TCC Worldwide Online Conference presentation on Web Privacy and Information Accountability by students from Colorado Technical University on April 18, 2012.
1. Privacy is a Myth
EM 835 Information Accountability and Web Privacy Strategies
M. Frye
H. Hess, Media Rain
S. Kamberi, Penny Galaxy
J. Murray, Murtek Viper
K. Ostler, Addisonbow
I. Spencer, Zkittykitty
C. Steele, Xavia Fluta
B. Truman, D’Lightful Doowangle
…and the 23 students in EM 835
Dr. Cynthia Calongne, Colorado Technical University April 18, 2012
2012 TCC Worldwide Online Conference
8. Barbara -
D’Lightful Karl -
Doowangle Addisonbow
Project Partners
The Project – Copyright Learning Module
Idea: Learning Module – Engineering Design & Copyright/Patent Relationships
Develop a Learning Design Studio of an online module about Engineering Design
Ideas/Contractual Work and the relationship with the Patent/Copyright process.
9. Goal: Outline, identify, and highlight up to date issues regarding intellectual property and
copyright/patents. In addition, host this as an online learning module in a
Virtual World Environment like Second Life.
Ideal: Develop a Holodeck or similar tool in Second Life to package a learning module to
pose situations to visitors and then provide information leading to a solution with focus
on Patent/Copyright Laws.
Design/Build –
Research – •SL Platform to support
•Copyright Law •Content Presentations
•Needs Assessment •Activities
•Learning Requirements
Analyze –
•Observations
•Feedback
•Survey - Results
The Design Process - Learning Module
11. Visit us live in See the tour
Second Life slideshow
Copyright Learning Module = RESULTS
12. Ideas &
Discoveries Futuring:
•Additional Copyright Solutions
•Additional Fields of Application
• Similar Modules for different topics
Design Solutions
Innovations:
•Virtual Worlds
•Emerging Media
•Artificial Intelligence
Copyright Learning Module = ROOM FOR MORE
13. How is My Identity Currently Defined?
• Drivers License • Birth Certificate
– License Number – Parents Information
– Name – Birth Date
– Address (Street, City, State, Zip Code) – Birth Location
– Hair Color – Hand and Feet Prints
– Eye Color – Picture
– Height – Blood Sample
– Weight • College ID
– Organ Donor – Name of College
• Social Security Card – Name
– Work Eligibility Number – Year
• Passports (E-Passport) • Genealogy
– Paper Trail with RFID Tag – Heritage
• Credit Cards • Medical EMR
– Card Number • Gender
– Name – Male
– Security Feature Number (3 digit) – Female
• User Name / Password / Pass Phrase – Transgender
14. Mobile Tracking Location-Based
Services Continue to Grow
Foursquare alone has over 5,000,000 registered users
Google latitude allows users to do micro-coordination
15. So why do we share?
use location
abstractions to
scaffold privacy
concerns
share precise location (GPS)
&
share nothing
max social benefits
&
no social benefits
16. The Best Facial Emotion Extraction
Method for Second life
How having better avatar facial features and expressions in
Second life can provide a more real-life like form of
communication
17. Three Methods
Facial Emotion Extraction through Text (SL) Facial Emotion Extraction using Kinect
(Microsoft)
Facial Emotion Extraction using Webcam
(nVisio)
18. Results
Method Implementation Feasibility Integration
Extracting emotion Already implemented in Uses text chat which Users can integrate it by
through user text SL through Second Life means total immersion of buying Automatic Facial
Marketplace communication in the Animation HUDs
virtual world to mimic real Not all users, especially
face-to-face new users, are willing to
communication is not pay for the HUDs.
feasible
Extracting emotion using SL can be accessed No real indication that Users need to buy Xbox
motion capture through the Xbox 360 Linden Labs is up for sale. 360 and Kinect in order
console via Xbox LIVE Not feasible to believe to integrate this
technology via Xbox and
through Wi-FI users are willing to buy technology.
Kinect connection expensive hardware just to
Implies Microsoft buying use SL
Linden Labs
Extracting emotion using Linden Labs hiring Most users own laptops Users do not need to do
nVisio’s technology via nVisio Most laptops have anything except for using
webcams their webcams in SL
webcams (Best Method)
Finding a method to use nVisio is a start-up Can be integrated free via
the extracted data from company willing to work the free Second Life
nVisio’s technology to with others Viewer
apply to 3D avatar facial
features.
20. Cyberstalking takes many forms. Among them:
• Installing spyware on a target's
computer or via email
• GPS surveillance of the movement
of victims
• Posting personal or false and
humiliating information about the
victim on the Internet
• Sending harassing emails & msgs
• Using social media such as
Facebook or Twitter to post false
and humiliating information
21. Cyberstalking
It’s not a Game
Cyberstalking and cybercrimes are
on the rise as more and more
private information becomes
easily accessible on the internet.
Advances in technology have
allowed stalking to go online, with
perpetrators accessing personal
information.
22. Bluesnarfing Prevention
• Education and awareness are key.
• Set Bluetooth to non-discovery mode.
• MAC address filtering.
• Encryption.
• User-set passwords.
• Download latest software version.
• Be wary of strangers.
24. Notecard
Project Topic: An Investigation Of Privacy Within Virtual World Therapy
Sessions
Online therapy is a type of psychological treatment where patients and mental
health professionals communicate and address mental issues. This type of
therapy has been utilized for conditions such as post traumatic stress disorder,
depression, eating disorders, and chronic pain. It is particularly useful to patients
who want to be treated and want to remain anonymous or cannot attend in office
consultations and visits.
The project is a virtual world simulation that evaluates two types of online
therapy sessions: group therapy and individual therapy. Participants within the
therapy sessions interact via avatars. The goal of the simulation is to identify
and contrast participant web privacy and information accountability issues
during these sessions.
26. Content Removal
Countries with the Highest Concern
Google Complaints
1400
1200
1000
800
600
Google Complaints
400
200
0
27. Countries with Less Concern
• Belarus
• Bolivia
• Chile
• Costa Rica
• Czech Republic
• Ecuador
• Egypt
• Guatemala
• Honduras
• Hungary
• Kuwait
No Complaints Filed with Google
• Paraguay
• Philippines
• Romania
• Saudi Arabia
• South Africa
• Ukraine
• Uruguay
• Venezuela
28. Privacy by Internet Penetration
• Countries with the most privacy concern
averaged 72% Internet Penetration
• Countries with the least privacy concern
averaged 38% Internet Penetration
29. Cloud Computing & Security
• Security is a major concern of companies
who want to move to the cloud
• Cloud providers obtain certifications
through auditing to verify they are secure
• Example Certifications
– PCI
– CMMI
– NIST 800-53
30. For More Information
• Cyberstalking Comic
http://nclc350group4.pbworks.com/w/page/7391773/Week%208%20Wiki%20Assignment
• Cyberbullies to be targeted by schools
http://paulhurst.wordpress.com/2007/09/21/cyberbullies-to-be-targeted-by-schools/
31. Privacy is a Myth
EM 835 Information Accountability and Web Privacy Strategies
Join us for a Treasure Hunt & tour of these simulations on Thursday,
April 19, 2012 at 1600 HST, 2000 Mountain in Second Life!
Many thanks to the M. Frye
23 students in EM 835 H. Hess, Media Rain
S. Kamberi, Penny Galaxy
J. Murray, Murtek Viper
K. Ostler, Addisonbow
I. Spencer, Zkittykitty
C. Steele, Xavia Fluta
B. Truman, D’Lightful Doowangle
Dr. Cynthia Calongne, Colorado Technical University April 18, 2012
2012 TCC Worldwide Online Conference
Notas do Editor
Throughout history, humans have endeavored to establish a form of individual identity. Of notable concern is our paper trail identification system we currently use today. Driver’s licenses, social security cards, passports, credit cards, username / password / pass phrase authentication, and even our birth certificate are all paper trail identity representations of us; the problem with a paper trail system is it can be seemingly absent or pilfered, knowingly or unknowingly replicated, and used fictitiously and of course, since it is our information, we are held accountable for its use, even if it is used without our knowledge. In the world of wired, wireless and open air communication technology, to prove oneself is derived from a username and password combination which at best provides minimal security and accessibility. If our society operated on a honesty trusted policy, and everyone involved played in congruence, security would be a moot point; however, given that there are a certain aspect of population that derives benefit from the bane of others, security measures have taken shape in an attempt to thwart unwanted infiltrators such as the Person in the Middle (PitM) [9] attacker / observer or some backdoor malware that records your information while you type. While the PitM attacker is not preventable at this venture of society, perhaps it will become moot with the addition of the digital me project and the e-Passport.
“Foursquare is a mobile application that makes cities easier to use and more interesting to explore. It is a friend-finder, a social city guide and a game that challenges users to experience new things, and rewards them for doing so. Foursquare lets users ”check in“ to a place when they‘re there, tell friends where they are and track the history of where they’ve been and who they‘ve been there with.”