This is a past event. Its details are archived for historical purposes.
The contact information may no longer be valid.
Please visit our current events listings to look for similar events by title, location, or venue.
Friday, June 17, 2022 at 9:30am
Virtual EventThis two-day workshop aims to center analysis of the people, organizations and work that ultimately make and break cybersecurity. However, it aims to do so in a way that bridges the gap between two very different kinds of methods and theoretical perspectives: science and technology studies, which tends to adopt a grounded and “bottom-up” approach to analysis; and international relations, which tends to take more of a “top-down” approach that centers nation-states and the international system.
SCHEDULE
THURSDAY, JUNE 16 - 9:45 am - 5:00 pm (ET)
9:45—10:15 am Welcome and Lightning Round
Workshop participants will be asked to introduce themselves in 1-2 minutes.
Panel 1 -10:15 – 12:15 PM THREATS
Chair: Sarah Kreps, Cornell University
Discussant: Frank Smith, Naval War College
Whose Expertise? The Static, Contingent, and Recursive Strategies of Malware Analysis and Detection
Andrew Dwyer, Durham University
Dark champions: The Emergence of Commercial Cyber Threat Intelligence in Great Power Competitor States
JD Work, Columbia University
The Making of Cyber(in)security: Sociotechnical Practices and Anticipation of Future Threats
Lilly Muller, Kings College London
Protest, Police, and the Sociotechnical Construction of Threat
Jason Ludwig and Rebecca Slayton, Cornell University
Panel 2 -1:15 – 2:45 PM HACKERS
Chair: Rebecca Slayton, Cornell University
Discussant: Jesse Sowell, University College London
The Hack-and-Leak
Gabriella Coleman, Harvard University
Computer Security and Its Discontents: The Anti-Security Movement, 2000 – 2002
Matt Goerzen, Harvard University
Bounty Everything: Hackers and the Making of the Global Bug Marketplace.
Ryan Ellis, Northeastern University; Yuan Stevens
Panel 3 - 3:30-5:00 PM MATERIALITY
Chair: Lilly Muller, Cornell University
Discussant: Aaron Gluck-Thaler, Harvard University
The Casual Counterfeiter in the Age of Desktop Publishing
Gili Vidan, Cornell University
Black sites: cybersecurity expertise and digital absence
James Shires, Leiden University
The Blurry Lines Between Operations and Information
Clare Stevens, Bristol University
FRIDAY, JUNE 17, 9:30 am-1:30 pm (ET)
Chair: Lilly Muller, Cornell University
Discussant: Jon Lindsay, Georgia Tech
Panel 1 - 9:30 am-11:30 am ORGANIZATIONS
The Technopolitics of Cybersecurity Incident Response
Rebecca Slayton and Frank Smith
Collective Resistance in the Digital Domain: An Exploratory Case Study of the Cyber Partisans
Max Smeets, ETH Zurich
Global Innovation, Knowledge Management, and Cybersecurity: UK Universities as a Case Study
Madeline Carr, University College London
Operational Epistemic Authorities in the Internet's Infrastructure
Jesse Sowell, University College London
12:30 - 1:30 pm FUTURE DIRECTIONS
Open discussion of research gaps and next steps
SPONSORED BY
Reppy Institute for Peace and Conflict Studies
Mario Einaudi Center for International Studies
U.S. National Science Foundation Award # 1553069.
Register here : https://cornell.zoom.us/meeting/register/tJwpd-yvqz4oE9Ld5SDfXOhPZkxFpCiJoGZ
Mario Einaudi Center for International Studies, Reppy Institute for Peace and Conflict Studies, Government, Computer Science, Science and Technology Studies, Information Science
https://einaudi.cornell.edu/programs/reppy-institute-peace-and-conflict-studies
Required
Public
No recent activity