privacy is a myth tcc 2_12065

31
Privacy is a Myth EM 835 Information Accountability and Web Privacy Strategies M. Frye H. Hess, Media Rain S. Kamberi, Penny Galaxy J. Murray, Murtek Viper K. Ostler, Addisonbow I. Spencer, Zkittykitty C. Steele, Xavia Fluta B. Truman, D’Lightful Doowangle …and the 23 students in EM 835 April 18, 2012 Dr. Cynthia Calongne, Colorado Technical University 2012 TCC Worldwide Online Conference

Upload: cynthia-calongne

Post on 06-May-2015

574 views

Category:

Education


0 download

DESCRIPTION

TCC Worldwide Online Conference presentation on Web Privacy and Information Accountability by students from Colorado Technical University on April 18, 2012.

TRANSCRIPT

Page 1: Privacy is a Myth TCC 2_12065

Privacy is a Myth EM 835 Information Accountability and Web Privacy Strategies

M. FryeH. Hess, Media RainS. Kamberi, Penny GalaxyJ. Murray, Murtek ViperK. Ostler, AddisonbowI. Spencer, ZkittykittyC. Steele, Xavia FlutaB. Truman, D’Lightful Doowangle

…and the 23 students in EM 835

April 18, 2012Dr. Cynthia Calongne, Colorado Technical University2012 TCC Worldwide Online Conference

Page 2: Privacy is a Myth TCC 2_12065

Museum of Web Privacy

Page 3: Privacy is a Myth TCC 2_12065

Student Museum on Web Privacy

Page 4: Privacy is a Myth TCC 2_12065

Introduction

• What kind of e-mail and web activity monitoring for students in middle school and high school is acceptable?

Page 5: Privacy is a Myth TCC 2_12065

Student Privacy & the Classroom

Page 6: Privacy is a Myth TCC 2_12065

Content Filter & Key Logger

Page 7: Privacy is a Myth TCC 2_12065

Smart Desk

Page 8: Privacy is a Myth TCC 2_12065

Barbara -D’Lightful Doowangle

Karl -Addisonbow

Project Partners

The Project – Copyright Learning Module Idea: Learning Module – Engineering Design & Copyright/Patent Relationships

Develop a Learning Design Studio of an online module about Engineering Design Ideas/Contractual Work and the relationship with the Patent/Copyright process.

Page 9: Privacy is a Myth TCC 2_12065

Design/Build – • SL Platform to

support• Content

Presentations• Activities

Research –• Copyright Law• Needs Assessment• Learning

Requirements

The Design Process - Learning Module

Analyze – • Observations• Feedback• Survey - Results

Goal: Outline, identify, and highlight up to date issues regarding intellectual property and copyright/patents. In addition, host this as an online learning module in a Virtual World Environment like Second Life.

Ideal: Develop a Holodeck or similar tool in Second Life to package a learning module to pose situations to visitors and then provide information leading to a solution with focus on Patent/Copyright Laws.

Page 10: Privacy is a Myth TCC 2_12065

Context:• Synchronous Activities• Asynchronous Activities• Combinations – Linear / Non-linear

Content:• Information Content• Sources• Creative Content• Learning /Problems• Solutions

The Project – Copyright Learning Module

Page 11: Privacy is a Myth TCC 2_12065

Copyright Learning Module = RESULTS

http://slurl.com/secondlife/Ach

eron%20LV426/31/203/55

http://cognitiveapprentice.com

/ctu/studiotour.htm

Visit us live in Second Life

See the tour slideshow

Page 12: Privacy is a Myth TCC 2_12065

Copyright Learning Module = ROOM FOR MORE

Futuring:• Additional Copyright Solutions• Additional Fields of Application• Similar Modules for different topics

Innovations:• Virtual Worlds• Emerging Media• Artificial

Intelligence

Ideas &Discoveries

Design Solutions

Page 13: Privacy is a Myth TCC 2_12065

How is My Identity Currently Defined?

• Drivers License– License Number– Name– Address (Street, City, State, Zip Code)– Hair Color– Eye Color– Height– Weight– Organ Donor

• Social Security Card– Work Eligibility Number

• Passports (E-Passport)– Paper Trail with RFID Tag

• Credit Cards– Card Number– Name– Security Feature Number (3 digit)

• User Name / Password / Pass Phrase

• Birth Certificate– Parents Information– Birth Date– Birth Location– Hand and Feet Prints– Picture– Blood Sample

• College ID– Name of College– Name– Year

• Genealogy– Heritage

• Medical EMR• Gender

– Male– Female– Transgender

Page 14: Privacy is a Myth TCC 2_12065

Foursquare alone has over 5,000,000 registered usersGoogle latitude allows users to do micro-coordination

Mobile Tracking Location-Based Services Continue to Grow

Page 15: Privacy is a Myth TCC 2_12065

So why do we share?

use location abstractions to scaffold privacy

concerns

share nothing &

no social benefits

share precise location (GPS)

& max social benefits

Page 16: Privacy is a Myth TCC 2_12065

The Best Facial Emotion Extraction Method for Second life

How having better avatar facial features and expressions in Second life can provide a more real-life like form of communication

Page 17: Privacy is a Myth TCC 2_12065

Three Methods

Facial Emotion Extraction through Text (SL) Facial Emotion Extraction using Kinect (Microsoft)

Facial Emotion Extraction using Webcam (nVisio)

Page 18: Privacy is a Myth TCC 2_12065

Method Implementation Feasibility IntegrationExtracting emotion through user text

Already implemented in SL through Second Life Marketplace

Uses text chat which means total immersion of communication in the virtual world to mimic real face-to-face communication is not feasible

Users can integrate it by buying Automatic Facial Animation HUDs

Not all users, especially new users, are willing to pay for the HUDs.

Extracting emotion using motion capture technology via Xbox and Kinect

SL can be accessed through the Xbox 360 console via Xbox LIVE through Wi-FI connection

Implies Microsoft buying Linden Labs

No real indication that Linden Labs is up for sale.

Not feasible to believe users are willing to buy expensive hardware just to use SL

Users need to buy Xbox 360 and Kinect in order to integrate this technology.

Extracting emotion using nVisio’s technology via webcams (Best Method)

Linden Labs hiring nVisio

  Finding a method to use

the extracted data from nVisio’s technology to apply to 3D avatar facial features.

Most users own laptops Most laptops have

webcams nVisio is a start-up

company willing to work with others

 

Users do not need to do anything except for using their webcams in SL

Can be integrated free via the free Second Life Viewer

Results

Page 19: Privacy is a Myth TCC 2_12065

‘Cyberstalking : Worse Than

Personal Harassment

Page 20: Privacy is a Myth TCC 2_12065

Cyberstalking takes many forms. Among them:

• Installing spyware on a target's computer or via email

• GPS surveillance of the movement of victims

• Posting personal or false and humiliating information about the victim on the Internet

• Sending harassing emails & msgs• Using social media such as

Facebook or Twitter to post false and humiliating information

Page 21: Privacy is a Myth TCC 2_12065

CyberstalkingIt’s not a Game

Cyberstalking and cybercrimes are on the rise as more and more private information becomes easily accessible on the internet. Advances in technology have allowed stalking to go online, with perpetrators accessing personal information.

Page 22: Privacy is a Myth TCC 2_12065

• Education and awareness are key.

• Set Bluetooth to non-discovery mode.

• MAC address filtering.

• Encryption.

• User-set passwords.

• Download latest software version.

• Be wary of strangers.

Bluesnarfing Prevention

Page 23: Privacy is a Myth TCC 2_12065

Individual Therapy Session PrivacyProviding Privacy for Online

Consultations

Page 24: Privacy is a Myth TCC 2_12065

Notecard

Project Topic: An Investigation Of Privacy Within Virtual World Therapy Sessions

Online therapy is a type of psychological treatment where patients and mental health professionals communicate and address mental issues. This type of therapy has been utilized for conditions such as post traumatic stress disorder, depression, eating disorders, and chronic pain. It is particularly useful to patients who want to be treated and want to remain anonymous or cannot attend in office consultations and visits.

The project is a virtual world simulation that evaluates two types of online therapy sessions: group therapy and individual therapy. Participants within the therapy sessions interact via avatars. The goal of the simulation is to identify and contrast participant web privacy and information accountability issues during these sessions.

Page 25: Privacy is a Myth TCC 2_12065

Group Therapy Session Privacy

Page 26: Privacy is a Myth TCC 2_12065

Content Removal Countries with the Highest Concern

Japa

n

Austra

lia

Turke

y

Fran

ceSp

ain

Taiwan

Argen

tina

Italy

United

Kin

gdom

Indi

a

Sout

h Kor

ea

United

State

s

German

yBraz

il0

200

400

600

800

1000

1200

1400

Google Complaints

Google Complaints

Page 27: Privacy is a Myth TCC 2_12065

• Belarus• Bolivia• Chile• Costa Rica• Czech Republic• Ecuador• Egypt• Guatemala• Honduras• Hungary• Kuwait• Paraguay• Philippines• Romania• Saudi Arabia• South Africa• Ukraine• Uruguay• Venezuela

Countries with Less Concern

No Complaints Filed with Google

Page 28: Privacy is a Myth TCC 2_12065

• Countries with the most privacy concern averaged 72% Internet Penetration

• Countries with the least privacy concern averaged 38% Internet Penetration

Privacy by Internet Penetration

Page 29: Privacy is a Myth TCC 2_12065

Cloud Computing & Security

• Security is a major concern of companies who want to move to the cloud

• Cloud providers obtain certifications through auditing to verify they are secure

• Example Certifications– PCI – CMMI– NIST 800-53

Page 30: Privacy is a Myth TCC 2_12065

For More Information

• Cyberstalking Comic http://nclc350group4.pbworks.com/w/page/7391773/Week%208%20Wiki%20Assignment

• Cyberbullies to be targeted by schools http://paulhurst.wordpress.com/2007/09/21/cyberbullies-to-be-targeted-by-schools/

Page 31: Privacy is a Myth TCC 2_12065

Privacy is a Myth EM 835 Information Accountability and Web Privacy Strategies

M. FryeH. Hess, Media RainS. Kamberi, Penny GalaxyJ. Murray, Murtek ViperK. Ostler, AddisonbowI. Spencer, ZkittykittyC. Steele, Xavia FlutaB. Truman, D’Lightful Doowangle

April 18, 2012Dr. Cynthia Calongne, Colorado Technical University2012 TCC Worldwide Online Conference

Many thanks to the23 students in EM 835

Join us for a Treasure Hunt & tour of these simulations on Thursday, April 19, 2012 at 1600 HST, 2000 Mountain in Second Life!