47 resultados para privacy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper introduces vulnerability and quantitative privacy. Optional reading

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Friendface is a Facebook-styled site aimed at illustrating the importance of using appropriate privacy settings when using social media

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"Really, you don't say?" quiz show

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This resource is an informational resource that attempts to inform the general public about security and privacy with using the internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Group 20 (km) "Kirk's Krew" is proud to present "Panorama: An Investigation into Augmented Reality," an exciting and entertaining video used for the general public which engages through a fast-paced investigatory style. You'll never forget the story of students Jake and Andrew as they seek to thwart the villianous schemes of Larry Beige with help and hindrance from AR! Explore the past, present and future of AR in a Panorama style investigation! ECS' very own Dr Enrico Costanza is on hand with years of expertise! For a full listing of share contents, please see readme.txt

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We know where you live is an entertaining and informative quiz show highlighting the dangers resulting from a lack of awareness of Facebook's privacy and security settings. The game show is complemented by a short tutorial explaining these settings. The show is aimed at a wider audience and is suitable for all.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Slides on presentations on the following topics: 1.1 Virtuality 1.2 New Business Models 1.3 Privacy and Personal Security see http://www.edshare.soton.ac.uk/10709/ for detailed briefs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Slides on presentations on the following topics: 2.1 Privacy and Security Legal overview, 2.2 Creative Commons open source, open movements 2.3 Crime online, Cyber security 2.4 Freedom of Speech and Defamation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Privacy

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wednesday 12th March 2014 Speaker(s): Dr Tim Chown Organiser: Time: 12/03/2014 11:00-11:50 Location: B32/3077 File size: 642 Mb Abstract The WAIS seminar series is designed to be a blend of classic seminars, research discussions, debates and tutorials. The Domain Name System (DNS) is a critical part of the Internet infrastructure. In this talk we begin by explaining the basic model of operation of the DNS, including how domain names are delegated and how a DNS resolver performs a DNS lookup. We then take a tour of DNS-related topics, including caching, poisoning, governance, the increasing misuse of the DNS in DDoS attacks, and the expansion of the DNS namespace to new top level domains and internationalised domain names. We also present the latest work in the IETF on DNS privacy. The talk will be pitched such that no detailed technical knowledge is required. We hope that attendees will gain some familiarity with how the DNS works, some key issues surrounding DNS operation, and how the DNS might touch on various areas of research within WAIS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tuesday 6th May Building 34 room 3001, 16.15-18.00 Presenting: Groups: A, B, C, D Marking Groups: E, F, G, H 16.20 Group A: The online workplace: virtuality 16.40 Group B: Open innovation and novel business practices 17.00Group C: Banter, jokes, freedom of speech and defamation 17.20 Group D: Security and privacy – legal overview

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monday 12th May Building 34 Room 3001, 12.00-13.45 Su & Rikki Presenting: Groups: E, F, G, H Marking Groups: I, J, K, L Schedule and Topics 12.00-12.05: Introduction and protocol for the session 12.05-12.25 Group E: Creative commons, open source, open movements 12.25-12.45 Group F: Trolling, Banter, Cyber Hate, Online Bullying 12.45-13.05 Group G: Personal Privacy and Security 13.05-13.25 Group H: Crime online; cyber security 13.25-13.45: Wash-up: feedback session for presentation groups

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker: Dr Kieron O'Hara Organiser: Time: 04/02/2015 11:00-11:45 Location: B32/3077 Abstract In order to reap the potential societal benefits of big and broad data, it is essential to share and link personal data. However, privacy and data protection considerations mean that, to be shared, personal data must be anonymised, so that the data subject cannot be identified from the data. Anonymisation is therefore a vital tool for data sharing, but deanonymisation, or reidentification, is always possible given sufficient auxiliary information (and as the amount of data grows, both in terms of creation, and in terms of availability in the public domain, the probability of finding such auxiliary information grows). This creates issues for the management of anonymisation, which are exacerbated not only by uncertainties about the future, but also by misunderstandings about the process(es) of anonymisation. This talk discusses these issues in relation to privacy, risk management and security, reports on recent theoretical tools created by the UKAN network of statistics professionals (on which the author is one of the leads), and asks how long anonymisation can remain a useful tool, and what might replace it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract: Big Data has been characterised as a great economic opportunity and a massive threat to privacy. Both may be correct: the same technology can indeed be used in ways that are highly beneficial and those that are ethically intolerable, maybe even simultaneously. Using examples of how Big Data might be used in education - normally referred to as "learning analytics" - the seminar will discuss possible ethical and legal frameworks for Big Data, and how these might guide the development of technologies, processes and policies that can deliver the benefits of Big Data without the nightmares. Speaker Biography: Andrew Cormack is Chief Regulatory Adviser, Jisc Technologies. He joined the company in 1999 as head of the JANET-CERT and EuroCERT incident response teams. In his current role he concentrates on the security, policy and regulatory issues around the network and services that Janet provides to its customer universities and colleges. Previously he worked for Cardiff University running web and email services, and for NERC's Shipboard Computer Group. He has degrees in Mathematics, Humanities and Law.