57 lines
2.3 KiB
TeX
57 lines
2.3 KiB
TeX
%% This is csc-poster-sample, a sample CSC poster
|
|
%% Copyright (C) 2003 Computer Science Club of the University of Waterloo
|
|
%%
|
|
%% This program is free software; you can redistribute it and/or modify
|
|
%% it under the terms of the GNU General Public License as published by
|
|
%% the Free Software Foundation; either version 2 of the License, or
|
|
%% (at your option) any later version.
|
|
%%
|
|
%% This program is distributed in the hope that it will be useful,
|
|
%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
%% GNU General Public License for more details.
|
|
%%
|
|
%% You should have received a copy of the GNU General Public License
|
|
%% along with this program; if not, write to the Free Software
|
|
%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
\documentclass{article}
|
|
\usepackage{csc-poster}
|
|
|
|
\begin{document}
|
|
|
|
\vspace*{-0.9in}
|
|
|
|
%% TITLE
|
|
% This command lays out the top of the document.
|
|
% The first parameter is the title.
|
|
% The second parameter is the speaker. This parameter may be empty.
|
|
\cschead{Security and Privacy Lecture Series}{Calum T. Dalek}
|
|
|
|
%% SUBTITLE
|
|
% This command prints the sub-title and is completely optional.
|
|
\cscsubtitle{Why You Should Care About Security and Privacy -- Sarah Harvey}
|
|
|
|
Recent media coverage has brought to light the presence of various government
|
|
agencies' surveillance programs, along with the possible interference of
|
|
governments in the establishment and development of standards and software.
|
|
This brings to question of just how much we need to be concerned about the
|
|
security and privacy of our information.
|
|
|
|
In this talk we will discuss what all this means in technological and social
|
|
contexts, examine the status quo, and consider the long-standing implications.
|
|
This talk assumes no background knowledge of security or privacy, nor any
|
|
specific technical background. All students are welcome and encouraged to
|
|
attend.\\
|
|
|
|
\noindent This is the first lecture of six in the Security and Privacy Lecture
|
|
Series.
|
|
|
|
%% FOOTER
|
|
% The first through third arguments tell us the date and time.
|
|
% The last argument is a pithy saying. It may be empty.
|
|
% Following the footer, the CSC logo is printed.
|
|
\cscfoot{Tuesday, 2013-10-08}{5:00 PM}{MC 4041}{{\tt :()\{ :|:\& \};:}}
|
|
|
|
\end{document}
|