Second Interdisciplinary Workshop on Reimagining Democracy

As with IWORD 2022, the goal was to bring together a diverse set of thinkers and practitioners to talk about how democracy might be reimagined for the twenty-first century.
Modern democracy was invented in the mid-eighteenth century, using mid-eighteenth-century technology.
Were democracy to be invented from scratch today, with today's technologies, it would look very different.
Resource allocation and reallocation would look different.
Everyone seems to be talking about ways to reform our existing systems.
IWORD 2023 was equally fantastic, easily the most intellectually stimulating two days of my year.
The event is like that; the format results in a firehose of interesting.
Summaries of all the talks are in the first set of comments below.
Next year, I hope to take the workshop out of Harvard and somewhere else.
Now, I really want to explain the format in detail, because it works so well.
I used a workshop format I and others invented for another interdisciplinary workshop: Security and Human Behavior, or SHB. It's a two-day event.
Each panel has six speakers, each of whom presents for ten minutes.
The workshop is limited to forty-eight attendees, which means that everyone is on a panel.
Attendees commit to being there for the whole workshop; no giving your talk and then leaving.
The final piece of the workshop is the social events.
We have a night-before opening reception, a conference dinner after the first day, and a final closing reception after the second day.
Even though a shorter event would be easier to deal with, the numbers all fit together in a way that's hard to change.
A one-day event means only twenty-four attendees/speakers, and that's not a critical mass.
Not everyone speaking creates a speaker/audience hierarchy, which I want to avoid.
I've thought about it long and hard; the format I'm using is optimal.


This Cyber News was published on www.schneier.com. Publication date: Mon, 08 Jan 2024 12:43:05 +0000


Cyber News related to Second Interdisciplinary Workshop on Reimagining Democracy

Second Interdisciplinary Workshop on Reimagining Democracy - As with IWORD 2022, the goal was to bring together a diverse set of thinkers and practitioners to talk about how democracy might be reimagined for the twenty-first century. Modern democracy was invented in the mid-eighteenth century, using ...
8 months ago Schneier.com
Three Years After January 6th: The Insurrection's Impact on U.S. Democracy - Three years ago, on January 6, 2021, the U.S. Capitol was stormed by a mob intent on overturning the results of the 2020 Presidential Election. This event - the January 6th insurrection - was a direct attack on the democratic process and the peaceful ...
8 months ago Securityboulevard.com
Democracy 2024: Stakes vs. Horses - The 2024 U.S. Presidential election isn't just another tick on the political timeline. It's a crucial juncture for - quite literally - the future of American democracy. We're not just deciding who gets to sit in the Oval Office for the next four ...
9 months ago Securityboulevard.com
Security Boulevard - This is likely our last shot at preserving liberal democracy in the U.S., or at least avoiding 20-40 years of abject horribleness by wannabe bigoted and sociopathic demigods. The year 2024 is also set to be a significant year for global politics, ...
9 months ago Securityboulevard.com
OpenSSL Providers Workshop: Authors Track - Please join us next week for part two of the workshop: Live OpenSSL Providers Workshop: Authors Track. As with the Users Track, we will be hosting two sessions of the Authors Track at different times to allow people from different time zones to be ...
10 months ago Openssl.org
CVE-2008-0869 - Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using ...
13 years ago
How a Group of Train Hackers Exposed a Right-to-Repair Nightmare - Earlier this month, Polish hackers known as Dragon Sector accused one of Poland's largest train makers, Newag, of intentionally bricking its own trains when they're repaired by third parties. Newag threatened to sue Dragon Sector, but the story ...
9 months ago Packetstormsecurity.com
Cisco Foundation Grantees prioritize Indigenous leadership to protect the Amazon Basin - This is the first of our three-part series on Cisco Foundation grantees working in the Amazon and South America region. This series will introduce you to eight Cisco Foundation Climate Impact & Regeneration grantees working to support preservation ...
8 months ago Feedpress.me
UK Government Warns of Russian Cyber Campaigns Against Democracy - Russian Intelligence Services have been engaging in a sustained cyber campaign aimed at interfering in UK politics and democratic processes. The National Cyber Security Centre, part of GCHQ, alongside international partners, have identified the ...
9 months ago Infosecurity-magazine.com
Speaking Freely: Mohamed El Gohary - After majoring in Biomedical Engineering in October 2010, he switched careers to work as a Social Media manager for Al-Masry Al-Youm newspaper until October 2011, when he joined Global Voices contracts managing Lingua until the end of 2021. Free ...
4 months ago Eff.org
4 Best War Games You Should Play - Online gaming is a luxury, especially if you are interested in strategic war games. Let this format be better expressed within the framework of games and films and people will perceive it at the multimedia level, and not take part in real combat ...
9 months ago Hackread.com
US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK - The US Federal Aviation Administration (FAA) has grounded SpaceX’s Falcon rockets for the third time in three months after a second-stage problem occurred following the successful launch of a Dragon Crew mission that brought two astronauts to ...
4 days ago Silicon.co.uk
CVE-2007-2705 - Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop ...
7 years ago
Chromebook SH1MMER exploit promises admin jailbreak The Register - Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER. SH1MMER - you may pronounce the "1" as an "i" - is a shim exploit, or more specifically, ...
1 year ago Packetstormsecurity.com
Hugging Face API tokens exposed, major projects vulnerable The Register - The API tokens of tech giants Meta, Microsoft, Google, VMware, and more have been found exposed on Hugging Face, opening them up to potential supply chain attacks. Researchers at Lasso Security found more than 1,500 exposed API tokens on the open ...
10 months ago Go.theregister.com
Censys unveils two new product tiers to help researchers enhance their threat hunting work - Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are part of a series of strategic initiatives to enhance the security community, including the introduction of Threat Hunting Boot ...
9 months ago Helpnetsecurity.com
Upcoming Book on AI and Democracy - If you've been reading my blog, you've noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce that we're writing a book on the topic. This isn't a book about deep fakes, or ...
3 months ago Schneier.com
CVE-2022-48506 - A flawed pseudorandom number generator in Dominion Voting Systems ImageCast Precinct (ICP and ICP2) and ImageCast Evolution (ICE) scanners allows anyone to determine the order in which ballots were cast from public ballot-level data, allowing ...
1 year ago
CVE-2024-33920 - Missing Authorization vulnerability in Kama Democracy Poll.This issue affects Democracy Poll: from n/a through 6.0.3. ...
5 months ago
The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords - While the world will always be unpredictable, several strong trends in cybersecurity point to promising and concerning developments in the months ahead. One thing's for sure: 2024 will be a very significant and interesting year. Artificial ...
7 months ago Securityboulevard.com
Protect Yourself from Election Misinformation - Welcome to your U.S. presidential election year, when all kinds of bad actors will flood the internet with election-related disinformation and misinformation aimed at swaying or suppressing your vote in November. As EFF's Corynne McSherry wrote in ...
6 months ago Eff.org
Partnering for Purpose: A Year in Focus - This is typically the time of year when we take time to reflect, and looking back, 2023 has been a wonderful year of fulfillment and purpose for me, specifically in my role leading Partnering for Purpose. A global Cisco initiative, Partnering for ...
9 months ago Feedpress.me
Navigating the AI Frontier with Cisco - Fresh from another impactful Cisco Live EMEA, the buzz around Artificial Intelligence is undeniable. AI stands as a new frontier for businesses, a beacon of innovation in our swiftly evolving landscape. On Partner Day, I addressed a packed room of ...
7 months ago Feedpress.me
What Do CISOs Have to Do to Meet New SEC Regulations? - Ilona Cohen, Chief Legal and Policy Officer, HackerOne: It is never an easy time to be a chief information security officer, but the past few months have felt particularly challenging. The recent charges from the US Security and Exchange Commission ...
9 months ago Darkreading.com
5 Essential Insights from the Microsoft Digital Defense Report 2023 - This year's report identified significant developments, some of which may sound familiar - such as the pressing need for more cyber defenders - and others that are newer. The report is based on insights synthesized from 65 trillion daily signals by ...
9 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)