This work was supported by the TRUST Center (NSF award number CCF-0424422) Many internet users blindly trust websites that actually misuse their information.

Slides:



Advertisements
Similar presentations
Chapter 6 Server-side Programming: Java Servlets
Advertisements

Contest format 5 hours, around 8-12 problems One computer running (likely)Linux, plus printer 3 people on one machine No cell phones, calculators, USB.
Composition CMSC 202. Code Reuse Effective software development relies on reusing existing code. Code reuse must be more than just copying code and changing.
This work was supported by the TRUST Center (NSF award number CCF ) 1. Setting up experiment on DETER testbed a)Created twelve pc backbone nodes.
This work was supported by the TRUST Center (NSF award number CCF ) Introduction With recent advances in technology comes an increase in the quantity.
1 Visualizer for Firewall Display & Analysis Tool.
Final Project of Information Retrieval and Extraction by d 吳蕙如.
INTEGRATION SERVICES IN THE REAL WORLD Brian Garraty, Database Administrator Virginia Beach City Public Schools.
Tagging Systems Austin Wester. Tags A keywords linked to a resource (image, video, web page, blog, etc) by users without using a controlled vocabulary.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
1 Virtual Forensics Lab Steve Kim (Client) Marilyn Silva Rajeswari Ian Anu Nagpal Anthony Glover 1.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
IDK0040 Võrgurakendused I Building a site: Publicising Deniss Kumlander.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
1 Spidering the Web in Python CSC 161: The Art of Programming Prof. Henry Kautz 11/23/2009.
1 I.Introduction to Algorithm and Programming Algoritma dan Pemrograman – Teknik Informatika UK Petra 2009.
This work was supported by the TRUST Center (NSF award number CCF ) Methods Data Collection: 1. Start Sever on the host OS: This creates a sanitized.
 2004 Prentice Hall, Inc. All rights reserved. Chapter 35 – Python Outline 35.1 Introduction First Python Program Python Keywords 35.2 Basic.
Hamdi Yesilyurt, MA Student in MSDF & PhD-Public Affaris SQL Riji Jacob MS Student in Computer Science.
HOW SEARCH ENGINE WORKS. Aasim Bashir.. What is a Search Engine? Search engine: It is a website dedicated to search other websites and there contents.
Team Viceroy Tom, Shannon, Jenny, Jordy, Damon, Brandon.
Exploring Business Technologies “I Can” and “I Will” Statements By Mr. Free.
This work was supported by the TRUST Center (NSF award number CCF ) Background Assurance of system stability is of paramount importance in every.
Java: Chapter 1 Computer Systems Computer Programming II.
1 California State University, Fullerton Chapter 8 Personal Productivity and Problem Solving.
PHP meets MySQL.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
1 CSC 222: Object-Oriented Programming Spring 2012 Object-oriented design  example: word frequencies w/ parallel lists  exception handling  System.out.format.
© 2001 Business & Information Systems 2/e1 Chapter 8 Personal Productivity and Problem Solving.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 8 Personal Productivity and Problem Solving.
Programming with Java © 2002 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill/Irwin Chapter 9 Arrays.
5 BASIC CONCEPTS OF ANY PROGRAMMING LANGUAGE Let’s get started …
Continuing Education UCC Fall 2010 Search Engine Optimization.
Introduction to Exception Handling and Defensive Programming.
Chapter 14: Exception Handling. Objectives In this chapter, you will: – Learn what an exception is – Learn how to handle exceptions within a program –
Objects to Protect Private Details: Memento and Iterator Snarf the iterator code for today’s class.
Okalo Daniel Ikhena Dr. V. Z. Këpuska December 7, 2007.
What does C store? >>A = [1 2 3] >>B = [1 1] >>[C,D]=meshgrid(A,B) c) a) d) b)
CIT 590 Intro to Programming Files etc. Announcements From HW5 onwards (HW5, HW6,…) You can work alone. You can pick your own partner. You can also stick.
Server-side Programming The combination of –HTML –JavaScript –DOM is sometimes referred to as Dynamic HTML (DHTML) Web pages that include scripting are.
Chapter 36 More Object Design with GoF Patterns 1CS6359 Fall 2011 John Cole.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Chapter 5 Files and Exceptions I. "The Practice of Computing Using Python", Punch & Enbody, Copyright © 2013 Pearson Education, Inc. What is a file? A.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
Programming with Java © 2002 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill/Irwin Chapter 5 Creating Classes.
The internship in SPAWAR contributed to a project in Maritime Domain Awareness (MDA). MDA is the effective understanding of anything associated with the.
CS-0401 INTERMEDIATE PROGRAMMING USING JAVA
Database Projects in Visual Studio Improving Reliability & Productivity.
C++ for Engineers and Scientists Second Edition Chapter 7 Completing the Basics.
Python Let’s get started!.
CHAPTER 10 ERROR HANDLING & DEBUGGING JavaScript can be hard to learn. Everyone makes mistakes when writing it.
© 2006 Pearson Addison-Wesley. All rights reserved 1-1 Chapter 1 Review of Java Fundamentals.
Exception Handling in C + + Introduction Overview of C++ Exception Handling Designing With Exceptions Exception Handling Philosophies Conclusion.
IMS 3253: Validation and Errors 1 Dr. Lawrence West, MIS Dept., University of Central Florida Topics Validation and Error Handling Validation.
MAC ON SQL &.NET Heidi Castillo. Project Goals  Address Database Issues: Security Increase Capacity and Size Reduce Data Redundancy and Inaccuracy Effective.
Equations for Ecademy Client: ISU Computation Center Faculty Advisor: Dr. Robert Anderson Technical Advisor: Dr. Pete Boysen Team Members:  Tim Arganbright,
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Unity Connection Provisioning API Matt Penning Unity.
In this session, you will learn to: Create and manage views Implement a full-text search Implement batches Objectives.
Lawson Mid-America User Group Spring 2016 Meeting.
Today Encapsulation. Build a fully encapsulated Halloween class, going from Halloween1 to Halloween6 (eventually!): –The final version will have overloaded.
Architecture Review 10/11/2004
Excel Tutorial 8 Developing an Excel Application
Project 11: Security and Privacy of the Communication Channels among IoT Devices REU Student: Tianbo Chen Graduate mentors: Safa Bacanli and Huy Truong.
Developing Applications
Coding Concepts (Basics)
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Lecture 13 Teamwork Bryan Burlingame 1 May 2019.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Math Sports Final Release Bridger.
Presentation transcript:

This work was supported by the TRUST Center (NSF award number CCF ) Many internet users blindly trust websites that actually misuse their information instead of protecting it. My research consists on looking for privacy flaws and complaints of internet users to see how much people know about internet privacy and other privacy related information. In order to get data I used the Yahoo! Answers API because it is publicly available. My group developed a script to obtain data from the API and stored it in a SQL database. Throughout the script development we encountered a series of errors. My contribution to this project involved resolving these errors and creating a log file. Process Flowchart: Internet Privacy Complaints Rafael J. Negrón 1, Nick Doty 2, Jen King 2, Prof. Deirdre Mulligan 2 1 University of Puerto Rico at Mayagüez, 2 University of California at Berkeley, School of Information Errors are solved by using the “Try – Except” technique in Python, known as “Try – Catch” in JAVA. Errors - (Their Exceptions): 1.Duplicates - (MySQLdb.IntegrityError): Solution : Ignores duplicated questions. 2.No Answer - (AttributeError): Solution : Add empty string to “chosenanswer” variable. 3.URL/File - (IOError): Solution: Notify the user the URL/File couldn't be opened. 4. Parser error - (xml.parsers.expat.ExpatError): Solution: Skip to the next word in the list, if any. 5. Special Characters - (UnicodeEncodeError): Solution: Encode data using “utf-8” encoding. 6.Eliminated Questions - (No exception): As QuestionID it has : “index:0/##/#/########” (# = Any digit in the range of 0 – 9) Solution : Added - “if (questionid.find('index:') == -1):”. If this condition isn’t met, the result will be ignored. I would like to thank the Team for Research in for Ubiquitous Secure Technology (TRUST) for this wonderful research experience and my mentors Jen King, Nick Doty, and professor Deirdre Mulligan for their guidance. Also I want to thank Dr. Kristen Gates and Sally Alcala for letting me have the opportunity to participate in this research program. Finally, my team members Chris Castillo, Jennifer Felder, Anand Sonkar and German Gomez for helping me complete my tasks. Thanks to all! Abstract Implementing Log File Solving Script Errors Acknowledgments The log consist of three steps: 1.opening a file and setting it to ‘append’, 2.writing to it the timestamp, entry level, and message, and 3.closing the file. If the log is not in the same directory as the script, it will throw an “IOError”. Entry Levels: Level 1: INFO, Level 2: DEBUG, Level 3: WARNING Results Keywords Results Pie Chart: Many Eyes Phrase Net Visualization: Added Queries Vs. Duplicates Graph: My next steps are creating a taxonomy of privacy words and terms, implementing a better log to overcome the actual limitations, and improving the code and list of keywords for better searches and results. Future Work Using the Yahoo! Answers API we found that people are really concerned about their privacy being violated but don’t know how to protect it. Also the most common used words were “privacy” and “security” as seen in the visualization and pie chart. In conclusion, people that don’t know how to protect their privacy will look for help in sites like Yahoo! Answers. Conclusion