Tagged / cyber seminar

Join us for today’s cyber security seminar…

Staff and students are invited to join us for today’s cyber security seminar on:

‘Persuasive Technology for Information Security’

Tuesday, 27th January at 4pm. 

Room: P335 LT

In the seminar, participants will hear about design principles for persuasive technology for promoting information security and also about methods to evaluate persuasive technology. Concrete examples and “best practices” will be given from a recent research project, in which it is used in organizations to make employees comply with information security policies.

Our speaker will be Marc Busch.  Marc is a scientist at the AIT – Austrian Institute of Technology and is active at the intersection of persuasive technology and usable privacy and security. Furthermore, he is specialized in advanced quantitative and qualitative usability and user experience methodology, research methods and statistics in Human-computer interaction. Marc is involved in several international and national research and industrial projects, such as MUSES – Multiplatform Usable Endpoint Security Before joining AIT, Marc was at CURE – Center for Usability Research & Engineering, where he focused on user experience and usability.

Secure and cross border digital identity: issues and perspectives

Staff and students are invited to join us for the next cyber security seminar on:

‘Secure and cross border digital identity: issues and perspectives’

Tuesday 25th November, 4pm – 5pm

Room: P335

 

The talk will discuss requirements, issues and perspectives for an interoperability solution that allows citizens and organizations to establish new e-relations across borders, just by presenting their national eID.

Our speaker will be Dr Andrea Atzeni, from the “Dipartimento di Automatica e Informatica, Politecnico di Torino” who is based in the TORSEC Security group.

Dr Atzeni’s work addresses the definition of security requirements and mobile security, plus, investigation and modelisation of user expectation on security and privacy; risk analysis and threat modeling for complex cross-domain systems; specification of functional and security architectures; development of cross-domain usable security; development and integration of cross-border authentication mechanisms (including legal and technical issues).