Difference between revisions of "White Paper Projects"
From CyberSecurity
Line 18: | Line 18: | ||
*'''Interrogation & Torture''' | *'''Interrogation & Torture''' | ||
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard] | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard] | ||
+ | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari] | ||
*'''State-Sponsored Hacking''' | *'''State-Sponsored Hacking''' | ||
**[[User:Keunwoo Lee|Keunwoo Lee]] | **[[User:Keunwoo Lee|Keunwoo Lee]] |
Revision as of 21:20, 7 November 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Nuclear Weapons
- ..
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- ..
- Encryption Policy
- ..
- Open Source and Cybersecurity
- ..
- Interrogation & Torture
- State-Sponsored Hacking
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- ..
- Cyber Criminal Activity
- Liability
- ..
- Education, Exploits, Cyberculture
- Offense vs. Defense
- ..
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.