Part of the UC Berkeley School of Information's Distinguished Lecture series. Hosted on the UC campus in 202 South Hall, just west of the tower.
It is risky for technologists to ignore the non-technical context in which their systems will be deployed, just as it is risky for policy makers to ignore the limits and potential of technology. Yet such insularity is all too common. The results are unfortunate but not surprising. This lecture explores the structure dialogs take to bring about what might be termed "security failings" by revisiting: identity theft, electronic voting, digital right management, and the overall vulnerabilities of today's deployed software.
Official Website: http://www.ischool.berkeley.edu/about/events/dls10042006
Added by k7lim on September 15, 2006