Skip to content

Commit 1673bff

Browse files
committed
Adds some quotes, clarifies, emphasizes some parts
1 parent a22f805 commit 1673bff

File tree

1 file changed

+24
-9
lines changed

1 file changed

+24
-9
lines changed

course-proposal/contents.tex

Lines changed: 24 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,15 @@ \subsection{The origin of the problem}
6767
\end{example}
6868
\end{frame}
6969

70+
\begin{frame}
71+
\textcquote{SecurityAsAScience}{%
72+
Unfalsifiable claims are common in security---and they, along with circular
73+
arguments, are used to justify many defensive measures \textelp{}
74+
\textins{T}here are many ways to argue measures in, but no way to argue one
75+
out.
76+
}
77+
\end{frame}
78+
7079

7180
\subsection{The goal}
7281

@@ -77,7 +86,8 @@ \subsection{The goal}
7786

7887
\pause
7988

80-
\item Where are the disputes and why?
89+
\item Where are the disputes, philosophical problems and why?
90+
\item What are the methods we use and why?
8191
\end{itemize}
8292
\end{block}
8393
\end{frame}
@@ -153,20 +163,26 @@ \subsection{Contents}
153163
\begin{frame}
154164
\begin{example}[Deductive inquiry]
155165
\begin{itemize}
156-
\item What are the limitations?
157-
\item Can this be science on its own?
158-
\item Or does it require a combination of application and further study
159-
to form something scientific?
166+
\item \enquote{What can deduction possibly say about reality?}
160167
\end{itemize}
161168
\end{example}
162169

163170
\pause
164171

165172
\begin{example}[Inductive/empirical inquiry]
166173
\begin{itemize}
167-
\item What can induction possibly say about security?
174+
\item \enquote{What can induction possibly say about security?}
168175
\end{itemize}
169176
\end{example}
177+
178+
\pause
179+
180+
\begin{remark}[To focus on]
181+
\begin{itemize}
182+
\item What are the limitations?
183+
\item Do these require a combination to form a Science of Security?
184+
\end{itemize}
185+
\end{remark}
170186
\end{frame}
171187

172188
\begin{frame}
@@ -233,11 +249,10 @@ \subsection{Contents}
233249
\begin{frame}[allowframebreaks]
234250
\begin{block}{Assessment}
235251
\begin{itemize}
236-
\item Apply subfield methodology from bottom-up and top-down
237-
insights to own paper.
252+
\item Apply subfield methodology insights to own paper.
238253

239254
\item Reflect on how this paper fits in the big picture of Security as a
240-
science.
255+
Science.
241256

242257
\item Discussion/reflection on limits of how scientific security research
243258
can be; \eg provability versus complexity of actual systems,

0 commit comments

Comments
 (0)