Searching for "data security"

IoT and libraries

The Internet of Things (IoT) and Libraries

The Internet of Things (IoT) and Libraries

breakdown of IoT functionality, from Deloitte. They give 5 general types of services that IoT “things” can do:

  1. Internal state: Heartbeat- and ping-like broadcasts of health, potentially including diagnostics and additional status reporting (for example, battery level, CPU/memory utilization, strength of network signal, up-time or software/platform version).
  2. Location: Communication of physical location via GPS, GSM, triangulation or proximity techniques
  3. Physical attributes: Monitoring the world surrounding the device, including altitude, orientation, temperature, humidity, radiation, air quality, noise and vibration
  4. Functional attributes: Higher-level intelligence rooted in the device’s purpose for describing business process or workload attributes
  5. Actuation services: Ability to remotely trigger, change or stop physical properties or actions on the device.

Examples of IoT in action

There are some pretty well-known IoT products that some of you already use, including:

  • Nest Thermostat (and others). These allow you to control your AC from your phone, anywhere that you can connect to the Internet.
  • Smart lights: Same concept, but for lights. You can turn lights on/off from your phone. Phillips Hue is an example of this
  • Bluetooth Trackers – Tile (https://www.thetileapp.com/) is an example of a Bluetooth Tracker. Put one on that thing you always lose (i.e., car keys). The next time you lose those keys, you can find them again via an app on your phone.
  • Smart Home appliances – things like Google Home, Amazon Echo, and Apple HomeKit.
  • Smart power switches – Belkin’s Wemo Insight Wi-Fi Smart Plug is an example. They let you turn the plug (and therefore anything connected to it) on and off, set schedules for the plug, monitor energy consumption and use, etc. You can also connect it to Amazon Alexa and Google Home for hands-free voice control
  • Health and exercise trackers – Fitbits “fit” into this category, too.

How does IoT affect libraries?

Here are some ways libraries are already incorporating IoT technology into their libraries:

  • Smart Building Technology: As libraries retrofit their buildings with newer technology (or build new buildings/branches), they are starting to see more IoT-based technology. For example, some libraries can can adjust heating, cooling and lights from a smartphone app. Some newer building monitoring and security systems can be monitored via mobile apps.
  • RFID: RFID technology (sensors in books) is a type of IoT technology, and has been around for awhile.
  • Beacon Technology: There are at least two library-focused companies experimenting with Beacon technology (Capira Technologies and Bluubeam).
  • People counters: Check out Jason Griffey’s Measure the Future project. Here’s what he says about Measure the Future: “Imagine having a Google-Analytics-style dashboard for your library building: number of visits, what patrons browsed, what parts of the library were busy during which parts of the day, and more. Measure the Future is working to make that happen by using open-hardware based sensors that can collect data about building usage that is now invisible. Making these invisible occurrences explicit will allow librarians to make strategic decisions that create more efficient and effective experiences for their patrons.”
  • Library classes! Libraries are also teaching classes about the Internet of Things. These include classes focused on introducing patrons to IoT technology, and classes that focus on an aspect of IoT, like a class on making things with Arduinos or how to use your new Fitbit.

++++++++
more on IoT in this IMS blog
https://blog.stcloudstate.edu/ims?s=internet+of+things

proposal for Arduino library counter: https://blog.stcloudstate.edu/ims/2017/11/18/service-based-learning-library-counter/

Blockchain Platforms 2018

A Comprehensive List of Best Blockchain Platforms To Watch Out in 2018

https://medium.com/@anubhav.2709/a-comprehensive-list-of-best-blockchain-platforms-to-watch-out-in-2018-a4a14ee0c166

http://blockchain.oodles.io/blogs/best-blockchain-platforms-2018/

A Comprehensive List of Best Blockchain Platforms To Watch Out in 2018 from TechNewsToday

Best Blockchain Platforms 2018

1. Ethereum

Founded in 2014 by Vitalik Buterin, Gavin Wood, and Jeffery Wilcke, Ethereum is one of the fastest growing blockchain technology-based platforms and a cryptocurrency like bitcoin.

 

2. Ripple

Ripple was developed in 2012. Currently, the cryptocurrency that represents Ripple blockchain, XRP, is one the high performing cryptocurrencies in the crypto world.

3. Hyperledger

Based on the blockchain technology, Hyperledger offers distributed ledger frameworks to a variety of industry leaders in the fields of banking, finance, Internet of Things, supply chains, manufacturing, and technology.

 

4. IBM Bluemix Blockchain:

Developed using the base of Hyperledger, IBM Bluemix offers transparency in transactions and security in information for enterprises. At present, IBM Bluemix runs on the IBM cloud.

 

5. Multichain

Multichain is one of the best Blockchain platforms that enables the creation and execution of private blockchains. This multi-asset exchange is becoming popular for solving real problems in finance, infrastructure, and e-commerce.

 

6. Openchain: 

Developed by Coinprism, Open-chain is a Blockchain infrastructure that’s used for the perseverance and management of digital assets.  Open-chain is an enterprise-ready platform for digital assets. Its approach is different than the standard Bitcoin approach to implementing Blockchain.

Conclusion: 

With the above-mentioned blockchain platforms, you can get unprecedented services for the security of digital transactions and assets. The blockchain technology provides independent and secure work structure and is a reliable solution that can be utilized to streamline an organization’s processes and transfer of assets without getting into any extensive documentation or periodical controls.

++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

AI tracks students writings

Schools are using AI to track what students write on their computers

By Simone Stolzoff August 19, 2018
50 million k-12 students in the US
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like GaggleSecurly, and GoGuardian to surface potentially worrisome communications to school administrators
In an age of mass school-shootings and increased student suicides, SMPs Safety Management Platforms can play a vital role in preventing harm before it happens. Each of these companies has case studies where an intercepted message helped save lives.
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal at Facebook and other recent data breaches from companies like Equifax, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety

+++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

more on surveillance  in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

hi ed leaders and blockchain

3 steps higher ed leaders should take before investing in blockchain

Aug. 9, 2018
  • Blockchain will have the biggest value in higher education in areas where trust is essential to the value chain in institutional operations, such as evaluation of student transcripts, processing of applications and maintenance of articulation agreements, said Oral Roberts University CIO Michael Mathews, at The Blockchain in Education Conference hosted by the institution in May, reports Campus Technology.
  • From an infrastructure standpoint, Mathews said institutions have to establish a secure digital identity by investing in software that allows the credential recipient and granter to have a seamless and trusted connection, allowing for students to have a diploma that is stored safely within their digital wallet. This could mean working with a third-party application developer or developing the capability in-house.
  • But before fully investing in blockchain, higher education leaders must take these steps, said Mathews:
    • Spend a significant amount of time researching how the technology is impacting the industry and educate staff about it;
    • test the technology to see if it follows validation and security procedures; and
    • collaborate with other institutions to share best tips and practices.

++++++++++
more on blockchain in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain+education

blockchain fixes

187 Things the Blockchain Is Supposed to Fix

Erin Griffith 

https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/187-things-the-blockchain-is-supposed-to-fix/amp
 
Blockchains, which use advanced cryptography to store information across networks of computers, could eliminate the need for trusted third parties, like banks, in transactions, legal agreements, and other contracts. The most ardent blockchain-heads believe it has the power to reshape the global financial system, and possibly even the internet as we know it.
 
Now, as the technology expands from a fringe hacker toy to legitimate business applications, opportunists have flooded the field. Some of the seekers are mercenaries pitching shady or fraudulent tokens, others are businesses looking to cash in on a hot trend, and still others are true believers in the revolutionary and disruptive powers of distributed networks.
 
Mentions of blockchains and digital currencies on corporate earnings calls doubled in 2017 over the year prior, according to Fortune. Last week at Consensus, the country’s largest blockchain conference, 100 sponsors, including top corporate consulting firms and law firms, hawked their wares.
 
Here is a noncomprehensive list of the ways blockchain promoters say they will change the world. They run the spectrum from industry-specific (a blockchain project designed to increase blockchain adoption) to global ambitions (fixing the global supply chain’s apparent $9 trillion cash flow issue).
 

Things Blockchain Technology Will Fix

  • Bots with nefarious intent
  • Skynet
  • People not taking their medicine
  • Device storage that could be used for bitcoin mining
  • Insurance bureaucracy
  • Electronic health record accessibility
  • Health record storage security
  • Health record portability
  • Marine insurance risk
  • Cancer
  • Earning money on personal data
  • Pensions
  • The burden of car ownership
  • Inability to buy anything with cryptocurrency
  • Better marketplaces for nautical shipping services
  • Better ways to advertise to your friends
  • Better ways to trade forex with your friends
  • Ownership shares in ancient sunken treasures
  • Poverty
  • Complying with Know Your Customer laws
  • Complying with Anti-Money-Laundering laws
  • Complying with securities laws in token sales
  • Censorship
  • A use for QR codes
  • Rewards for buying alcohol by subscription
  • Tracing water supplies
  • Dearth of emergency responders
  • High cost of medical information
  • Improved digital identity authentication
  • Managing real estate workflow
  • International real estate purchases
  • Physical branches for crypto banking
  • Physical branches for crypto exchanges
  • Private equity
  • Venture capital
  • AIDS, also online sales of classic Japanese domestic cars
  • Efficiency and transparency at nonprofits
  • Incorporating local preferences in decentralized banking options
  • Boosting sales for local businesses
  • A digital-only investment bank
  • Containers to transport sensitive pharmaceuticals and food
  • Protecting consumer information on mobile
  • Helping mobile phone users monetize their data
  • Not enough interconnection in the world
  • Complexity and risk in the crypto market
  • Expensive AI research
  • Counterfeit goods
  • Connecting “innovation players” and “knowledge holders”
  • Movie industry’s slow and opaque accounting practices
  • Global supply chain’s $9 trillion cash flow issue
  • Trust in the global supply chain
  • Economic crisis
  • Cash flow problems at small and medium-sized businesses
  • Improving the use of data in the transportation and logistics industries
  • Poverty among African farmers
  • Transparency in the food supply chain
  • Ad fraud
  • Fake news
  • False news
  • Settling payments faster
  • Speeding transactions
  • The unbanked
  • The underbanked
  • The bidding process in art and collectibles markets
  • Assessing the value of collectibles
  • Diamond industry’s high banking and forex fees
  • The illicit diamond trade
  • Availability of digital games
  • Currency for eSports
  • Currency for eSports betting
  • Currency for sports betting
  • Storing scholarly articles
  • Health insurance providers billing processes
  • Currency for healthcare providers
  • Shortage of workers with advanced tech skills
  • Lack of diversity in tech
  • Elder care
  • Rights management for photographers
  • Content rights management
  • Simplifying the logo copyrighting process
  • Ticketing industry’s “prevalent issues”
  • Crowdsourcing for legal dispute resolution
  • Securing financial contracts
  • Paper
  • Automation
  • Control of personal data
  • Control of personal credit data
  • No way to spend crypto
  • Advertising for extended reality environments
  • Human suffering
  • Security for luxury watches
  • Authenticity in cannabis sales
  • Crypto rewards for cannabis-focused social media site
  • Crypto payments for rating cryptoassets
  • Crypto payments for taking surveys, watching videos and clicking links
  • Crypto rewards for video game skills
  • Crypto rewards for time spent playing video games
  • Buying, selling and trading your social media friends
  • Crypto rewards for social media sharing
  • Free mobile data for watching ads
  • Crypto rewards for watching entertainment content
  • Gold-backed cryptocurrency
  • Crypto-backed gold
  • Metals-backed cryptocurrency
  • Precious metals-based cryptocurrency
  • “Tokenizing” real world items
  • Nashville apartment buildings
  • Monaco real estate
  • Financial infrastructure for trading within video games
  • Checking ID for purchases like alcohol
  • “Uber for alcohol” on blockchain
  • Inefficiencies in cargo delivery
  • Branded tokens for merchants to reward customers
  • Fraud and corruption among non-profits
  • Better transparency at non-profits
  • Better transparency around impact investing
  • Bitcoin mining uses too much energy
  • Home appliances mining for bitcoin while not in use
  • Bitcoin mining using hydropower
  • Large corporations’ carbon footprints
  • “Decarbonizing” electricity grids
  • Climate change
  • Trust in governments
  • Trust in corporations
  • Trust in social networks
  • Trust in media
  • Universal billing system for travel industry
  • Decentralized Uber and Lyft
  • Online gambling not fair
  • Online gambling sites take commission
  • Helping retailers hurt by Amazon
  • Online retail fraud
  • Paying for things with your face
  • Streamlining interactions among shoppers, retailers and brands
  • Linking content across computers, tablets and phones
  • Ranking apps by their value
  • Aligning creativity and recognition for content creators
  • Improving payments for artists on Spotify and Pandora
  • Online piracy
  • Improving the technology of the Russian gas industry
  • A blockchain equivalent of Amazon, Groupon and Craigslist
  • Too many non-value-added costs
  • Unregulated prison economies
  • Standardizing the value of advertisements
  • Advertising not transparent enough
  • Old real estate practices
  • Free public information from silos
  • Speeding the rendering of animated movies
  • Selling items for crypto instead of regular money
  • Borders
  • Man-in-the-middle hacks
  • Security sacrifices that come with innovation
  • Scams, fraud and counterfeits
  • Tools to build decentralized apps
  • Blockchain infrastructure
  • Removing barriers separating blockchains
  • Safety in buying and selling blockchain tokens
  • Improving privacy in online file storage
  • ICO projects could benefit from the “wisdom of the crowd”
  • Improving privacy of blockchain
  • Decentralized database for decentralized technologies
  • Improving trust and confidence in blockchain system
  • More cohesive user experiences across blockchain and the cloud
  • Democratizing gold trading
  • Giving investors more control of their assets
  • Simplifying the cryptocurrency transaction process
  • Trading indexes as tokens
  • Improving crypto safekeeping solutions
  • Simplifying ICO investment, trading and cryptocurrency
  • Improving institutional-grade crypto asset management
  • “Painstakingly slow” manual crypto wallet process
  • More open global markets
  • Easier way to invest in real estate
  • Easier way to invest in Swiss real estate
  • Easier way to combine smart contracts with crowdfunded home loans
  • Easier way to borrow against crypto holdings
  • Faster porn industry payment options
  • Lower porn industry payment fees
  • Identifying and verifying users in online dating
  • Improving traditional banking services for crypto world
  • Cryptocurrency based on Game Theory, IBM’s Watson, and other theories
  • Better social network + blockchain + AI + human touch
  • Improving content streaming on the blockchain
  • Supply chain transparency
  • Increasing public sector trust of cryptocurrencies
  • Education around blockchain technology
  • Blockchain not mainstream enough
 
++++++++++++++++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

What is GDPR

What is GDPR? The huge European security regulation takes effect this week

Gene Marks Special to the Washington Post
The European Union‘s General Data Protection Regulation, or GDPR, goes into effect on May 25
The objective of the regulation, which passed in 2016, is to simplify and consolidate rules that companies need to follow in order to protect their data and to return control to EU citizens and residents over their personal information.
Individuals in the EU will have the right to access or request that companies erase or migrate their data elsewhere. When asked, companies must prove to authorities that they have satisfactory policies and procedures in place to protect their data, or they will face huge fines. How huge? If your company’s not compliant, the fines could be as large as 20 million Euros (about $24 million) or four percent of your annual global revenue, whichever is higher.
“A U.S. tourist who visits Germany for one day and returns to the U.S. has rights under the law if that person used [a service like] Facebook while on the trip,” Alex Stern, an attorney wrote on his firm’s blog.
 +++++++++++++++++++++++

Mr GDPR : Interview with Giovanni Buttarelli

Mr GDPR : Interview with Giovanni Buttarelli

++++++++++++++++++++++++++
More on the European Privacy Law in this IMS blog
https://blog.stcloudstate.edu/ims?s=gdpr

Facebook European privacy law

Facebook moves 1.5bn users out of reach of new European privacy law

Company moves responsibility for users from Ireland to the US where privacy laws are less strict

https://www.theguardian.com/technology/2018/apr/19/facebook-moves-15bn-users-out-of-reach-of-new-european-privacy-law

Facebook has moved more than 1.5 billion users out of reach of European privacy law, despite a promise from Mark Zuckerberg to apply the “spirit” of the legislation globally.

+++++++++++++++++++

Facebook To Offer Users Opt-Outs That Comply With New European Privacy Rules

April 19, 20182:50 AM ET https://www.npr.org/sections/thetwo-way/2018/04/19/603824213/facebook-to-offer-users-opt-outs-that-comply-with-new-european-privacy-rules

Facebook CEO Mark Zuckerberg, who offered congressional testimony last week, has also been asked to appear before the European Parliament.

As we reported earlier this week, a federal judge in California ruled that Facebook could be sued in a class-action lawsuit brought by users in Illinois who say the social media company improperly used facial recognition to upload photographs.

Also on Wednesday, TechCrunch reports that Facebook is investigating a security research report showing that its user data is vulnerable to third-party JavaScript trackers embedded on websites offering the “Login With Facebook” feature.

+++++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

future of Internet

Can the Internet be saved?

https://mondediplo.com/outsidein/can-the-internet-be-saved
In 2014 Tim Berners-Lee, inventor of the World Wide Web, proposed an online ‘Magna Carta’ to protect the Internet, as a neutral system, from government and corporate manipulation. He was responding after revelations that British and US spy agencies were carrying out mass surveillance programmes; the Cambridge Analytica scandal makes his proposal as relevant as ever.

Luciano Floridi, professor of Philosophy and Ethics of Information at the Oxford Internet Institute, explains that grey power is not ordinary socio-political or military power. It is not the ability to directly influence others, but rather the power to influence those who influence power. To see grey power, you need only look at the hundreds of high-level instances of revolving-door staffing patterns between Google and European governmentsand the U.S. Department of State.

And then there is ‘surveillance capitalism’. Shoshana Zuboff, Professor Emerita at Harvard Business School, proposes that surveillance capitalism is ‘a new logic of accumulation’. The incredible evolution of computer processing power, complex algorithms and leaps in data storage capabilities combine to make surveillance capitalism possible. It is the process of accumulation by dispossession of the data that people produce.

The respected security technologist Bruce Schneier recently applied the insights of surveillance capitalism to the Cambridge Analytica/Facebook crisis.

For Schneier, ‘regulation is the only answer.’ He cites the EU’s General Data Protection Regulation coming into effect next month, which stipulates that users must consent to what personal data can be saved and how it is used.

++++++++++++++++++++++
more on the Internet in this IMS blog
https://blog.stcloudstate.edu/ims?s=internet

Are your phone camera and microphone spying on you

Are your phone camera and microphone spying on you?

https://www.theguardian.com/commentisfree/2018/apr/06/phone-camera-microphone-spying

Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber

Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:

  • Access both the front and the back camera.
  • Record you at any time the app is in the foreground.
  • Take pictures and videos without telling you.
  • Upload the pictures and videos without telling you.
  • Upload the pictures/videos it takes immediately.
  • Run real-time face recognition to detect facial features or expressions.
  • Livestream the camera on to the internet.
  • Detect if the user is on their phone alone, or watching together with a second person.
  • Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.

For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.

The government

  • Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
  • Government security agencies like the NSA can also have access to your devices through in-built backdoors. This means that these security agencies can tune in to your phone calls, read your messages, capture pictures of you, stream videos of you, read your emails, steal your files … at any moment they please.

Hackers

Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.

An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.

Once a user opens this PDF file, the hacker can then:

  • Install whatever software/app they like on the user’s device.
  • Use a keylogger to grab all of their passwords.
  • Steal all documents from the device.
  • Take pictures and stream videos from their camera.
  • Capture past or live audio from the microphone.
  • Upload incriminating images/documents to their PC, and notify the police.

And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too

  • You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.

++++++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

 

best practices in online proctoring

To catch a cheat: Best practices in online proctoring

As online education expands, students are bringing old-fashioned cheating into the digital age

According to the latest report from Babson Survey Research Group, nearly 6.5 million American undergraduates now take at least one course online

1. Listen to students and faculty. Every college, university, or online-learning provider has a different approach to online learning. At Indiana University, where more than 30 percent of students take at least one online course, the online education team has launched Next.IU, an innovative pilot program to solicit feedback from the campus community before making any major edtech decision. By soliciting direct feedback from students and faculty, institutions can avoid technical difficulties and secure support before rolling out the technology campus-wide.

2. Go mobile. Nine in 10 undergraduates own a smartphone, and the majority of online students complete some coursework on a mobile device. Tapping into the near-ubiquity of mobile computing on campus can help streamline the proctoring and verification process. Rather than having to log onto a desktop, students can use features like fingerprint scan and facial recognition that are already integrated into most smartphones to verify their identity directly from their mobile device.

For a growing number of students, mobile technology is the most accessible way to engage in online coursework, so mobile verification provides not only a set of advanced security tools, but also a way for universities to meet students where they are.

3. Learn from the data. Analytical approaches to online test security are still in the early stages. Schools may be more susceptible to online “heists” if they are of a certain size or administer exams in a certain way, but institutions need data to benchmark against their peers and identify pain points in their approach to proctoring.

In an initial pilot with 325,000 students, for instance, we found that cheating rose and fell with the seasons—falling from 6.62 percent to 5.49 percent from fall to spring, but rising to a new high of 6.65 percent during the summer.

++++++++++++
more on proctoring in this IMS blog
https://blog.stcloudstate.edu/ims?s=proctoring

1 7 8 9 10 11 14