Publications

18 Results
Skip to search filters

Data privacy and security considerations for personal assistantsfor learning (PAL)

International Conference on Intelligent User Interfaces, Proceedings IUI

Raybourn, Elaine M.; Fabian, Nathan D.; Davis, Warren L.; Parks, Raymond C.; McClain, Jonathan T.; Trumbo, Derek T.; Regan, Damon; Durlach, Paula J.

A hypothetical scenario is utilized to explore privacy and security considerations for intelligent systems, such as a Personal Assistant for Learning (PAL). Two categories of potential concerns are addressed: factors facilitated by user models, and factors facilitated by systems. Among the strategies presented for risk mitigation is a call for ongoing, iterative dialog among privacy, security, and personalization researchers during all stages of development, testing, and deployment.

More Details

Control systems field equipment forensics : what happened to my PLC and how do I fix it?

Parks, Raymond C.

The outline for the presentation is: (1) Advance preparation - (a) Think about attacks before they happen, (b) Configuration Management, (c) Backups, (d) Off-site storage, (e) Design and build for resiliency, (f) Training operators to detect attack; (2) Detection - (a) How do I know I've been attacked, (b) The front-line detection system - operators; (3) Triage - (a) Working through the attack, (b) Law enforcement or business continuity, (c) Deciding what to fix first; (4) Field Equipment Forensics - (a) Engineering Workstation, (b) Projects/Configurations/Programs; and (5) Conclusion and Discussion. Red teaming works for supply chain - Finds the worst attacks across multiple dimensions, Shows where to best expend resources to reduce risk, and Provides positive control of potentially negative activities.

More Details
18 Results
18 Results