1 Maritza Johnson Ph.D. candidate in Computer Science Research Computer security and human factors Paper Computer security research with human subjects.

Slides:



Advertisements
Similar presentations
Bullying Through the Use of Electronic Media and the Responsibility of Schools in Regulating it Alicia Kellier CBSE 7202T Spring 2013.
Advertisements

 The Internet can be great- but we need to be careful about how we use it  There are lots of social media sites and some of them are not safe.  You.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Social Networking Safety. Dangers of online social networking Facebook Twitter Instagram.
Johnson Logistics Solutions Office of Systems and Information Technology.
Social Media: New Marketing Tools. Social Media: “Social media is the use of web-based and mobile technologies to turn communication into interactive.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Social Networking Site Click on the answer of your choice! 1 BEGIN.
By Christopher Tonkin. What is Web 2.0? Web 2.0 is made up of many things. Eg. Web applications, social-networking sites, video-sharing sites, wikis and.
Need your MyMathLab card with your access code (behind the ‘pull off’ tab) Need a Valid Address Need to know Purdue’s zip code is and your.
Need your MyMathLab card with your access code (behind the ‘pull off’ tab) Need a Valid Address Need to know Purdue’s zip code is and your.
Internet Safety Background on Our Program University of New Mexico – Anderson Schools of Management Information Assurance MBA Program –Internet Security.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
EVERYTHING YOU NEED TO KNOW ABOUT CLOUD STORAGE BY: JONATHAN SANBORN SECTION 005.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Presented By: Stephanie R. Taylor ESTATE PLANNING FOR DIGITAL ASSETS R ANDALL |D ANSKIN A Professional Service Corporation.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
EthicsStat …Now You Know Addressing Social Networking Ethics Resource Center April 22, 2009.
Aims and Objectives.
Social Media Strategy Heathlewett Public Library Lewis Sievers.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
 Introduction to Computing  Computer Programming  Terrorisom.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
Enterprise Survey/Assessment Tool Administrative Computing Working Group October 25,
Individual Student Account For Edsby and Computer login.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Welcome Topic : Security.
Age and Social Networking Use Angelica Craig EDTC 5103 March 2011.
Juan Johnson. What is Carbonite?  Online online backup service  It backup files from your computer  Need to download a small application.
GLACIER DEPARTMENT ADMINISTRATOR 3 ROLE. Role of Department Administrator 3 Departments who pay a large number of foreign individuals can choose to give.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
User Studies on the Internet Steven M. Bellovin
Web 2.0 Rachel Coombes.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
What Would You Do? The Risks of Behavior on the Internet.
Computer Security Set of slides 8 Dr Alexei Vernitski.
HCI problems in computer security Mark Ryan. Electronic voting.
Technology Orientation Access Account Your Access Account is your access to University services such as , the Internet, WebMail, ANGEL, e-Lion,
11 | Managing User Info Jeremy Foster Michael Palermo
Calgary Computer Security Solutions
Norton Internet Security Customer Service Number Why Is Norton Antivirus Blocking Some Extensions From Being Installed On Microsoft Edge? Norton is not.
Key words: Secure | Password | Character
Understanding The Computer Login Account
Calgary Best Computer Security Services -
World is Changing People are always connected because of smart phones
A Parent Guide to creating a student (under 13) Apple ID
Calgary Computer Security Services -
Calgary Computer Security Solutions -
Reset AOL Mail Password Online How to Reset AOL Mail Password Online? Call AOL Technical Support Number to Reset AOL Mail Password by AOL.
Content Management lifecycle
Twitter 330 million Montlhy Active Users
Facebook Connect By Robert Daigle.
Auditing JTT’s Acceptable Use Policy
Internet safety By DAGAS YACMAS team.
O.
An Introduction to Cloud Computing
It’s in the Clouds? An Overview of Cloud Services
Student Experience It’s your education.
Calgary Best Computer Security Services
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Online Data Collection: Ethics
Calgary computer security
Data Portability It’s Mine, Mine, Mine!
Chapter Goals Define cryptography

API Security: OAuth, OpenID Connect & ABAC
Calgary Cybersecurity Services
Presentation transcript:

1 Maritza Johnson Ph.D. candidate in Computer Science Research Computer security and human factors Paper Computer security research with human subjects

2 Computer Security Protect systems and information from abuse and unwanted access Ensure systems remain accessible and productive for intended use and users

3 Information Security

4 Anonymity & Personally Identifiable Information

5

6 Anonymizing a Dataset

7 +

8 AOL Searcher #

9 Availability Ownership Data loss

10 Access Control Who has access? What are they permitted to do? Authentication

11 Usable Security

12 Human subjects research?

13 Passwords Must be unique Do NOT write it down Should not be guessable by acquaintances Include letters AND numbers Include at least one number BETWEEN the first and last character Contain no symbols (!, %, #, etc.)

14 Online Consent

15 Textured Agreement

16 My Research

17 API Application programming interface Facebook, Myspace, Twitter, Flickr, iPhone apps

18 API Application programming interface Facebook, Myspace, Twitter, Flickr, iPhone apps

19 Facebook API

20

21 API Best Practices

22 Summary Data anonymization Storage Internet research beyond surveys Application programming interfaces

23 Contact: Maritza Johnson