HCI problems in computer security Mark Ryan. Electronic voting.

Slides:



Advertisements
Similar presentations
CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction.
Advertisements

Privacy: Facebook, Twitter
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Lecture 7.1: Privacy and Anonymity Using Anonymizing Networks - I CS 436/636/736 Spring 2012 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus.
Using the Internet: Making the Most of the Web’s Resources James B. Dang Associate Professor/Department Chair of Computer Science Southeast Campus.
Database Searching: Education Abstracts/Full Text & Professional Development Collection.
Skills: none Concepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, advertising signals, hacking, social graph.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Computers Are Your Future Twelfth Edition
1 Maritza Johnson Ph.D. candidate in Computer Science Research Computer security and human factors Paper Computer security research with human subjects.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 7/2/ Facebook is the most popular social.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Connecting To A Remote Computer Via ‘Remote Desktop Web Connection’ Compatible With ‘Most Any’ Computer.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
INTERNET CHAPTER 12 Information Available The INTERNET contains a huge amount of information a huge amount of information information on any topic you.
Office Tech Tools and Toys Update: Make Your Job Easier, More Productive, and More Profitable April 21, 2007 in Minneapolis, MN Presented by Mark Goldstein,
Computer Tech Class August 20,  Internet was originally started by Department of Defense  Was made as means of communication without central location.
 Presentation Software - Group Assignment LRC 320 Group 6 Members: Brandon Boyle Osvaldo Macias Kwang Joon An Daniel Boice.
Digital Landscape Summary GhanaKenyaNigeria Population: million43.8 million million Internet Users: 4.14 (16.34 % penetration)21.2 million.
1 The Evolution of Internet Voting By Ka Ling Cheung.
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Evidence from Behavior INST 734 Doug Oard Module 7.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Who created Google? The very popular search engine called Google was invented by Larry Page and Sergey Brin in 1996 at Standford university while doing.
Use of Electronic and Internet advertising options Standard 3.4.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
CS573 Data Privacy and Security Introduction Li Xiong Department of Mathematics and Computer Science Emory University.
For Technology Integration and Classroom Management.
Resisting Structural Re-identification in Anonymized Social Networks Michael Hay, Gerome Miklau, David Jensen, Don Towsley, Philipp Weis University of.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
By: Clive Thompson Published: Divided into nine chapters that focused on the positives and negatives technology has on our lives Used examples,
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Top 10 Uses of the Internet By Sara Wooddell. #1- Information Internet is a valuable tool for gathering information and conducting research Popular search.
A Statistical Comparison of Tag and Query Logs Mark J. Carman, Robert Gwadera, Fabio Crestani, and Mark Baillie SIGIR 2009 June 4, 2010 Hyunwoo Kim.
The world’s libraries. Connected. Theoretical Research about Privacy Georgia State University Reporter: Zaobo He Seminar in 10 / 07 / 2015.
Jeopardy $100 Are YOU Caught In The Web? Luke, this is the media section... Specialized Reserach Everything from your home at your office Tea And Biscuit.
Influence of Social Media & Technology By Gregory Samuels.
William H. Bowers – Ethics for the Information Age Chapter 6.5 – Online Voting.
ONE® Pages Training Presentation North York General Hospital.
What is Spam? d min.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Business Concepts and Entrepreneurial Discovery BCS-BE-7: The student utilizes technology in a variety of ways while solving business problem.
Rachael Vanneste Marina Okray.  The right to not belief in all topics stated on the internet.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Online Information Services and Bulleting Board Services (BBS)
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
Computer Security The problem of insecure PCs – and its consequences Why does this problem exist? Solutions – what you can do – what the industry can do.
Marking the Most of the Web’s Resources
WELCOME.
E-Commerce: Doing Business on the Internet
Data Collection and Problem Solving
Some slides borrowed from Philippe Golle, Markus Jacobson
Presentation Software - Group Assignment
ONE® Pages Training Presentation
Search Pages and Results
Tracing Your Steps Understanding Your Digital Footprint Presented by:
Use of Electronic and Internet advertising options
HOW BLOCK CHAIN COULD SHAPE THE FUTURE OF WEB DESIGN Many governments in the world have come up with laws of protecting data. This is meant to ensure the.
Pima Medical Institute Online Education
Pima Medical Institute Online Education
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

HCI problems in computer security Mark Ryan

Electronic voting

ballot secrecy and coercion resistance usability election verifiability ?

“A face is exposed for AOL searcher no ” From New York Times, August 9, 2006 In August 2006, Buried in a list of 20 million Web search queries collected by AOL and recently released on the Internet is user No The number was assigned by the company to protect the searcher's anonymity, but it was not much of a shield. No conducted hundreds of searches over a three-month period on topics ranging from"numb fingers" to "60 single men" to "dog that urinates on everything." And search by search, click by click, the identity of AOL user No became easier to discern. There are queries for "landscapers in Lilburn", and several people with the last name Arnold. It did not take much investigating to follow that data trail to Thelma Arnold, a 62-year-old widow who lives in Lilburn, GA “

Privacy in the digital world Facebook blogs Gmail Web searches instant messaging Oyster card Government űberdatabase IS P Google Docs