ISEM 301 Information and Society1 Mike Anderson Mechanical Engineering

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

Recruitment Booster.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
SEM A – Marketing Information Management (MIM)
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
How to keep your kids safe online
Marketing Communications Services Hayward, WI.
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
1 Washington State Department of Social & Health Services Division of Behavioral Health and Recovery 2013 Prevention Redesign Initiative Community Survey.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Big Data A big step towards innovation, competition and productivity.
How To Protect Your Privacy and Avoid Identity Theft Online.
Facebook Page’s for All of Your Listings Increase your FB lead Generation Presented By: YOUR NAME YOUR CONTACT INFO YOUR NMLS#
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Sandwell Academy IT Information Evening 12 November 2014.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
Parent Information. Important Dates iPads Handed Out to Students  12 th Grade- Friday, September 21  11 th Grade- Monday, September 24  10 th Grade-
 Privacy in Social Networks. Facebook Background  Biggest social network with 1 billion users  Most information defaults to public.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
WA SECURES Training Spring Welcome As a volunteer of the Department of Health Emergency Operations Center or RSS Task Force you must be prepared.
Delivering Your Messages in Today’s Online Environment American Library Association, PR Forum Kevin T. Kirkpatrick Executive Vice President Sunday, July.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Social Media 101 An Overview of Social Media Basics.
CCT355H5 F Presentation: Phishing November Jennifer Li.
 Go to YouTube and click “create account” on the top right of the page.YouTube  If you already have a Google account (i.e. gmail) then you may use this.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Summary: Social Network Data Mining Privacy Community Team CBC News Posted: Nov 27, :55 PM ET Presented by: Group 16.
Choose a category. You will be given the answer. You must give the correct question. Click to begin.
FriendFinder Location-aware social networking on mobile phones.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
 How we should structure our checkout and order process?  Checkout and Order Process of our framework  Stages of Checkout and Order Process.
INTRODUCTION & QUESTIONS.
MySpace & Facebook By Veronica Baca. MySpace Tom Anderson August 2003 Social Networking Website Free service Required Age: 14 & over A virtual community.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Best Practices 21st Century Communication Ideas. Social Media Use is Growing.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
1 Digital Landscape (20 mins ) Coverage of digital market Market Trend Statistic Mobile User Data Mobile User Behavior Statistic Customer bonding Demographic.
Home Business Shopping Online – Purchasing goods and services using the Internet.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Facebook. You need a facebook account before you set up a facebook page.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Year 7 and 8 Parent Workshop
Social Media and the job Search
Payment Instruments, Financial Privacy and Online Purchases
A Parent Guide to creating a student (under 13) Apple ID
yahoo mail technical support number
Information Security Session October 24, 2005
Fun gym Cambridge Nationals R001.
Big Data.
Fun gym Cambridge Nationals R001.
Internet Safety Vocabulary
The Internet: Encryption & Public Keys
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

ISEM 301 Information and Society1 Mike Anderson Mechanical Engineering

ISEM 301 Information and Society2 When I was your age, “..I walked to school, through the snow, both ways…” The next 40 years…. What will “thinking” mean in 40 years? From our text, p37:..Havelock focused on the process of converting, mentally, from a “prose of narrative” to a “prose of ideas”; organizing experience in terms of categories rather than events; embracing the discipline of abstraction. He had a word in mind for this process, and the word was thinking. This was the discovery, not just of the self, but of the thinking self- in effect, the true beginning of consciousness.

ISEM 301 Information and Society3

4

5

6 How much information can be stored? Privacy, how do we give it away? What can be learned from stored information? Web analytics Government access, Facebook and Google Edward Snowden

ISEM 301 Information and Society7 Domestic Surveillance Directorate- Utah Data Center "..first facility in the world expected to gather and house a yottabyte...“"..first facility in the world expected to gather and house a yottabyte...“, yottabyte=1 trillion terabytes

ISEM 301 Information and Society Tb per person in the US (based on 320 million population! 142 Tb per person on the planet! 1080pi (25Mbit/sec=3.13Mbytes/sec), 35.2Mb/min, 2.11Gb/hr, 25.4Gb/12 hr day, 9.26Tb/yr! How Big is a Yottabyte?

ISEM 301 Information and Society9

10

ISEM 301 Information and Society11

ISEM 301 Information and Society 12

ISEM 301 Information and Society13 Home Depot Data Breach, New York Times, September 8, 2014 “…what could be the largest known breach of a retail company’s computer network.” “…total number of credit card numbers stolen at Home Depot could top 60 million.”

ISEM 301 Information and Society14 For Target, the Breach Numbers Grow, New York Times, January 10, “Target on Friday revised the number of customers whose personal information was stolen in a widespread data breach during the holiday season, now reporting a range of 70 million to 110 million people.” Target Struck in Cat-and-Mouse Game of Credit Theft, New York Times, December 19, 2013

ISEM 301 Information and Society15 5 Million Gmail Usernames, Passwords Hacked and Posted to Russian Bitcoin Forum, International Business Times, September 10, 2014 “The database (which International Business Times will not link to) contains 4.93 million Google accounts belonging to English-, Russian- and Spanish-speaking users. “ “A Google spokesperson has confirmed what many security experts had already suggested, that many of the passwords in question were likely taken from a website other than Google.“

ISEM 301 Information and Society16 Apple, Google, Encryption and the FBI, New York Times, October “Apple and Google have announced new software that would automatically encrypt the contents of cellphones, using codes that even the companies could not crack.”new software “The director of the F.B.I., James B. Comey, said on Thursday that the “post-Snowden pendulum” that has driven Apple and Google to offer fully encrypted cellphones had “gone too far.” He hinted that as a result, the administration might seek regulations and laws forcing companies to create a way for the government to unlock the photos, s and contacts stored on the phones.”F.B.I.

ISEM 301 Information and Society17 Kosinski, et al., Private Traits and Attributes are Predictable from Digital Records of Human Behavior, Proceedings of the National Academy of Sciences of the United States of Ameria, 2013 Abstract We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender. The analysis presented is based on a dataset of over 58,000 volunteers who provided their Facebook Likes, detailed demographic profiles, and the results of several psychometric tests. The proposed model uses dimensionality reduction for preprocessing the Likes data, which are then entered into logistic/linear regression to predict individual psychodemographic profiles from Likes. The model correctly discriminates between homosexual and heterosexual men in 88% of cases, African Americans and Caucasian Americans in 95% of cases, and between Democrat and Republican in 85% of cases. For the personality trait “Openness,” prediction accuracy is close to the test–retest accuracy of a standard personality test. We give examples of associations between attributes and Likes and discuss implications for online personalization and privacy.

ISEM 301 Information and Society18 Kosinski M et al. PNAS 2013;110:

ISEM 301 Information and Society19 ME313 Class WebsiteGoogle Analytics

ISEM 301 Information and Society20 Facebook Government Requests Report

ISEM 301 Information and Society21 Google Transparency Report

Edward Snowden: Here's how we take back the Internet | Talk Video | TED.com ISEM 301 Information and Society22

ISEM 301 Information and Society23 View the following TED talk Richard Ledgett: The NSA responds to Edward Snowden’s TED Talk | Talk Video | TED.com