<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Zachary N J Peterson</title>
    <description>znjp</description>
    <link>http://localhost:4000/</link>
    <atom:link href="http://localhost:4000/feed.xml" rel="self" type="application/rss+xml" />
    <pubDate>Wed, 10 Jun 2020 11:06:27 -0700</pubDate>
    <lastBuildDate>Wed, 10 Jun 2020 11:06:27 -0700</lastBuildDate>
    <generator>Jekyll v4.0.0</generator>
    
      <item>
        <title>NICE K12 Cybersecurity Education Conference</title>
        <description>&lt;p&gt;I will be &lt;a href=&quot;https://www.k12cybersecurityconference.org/agenda2019&quot;&gt;speaking on Tuesday, December 10&lt;/a&gt; at the 2019 &lt;a href=&quot;https://www.k12cybersecurityconference.org&quot;&gt;NICE K12 Cybersecurity Conference&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I’ll be sharing some of my work in using alternate realities, in and out of the classroom, to engage new audiences in computer security concepts.&lt;/p&gt;

&lt;p&gt;If you’re in the neighborhood, stop by and say hello!&lt;/p&gt;

</description>
        <pubDate>Tue, 08 Oct 2019 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/news/2019/10/08/NICE/</link>
        <guid isPermaLink="true">http://localhost:4000/news/2019/10/08/NICE/</guid>
        
        <category>security</category>
        
        <category>education</category>
        
        <category>alternate reality games</category>
        
        
        <category>news</category>
        
      </item>
    
      <item>
        <title>On Stablecoins: Stability Mechanisms and Use Cases for Real People. In: Proceedings of the Third International Symposium on Foundations and Applications of Blockchain, 2020</title>
        <description>&lt;p&gt;N. Fowler, E. Cuellar, Z. Peterson. &lt;a href=&quot;https://znjp.com/papers/fowler-fab20.pdf&quot;&gt;On Stablecoins: Stability Mechanisms and Use Cases for Real People&lt;/a&gt;. In: Proceedings of the Third International Symposium on Foundations and Applications of Blockchain, 2020.&lt;/p&gt;

</description>
        <pubDate>Wed, 01 May 2019 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/pubs/2019/05/01/FAB/</link>
        <guid isPermaLink="true">http://localhost:4000/pubs/2019/05/01/FAB/</guid>
        
        <category>cryptocurrency</category>
        
        <category>blockchain</category>
        
        
        <category>pubs</category>
        
      </item>
    
      <item>
        <title>In which I gave mediocre Cyber Monday advice</title>
        <description>&lt;p&gt;I had a fun &lt;a href=&quot;https://www.keyt.com/news/san-luis-obispo-county/central-coast-cyber-experts-warn-shoppers-about-cyber-monday-scams/893388185&quot;&gt;opportunity to speak&lt;/a&gt; to Nathalie Vera of KCOY/KEYT news about Cyber Monday scams and what you can do to avoid them.&lt;/p&gt;

&lt;p&gt;One of the things that may have gotten lost in my advice, however, is that it’s simply not enough for your browser to show a “closed lock” icon. At least &lt;a href=&quot;https://info.phishlabs.com/hubfs/2018%20PTI%20Report/PhishLabs%20Trend%20Report_2018-digital.pdf&quot;&gt;one recent report&lt;/a&gt; shows that as many as a third of phishing sites are now using HTTPS/TLS (the technologies that make the locked in your browser “closed.”). This means, in addition to the “closed locked,” we must also check that the domain name/URL (e.g. amazon.com) shown by your browser matches the site you intended to visit. Only then can you know that your information is both being kept confidential (lock is closed) and being sent to the intended recipient (name matches). A small, but important distinction!&lt;/p&gt;

</description>
        <pubDate>Mon, 26 Nov 2018 00:00:00 -0800</pubDate>
        <link>http://localhost:4000/news/2018/11/26/cybermonday/</link>
        <guid isPermaLink="true">http://localhost:4000/news/2018/11/26/cybermonday/</guid>
        
        <category>Cyber Monday</category>
        
        <category>phishing</category>
        
        <category>scam</category>
        
        
        <category>news</category>
        
      </item>
    
      <item>
        <title>Fakesbook: A social networking platform for teaching security and privacy concepts to secondary school students. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2019</title>
        <description>&lt;p&gt;M. Zinkus, O. Curry, M. Moore, Z. Peterson, Z. J. Wood. &lt;a href=&quot;https://znjp.com/papers/zinkus-sigcse19.pdf&quot;&gt;Fakesbook: A social networking platform for teaching security and privacy concepts to secondary school students&lt;/a&gt;. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2019.&lt;/p&gt;

</description>
        <pubDate>Wed, 10 Oct 2018 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/pubs/2018/10/10/SIGCSE/</link>
        <guid isPermaLink="true">http://localhost:4000/pubs/2018/10/10/SIGCSE/</guid>
        
        <category>security</category>
        
        <category>privacy</category>
        
        <category>education</category>
        
        
        <category>pubs</category>
        
      </item>
    
      <item>
        <title>Cybersecurity Policy Fellow at New America</title>
        <description>&lt;p&gt;I’m very pleased and proud to announce that I’ve been named, among a &lt;a href=&quot;https://www.newamerica.org/cybersecurity-initiative/2018-2019-cybersecurity-policy-fellows/&quot;&gt;distinguished list of scholars&lt;/a&gt;, a Cybersecurity Policy Fellow at &lt;a href=&quot;https://www.newamerica.org&quot;&gt;New America&lt;/a&gt;. Details of the fellowship can be found in this &lt;a href=&quot;https://www.newamerica.org/cybersecurity-initiative/press-releases/new-america-announces-2018-19-cybersecurity-policy-fellows/&quot;&gt;press release&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I couldn’t be more excited for this opportunity. In particular, I’m looking forward to crafting policy that builds our nation’s cybersecurity workforce, leveraging much of the work I’ve done in computer security outreach and education over the years.&lt;/p&gt;

</description>
        <pubDate>Wed, 03 Oct 2018 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/news/2018/10/03/newamerica/</link>
        <guid isPermaLink="true">http://localhost:4000/news/2018/10/03/newamerica/</guid>
        
        <category>security</category>
        
        <category>computer science</category>
        
        <category>education</category>
        
        
        <category>news</category>
        
      </item>
    
      <item>
        <title>Cal Poly wins NSA GenCyber Teacher Training Award</title>
        <description>&lt;p&gt;My colleagues John Oliver, Paul Hummel, and I have been awarded a 2018 &lt;a href=&quot;https://www.gen-cyber.com&quot;&gt;GenCyber&lt;/a&gt; grant for providing guidance to local high school teachers in integrating core, cybersecurity concepts into their classroms. The goal is to create a force-multiplier for generating interest in cybersecurity amongst the local high school students. Beyond  traiditional in-class exercises, our program will leverage my existing cybersecurity track within &lt;a href=&quot;https://epic.calpoly.edu&quot;&gt;EPIC&lt;/a&gt; to create a hands-on, learn-by-doing labratory where teachers will get to pracitce some of their newly learned techniques. Further, to help ensure that teachers will adopt the cyber labs as part of their teaching, we will link each of the labs to the Next Generation Science Standards (NGSS) which are used by all California public schools. We hope to release our curricular materials publicaly soon after the camp concludes.&lt;/p&gt;

</description>
        <pubDate>Fri, 06 Jul 2018 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/news/2018/07/06/gencyber/</link>
        <guid isPermaLink="true">http://localhost:4000/news/2018/07/06/gencyber/</guid>
        
        <category>security</category>
        
        <category>computer science</category>
        
        <category>education</category>
        
        
        <category>news</category>
        
      </item>
    
      <item>
        <title>Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates. In: Proceedings of the USENIX Advances in Security Education Workshop (ASE), 2018.</title>
        <description>&lt;p&gt;J. R. Morelock and Z. Peterson &lt;a href=&quot;https://znjp.com/papers/morelock-ase18.pdf&quot;&gt;Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates&lt;/a&gt; In: Proceedings of the USENIX Advances in Security Education Workshop (ASE), 2018.&lt;/p&gt;

</description>
        <pubDate>Tue, 03 Jul 2018 00:00:00 -0700</pubDate>
        <link>http://localhost:4000/pubs/2018/07/03/ASE/</link>
        <guid isPermaLink="true">http://localhost:4000/pubs/2018/07/03/ASE/</guid>
        
        <category>games</category>
        
        <category>education</category>
        
        
        <category>pubs</category>
        
      </item>
    
      <item>
        <title>CENIC Panel Cybersecurity Workforce Development in R&amp;E Environments</title>
        <description>&lt;p&gt;Along with my colleagues Matt Bishop (UC Davis), Cynthia Irvine (Naval Postgraduate School), David Rusting (University of California CISO) and modertated by Sean Piesert (UC Davis), I partipated in a panel discussion titled &lt;a href=&quot;http://www.cvent.com/events/the-right-connection-cenic-2018/agenda-17638eddf8134d85a4450b68fe85400e.aspx&quot;&gt;Cybersecurity Workforce Development in R&amp;amp;E Environments&lt;/a&gt; at the &lt;a href=&quot;https://cenic.org/conference&quot;&gt;CENIC Annual Conference&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I found it to be a really fascinating, with some key insights being:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;We’re too narrowly focused on producing experts, when all computing majors (at a minimum) should be receive security education;&lt;/li&gt;
  &lt;li&gt;Even when producing attempt to produce “experts,” the traditional CS curriculum fails to attract and retain a diverse population of students;&lt;/li&gt;
  &lt;li&gt;There is no common core for computer security; instead there are wide, and sometimes conflicting, sets of learning objectives;&lt;/li&gt;
  &lt;li&gt;and, we have a long way to go!&lt;/li&gt;
&lt;/ul&gt;

</description>
        <pubDate>Tue, 06 Mar 2018 00:00:00 -0800</pubDate>
        <link>http://localhost:4000/news/2018/03/06/CENIC18/</link>
        <guid isPermaLink="true">http://localhost:4000/news/2018/03/06/CENIC18/</guid>
        
        <category>security</category>
        
        <category>computer science</category>
        
        <category>education</category>
        
        
        <category>news</category>
        
      </item>
    
      <item>
        <title>Mixed approaches to CS0: Exploring topic and pedagogy variance after six years of CS0. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2018.</title>
        <description>&lt;p&gt;Z. J. Wood, J. Clements, Z. Peterson, D. Janzen, H. Smith, M. Haungs, J. Workman, J. Bellardo, and B DeBruhl. &lt;a href=&quot;https://znjp.com/papers/wood-sigcse18.pdf&quot;&gt;Mixed approaches to CS0: Exploring topic and pedagogy variance after six years of CS0.&lt;/a&gt; In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2018.&lt;/p&gt;

</description>
        <pubDate>Tue, 09 Jan 2018 00:00:00 -0800</pubDate>
        <link>http://localhost:4000/pubs/2018/01/09/SIGCSE/</link>
        <guid isPermaLink="true">http://localhost:4000/pubs/2018/01/09/SIGCSE/</guid>
        
        <category>games</category>
        
        <category>education</category>
        
        
        <category>pubs</category>
        
      </item>
    
      <item>
        <title>Introducing Privacy to Undergraduate Computing Students. In: Proceedings of the Consortium for Computing in the Colleges Southwest Region Conference, 2018</title>
        <description>&lt;p&gt;M. Moore, M. Zinkus, N. Lemay, Z. Peterson, and B. DeBruhl. &lt;a href=&quot;https://znjp.com/papers/moore-ccsc-sw18.pdf&quot;&gt;Introducing Privacy to Undergraduate Computing Students&lt;/a&gt;. In: Proceedings of the Consortium for Computing in the Colleges Southwest Region Conference, 2018.&lt;/p&gt;

</description>
        <pubDate>Tue, 09 Jan 2018 00:00:00 -0800</pubDate>
        <link>http://localhost:4000/pubs/2018/01/09/CCSC18/</link>
        <guid isPermaLink="true">http://localhost:4000/pubs/2018/01/09/CCSC18/</guid>
        
        <category>security</category>
        
        <category>education</category>
        
        
        <category>pubs</category>
        
      </item>
    
  </channel>
</rss>
