Preliminary Plan for Monday, Sept 10, 5:45 PM to 8 PM
Introduction – who are the students in this class. About myself: http://web.stcloudstate.edu/pmiltenoff/faculty Contact info, “embedded” librarian idea – I am available to help during the semester with research and papers
#FakeNews is a very timely and controversial issue. in 2-3 min choose your best source on this issue. 1. Mind the prevalence of resources in the 21st century 2. Mind the necessity to evaluate a) the veracity of your courses b) the quality of your sources (the fact that they are “true” does not mean that they are the best). Be prepared to name your source and defend its quality.
How do you determine your sources? How do you decide the reliability of your sources? Are you sure you can distinguish “good” from “bad?”
Compare this entry https://en.wikipedia.org/wiki/List_of_fake_news_websites
to this entry: https://docs.google.com/document/d/10eA5-mCZLSS4MQY5QGb5ewC3VAL6pLkT53V_81ZyitM/preview to understand the scope
Do you know any fact checking sites? Can you identify spot sponsored content? Do you understand syndication? What do you understand under “media literacy,” “news literacy,” “information literacy.” https://blog.stcloudstate.edu/ims/2017/03/28/fake-news-resources/
Why do we need to explore the “fake news” phenomenon? Do you find it relevant to your professional development?
So, how do we do academic research? Let’s play another Kahoot: https://play.kahoot.it/#/k/5e09bb66-4d87-44a5-af21-c8f3d7ce23de
If you to structure this Kahoot, what are the questions, you will ask? What are the main steps in achieving successful research for your paper?
Research using social media
what is social media (examples). why is called SM? why is so popular? what makes it so popular?
use SM tools for your research and education:
– Determining your topic. How to?
Digg http://digg.com/, Reddit https://www.reddit.com/ , Quora https://www.quora.com
Facebook, Twitter – hashtags (class assignment 2-3 min to search)
LinkedIn Groups
YouTube and Slideshare (class assignment 2-3 min to search)
Flickr, Instagram, Pinterest for visual aids (like YouTube they are media repositories)
https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/187-things-the-blockchain-is-supposed-to-fix/amp
Blockchains, which use advanced cryptography to store information across networks of computers, could eliminate the need for trusted third parties, like banks, in transactions, legal agreements, and other contracts. The most ardent blockchain-heads believe it has the power to reshape the global financial system, and possibly even the internet as we know it.
Now, as the technology expands from a fringe hacker toy to legitimate business applications, opportunists have flooded the field. Some of the seekers are mercenaries pitching shady or fraudulent tokens, others are businesses looking to cash in on a hot trend, and still others are true believers in the revolutionary and disruptive powers of distributed networks.
Mentions of blockchains and digital currencies on corporate earnings calls doubled in 2017 over the year prior, according to Fortune. Last week at Consensus, the country’s largest blockchain conference, 100 sponsors, including top corporate consulting firms and law firms, hawked their wares.
Here is a noncomprehensive list of the ways blockchain promoters say they will change the world. They run the spectrum from industry-specific (a blockchain project designed to increase blockchain adoption) to global ambitions (fixing the global supply chain’s apparent $9 trillion cash flow issue).
Things Blockchain Technology Will Fix
Bots with nefarious intent
Skynet
People not taking their medicine
Device storage that could be used for bitcoin mining
The European Union‘s General Data Protection Regulation, or GDPR, goes into effect on May 25
The objective of the regulation, which passed in 2016, is to simplify and consolidate rules that companies need to follow in order to protect their data and to return control to EU citizens and residents over their personal information.
Individuals in the EU will have the right to access or request that companies erase or migrate their data elsewhere. When asked, companies must prove to authorities that they have satisfactory policies and procedures in place to protect their data, or they will face huge fines. How huge? If your company’s not compliant, the fines could be as large as 20 million Euros (about $24 million) or four percent of your annual global revenue, whichever is higher.
“A U.S. tourist who visits Germany for one day and returns to the U.S. has rights under the law if that person used [a service like] Facebook while on the trip,” Alex Stern, an attorney wrote on his firm’s blog.
Social media platforms are using the same techniques as gambling firms to create psychological dependencies and ingrain their products in the lives of their users, experts warn.
atasha Schüll, the author of Addiction by Design, which reported how slot machines and other systems are designed to lock users into a cycle of addiction.
Whether it’s Snapchat streaks, Facebook photo-scrolling, or playing CandyCrush, Schüll explained, you get drawn into “ludic loops” or repeated cycles of uncertainty, anticipation and feedback — and the rewards are just enough to keep you going.
Like gambling, which physically alters the brain’s structure and makes people more susceptible to depression and anxiety, social media use has been linked to depression and its potential to have an adverse psychological impact on users cannot be overlooked or underestimated.
However, the number of monthly active users of Facebook hit 2.13 billion earlier this year, up 14% from a year ago. Despite the furore around its data privacy issues, the social media monolith posted record revenues for the first quarter of 2018, making $11.97bn, up 49% on last year.
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
The government
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
The ACM/IEEE Joint Conference on Digital Libraries in 2018 (JCDL 2018L: https://2018.jcdl.org/) will be held in conjunction with UNT Open Access
Symposium 2018 (https://openaccess.unt.edu/symposium/2018) on June 3 – 6, 2018
in Fort Worth, Texas, the rustic and artistic threshold into the American
West. JCDL welcomes interesting submissions ranging across theories, systems,
services, and applications. We invite those managing, operating, developing,
curating, evaluating, or utilizing digital libraries broadly defined, covering
academic or public institutions, including archives, museums, and social
networks. We seek involvement of those in iSchools, as well as working in
computer or information or social sciences and technologies. Multiple tracks
and sessions will ensure tailoring to researchers, practitioners, and diverse
communities including data science/analytics, data curation/stewardship, information retrieval, human-computer interaction, hypertext (and Web/network science), multimedia, publishing, preservation, digital humanities, machine learning/AI, heritage/culture, health/medicine, policy, law, and privacy/ intellectual property.
General Instructions on submissions of full papers, short papers, posters and
demonstrations, doctoral consortium, tutorials, workshops, and panels can be
found at https://2018.jcdl.org/general_instructions. Below are the submission
deadlines:
• Jan. 15, 2018 – Tutorial and workshop proposal submissions
• Jan. 15, 2018 – Full paper and short paper submissions
• Jan. 29, 2018 – Panel, poster and demonstration submissions
• Feb. 1, 2018 – Notification of acceptance for tutorials and workshops
• Mar. 8, 2018 – Notification of acceptance for full papers, short papers,
panels, posters, and demonstrations
• Mar. 25, 2018 – Doctoral Consortium abstract submissions
• Apr. 5, 2018 – Notification of acceptance for Doctoral Consortium
• Apr. 15, 2018 – Final camera-ready deadline for full papers, short papers,
panels, posters, and demonstrations