Searching for "data security"

game for online privacy and data security

Teachers Turn to Gaming for Online Privacy Lessons

By Dian Schaffhauser 10/10/18

https://thejournal.com/articles/2018/10/10/teachers-turn-to-gaming-for-online-privacy-lessons.aspx

Blind Protocol, an alternate reality game created by two high school English teachers to help students understand online privacy and data security. This form of gaming blends fact and fiction to immerse players in an interactive world that responds to their decisions and actions. In a recent article on KQED, Paul Darvasi and John Fallon described how they chose the gaming format to help their students gain a deeper look at how vulnerable their personal data is.

Darvasi, who blogs at “Ludic Learning,” and Fallon, who writes at “TheAlternativeClassroom,” are both immersed in the education gaming realm.

++++++++++
more on online privacy and data security

https://blog.stcloudstate.edu/ims?s=online+privacy

https://blog.stcloudstate.edu/ims?s=data+security

Internet of Thing Security Problem

The Internet of Things’ Persistent Security Problem

  • The threat of ransomware
  • IoT’s special vulnerabilities
  • Potential solutions

In what is currently a fragmented regulatory and standards landscape internationally, the EU has taken strongest interest in IoT, but from a competition perspective. The EU Commission is investigating competition questions related especially to the three dominant voice-assistants (Alexa, Google Assistant, Siri), a node for issues of data privacy and interoperability. Its recently released report hardly mentions security.

+++++++++++++++++
more on IoT in this iMS blog
https://blog.stcloudstate.edu/ims?s=internet+of+things

AI data and infodemic

AI progress depends on us using less data, not more

A minimal-data practice will enable several AI-driven industries — including cyber security, which is my own area of focus — to become more efficient, accessible, independent, and disruptive.

1. AI has a compute addiction. The growing fear is that new advancements in experimental AI research, which frequently require formidable datasets supported by an appropriate compute infrastructure, might be stemmed due to compute and memory constraints, not to mention the financial and environmental costs of higher compute needs.

MIT researchers estimated that “three years of algorithmic improvement is equivalent to a 10 times increase in computing power.”

2. Big data can mean more spurious noise. 

++++++++++++++
more on infodemic in this IMS blog
https://blog.stcloudstate.edu/ims?s=infodemic

disinformation cybersecurity

It’s time to accept that disinformation is a cyber security issue from r/technology

https://www.computerweekly.com/opinion/Its-time-to-accept-that-disinformation-is-a-cyber-security-issue

Misinformation and disinformation are rife, but so far it’s been seen as a challenge for policy-makers and big tech, including social media platforms.

The sheer volume of data being created makes it hard to tell what’s real and what’s not. From destroying 5G towers to conspiracies like QAnon and unfounded concern about election fraud, distrust is becoming the default – and this can have incredibly damaging effects on society.

So far, the tech sector – primarily social media companies, given that their platforms enable fake news to spread exponentially – have tried to implement some measures, with varying levels of success. For example, WhatsApp has placed a stricter limit on its message-forwarding capability and Twitter has begun to flag misleading posts.

the rise of tech startups that are exploring ways to detect and stem the flow of disinformation, such Right of ReplyAstroscreen and Logically.

disinformation has the potential to undermine national security

Data breaches result in the loss of value, but so can data manipulation

Teaching Cybersecurity

Teaching Cybersecurity: What You Need to Know

Wednesday, Nov. 13 @ 4 pm CT

REGISTER HERE

In 2014, there were 1 million unfilled cybersecurity jobs globally. By 2021, it’s estimated that number will grow to 3.5 million. Exposing K-12 students to cybersecurity through a well-designed curriculum and set of activities will help alleviate the shortage by increasing the interest and skills of the new generation. Unfortunately, current secondary school curricula across the country leave students and educators with minimal or no exposure to cybersecurity topics.
Many K-12 school districts are looking for ways to create cybersecurity training programs. This edWebinar will focus on best practices for teaching and learning cybersecurity skills, including the following learning objectives:
  • What skills does the instructor need to teach an introductory cybersecurity course?
  • What are some best practices for teaching an introductory cybersecurity course?
  • Where can instructors get help teaching their courses?
  • What tools/resources do students and instructors need to teach an introductory cybersecurity course?
This edWebinar will be of interest to middle school through higher education teachers and school and district leaders. There will be time to have your questions answered at the end of the presentation. Learn more.

++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

Tik Tok and cybersecurity

https://www.axios.com/tiktok-china-online-privacy-personal-data-6b251d22-61f4-47e1-a58d-b167435472e3.html

The bottom line: While the Big Tech behemoths of the U.S. are barred from making inroads in China, the inverse doesn’t apply. That could mark an opening front in the ongoing technological and economic war between the two rivals.

++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

https://blog.stcloudstate.edu/ims?s=tik+tok

https://blog.stcloudstate.edu/ims/2018/10/31/students-data-privacy/

privacy data collection

How To Keep Google From Collecting Your Data

Megan E. Holstein Dec 21, 2018 https://medium.com/swlh/how-to-keep-google-from-collecting-your-data-5fd97a6bf929

here are two places where you can turn off how Google tracks you: Activity Controls and Ad Settings.

Along with turning off Ad Personalization, you should turn off Shared Endorsements.

Privacy Checkup

Security Checkup

Part 2: Deleting The Data They Already Have

Get Backups with Google Takeout

My Activity

My Services

Part 3: Don’t Use Your Google Account for More Than You Have To

  • Don’t use Sign In With Google
  • Don’t use your Gmail, even for junk email

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

data interference

APRIL 21, 2019 Zeynep Tufekci

https://www.nytimes.com/2019/04/21/opinion/computational-inference.html

http://trendingpress.com/think-youre-discreet-online-think-again/

Because of technological advances and the sheer amount of data now available about billions of other people, discretion no longer suffices to protect your privacy. Computer algorithms and network analyses can now infer, with a sufficiently high degree of accuracy, a wide range of things about you that you may have never disclosed, including your moods, your political beliefs, your sexual orientation and your health.

There is no longer such a thing as individually “opting out” of our privacy-compromised world.

In 2017, the newspaper The Australian published an article, based on a leaked document from Facebook, revealing that the company had told advertisers that it could predict when younger users, including teenagers, were feeling “insecure,” “worthless” or otherwise in need of a “confidence boost.” Facebook was apparently able to draw these inferences by monitoring photos, posts and other social media data.

In 2017, academic researchers, armed with data from more than 40,000 Instagram photos, used machine-learning tools to accurately identify signs of depression in a group of 166 Instagram users. Their computer models turned out to be better predictors of depression than humans who were asked to rate whether photos were happy or sad and so forth.

Computational inference can also be a tool of social control. The Chinese government, having gathered biometric data on its citizens, is trying to use big data and artificial intelligence to single out “threats” to Communist rule, including the country’s Uighurs, a mostly Muslim ethnic group.

+++++++++++++

Zeynep Tufekci and Seth Stephens-Davidowitz: Privacy is over

https://www.centreforideas.com/article/zeynep-tufekci-and-seth-stephens-davidowitz-privacy-over

+++++++++++

Zeynep Tufekci writes about security and data privacy for NY Times, disinformation’s threat to democracy for WIRED

++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

Blurred Lines Between Security Surveillance and Privacy

Edtech’s Blurred Lines Between Security, Surveillance and Privacy

By Tony Wan     Mar 5, 2019

https://www.edsurge.com/news/2019-03-05-edtech-s-blurred-lines-between-security-surveillance-and-privacy

Tony Wan, Bill Fitzgerald, Courtney Goodsell, Doug Levin, Stephanie Cerda

SXSW EDU https://schedule.sxswedu.com/

privacy advocates joined a school administrator and a school safety software product manager to offer their perspectives.

Navigating that fine line between ensuring security and privacy is especially tricky, as it concerns newer surveillance technologies available to schools. Last year, RealNetworks, a Seattle-based company, offered its facial recognition software to schools, and a few have pioneered the tool. https://blog.stcloudstate.edu/ims/2019/02/02/facial-recognition-technology-in-schools/

The increasing availability of these kinds of tools raise concerns and questions for Doug Levin, founder of EdTech Strategies.acial-recognition police tools have been decried as “staggeringly inaccurate.”

acial-recognition police tools have been decried as “staggeringly inaccurate.”School web filters can also impact low-income families inequitably, he adds, especially those that use school-issued devices at home. #equity.

Social-Emotional Learning: The New Surveillance?

Using data to profile students—even in attempts to reinforce positive behaviors—has Cerda concerned, especially in schools serving diverse demographics. #equity.

As in the insurance industry, much of the impetus (and sales pitches) in the school and online safety market can be driven by fear. But voicing such concerns and red flags can also steer the stakeholders toward dialogue and collaboration.

+++++++++++++
more in this IMS blog on
https://blog.stcloudstate.edu/ims?s=privacy
https://blog.stcloudstate.edu/ims?s=surveillance
https://blog.stcloudstate.edu/ims?s=security

1 2 3 14