text-only page produced automatically by LIFT Text
Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation HomeNational Science Foundation - Directorate for Computer & Information Science & Engineering (CISE)
Computer & Network Systems (CNS)
design element
CNS Home
About CNS
Funding Opportunities
Career Opportunities
See Additional CNS Resources
View CNS Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Merit Review
NSF Outreach
Policy Office
Additional CNS Resources
Career Opportunities

The Washington Area Trustworthy Computing Hour (WATCH) seminar series

About the WATCH series:


Today we are regularly obliged to trust a cyberinfrastructure that is in fact untrustworthy. Transforming today’s infrastructure into one that can meet society’s growing demands is major national challenge and opportunity. Meeting the challenge requires not only technical advances in the fabric of computing and communication but also improved understanding of how individuals and organizations comprehend and use technology, how economic and policy incentives can affect adoption of new technology, and how to develop human-centered systems that can serve users with different national, cultural, and technical backgrounds around the planet. WATCH aims to provide a series of thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Trustworthy Computing Program

Video and Audio will be available one month after each meeting. You can also visit the CISE webinar/webcast page for more WATCH information at: http://www.nsf.gov/events/event_group.jsp?group_id=20018&org=CISE

To join our listserv and receive WATCH Series by email, please send a blank email to:


You should receive an email to confirm your subscription within an hour.

Next WATCH series:

Carl Landwehr
How can we enable privacy in an age of big data analytics?
George Washington University
May 19, 2016

To attend this meeting virtually, register at: http://www.tvworldwide.com/events/nsf/160519/.

Any language, opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation

Past WATCH series:

4/21/16 - Susan Landau "Crypto Wars: Plus ça Change, Plus c'est la Même Chose"

3/24/16 - Phillip Rogaway "The Moral Character of Cryptographic Work"

3/17/16 - Deirdre K. Mulligan "Privacy: Plural, Contextual, Contestable but not Unworkable"

1/21/16 - Ronald J. Deibert "The Citizen Lab's Mixed Methods Approach to Research on Information Controls"

11/12/15 - Tadayoshi Kohno "Computer Security and the Internet of Things"

7/16/15 - Mark Tehranipoor "New Frontiers in Hardware Security and Trust"

7/6/15 - Robert N.M. Watson, "The CHERI Processor: Revisiting the Hardware-Software Interface for Security"

6/18/15 - Bret Hartman, "Cybersecurity for the Internet of Everything (IoE)"

4/14/15 - Gabriella Coleman, "Inside Anonymous"

3/19/15 - Mary Ellen Callahan, "Cybersecurity and Privacy: Complementary -- Not Mutually Exclusive -- Concepts"

1/15/15 - Salil Vadhan, "Differential Privacy: Theoretical and Practical Challenges"

11/13/14 - Dana Chisnell, "The burden of authentication: What friction points reveal"

7/17/14 - Crispin Cowen, "Reflections on Decades of Defending Imperfect Software"

5/15/14 - Dan Wallach, "STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System"

4/17/14 - Deb Frincke, "Education and Training - NSA/CSS Style"

3/20/14 - Maya Bernstein, "Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems"

2/20/14 - Deanna Caputo, "Going Spear phishing: Exploring Embedded Training & Awareness"

1/14/14 - Roger Dingledine, "The Tor Project in 2013"

11/25/13 - Alessandro Acquisti, "An Experiment in Hiring Discrimination via Online Social Networks"

7/18/13 - Stewart Baker, "Cyberwar -- Without the Magical Thinking"

3/21/13 - Cormac Herley, "Security, Cybercrime and Scale"

1/17/13 - Patrick Lincoln, "Ultra Paranoid Computing"

11/15/12 - Kevin Fu, "Medical Device Cybersecurity: The First 164 Years"

10/18/12 - Jeff Hancock, "Deception and Cybersecurity"

8/16/12 - Ernest McDuffie, "National Initiative for Cybersecurity Education (NICE) Overview"

4/19/12 - Lorrie Cranor, "Security, Privacy, and Usability: Better Together"

3/15/12 - Tom Longstaff, "Barriers to the.Science of Security"

2/16/12 - Paul Barford, "Challenges and Opportunities in Cyber Security Innovation"

1/19/12 - Vitaly Shmatikov, "The End of Anonymity, the Beginning of Privacy"

12/1/11 - Fabian Monrose, "Hooked On Phonics: Learning to Read Encrypted VoIP Conversations"

11/3/11 - Stefan Savage, Why the hard problem of computer security needs the soft sciences"

10/6/11 - Douglas Maughan, "So what if I take over a botnet to do my research?"

9/1/11 - Marshall Van Alstyne, "Fighting Fraud from an Economic Perspective"

8/4/11 - Ken Klingenstein, "Trust and Turtles All the Way Down..."

7/7/11 - Paul L. Harris, "Selective Credulity"

6/1/11 - Fred B. Schneider, "Doctrine for Cybersecurity."


Questions/comments about WATCH? Contact Nina Amla


Email this pagePrint this page
Back to Top of page