Modulate level of authentication
based on situation
• Understanding behavior at large scales
– Opportunity to instrument the world
– Augmented social graph

More Related Content

Similar to Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable AuthenticationJason Hong
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Jason Hong
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveCity University London
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...SunilKrPandey1
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Using Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthUsing Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthAlex Little
 
CV_Tan-Tran
CV_Tan-TranCV_Tan-Tran
CV_Tan-TranTan Tran
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiFay M.
 

Similar to Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011 (20)

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
Php project titles
Php project titlesPhp project titles
Php project titles
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Doc handout
Doc handoutDoc handout
Doc handout
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Using Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthUsing Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal Health
 
CV_Tan-Tran
CV_Tan-TranCV_Tan-Tran
CV_Tan-Tran
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdi
 

Recently uploaded

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011

Editor's Notes

  1. Images are from Paul Adam’s talk
  2. Images are from Paul Adam’s talk
  3. Images are from Paul Adam’s talk