Debugging our Cyber-Security Policy Edward W. Felten Department of Computer Science Woodrow Wilson School of Public and International Affairs Center for.

Slides:



Advertisements
Similar presentations
Used to Procure Goods & Supplies. Office supplies Operating supplies Computer hardware and software (non- capitalized
Advertisements

Providing Public Goods
DSST Core Instructional Practices. Guitar & Violin by Picasso.
1 Opportunities for Development and Investments in Translational Research URBAN & REGIONAL POLICY Barry Bluestone Center for Urban and Regional Policy.
How Do I Stay on Track? Monitoring and Control Requires: Identifying factors critical to success Measuring performance Defining standards of expected.
Nicole Bornkamp Princeton University Class of 2014 PEI Development Challenger.
The Strategic and Operational Planning Process
Strategic Business Planning for Commercial Producers
Elizabeth A. Evans UNC Chapel Hill Administrative Information Services Project Management Techniques for Cross-Campus Collaboration (Or: Just how do you.
1 - 0 Copyright © 2002 by Harcourt, Inc.All rights reserved. CHAPTER 1 An Overview of Financial Management Role of financial management Career opportunities.
S CHOOL OF S OCIAL E COLOGY Discover Engage Transform.
The Caribbean Single Market Economy Understanding the impact of the free movement of labor on the people of St. Lucia Kevin Stapleton, Graduate Student.
Building Lasting Wealth A REAL ESTATE INVESTMENT SEMINAR.
EU Macro-regions e.g. Baltic Sea Region Macro-regions e.g. Baltic Sea Region National Regional City-regions Cluster Policy in Europe Local.
China – EU INFORMATION CENTER for Sustainable Development Strategy and Global Dynamic Monitoring.
Emerging Market Global Players: Institutions, Governance and Strategy: The Case of Qatar Emerging Market Global Players: Institutions, Governance and Strategy:
WLE and the INTEGRATING ECOSYSTEM SOLUTIONS INTO POLICY and INVESTMENTS (IES) FLAGSHIP Nathanial Matthews Global Research Coordinator IES Flagship Leader.
Public Spending on Science and Research Dr Graeme Reid CaSE Roundtable 25 May 2012.
Bell Ringer Calculate the average of the following list of numbers What did you do over thanksgiving?
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
European Commission Employment & Social Affairs Employment & European Social Fund The European Employment Strategy The first five years and beyond Presentation.
The Right Approach to Investing. The Right Approach for You Let’s determine Who you are What you currently have What your objectives are What you need.
…………………...  Study the market, coupe with competition (direct and indirect).  New business create pressure on the market either in price, investment.
Strategic Planning and the Environment: Cape Town Perspectives Gregg Oelofse: Environmental Policy and Strategy City of Cape Town.
GOALS © South-Western Educational Publishing Lesson 12.1 Evaluating Stocks  Describe the features of common and preferred stock  Discuss stock investing.
Organizational Structure Suvi Skippari Svetlana S. Velikanova BP-Centro.
computer
Unit 1 Area of Study 2. An Externality is any effect on a third party that results from economic activities.
Brokers & Analysts  Brokers link buyers and sellers of stock.  They usually work for an investment firm  Earn profit by collecting commission.
PREPARED BY: Hadeel El-Genedy SOFTWARE ARCHITECTURE COURSE PRE-MASTERS STUDIES COMPUTER SCIENCE DEPARTMENT CAIRO UNIVERSITY Software Product Line.
Archiving is downloading, keeping and protecting s that you are receiving or sending so they can be accessed at another time. Archiving.
Brought to you by: Company Name – Company Website Building Lasting Wealth A REAL ESTATE INVESTMENT SEMINAR.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Marketing Essentials Chapter 5.  Our nation is built upon freedom ◦ Freedom  What to purchase  Where to work  How to spend our money  To organize.
Chapter 29 Principles of Corporate Finance Tenth Edition Financial Planning Slides by Matthew Will McGraw-Hill/Irwin Copyright © 2011 by the McGraw-Hill.
Services Assessment Exercise
State shareholders should become an active force in promoting the establishment of effective corporate governance Chen Qingtai State Council Development.
Issues Facing Suppliers and Users of IT Products and Services 4 Short term 4 Long term.
Project Demonstration Template Computer Science University of Birmingham.
Responsible Research and Innovation as a part of Regional Innovation Eco-system Rhys Thomas Head of Innovation System and Engagement Pennaeth System Arloesi.
爱沙尼亚 - 中国 IT 产业交流会 Introduction of Dalian Software Industry.
May 10, 2001An Overview of the Princeton University Web - WWS 1 Woodrow Wilson School  History –One of Princeton’s first academic department sites, started.
Domain Processes Know your customer.. Last Class - "Life Cycles" the process we will use to create the software product This Class - "Domain Processes"
Operational Risk Policy. Risk Management Policy Planning of operational risk management. Identification of business lines. Mapping of business lines.
Future of Children Chapter 1: The Science of Climate Change Jesse K. Anttila-Hughes University of San Francisco Department of Economics Michael Oppenheimer.
MARKET ANALYSIS Session 3 Monday, April SESSION OUTLINE Company’s micro and macro-environment Analysis of product demand –static –dynamic Competitive.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Market, Policy, & Institutional Failures Session Objective: l Use environmental economics to identify economic root causes of environmental problems.
Chapter 1 Main Ideas About War (7). Warfare is… …armed conflict involving different states (governments).
Circular Flow of Wealth Models. The entrepreneurs The businesses The productsThe people Wealth Left out: the government invest wealth: land, labor or.
Ingram, S. Entrepreneurship Planning the Small Business: Planned Financing.
Why the Internet Should Stay Neutral Lydia Chen, Alex Salloum, David Talley, Angela Zhou.
Info Tech. Period 3.  Computer Programmers write computer languages like JavaScript and Jscript  They Debug programs by testing and finding errors.
Software Architecture Exercise 3 System Architecture © Ingo Arnold Department Computer Science University of Basel Introduction.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
WEEK 10 PRESENTATION BRIEFING B300. MODULE 3 – POLICY ISSUES FOR BUSINESS Objectives and Key Themes: To appreciate the rationale for business policy.
Chapter 15 Telecommunication Department Management.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Purchase of Agricultural Conservation Easement programs operate in 32 states Source: Farmland Information Center 2015 PACE Survey –
UM Positioning Over past 6 years, UM has taken a number of steps that help us prepare for challenges ahead: Moved to a more conservative endowment spending.
This presentation has been IRM protected by policy.
Circular Flow of Wealth Models
Top 6 Strategies of Digital Marketing.
Earl Lewis, PE Kansas Economic Policy Conference October 24, 2003
Solve: 1. 4<
SHEFFIELD CITY REGION EXECUTIVE TEAM
قوانين برگزاري مناقصات و آيين نامه مالي و معاملاتي دانشگاه علوم پزشكي و خدمات بهداشتي ،درماني تهران
Community of Users.
Venture Center Library – Floor Plan
Presentation transcript:

Debugging our Cyber-Security Policy Edward W. Felten Department of Computer Science Woodrow Wilson School of Public and International Affairs Center for Information Technology Policy Princeton University

Need a long-term approach.

Need to protect the average computer.

Software quality is the core problem.

Need to improve the ecosystem.

The market is not solving our problem.

Market failures: Lemons problem Negative externalities

Few places to invest

Action: Make necessary short-term investments.

Strategy: Attack the market failures.

Action: Foster broad information sharing.

Action: When purchasing, try to internalize externalities.

Action: Long-term investment in human capital.

Action: Give someone authority to force action.

Debugging our Cyber-Security Policy Edward W. Felten Department of Computer Science Woodrow Wilson School of Public and International Affairs Center for Information Technology Policy Princeton University