Privacy, Infrastructures, Policy
Media, government, and industry commonly frame Security and Privacy as diametrically opposed: protecting one requires sacrificing the other.
Media, government, and industry commonly frame Security and Privacy as diametrically opposed: protecting one requires sacrificing the other.
All faculty, staff, and students are invited to play an active role in shaping the direction of research, education, and policy at the University of Waterloo by attending the Summit for Responsible Innovation and Technology. This is an opportunity to provide valuable input and define Waterloo's culture of responsible innovation and technology.
Register to attend this exciting event featuring:
The Centre for Information Integrity and Information Systems Assurance at the University of Waterloo (UW CISA) will be holding its 11th biennial symposium held in Toronto, Canada. Our symposia are recognized for the extensive interaction between practitioners and academics. Papers and panels from academe and practice will address risks, controls and assurance issues associated with the following topics:
Faced with mounting pressures and repeated, very public crises, social media firms have taken a new tack since 2017: to respond to criticism of all kinds and from numerous quarters (regulators, civil society advocates, journalists, academics and others) by acknowledging their long-obfuscated human gatekeeping workforce of commercial content moderators.
Vitalik Buterin
Creator of Ethereum, Cofounder of Bitcoin Magazine
Nolen Scaife, PhD candidate
Florida Institute for Cybersecurity, University of Florida
Credit, debit, and prepaid cards have dominated the payment landscape for decades, empowering the economy. Unfortunately, these legacy systems were not designed for today's adversarial environment, and deployment of new technologies is slow, expensive, and difficult to adopt.
N. Asokan, Department of Computer Science
Aalto University, Finland
As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs
As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs