Linkage

 

Academic Opportunities for Faculty, Post-Doctoral and Student in Economics of Security

Faculty Opportunities

School of Information One Assistant Tenure Track and One Open Rank
The School of Information at the University of California, Berkeley invites applications for up to two ladder rank faculty members, one at the junior (untenured) level and one open as to rank. ....We have organized our curriculum into five subfields: information design and architecture, information economics and policy, information assurance (privacy, security, quality), social science analysis of information and online communication, and human computer interaction.

MIT Engineering Systems Division One Assistant Tenure Track
The MIT Engineering Systems Division invites applications for a tenure track position at the Assistant Professor level in the broad area of principles and properties of complex large scale engineering systems. Relevant topic areas include but are not limited to technology and policy, energy and environment systems, interface of economics and engineering systems, logistics and supply chains, and applications to critical network infrastructures. Applicants must have earned a Ph.D. in Engineering Systems or a related field of engineering, management, or social science, must have strong teaching skills, and must have demonstrated excellence in research. The successful candidate will be expected to develop a significant research program and use his/her expertise to develop and teach subjects in related areas. Applications received by January 30,

School of Public Policy One Assistant Tenure Track
The School of Public Policy at George Mason University invites applications for a position in national and global security. The School is aggressively building a multidisciplinary capability in this area, and we have a particular interest in research, education, and outreach on asymmetric and emerging threats and organizational change and resilience.

US Department of State 2008 Jefferson Science Fellowship Program
The articulation of accurate science for state to policy makers has become an essential element in establishing effective international relationships in the 21st century. Recognizing this need, the U.S. Department of State created the Jefferson Science Fellows (JSF) program which established a new model for engaging the American academic STE communities in the formulation and implementation of U.S. foreign policy. The JSF program is administered by the National Academies and supported through a partnership between American philanthropic foundations (the MacArthur Foundation and the Carnegie Corporation), the U.S. STE academic community, professional scientific societies, and the U.S. Department of State.

Sloan Center for Internet Retailing at the US Department of State at the University of California, Riverside Two Tenured Faculty
The A. Gary Anderson Graduate School of Management at the University of California, Riverside invites applications for up to four full-time tenure-track faculty positions as Assistant Professor in Marketing to begin July 1, 2007. We seek candidates with highly sophisticated research training who can demonstrate the potential for outstanding accomplishment and scholarly distinction in marketing. Research area is open but preference will be given to candidates with strong methodological training and behavioral research interests. Teaching opportunities are available at both the graduate and undergraduate levels. Candidates must have the Ph.D. or expect the degree to be conferred by the date of appointment. File review will begin June 1, 2006. First consideration will be given to candidates who apply by the application deadline of September 1, 2006

University of Boulder CIRES Those interested are encouraged to email Dempsey@CIRES.Colorado.edu One Senior Director Position
Applicants must have demonstrated achievement in science and technology policy research. This position allows substantial time for research as well as leadership and administrative service as Center Director. The successful candidate must have an established interest in interdisciplinary research and teaching, and must be willing to contribute to both undergraduate and graduate teaching related to science and technology policy. The position will carry tenure within an academic department to be mutually decided upon by the candidate and department. Possibilities include Geography, Political Science, Environmental Studies, Communications, and numerous others. Required Qualifications: PhD in a field relevant to science and technology policy

Post-Doctoral Opportunities

The I3P has published the 2007 Research Fellowships for post-doctoral researchers, junior faculty and research scientists.
The Institute for Information Infrastructure Protection (I3P) seeks to advance its national research agenda through a research fellowship program. The I3P fellowship program helps to build a nationwide cadre of investigators focused on critical research challenges and provides expanded research opportunities at I3P Consortium member institutions. A targeted goal of the I3P fellowship program is to add depth and breadth to critical research needs highlighted by the I3P Cyber Security Research and Development Agenda which identified the following core research areas: Enterprise Security Management; Trust Among Distributed Autonomous Parties; Discovery and Analysis of Security Properties and Vulnerabilities; Secure System and Network Response and Recovery; Traceback, Identification, and Forensics; Wireless Security; Metrics and Models; and Law, Policy, and Economic Issues. See the I3P Consortium Member Contacts page.

Student Opportunities

University of Michigan and Wayne State University STIET-Incentive-Centered Design Program The STIET program brings together faculty and doctoral students from the University of Michigan and Wayne State University in research, training, and outreach, through an incentive-centered design (ICD) approach to modern information systems. System performance depends on the strategic behavior of autonomous, self-interested humans; therefore we draw on theories of rational decision making, game-theoretic models of strategic interaction, and economic, psychological and other social science theories of motivation to form a principled grounding for system design. STIET students and faculty collaborate in interdisciplinary ICD research fueled by a weekly seminar series and twice yearly research workshops.  Our program provides curriculum, research training and a collaborative research community. Generous NSF IGERT-funded fellowships are available. We also have a new summer research training and mentoring program to prepare and encourage promising undergraduates and masters students to pursue a graduate degree, and will provide a training ground in research leadership and mentoring for our PhD students, called the STIET-Summer Research Opportunity Program (S-SROP)
The School of Informatics at Indiana University offers a PhD in Security Informatics Security Informatics is centered on the core protocols and practices of information technology security and its use. The Security Informatics curriculum includes all subjects central to computer security: mathematics, protocol analysis, system and network security. It also naturally dovetails with the span of material pertaining to informatics. Indeed, Security Informatics is security integrated with human-computer interaction, social engineering, science informatics, and information technology rather than isolated from the large economic and social milieu.

Optimal Places Graduate Study of Economics of Security

Cambridge University Computer Science Laboratory

Carnegie Mellon University Privacy Lab

Carnegie Mellon University Heinz School

Carnegie Mellon University Engineering and Public Policy

University of Minnesota

University of Michigan School of Information

Harvard University Division of Engineering and Applied Sciences

University of Maryland College Park

Dartmouth hosts the I3P

which includes the Tuck School as well as the Computer Science Department in studying economics of information security.
WEIS05
©Copyright 2005.