Deviation from the Norms - The Necessity and Challenges - USENIX Enigma 2017

Deviation from the Norms - The Necessity and Challenges - USENIX Enigma 2017

USENIX Enigma Conference via YouTube Direct link

CYBER SOVEREIGNTY

11 of 14

11 of 14

CYBER SOVEREIGNTY

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Deviation from the Norms - The Necessity and Challenges - USENIX Enigma 2017

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 WHAT TARGETS ARE OFF LIMITS?
  3. 3 STATE OF THE SECURITY LANDSCAPE (P2)
  4. 4 WHEN IT COMES TO DIGITAL OFFENSE
  5. 5 THE PURSUIT OF NORMS
  6. 6 A BRIEF HISTORY OF U.S. DIGITAL OFFENSE RESPONSES
  7. 7 NORMS 101
  8. 8 EXAMPLE: SEATBELT USAGE
  9. 9 NORM PROPAGATION S-CURVE
  10. 10 MULTI-STAKEHOLDER MODEL
  11. 11 CYBER SOVEREIGNTY
  12. 12 COMPETING NORMS: FROM THEORY TO PRACTICE
  13. 13 FORUM SHOPPING: FORUMS FOR NORM DIFFUSION
  14. 14 POLICY INNOVATION & ENGAGEMENT REQUIRED

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.