Skip to main content
Home > News >

I3P Researchers in the News

February 2014

William Sanders

"C-U named one of Techie.com's "Most Promising Tech Hubs to Watch in 2014""

University of Illinois

Steven Bellovin

"Senate cybersecurity report finds agencies often fail to take basic preventive measures"

Columbia University

Alessandro Acquisti

"Privacy? What privacy?"

Carnegie Mellon University

Jonathan Butts 

Air Force Researchers Plant Rootkit In A PLC"

U.S. Air Force Institute of Technology

Jean Camp

"New U.S. transparency rule: real change or a gag?" Indiana University

 

January 2014

Anup Ghosh

 "For Target, the Breach Numbers Grow"

George Mason University

Deanna Caputo, Eric Johnson, Shari Lawrence Pfleeger

"Why Training Doesn't Mitigate Phishing"

MITRE, I3P-Dartmouth, Vanderbilt University

Alessandro Acquisti

"Privacy and technology: How simple photos are leading to full profiles of ordinary people"
"Academics Call for End to Mass Surveillance"

Carnegie Mellon University

Deirdre Mulligan

"Are Google, Yahoo and Microsoft Living Up to Their Promises in China?" UC Berkeley

Mauricio Papa

"Consultant: Despite Hacks, Info Leaks, Americans Still Lax On Digital Security" University of Tulsa

 

December 2013

Deirdre Mulligan

Privacy Laws Can Create Opportunities, Limitations, California Lawmakers Advised

UC Berkeley

 

November 2013

Alessandro Acquisti

My Identity Was Stolen. Here's How They Did It
Carnegie Mellon Researchers Investigate How Information Shared Via Online Social Networks Can Lead to Hiring Discrimination

Carnegie Mellon University

 

October 2013

Jean Camp

Informatics professor highlights effects of NSA surveillance on students
IU to help Army protect against cyber attacks

Indiana University

 

September 2013

Sean Smith Dartmouth IT Security Institute Gets New Leadership Dartmouth

Alessandro Acquisti

Facebook Plans to Add Millions More Faces to Its Facial Recognition Database

Carnegie Mellon University

 

June 2013

Deirdre Mulligan

NSA Surveillance Reflects a Broader Interpretation of the Patriot Act

UC Berkeley

 

May 2013

Anup Ghosh "Pentagon accuses China of cyberattacks on U.S military, business targets" George Mason University
Brian Tierney "Reservoir Labs & Tilera Unveil A New Generation In Cyber Security" Lawrence Berkeley National Laboratory
Alessandro Acquisti "Drones With Facial Recognition Technology Will End Anonymity, Everywhere"
"60 MINUTES: Facial recognition technology outpaces regulation"
Carnegie Mellon University
Rahul Telang "Putting a Price Tag on Film Piracy" Carnegie Mellon University
M. Eric Johnson "Espionage and sabotage in the virtual world" Dartmouth

 

March 2013

Apu Kapadia Two IU computer scientists earn NSF CAREER Awards for young investigators Indiana University

 

February 2013

Sujeet Shenoi "Welcome to the Malware-Industrial Complex" University of Tulsa
Dickie George "Banks seek NSA help amid attacks on their computer systems" Johns Hopkins University
Alessandro Acquisti "Freedom Isn't Free"
"Coming soon? Take photo, ID person"
Carnegie Mellon University
L. Jean Camp "Spinning door for students in IU's security informatics program powered by jobs, jobs, jobs" Indiana University
Apu Kapadia "PlaceRaider: Virtual Theft in Physical Spaces with Smartphones" Indiana University
Seymour Goodman "Tale of 'Bob': Does outsourcing new software pose cyber security risk?" Georgia Tech
Kevin Fu "Preparing for for new healthcare malware attacks" I3P Senior Research Associate
Sal Stolfo "Cisco VoIP Phones Affected By On Hook Security Vulnerability" Former I3P Researcher

December 2012

Denise Anthony Privacy worries go far beyond e-mails Dartmouth College

November 2012

Sujeet Shenoi  Cyber Corps program trains spies for the digital age  University of Tulsa
Dickie George
Sujeet Shenoi
Federal agencies, private firms fiercely compete in hiring cyber experts Johns Hopkins University
University of Tulsa
Alessandro Acquisti A Trail of Clicks, Culminating in Conflict Carnegie Mellon University
Peter G. Neumann Killing the Computer to Save It SRI International

October 2012

Rahul Telang IFPI - International Federation of the Phonographi : Overall impact of unlicensed p2p file-sharing is negative Carnegie Mellon University
Alessandro Acquisti Skeptics scoff, privacy advocates protest as biometric IDs advance Carnegie Mellon University
Travis Breaux 'Reconciling Multi-jurisdictional Legal Requirements: A Case Study in Requirements Water Marking' Wins Best Paper Award Carnegie Mellon University
M. Eric Johnson Facebook Tests 'Want' and 'Collect' Buttons: How to Get Started Dartmouth College
Denise Anthony Professor examines privacy violations Dartmouth College
Zach Tudor FIIW Keynote: What You Can't Measure, You Can't Improve . . . The Current State of Cyber Security SRI International
Brian Tierney At 100 Gbps, ESnet Puts Network Research on Fast Track Lawrence Berkeley National Lab
James Alves-Foss October 25th Cybersecurity Workshop University of Idaho
Deanna Caputo The Human Factor: Using Behavioral Science to Counter Insider Threats MITRE Corporation
Sujeet Shenoi 25 of today's coolest network and computing research projects University of Tulsa
Sujeet Shenoi The NSA Wants Hackers, And It Wants Them On Its Side University of Tulsa
Kevin Fu   Highly Contagious Malware Could Cause 'Mass Murder' By Hacking Pacemakers To Send A Deadly Jolt University of Massachusetts, Amherst
Rae Zimmerman "Book Talk by Professor Rae Zimmerman - Transport, the Environment and Security. Making the Connection." New York University

June 2012

Rahul Telang Dear [Insert Company Name], Personalized Emails Don't Impress Customers Carnegie Mellon University
Rahul Telang "File sharing is no different from Jimmy Carr's clever accounting Carnegie Mellon University
Alessandro Acquisti A Dollar For Your Data Carnegie Mellon University
Alessandro Acquisti What's next after Facebook buys facial rec software? Carnegie Mellon University
Johannes Gehrke IEEE to Award 14 Industry Professionals Cornell University
Anup Ghosh US military locks down on soldiers' smartphones George Mason University
Seymour Goodman Cyberpower And International Security - Analysis Georgia Institute of Technology
James Alves-Foss IGEM boosts UI cybersecurity program University of Idaho
Dickie George Exclusive: Spy agency seeks cyber-ops curriculum Johns Hopkins University
Helen Nissenbaum Google Privacy Inquiries Get Little Cooperation New York University
Kevin Fu Infections At Medical Device Firm Lasted For Months University of Massachusetts, Amherst
Kevin Fu Downloading of software updates for lifesaving medical devices proves very dangerous University of Massachusetts, Amherst

March 2012

Robert Hutchinson Congressional Hearing: "Cybersecurity: Threats to Communications Networks and Public-Sector Responses Sandia National Laboratories
Greg Shannon Congressional Hearing: "Cybersecurity: Threats to Communications Networks and Public-Sector Responses Carnegie Mellon University
Roy Maxion Bypassing the Password Carnegie Mellon University
Rae Zimmerman Coastal cities face higher risk of flooding New York University

February 2012

Alessandro Acquisti Real-time face recognition comes to your iPhone camera Carnegie Mellon University
Alessandro Acquist Privacy in the Age of Big Data Carnegie Mellon University
M. Eric Johnson Facebook IPO will not affect users Dartmouth College
M. Eric Johnson Small business owners find gold in daily deal websites, but at a cost Dartmouth College
M. Eric Johnson Social media: Information networks are vital to success Dartmouth College
Kevin Fu The hack-able body University of Massachusetts, Amherst
Mustaque Ahamad Georgia Tech spinoff secures funding for phone security technology Georgia Institute of Technology

January 2012

Yacov Haimes Chemical cybernetics' and the problem of climate change University of Virginia
Alessandro Acquisti Visibility before all Carnegie Mellon University
Alessandro Acquisti Facial recognition technology creates privacy headaches for agencies Carnegie Mellon University
Mustaque Ahamad Cyber threats in 2012: 5 pain points Georgia Institute of Technology
Mustaque Ahamad More web users aim to thwart prying eyes Georgia Institute of Technology
Sean Smith Usenix: Dartmouth Expanding Diff, Grep Unix Tools Dartmouth College

 December 2011

Raymond Parks Principles of Cyber-warfare Sandia National Laboratories
David Duggan Principles of Cyber-warfare Sandia National Laboratories
M. Eric Johnson Tuck MBAs select top tech toys for the holiday season Dartmouth College
M. Eric Johnson Tuck students compile list of season’s top toys Dartmouth College
Bruce Bakis So, What Are These Privacy Audits That Google And Facebook Have To Do For The Next 20 Years? MITRE Corporation
Rahul Telang Delaying content leaves money on the table Carnegie Mellon University
Rahul Telang Yet Another Study Shows That Hollywood's Own Bad Decisions Are Increasing The Amount Of Infringement Carnegie Mellon University
Alessandro Acquisti Hacking at Hotels: Mutating Threats at the Ramparts Carnegie Mellon University
Salvatore Stolfo Printer Vulnerability Puts HP Behind the Eight Ball Columbia University
Salvatore Stolfo Exclusive: Millions of printers open to devastating hack attack, researchers say Columbia University
Salvatore Stolfo Print Me if you Dare,' Columbia University Intrusion Detection Systems Lab  Columbia University

 For more stories, visit the archive.

 

Last Updated: 4/18/14