Event

La désinhibition en ligne peut-elle influencer l’agression sexuelle?

Les nouvelles technologies ont modifié la manière dont les individus interagissent entre eux. Les collègues, les amis, la famille et les rencontres amoureuses se font de plus en plus via les réseaux sociaux. La disponibilité et l’accessibilité mondiale permettent d’échanger à tout moment, peu importe les fuseaux horaires. Cela permet à plusieurs individus de faire …

Configuring data flows in the Internet of things for secrecy and privacy requirements

The concept ‘Internet of things’ expresses the networked integration of large sets of physical and virtual devices in complex systems that will carry and process data and control information from sensors or terminals to end users (which can be human users or other machines). It promises integration of the real world with the information world, …

Voter Data and the Impact of Privacy Legislation Gaps on Cybersecurity of Elections

In Canada, there are both legislative gaps and ambiguity around the privacy obligations of political parties with respect to voter data. Despite the highly sensitive nature of political preferences, political parties have been largely exempt from formal obligations to protect personal information. Privacy legislation requires that entities adhere to fair information principles, which require notice …

Différences de genre dans la perception des emplois en science informatique

Bien qu’elle soit en constante augmentation, la participation des femmes dans le champ des STIM (science, technologie, ingénierie et mathématiques) reste encore considérablement faible. Plusieurs études ont montré que les carrières professionnelles dans le champ des STIM représenteront une proportion importante de la main-d’œuvre future et pourtant, le nombre d’étudiants qui graduent dans ce champ …

ATLSECCON: Atlantic Opportunity

Its hard to keep growing professionally, particularly in a field as challenging as cybersecurity. It’s a dynamic and complex field with an ever-shifting landscape. Moreover, it’s a field that ironically requires both shared experience and non-disclosure agreements.  Security conferences fill this space, providing the chance to learn from leaders and network with peers. A commitment to …

2018 Toronto ACM Conference on Computer and Communications Security !Call for Papers!

Image by Christian Raul Hernandez

One of the most important events for academics in computer security is coming to Canada in Fall.  This October 15 – 19, Toronto will play host to the 25th the Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS). This year the conference will be Chaired by Canadian Researchers David Lie from the …