Security

Related Faculty

John Chuang
Professor
Bio-sensory computing; brainwave authentication; information economics and policy
Chris Hoofnagle
Adjunct Professor
Internet law, information privacy, consumer protection, cybersecurity, computer crime, regulation of technology, edtech
Deirdre K. Mulligan
Associate Professor
privacy, fairness, human rights, cybersecurity, technology and governance, values in design
doug_red_shirt_1.jpg
Professor (I School and EECS)
Computer security and privacy
Steven Weber
Faculty Director, Center for Long-Term Cybersecurity and Professor (I School and Dept. of Political Science)
International politics, international business, and the information economy; Cybersecurity; Behavioral economics within Information Systems

Recent Publications

Dec 15, 2018

What can machines know about the mind? This dissertation seeks to understand people’s beliefs about this question: how these beliefs affect and arise from interactions with digital sensors, from prior beliefs about the mind and the body; and how these beliefs may shape the design of technical systems in the future.

The purpose of this dissertation is twofold. First, it surfaces that the boundary between sensing bodies and sensing minds is unstable, deeply entangled with social context and beliefs about the body and mind. Second, it proposes the porousness of this boundary as a site for studying the role that biosensing devices will play in near future. As biosensors creep into smart watches, bands, and ingestibles, their ability to divine not just what these bodies do, but what they think and feel, presents an under-explored avenue for understanding and imagining how thesetechnologies will come to matter in the course of life.

Nov 8, 2018

We investigate cybersecurity toolkits, collections of public facing materials intended to help users achieve security online. We look at design dimensions of these toolkits, and investigate how the toolkits construct security as a value and how they construct people as (in)secure users.

May 8, 2018

The creators of technical infrastructure are under social and legal pressure to comply with expectations that can be difficult to translate into computational and business logics. This dissertation bridges this gap through three projects that focus on privacy engineering, information security, and data economics, respectively. These projects culminate in a new formal method for evaluating the strategic and tactical value of data: data games. This method relies on a core theoretical contribution building on the work of Shannon, Dretske, Pearl, Koller, and Nissenbaum: a definition of situated information flow as causal flow in the context of other causal relations and strategic choices.

Pages

Security news

labmd-ftc-amicus.jpg

Chris Jay Hoofnagle, Deirdre Mulligan, and others weighed in on an ongoing lawsuit challenging the authority of the Federal Trade Commission to regulate companies’ data security practices.

cltc-scenario_0.jpg
How might we function in a world where everything we do online can be hacked or stolen, or where powerful algorithms predict human behavior at the most granular scale?
irgc-article_0.jpg
In a new article, I School scholars ponder the implications of considering cybersecurity a public good, like public health.
cltc-logo_0.png
More than $900,000 in funding will be shared among 22 cybersecurity research teams working at UC Berkeley and beyond.
Professor Steve Weber (left) and Admiral Michael Rogers, commander of U.S. Cyber Command
UC Berkeley Center for Long-Term Cybersecurity hosted a discussion with Admiral Michael Rogers, commander of the United States Cyber Command and director of the National Security Agency.
Executive director Dr. Betsy Cooper and senior fellow Jonathan Reiber join research center.

Pages