Surveillance: The Back Story

July/August 2014

IEEE Security & Privacy magazine cover

From the Editors

Security and Privacy: Facing Ethical Choices
The public no longer sees computer scientists as heroes. With companies' data collection practices and near daily announcements of data breaches, computer scientists are now often viewed as part of the privacy and security problem. The decisions we make are too important for us not to have an understanding of the social values we're embedding in our lines of code. We need to work to ensure these embedded values are ethical. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

The Enduring Importance of Transparency

The Enduring Importance of Transparency

The five Fair Information Practices (FIPs), stemming from the 1974 US Privacy Act, remain relevant today. In this inaugural tribute article to its legacy, we look at the first of the FIPs: prohibiting secret data-keeping systems. Read full article »

Privacy Issues in Identity Verification

Privacy Issues in Identity Verification

Identity verification plays an important role in creating trust in the economic system. It can, and should, be done in a way that doesn't decrease individual privacy. Read full article »

Announcements

Seeking Editor in Chief

seeking EIC

The IEEE Computer Society seeks applicants for the position of editor in chief, serving a two-year term starting 1 January 2016. The EIC would need to be available for training and interim activity beginning 1 October 2015.

Prospective candidates are asked to provide (as PDF files), by 1 August 2014, a complete curriculum vitae, a brief plan for the publication's future, and a letter of support from their
institution or employer.

Qualifications and Requirements

Candidates for any IEEE Computer Society editor in chief position should possess a good understanding of industry, academic, and government aspects of the specific publication's field. In addition, candidates must demonstrate the managerial skills necessary to process manuscripts through the editorial cycle in a timely fashion. An editor in chief must be able to attract respected experts to his or her editorial board.

Major responsibilities include

  • actively soliciting high-quality manuscripts from potential authors and, with support from publication staff, helping these authors publish their manuscripts;
  • identifying and appointing editorial board members, with the concurrence of the Publications Board;
  • selecting competent manuscript reviewers, with the help of editorial board members, and managing timely reviews of manuscripts;
  • directing editorial board members to seek special-issue proposals and manuscripts in specific areas;
  • providing a clear, broad focus through promotion of personal vision and guidance where appropriate; and
  • resolving conflicts or problems as necessary.

Applicants should possess recognized expertise in the computer science and computer security community, and must have clear employer support.

Contact Information

For more information on the search process and to submit application materials for IEEE Security & Privacy, please contact: Kathy Clark-Fisher at kclark-fisher@computer.org.

*****

Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »

Multimedia

Silver Bullet

Silver Bullet Security Podcast logo

Silver Bullet Security Podcast Episode 100
After 100 months in a row (over 8 years), the Silver Bullet Security Podcast with Gary McGraw hits its landmark 100th episode. In this episode Gary talks live on video with Cigital's Principals: John Steven, Scott Matsumoto, Paco Hope, Jim DelGrosso and Sammy Migues. The group discusses the state of software security and how its evolved (or has it?) over the last decade. They talk Frameworks and code analysis, mobile security, software security in Europe, the forthcoming IEEE Center for Secure Design, and BSIMM. Finally we get to find out who thinks we're making progress and who doesn't. More podcast episodes »