SlideShare a Scribd company logo
1 of 27
©2009CarnegieMellonUniversity:1
Computer Human Interaction:
Mobility, Privacy, and Security
Jason Hong
jasonh@cs.cmu.edu
©2011CarnegieMellonUniversity:2
Two Major Research Thrusts
• Streamlining Authentication
– How to simplify and strengthen
authentication using sensor data?
• Understanding Human Behavior at
Large Scales
– What can we infer about people and
places based on lots of sensor data?
©2011CarnegieMellonUniversity:3
Too many passwords!!!
©2011CarnegieMellonUniversity:4
Problems with Passwords
• People forget passwords
• Susceptible to social engineering
• People re-use passwords
• Passwords tend to be weak in practice
©2011CarnegieMellonUniversity:5
WebTicket
• Cheap printable tokens
for a reliable way to log in
• Browser plug-in for
creating new accounts
– Strong passwords are assigned
• Print out ticket
– Ticket is encrypted to work
only with specific computer(s)
– QRCode: URL, user name,
password
©2011CarnegieMellonUniversity:6
Logging In with WebTicket
©2011CarnegieMellonUniversity:7
WebTicket
• Design:
– Very cheap (paper + printer + webcam)
– Compatible with existing systems
– Easy to deploy
– Easy to teach: treat it like a house key
• Weaknesses:
– Not meant for commonly used passwords
– Tickets can get damaged or lost
– Need to store main encryption key
– Scale (about 15 accounts on average)
©2011CarnegieMellonUniversity:8
WebTicket User Study
• Three studies, 59 people total
– Study 1: Lab study
– Study 2: Lab study (phishing too)
– Study 3: Field trial
• Experiment
– Two conditions: password and WebTicket
– Create a few new accounts
– Login to a few sites
– Come back a week later, login again
©2011CarnegieMellonUniversity:9
WebTicket Study Results
• 1/4 of people using passwords could
not login again a week later
– Didn’t restrict what passwords people used
• Login time for WebTicket slower at first,
faster a week later
• WebTicket perceived as easier and faster
• Simulated phishing attack
– All in password condition fell for it
– 30% of people using WebTicket did
(though data still encrypted)
©2011CarnegieMellonUniversity:10
Ongoing and Future Work
• Mobile phone version to scale up
– A strong password manager
– Can’t fall for phish too
©2011CarnegieMellonUniversity:11
Ongoing Work
• Can encode 3k data with QR codes
– Ex. “Login only if in Cylab office or home”
– Ex. “Login only if between 5-8pm”
– Ex. “Login only if parents at home”
– Ex. “Notify parents when you login”
– Ex. Include face biometric data
©2011CarnegieMellonUniversity:12
Casual Authentication
• Use commodity sensors + behavioral
models for cheap, passive, multi-factor
authentication
• Modulate level of authentication needed
– In likely situations, make logins fast
– In unlikely situations, make it reliable
©2011CarnegieMellonUniversity:13
Example Scenarios
• Scenario 1 – Mobile device
– If in office is high, make login fast
– If in Brazil, make login reliable
– Location, IP address, WiFi MAC,
Bluetooth devices nearby, tilt
• Scenario 2 – Home
– Wake up in morning, go to computer
– Weight sensor in chair, height sensor
via Kinect, mobile devices nearby
– Use face recognition to login (fast)
©2011CarnegieMellonUniversity:14
Casual Authentication
• Location as a passive factor
– (a) Diary study with 20 people
– (b) Location traces of 30 people
(a) Where
people login
(Hayashi and Hong, CHI 2011)
(b) Where people
spend time
(Amini et al, Mobisys 2011)
©2011CarnegieMellonUniversity:15
• Location entropy
– Concept taken from ecology
– Number of unique people seen in a place
– Approximates public vs private
• Locaccino data
– 489 participants
– 2.8m location sightings
Characterizing Places
©2011CarnegieMellonUniversity:16
©2011CarnegieMellonUniversity:17
Using Location Data
• Characterizing individuals
– Personal frequency
– Personal mobility pattern
• Characterizing places
– Entropy – number of unique people
– Churn – same people or different
– Transience – amount of time spent
– Burst – regularity of people seen
• Building models of people and places
©2011CarnegieMellonUniversity:18
Ongoing Work
• Evaluating passive factors
• Developing threat models
– How well person knows you
– How skilled a hacker they are
• Developing prototypes
– Mobile case
– Work/Home
• Evaluating security and usability
– Ease of use, time to login
– False accept rates, expert analysis
©2011CarnegieMellonUniversity:19
Understanding Human Behavior
at Very Large Scales
• Capabilities of today’s mobile devices
– Location, sound, proximity, motion
– Call logs, SMS logs, pictures
• We can now analyze real-world social
networks and human behaviors at
unprecedented fidelity and scale
©2011CarnegieMellonUniversity:20
• Insert graph here
• Describe entropy
©2011CarnegieMellonUniversity:21
Entropy Related to Location Privacy
©2011CarnegieMellonUniversity:22
Results of Location Analysis
• Entropy related to location privacy
– Fewer concerns in “public” places
(Toch et al, Ubicomp 2010)
• Can predict Facebook friendships
based on co-location patterns
– Not just frequency, but also where
– 92% accuracy
(Cranshaw et al, Ubicomp 2010)
• Can predict number of friends based
on mobility patterns
– Go out often and to high entropy places
©2011CarnegieMellonUniversity:23
Augmented Social Graph
©2011CarnegieMellonUniversity:24
Augmented Social Graph
©2011CarnegieMellonUniversity:25
Augmented Social Graph
• Online social network information +
smartphone communication
– Infer tie strength, roles, groups
©2011CarnegieMellonUniversity:26
Potential Scenarios
• Secure invitations
– Who is this person friending me?
– How do my friends know her?
• Communication triage
• Configuration of privacy policies
– Tie strength strongly correlated with what
personal info people willing to share
(Wiese et al, Ubicomp 2011)
– Communication and co-location can be
used to predict tie strength
• Depression / Leadership
©2011CarnegieMellonUniversity:27
Summary
• WebTicket
– Printable tokens to login
• Casual authentication
– Use sensor data and models to
characterize people and places
– Modulate level of authentication
based on situation
• Understanding behavior at large scales
– Opportunity to instrument the world
– Augmented social graph

More Related Content

Similar to Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable AuthenticationJason Hong
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Jason Hong
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveCity University London
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...SunilKrPandey1
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Using Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthUsing Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthAlex Little
 
CV_Tan-Tran
CV_Tan-TranCV_Tan-Tran
CV_Tan-TranTan Tran
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiFay M.
 

Similar to Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011 (20)

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
Php project titles
Php project titlesPhp project titles
Php project titles
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Doc handout
Doc handoutDoc handout
Doc handout
 
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
Blockchain and Data Science:Enabling Data Integrity for Predictions through ...Blockchain and Data Science:Enabling Data Integrity for Predictions through ...
Blockchain and Data Science :Enabling Data Integrity for Predictions through ...
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Using Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal HealthUsing Mobile Technologies to Improve Maternal Health
Using Mobile Technologies to Improve Maternal Health
 
CV_Tan-Tran
CV_Tan-TranCV_Tan-Tran
CV_Tan-Tran
 
MobileForensicsbyFayMahdi
MobileForensicsbyFayMahdiMobileForensicsbyFayMahdi
MobileForensicsbyFayMahdi
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011

Editor's Notes

  1. Images are from Paul Adam’s talk
  2. Images are from Paul Adam’s talk
  3. Images are from Paul Adam’s talk