@@ -67,6 +67,15 @@ \subsection{The origin of the problem}
6767 \end {example }
6868\end {frame }
6969
70+ \begin {frame }
71+ \textcquote {SecurityAsAScience}{%
72+ Unfalsifiable claims are common in security---and they, along with circular
73+ arguments, are used to justify many defensive measures \textelp {}
74+ \textins {T}here are many ways to argue measures in, but no way to argue one
75+ out.
76+ }
77+ \end {frame }
78+
7079
7180\subsection {The goal }
7281
@@ -77,7 +86,8 @@ \subsection{The goal}
7786
7887 \pause
7988
80- \item Where are the disputes and why?
89+ \item Where are the disputes, philosophical problems and why?
90+ \item What are the methods we use and why?
8191 \end {itemize }
8292 \end {block }
8393\end {frame }
@@ -153,20 +163,26 @@ \subsection{Contents}
153163\begin {frame }
154164 \begin {example }[Deductive inquiry]
155165 \begin {itemize }
156- \item What are the limitations?
157- \item Can this be science on its own?
158- \item Or does it require a combination of application and further study
159- to form something scientific?
166+ \item \enquote {What can deduction possibly say about reality?}
160167 \end {itemize }
161168 \end {example }
162169
163170 \pause
164171
165172 \begin {example }[Inductive/empirical inquiry]
166173 \begin {itemize }
167- \item What can induction possibly say about security?
174+ \item \enquote { What can induction possibly say about security?}
168175 \end {itemize }
169176 \end {example }
177+
178+ \pause
179+
180+ \begin {remark }[To focus on]
181+ \begin {itemize }
182+ \item What are the limitations?
183+ \item Do these require a combination to form a Science of Security?
184+ \end {itemize }
185+ \end {remark }
170186\end {frame }
171187
172188\begin {frame }
@@ -233,11 +249,10 @@ \subsection{Contents}
233249\begin {frame }[allowframebreaks]
234250 \begin {block }{Assessment}
235251 \begin {itemize }
236- \item Apply subfield methodology from bottom-up and top-down
237- insights to own paper.
252+ \item Apply subfield methodology insights to own paper.
238253
239254 \item Reflect on how this paper fits in the big picture of Security as a
240- science .
255+ Science .
241256
242257 \item Discussion/reflection on limits of how scientific security research
243258 can be; \eg provability versus complexity of actual systems,
0 commit comments