A set of questions from my own experience about what to ask when on the job market as a doctoral student.
A set of questions from my own experience about what to say when asked to write a tenure review or recommendation letter.
A set of records showing patterns of communications between the Trump Organization and Alfa Bank during the presidential primaries and election in 2016, please analyze yourself.
Agree of Disagree: Get Involved Now
- IEEE-USA addresses a broad range of science and policy issues. Select the correct committee and get involved. The Computer Society is the oldest computing society in the US.
- USACM addresses the
issues most closely related to computing and public policy. USACM is
focused on the computing sciences.The USACM is the oldest computing
organization in the US.
- AAAS has public policy fellowship, an amazing annual meeting, and a long-standing commitment to policy.
L Jean Camp, Comments on the Menlo Report, Document ID DHS-2011-0074-0001, The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Department of Homeland Security (DHS) Washington, DC.
L Jean Camp, Old People and Computer Security. Some thoughts in powerpoint to pdf.
When you contact a professor about working with them, check your grammar and spelling in Google Docs, Open Office, or MS Word before you send. When you send a cv or resume, send it in pdf. Even better send a pointer to a pdf. Do not send it in any of the document formats mentioned in the first line. to top
Risk Communication Videos
Target for Behavior Change not Education Is the goal is to ensure that individuals respond appropriately, or to have them exhibit a correct understanding of the mechanics of the risk. If this makes no sense to you, then you probably have some expertise in computer security.
Access control - http://www.youtube.com/watch?v=F9m6A4gWKX8
Keylogger - http://www.youtube.com/watch?v=6zHJoZqrCB0
Phishing - http://www.youtube.com/watch?v=4ZQ9pFTCdy4
To reference please use either
L. Jean Camp,
Mental models of privacy and securityIEEE Technology And Society Magazine (2009) No 3:28, IEEE, Pages: 37-46.
or
J. Blythe, L. Jean Camp & V. Garg,
Targeted risk Communication for Computer Security, 2011 International Conference on Intelligent User Interfaces, (Palo Alto, CA) 13-16 February 2011.
http://portal.acm.org/citation.cfm?id=1943449
user click traces to determine user expertise and risk profile and generate timely, narrative warnings .