Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Privacy and Technology Week.

Slides:



Advertisements
Similar presentations
Study Skills 101.
Advertisements

PRESENTATION endrikawidyastuti.wordpress.com.
Lesson Objectives To understand what input and output devices are, and how they are used The understand the difference between input and output devices.
The Conference Presentation Lynda Gagne University of Victoria October 2004.
Giving an Effective Technical Presentation: Planning.
HOW TO GIVE AN Effective ORAL PRESENTATION
Conference posters & Short presentations By Andreas Grondoudis 1.
ISM20 – Project management and Research Methods Research Methodology Making presentations.
Presentations/JGSida 1 To present a paper method (technology) how to present it stage fright…?
Giving Public Presentations of Risk Information Katherine A. McComas, Ph.D. University of Maryland.
Electronic Visualization Laboratory University of Illinois at Chicago Giving Good Presentations Electronic Visualization Laboratory University of Illinois.
How to give a lecture Course for Young Psychiatrists, Nairobi, 23 rd March 2007 David Goldberg Institute of Psychiatry King’s College, London.
PRESENTATION SKILLS PART B 1. 1.KNOW YOUR AUDIENCE A presentation is a dialogue between you and your audience and they will judge your presentation on:
SENG 531: Labs TA: Brad Cossette Office Hours: Monday, Wednesday.
Giving Talks. Seminars are important They provide a way to communicate about your research – They are a key element to getting jobs – As your career progresses,
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Privacy Week 6 - February 20,
Risk of Using RFID chips in Passports Oscar Mendez.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
THE ART OF MAKING A PRESENTATION
Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 1 Privacy –
Presentations/JGSida 1 To present a paper method (technology) how to present it stage fright…?
Presenting your Proposal. Introduction Communication is key to sell the merits of your project Communication skills required – Oral presentations – Written.
Making a Presentation Discussion Points Masters-Doctoral Seminar.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Preparing a Presentation
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID – An Introduction Murari Raghavan UNC-Charlotte.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials Screens: Presentation skills Suitable for: Improver Advanced.
Powerpoint Presentation Advice
1/28 Using PowerPoint for Academic Presentations How to… How NOT to…
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Privacy and technology Week.
Scientific Communication CITS7200 Lecture 10 Giving a Talk.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Workable Presentations 20 or so Tips to a Successful Presentation Created by S. L. Shea Dept of Family & Comm. Medicine Southern Illinois University School.
MBA International Business Induction How to make an effective presentation Roger Bull Tutor in International Human Resource Management.
There are things that you can do to get better grades on tests…
How To Give A Scientific Seminar Michelle Chow Ocean Discovery! Sebastopol, CA.
Top Ten Tips for Giving a Presentation. #1 Identify Your Main Point Identify your main point (finding, opinion, etc.) and state it succinctly up front.
First-Year Engineering Program P. 1 Lab Safety Policies Don’t stand on lab chairs Don’t sit or stand on lab tables No dangling jewelry or loose clothes.
Unit 5.  Know your topic and become an expert  Have an idea what the background is of your audience is so you will know how much detail to go into and.
How to develop an oral presentation You have one chance to make a point.
Designing & Delivering Effective Presentations. Powerful Introductions 2 Don’t be typical My name is …. is boring Start with a relevant POW! – Story –
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Computers and Society Carnegie Mellon University Spring 2005 Lorrie Cranor and Dave Farber 1 Computer Reliability.
Presenting in Prof. Eckert’s Classes Please make sure your presentation gives an opinion or argument on some idea: for example, evaluate the book, or.
Presentation on Presentations Dr. Dave Shattuck Dept. of Electrical and Computer Engineering University of Houston.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Law Enforcement.
 Before you start  TIPS  Slides continent’s (Material)
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
ISM20 – Project management and Research Methods Research Methodology Making presentations.
Lecture 29 Creating Effective Visual Aids Presentation Skills.
Week 13 Day 1 Presentations 101 Today in Class: -- Presentation schedule -- Presentations -- Self Critique Paper.
Dress smartly Smile Say hello and smile when you greet the audience Speak clearly Use silence Keep within the allotted time Eye contact is crucial to.
Research Proposal Presentations. Preparation Condensing a complex body of information 15 minute presentation (and 5 minutes for comments or questions)
1 Module 8 Reporting Results. 2 Learning Objectives At the end of this session participants will:  Understand key points to effectively present results.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Computer Applications I I dentify alternative input devices and techniques.
How to do a great Power Point Document. The Principles 1. The audience should focus on YOU, not the screen 2. Keep it simple! Both text and visual layout.
How to do a great Power Point Document. The Principles 1. The audience should focus on YOU, not the screen 2. Keep it simple! Both text and visual layout.
Research talk 101 Jim Miles California State University, Long Beach 9/9/15.
Studio 2 Guidelines for Good Presentations JANUARY GE105 Introduction to Engineering Design College of Engineering King Saud University.
Studio 2. Guidelines for Good Presentations
To present a paper method (technology) how to present it
Applications Software
Studio 2. Guidelines for Good Presentations
Studio 2. Guidelines for Good Presentations
Studio 2. Guidelines for a Good Presentation
Presentation transcript:

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Privacy and Technology Week 12 - November 14, 16

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 2 Announcements Be very careful about avoiding plagiarism - see week 1 notes for details and ask if you have questions! Guest speaker, Mike Shamos, next Monday No class next Wednesday - Thanksgiving Break Any requests for what we should talk about the following week?

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 3 Finishing up government surveillance Examples of government surveillance that violated civil liberties in the US? Watch part of DVD “Unconstitutional: The War on Our Civil Liberties”

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 4 Preparing a short presentation

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 5 Research and Communication Skills Plan your talk Make an outline of what you want to talk about No need to present every detail of your paper Your presentation should motivate people who find it interesting to read your paper Consider the background of your audience If they are experts, focus on the details of your research and results If they are not experts, spend time on background and motivating the problem Consider how much time you have (10 minutes MAXIMUM + 5 minutes for questions)

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 6 Structure your talk Outline Optional for short talks Background and motivation Sometimes you may want to lead with this Research methodology Or system design + evaluation Results You may not have them if this is a work in progress Related work Could also go after background or at end, optional for short talks Contributions Useful in job talk, probably no time in 10-minute talk Future work Optional for short talks Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 7 Making slides Use easy-to-read fonts Avoid text < 20 pt font Use a simple slide design, no distracting background images Use a color scheme with high contrast Avoid animation unless it helps illustrate your point Clipart can help make your points more clear and/or memorable, but don’t let it distract Make figures and tables readable Don’t make too many slides (1-3 minutes/slide) Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 8 Slide content Are slides lecture notes/handouts? For a class or tutorial, slides may double as lecture notes  more content on slides For a research presentation, your paper is usually the “handout”  less content on slides Don’t try to put everything on the slide Don’t include text unless you want people to read it If people are reading your slides they are not listening to you Keep text short Don’t put too much math on a slide Just include key points, examples, etc. A figure may be worth 1000 words Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 9 If you use overhead projector White background usually best Don’t use a paper to cover up part of your slide and uncover as you go If you have to skip slides, don’t put them up and take them down real fast, just skip them Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 10 Prepare Make your slides in advance Practice Time yourself Get feedback from others Watch yourself on video Make sure you know how to hook your laptop up to the projector, change screen resolution, advance your slides, etc. (Mac users, bring your adaptor!) If you need to point to parts of your slides, decide if you will use, mouse, stick, laser pointer, etc. and bring it with you Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 11 Giving your talk Dress neatly Stand up straight, hands out of pockets Don’t hide behind the podium Move around, but not too much Keep track of time Put your watch on podium, note clock in room, watch moderator with time cards, etc. Face the audience, look at your audience, not just one person Project your voice Don’t talk too fast Finish on time (or early!) Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 12 Keeping your audience engaged Convey enthusiasm Inject humor Tell a story Ask the audience questions Modulate your voice Speak slowly Try to prevent your audience from getting lost Provide ample background Define important terms up front Don’t get into highly technical details unless that’s what your audience expects Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 13 Handling questions If you have a strict time limit, leave time for questions or avoid taking them Answer clarification questions quickly Suggest that questions that will require lengthy answers be taken off line Don’t get flustered by critics or questions you don’t know the answer to Stay calm, diffuse the question, keep going Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 14 Privacy invasive technologies Location tracking (cell phones, GPS devices that phone home, etc.) RFID Transit cards Computer software that phones home Devices that phone home Video cameras (hidden cameras, cell phones) Personalized ecommerce sites Automobile data recorders Face recognition

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 15 The Global Positioning System (GPS) Radio-navigation system operated by US DoD Comprised of 24 satellites and 5 ground stations Uses satellites like “man-made stars” to triangulate and calculate 3D position from 4 satellite signals Receivers listen for radio beacons and triangulate their position Typical accuracy in meters, cm accuracy possible DoD intentionally degraded accuracy until May 2000 One-way system If receivers are to report their location back they must use another system, for example cellular phone network Does not work indoors

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 16 Radio-frequency identification (RFID) Tags Antenna bonded to small silicon chip encapsulated in glass or plastic (as small as grain of rice) Unpowered (passive) tags and powered (active) tags Readers Broadcast energy to tags, causing tags to broadcast data Energy from readers can also power onboard sensors or cause tag to write new data to memory Read ranges currently a few centimeters up to a few meters

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 17 Current and near term uses of RFID Automobile immobilizers Animal tracking Building proximity cards Payment systems Automatic toll collection Inventory management (mostly at pallet level) Prevent drug counterfeiting Passports

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 18 Electronic Product Code Standard managed by EPCglobal Relatively small tags Inexpensive No encryption, limited security Kill feature Password feature Designed to replace UPC bar codes 96-bit+ serial number Object Name Service (ONS) database operated by EPCglobal

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 19 Post-sale uses Read product labels to blind people Sort packaging for recycling Provide laundry instructions to washer, dryer, dry cleaner Allow smart refrigerator to automatically generate shopping lists and warn about expired items and recalls Allow smart closet to suggest outfits Simplify product returns

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 20 Privacy concerns with EPCs? What are the privacy risks? What are possible solutions? What are the limitations of these solutions?

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 21 Building proximity cards Used for access control to buildings Many prox cards have no security features Easily clonable, even remotely Can be read through someone’s pocket or from longer distances while card is being read by legitimate reader Solutions involve adding crypto to cards

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 22 RFID payment systems Gas station keyfobs Coming soon to the major credit cards in your wallet Chase “Blink” card already issued in Philadelphia and NYC Can be read from about 20 cm In some countries integrated into watches and cell phones Main advantage is to save time Don’t have to swipe machine Don’t need signature Supposedly crypto is used to prevent cloning, but JHU researchers demonstrated how to break SpeedPass

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 23 RFIDs in passports cause concerns State Department announced plan in 2004 Lots of privacy concerns 2,335 comments, 98.5% negative Concerns People could scan and get your identity info  Identity theft (including fake passports)  Tracking people  Selecting victims

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 24 Revised passport plan Revised plan in October 2005 addressed some, but not all concerns Improvements  Screen in cover prevents reading RFID except when passport is open  Visual encryption key prevents decrypting content of passport Problems  People can still be tracked due to anti-collision field  This can be do from distances much further than official read distance of chip What problem does RFID in passports solve and what other solutions are there? html#1