Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Daily Archives: September 17, 2013
Language-Action Causal Graphs for Trustworthiness Attribution in CMC
Dr. Shuyuan Ho, Assistant Professor at the School of Library and Information Studies (SLIS), Florida’s iSchool, has been awarded a two year grant from the National Science Foundation (NSF). The grant team will be led by Dr. Ho (Principal Investigator) … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Language-Action Causal Graphs for Trustworthiness Attribution in CMC
“You don’t hire brilliant people for jobs like this. You hire smart people. Brilliant people [like Snowden] get you in trouble.”
Edward Snowden accessed some secret national security documents by assuming the electronic identities of top NSA officials, said intelligence sources. The NSA still doesn’t know exactly what Snowden took. But its forensic investigation has included trying to figure out which … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on “You don’t hire brilliant people for jobs like this. You hire smart people. Brilliant people [like Snowden] get you in trouble.”