SMAD 470 Q4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Ways of seeing things on newsfeed

Random Potential from Network Exposed Selected

The Guardian article: "What happened when I confronted my Troll" Lindy West

a blogger or writer that wrote about feminism and bitchy things that make people uncomfortable A Troll made an account on Twitter as her dead father Now she feels pitty for trolls after she posted how hurtful it was and he emailed her an apology

Video: "Enemy of the State?" Krotoski's paradox of the web

We applaud it for giving us power and a voice, but it can be used for good and evil The more info we put out, the more vulnerable we are for evil to be done

Digitized Lives ch 4: "Is Everybody Equal Online?" subject position

Where social structures beyond yourself place you in the world Some elements can change over time

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Potential from Network

You see the average percentage of cross-cutting articles posted by a persons friends The steepest reduction

Vanity Fair article Mafiaboy

a 15 year old French Canadian who launch DDoS attacks on companies like Yahoo, Amazon, eBay, Dell, CNN, etc. and lost them billions of dollars because of it

Article: Pew Research Center "The future of well-being in tech" Concerns over harms (more harmed than helped)

digital deficits digital addiction digital distrust digital duress digital dangers

Video: "Homo Interneticus?" Facebook's Success

easy to make an account and therefore the volume of people online is the success

Video: "Homo Interneticus?" Unintended consequences of the printing press

every copy is the same with no variation (this is both good and bad) anyone could create info

Vanity Fair article & "Inside the Dark Web" article Dark Net/Web

exists within the deep web and lies beneath the surface net Whistle-blowers, criminals, and political dissidents are people that like to have access Tor.

Video: "Homo Interneticus?" Expectations of the Korean Children (Korean National Information Society)

expects children to be more intelligent and understand the importance of communication and information lead in math and science learning because interacting online from a young age can be beneficial

Time Magazine Article: "How Trolls are Ruining the Internet" The online disinhibition effect

factors like anonymity, invisibility, a lack of authority, and not communicating in real time strip away the mores society spent millennia building

Video: BBC "Inside the Dark Web" the "Boom Industry"

financial crime credit card fraud, giving away account numbers, etc.

Video: "How Hackers Changed the World" Anonymous why did Anonymous decide to wear masks and conceal their identity?

for safety, worried they would be stalked or their families and friends would be in danger "none of us are as strong as all of us" -- they are one voice

Video: Troll Hunters Why troll with porn?

gets attention claims nothing would make him stop because it is "freedom of speech"

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Nation States

governments do the attacking Ex: Germany and Iran

Video: "How Hackers Changed the World" Anonymous Hacker culture and hactivism

hacking originated at MIT as a humorous, funny thing; like pranks hacktivism: a cult of the dead cow coined it; original principle was for freedom and expression; resistance of authority; a software that all countries could access and talk where governments could not see it

Vanity Fair article Hired guns

had to be on the "right" side had to be serious about network security

Digitized Lives ch 4: "Is Everybody Equal Online?" Stereotypes re-emerging

hate groups, biotechnology (Ancestry online)

John Oliver's Encryption video Oliver's view on weakening Encryption

he agrees with Apple; weakening Encryption would end up doing more harm than good

Vanity Fair article Event Logs

lines on a screen showing summaries of each new task given to a computer network; a time stamp and a green or red dot to indicate success or failure

Video: Troll Hunters Louise's troll

posted rape threats - they tracked him down and stake out his house - he didn't care and wouldn't own up to actions, said it was for fun - was completely caught off guard and couldn't defend himself

Video: "Enemy of the State?" packet switching and the original problem with computer networks

problem: how to join networks up packet switching: allows for huge data to be sent fast along multiple routes

Vanity Fair article Botnets

"Robot" + "Network" Illicit networks of infected computers, known as zombies or nodes Appear to function normally but are secretly controlled by hackers and can be used in combination to produce enormous computing power -- can be millions of infected computers

Vanity Fair article & "Inside the Dark Web" article Surface Net/Web

"anything you can find through Google" is publicly found for all we interact with it daily uses Spiders

Future Crimes "Connected, Dependent, and Vulnerable" Malware

"malicious" and "software" all seeks to damage, disrupt, steal from, or inflict illegitimate or unauthorized action on a data system

NY Times Article: "When the Internet Thinks It Knows You" Relevance

**According to Facebook virtually the sole criterion that determines what users see It is the most personally relevant news

Fast Company Article: "Why Online Harassment is Still Ruining Lives"

- Online Harassment goes unchecked the majority of the time - Local law enforcement doesn't always know how to enforce online harassment laws - Startups don't think about online harassment until it is too late - Tech companies have no liability for harassment on their platforms - There are no easy technical solutions to this problem - Women and minorities are underrepresented at big tech companies and among lawmakers

Video: Troll Hunters How does the online world and "real world" intersect in trolling?

- cyber bullies are usually anonymous - everything you do online leaves a trail of breadcrumbs - model: online hate leads to fear of being in public - how would the trolls feel if people knew what they were saying online? - trolls blur the line between online & reality - no idea about abuse and its effects

Video: Troll Hunters Privacy and anonymity online applied to trolling abuse

- depends if the trolling is illegal - it is difficult for authorities to track them down - people know how to cover their tracks - troll claimed he is not anonymous because of shame, he thinks of it just as an alternative identity

Video: Troll Hunters how do investigators track down trolls?

- trolls give away information in comments that could lead to a location - bring together different sources - photos posted give locations - facial recognition

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" 2 concerns of the Filter Bubble

1. Algorithm would help folks surround themselves with media that supports what they already believe 2. algorithms will tend to down-rank the kind of media that is most necessary in a democracy (news and info about most important social topics)

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" 3 types of online attackers

1. Online Criminals 2. Hacktivists 3. Nation States

Video: "Enemy of the State?" Freedom of speech in 20th century & what has changed

20th century: it was not acceptable and you were not able to say whatever you wanted in public the digital communication system changed that; it opened a platform to say whatever; the most democratic platform there has been

Video: "How Hackers Changed the World" Anonymous 4chan, /b/ board, & Memes

4chan: website to upload photos anonymously; separated as boards with specific topics /b/ board: a board where anything goes, showed what would happen with total freedom; photos of things that could not be unseen memes: a meme is an idea; every meme probably originated on 4chan and it is a place to watch them grow

Video: BBC "Inside the Dark Web" Silk Road and paying

A plug-in on a browser to buy whatever; "a dinner buffet of narcotics and drugs" Buying is done through Escrow where the silk road holds the money until the buyer says their drugs were delivered

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" DigiNotar

A service that governments can use to make HTTPS certificates insecure People died from these attacks Ex: Iran activists would use gmail and the government could then see all their emails

TEDGlobal: "Misha Glenny" Anonymous

A sophisticated group of hackers They say they are doing a service by showing us how bad companies are at securing our info They are ideologically and politically driven, not money driven

Video: "How Hackers Changed the World" Anonymous Aaron Barr & HBGary

Aaron Barr said he was monitoring Anonymous' databases and identified the leaders (which he hadn't done) So, Anonymous hacked him and saw that he was trying to send false documents to Wikileaks to discredit them Aaron Barr defended this by saying it was just a brainstorming idea, but he had written documents out and a proposal

TEDGlobal: "Misha Glenny" Characters in hacking and what they have in common

All learned hacking skills at a young age and did not know anything different; they learned these skills before they developed a moral compass All mastered skills in math and science All lacked social skills and showed signs of Aspergers and social disorders

Video: "Homo Interneticus?" "As We May Think"

An article about real time updating and shows how we think with association now rather than linear thinking This is relevant in how we hyperlink everything online now The problem: How do we think effectively in a constant associative brain

Digitized Lives ch 4: "Is Everybody Equal Online?" offline gender issues migrating into digital technologies

Anonymity in cyberspace Stereotypes thrive online Women are typically the target of cyberstalking, trolling, etc. There are now networks and online organizations that seeking a solution (Cyberfeminism)

Video: BBC "Inside the Dark Web" Troels Oerting's and Applebaum's views on anonymity

Anonymity is a threat to society because it hides criminals and allows them to continue committing crimes -- there is no risk with anonymity so crime is almost encouraged Anonymity is a reflection of human society without surveillance or risk

Video: "How Hackers Changed the World" Anonymous Church of Scientology

Anonymous began to mock them and Scientology got a copyright which turned into a legal battle it was the first time Anonymous posted a video and came out as a group and movement **Internet Activism was born thousands of people met world wide to protest the Church of Scientology

Video: "How Hackers Changed the World" Anonymous The paradox of Anonymous

Anonymous valued and wanted free exchange of information, but they stopped the flow of it when they did DDoS attacks, shut down journalist's blogs, etc.

Time Magazine Article: "How Trolls are Ruining the Internet" Trolling

Anything from pranks to harassment to violent threats It is a political fight

Videos: BBC Bitcoins & Cryptocurrency video Bitcoin blocks/blockchains & mining

Blocks track transactions Blockchains are a string of transactions that are added every 10 minutes Mining: solving the transaction problems for money

TEDGlobal: "Misha Glenny" CarderPlanet and Carder RedBrigade

CarderPlanet: cybercriminals would go to exchange info and malware such as credit card info; "A supermarket for cybercriminals" Innovative because it had a mediator between vendor and purchaser that would verify if the info was legit and if the cards worked Carder RedBrigade: he would go on "Sprees" in NY taking out thousands of dollars per week with different credit cards

Video: "How Hackers Changed the World" Anonymous Chaotic actor

Chaotic actor: good or evil; doing damage or helping

Video: BBC "Inside the Dark Web" Who was responsible for the leak of confidential US government material in 2010?

Chelsey Manning revealed info regarding wars in Iraq and Afghanistan

Coleman "Hacker, Hoaxer, Whistleblower, Spy" Anonymous

DDoS campaigns A foundation committed to the maintenance of anonymity and free flow of info Did it for the Lolz A radical political act, social order based on monitoring, iconography of masks and headless suits

Video: Troll Hunters How do trolls defend their actions and how compelling are their explanations?

Defense: - see what reaction they could get - thought it was just a joke - under the influence of alcohol or things - did not know it was illegal - attention addiction

Video: "Enemy of the State?" DDos Attacks

Distributed Denial of Service attacks They flood a site with requests until access is denied and the business is ruined Targets large corporations and banks mostly we don't usually know who is behind attacks or where they come from (although we assume it is from another country)

Video: "How Hackers Changed the World" Anonymous cyberactivists and Egypt -- Arab Spring revolution

Egypt shut down the internet and then cyber-activists would send Encryption and certificates; would tweet for people that couldn't to make sure it was known what was going on

Video: "How Hackers Changed the World" Anonymous What happened to members of Anonymous after the PayPal DDoS attack?

FBI members searched members of Anonymous; they got search warrants and busted down doors and invaded homes

Video: BBC "Inside the Dark Web" David Chaum's fear and what he realized about surveillance

Fear: the threats the networks would pose Patterns of communication on internet was disguised so it is harder to survey Surveillance: who and when we talk is just as important as what we are saying Anonymity is only relative to a group of people

Digitized Lives ch 4: "Is Everybody Equal Online?" Ways to think of digitial culture as genders

Gender imbalances in the ICT workforce Gendering of the design of ICT Forms of gender harassment and discrimination in online environments Representations of gender in online media and digital games The use of cyberspaces and digital devices in pursuit of gender equality

Video: "How Hackers Changed the World" Anonymous what happened with Habbo Hotel in 2000s

Habbo Hotel: a video game for kids, Anonymous created a specific person they all were in the game and created symbols to offend people Anonymous' goal at the time was to offend people; the media treated Anonymous like they were ruining people's lives but they really just wanted to get LOLZ

Digitized Lives ch 4: "Is Everybody Equal Online?" 2 Main technical elements enabling digital culture impacts the access of people with disablities

Hardware that is difficult or impossible to use Software and applications with limited functionality or certain physical and cognitive conditions

Video: "How Hackers Changed the World" Anonymous Brian Mettenbrink

He was arrested by FBI He sent the 2nd most threats to scientology and was given 1 year in prison with supervised release after He said his punishment was lopsided but he would do it again because he stood up for what he believed in and had no intention of hurting anyone

TEDGlobal: "Misha Glenny" Glenny's idea of what to do with hackers

Hire them Use their skills to benefit us Penetration Hacking (when a company hires them to hack their sites to see if they can)

Video: Matt Honan's experience with Hackers

His phone powered down randomly and then it asked him to register his phone and said iCloud password was wrong Google account was deleted and they were tweeting from his account Attacker's reason: they liked his Twitter handle and wanted it, plus they were showing Apple's loop holes Matt did not have a 2nd authentification method set up for Google All a tech support person needs to verify a person at Apple is: Apple ID, last 4 digits of a credit card number, and a billing address

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Caveats of the study

Ideological tagging mechanism doesn't mean what it looks like it It is hard to average something that is constantly changing and different for everyone This only measures the 9% of Facebook users who report their political affiliation It is really hard to separate "individual choice" and the workings of the algorithm In my humble opinion, this is a good science, but because it is by Facebook scientists, it is not reproducible

Digitized Lives ch 4: "Is Everybody Equal Online?" Race

It is skin deep visible skin color, facial features It is a socially constructed category

Video: BBC "Inside the Dark Web" Julia Angwin's discovery and the use of Wifi locations

Julia Angwin discovered surveillance and monitoring of users is always going on, through invisible trackers and selling info *our deepest secrets and profiles are shared through browsing habits and we are not really anonymous Wifi locations are tracked and do a better job than GPS sources

Video: "How Hackers Changed the World" Anonymous LulzSec & Journalists

LulzSec: a group from Anonymous that carried on operations and made trouble; they were attacking in a way that Anonymous was not meant for *Steven Levy is more worried about the next generations hacking approaches and the hacks we don't hear about (like government funded ones) Journalists were getting attacked for things they were saying if it didn't agree with Anonymous' views; Anonymous would shut down their sites and criticize them Hacktivism became nasty and vicious

Video: BBC "Inside the Dark Web" Cryptography's purpose

Makes sure users are secure and their info is safe Keeps internet resilient Changes surveillance's value

Video: BBC "Inside the Dark Web" Metadata & the dystopian scenario

Metadata: info about who is sending data, from where, about what; determining our lives Dystopian Scenario: every part of your life can be analyzed; health, money, etc.; all about power

Video: BBC "Inside the Dark Web" Eugene Kaspersky's view on Anonymity

Online Passports Privacy has disappeared online anyways so we should just be transparent

Digitized Lives ch 4: "Is Everybody Equal Online?" Attitudes toward individuals with disabilities

Pity Heroic Appreciation Invisibility/Avoidance Annoyance/Impatience

Future Crimes "Connected, Dependent, and Vulnerable" Positive aspects and downsides of the technological evolution

Positive: - medical science - per capita income tripled - high-quality education is more accessible - connectivity Downsides: - everything is dependent on computers - we plug more info about our daily lives into the web every day

Video: "How Hackers Changed the World" Anonymous Telecomix

Telecomix tried to keep the internet running; would tweet for people if they couldn't

NY Times Article: "When the Internet Thinks It Knows You" Gatekeepers before the Internet

The people that controlled the flow of info An elite class of editors, producers and media moguls who decided what people would see and hear about the world

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" The Filter Bubbly Theory

The personalized universe of the information that makes it into our feed Facebook newsfeed algorithm in particular will tend to amplify news that your political compadres favor **whatever the popular belief is amongst your friends

Video: "Enemy of the State?" Cyberbalkanization

The web allows users to filter their views based on what they read and it just reinforces their extremist views A bunch of portable homelands coming together The opposite of Berner Lee's vision of openness and libertarianism

NY Times Article: "When Algorithms Discriminate" Algorithms result from

They are a series of instructions written by programmers Result from a reflection of people's attitudes and behaviors Machine learning algorithms evolve based on what people do online It is impossible for a human to oversee every decision an algorithm makes

Digitized Lives ch 4: "Is Everybody Equal Online?" Individuals with disabilities on digital technologies

They tend to be pushed to the margins and made invisible, but they are actually online twice as much than people without disabilities

Video: BBC "Inside the Dark Web" Tor and Paul Syverson

Tor is like an onion; it sends information concealed in multiple layers so when they message gets to its final destination the final layer reveals the message but still hides the user

Video: "Enemy of the State?" PayPal

Tried to re-draw global lines of currency People had more control over their money than they have ever had before This connects anyone and there are no restrictions based on geography Creator: Peter Thiel

Coleman "Hacker, Hoaxer, Whistleblower, Spy" Trolling and Trolls

Trolling: an activity that seeks to ruin the reputations of individuals and reveal embarrassing personal info Trolls: try to upset people by spreading this content and igniting arguments

Video: BBC "Inside the Dark Web" The paradox regarding US government, anonymity, Tor, Iran, and China

Using Tor for anonymity is supported and understood but when people say things publicly they get arrested

Video: "How Hackers Changed the World" Anonymous Values expressed by cyber activists and the questions raised

Values: freedom of expression and free flow of info, citizens should have control Questions: what does privacy actually look like? what is the motive behind all of this and does it matter if it is good or evil? would they do it again?

Future Crimes "Connected, Dependent, and Vulnerable" Types of Malware

Viruses Worms Trojans

"Inside the Dark Web" article GNUnet

a free software, volunteer project to create secure peer-to-peer networking keeps anonymity but unlike Tor, it does not require the underlying architect of the internet function (TCP/IP) Relies on central authorities (ICANN) goal: to build, engineer, deploy a network where the technology reflects what a broad number of people can get behind

Vanity Fair article Obsec

a grand master of the dark art of hacking could break into almost any secure network without setting off any alarms He was kicked out of multiple schools for hacking; could hack into China's databases; got arrested at 18 and then got out and used his power for good as a penetration tester and then a hired gun; then was involved with the Ransomware attack on the Company

Wired Magazine article: "When will the internet be safe for Women?" Gamergate

a host of threats targeted at women specifically

Video: "How Hackers Changed the World" Anonymous Anonymous and Wikileaks (2010)

a new political wing was established in 2010 Wikileaks wanted to liberate the truth; PayPal and Mastercard pulled their donations to wikileaks and Anonymous did a DDos because they were mad about it

Wired Magazine article: "When will the internet be safe for Women?" Cybercrime Enforcement Training Assistance Act

a proposal that would provide federal grant money to local law enforcement for the prevention, enforcement, and prosecution of online crimes against individuals right now law enforcement doesn't have training for online crimes and FBI and Department of Justice said they are not responsible for online harassment

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Random

a random sample would be that liberals see 45% conservative stuff and conservatives would see 40% liberal stuff

The Guardian article: "What happened when I confronted my Troll" Lindy West's description of trolling

a recreational abuse, usually anonymous and intended to waste the subjects time or frighten them into silence it is usually towards women, and women of color, trans, disabilities, fat, sex, etc. Trolls are usually white men in male-dominated communities

"Inside the Dark Web" article Silk Road

a service like eBay on the dark web, offering users to give reputations to each other

"Inside the Dark Web" article Cloudmark

a spam filter on email, social networks, mobile devices, etc. familiar with the ways criminal groups move money online The more nodes you have control over, the more traffic can be traced

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Algorithm

a theory of how part of the would should work, expressed in math or code the more we are able to interrogate how they work and what effects they have, the more we are able to shape our own info destinies

Vanity Fair article A Zero-day exploit

aka a backdoor a piece of software that takes advantage of a vulnerability that is known to a small group of aggressors and generally not to the defenders

John Oliver's Encryption video Clipper chip

allowed the government to access phones if needed like giving a key to a trusted neighbor it did not work

Video: "Enemy of the State?" wikileaks

allows people to anonymously leak info about big companies and government agencies; it is shown dark and secretive when courts tried to shut it down people were just more interested in the case and more exposure came out of it

"Inside the Dark Web" article Tor.

an anonymous network on the dark web no inward facing links, so spiders cannot access can be used to access sites on the surface web but can also be assigned hidden ones Tor. nodes are simple websites and every website can have a vulnerability

Vanity Fair article Root Shell

an illicit admin, hacker could do what he or she pleased -- using a computer to attack another and another and another computer most famous case: Kevin Mitnick

Video: "Enemy of the State?" Austin Heap

developed a secure way for Iranian activists to load sites the government had blocked without the government knowing it was secure and encrypted

Time Magazine Article: "How Trolls are Ruining the Internet" Swatting

calling in an emergency to a victim's house so the SWAT team busts in

Future Crimes "Connected, Dependent, and Vulnerable" Worms

cause damage as stand-alone software and do not require a host to replicate themselves

Video: "How Hackers Changed the World" Anonymous What does history teach us about civil change?

change doesn't come with flowers and rainbows

Video: "Homo Interneticus?" Generation Web

children only know life online their life is centered around computers and being online

Video: "Enemy of the State?" Ai WeiWei

citizen blogger in China who posted names of the school children killed in the earthquake it is inspired thousands of volunteers to go to the schools that were impacted; government did not like this

Video: "Enemy of the State?" Internet Commentators

citizens who wrote about government politics and put policies of the government in favor they get paid 15 cents they are supposed to guide opinions in a specific direction citizens are aware of when it is a commentator who wrote it, aware of the cat/mouse game

Digitized Lives ch 4: "Is Everybody Equal Online?" Socialization/Identity factors (subject position factors)

class gender race sexual identity age language education level religion geographic location

NY Times Article: "When the Internet Thinks It Knows You" New Gatekeepers

code

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" What happens with a color laser printer

color laser printers print with yellow dots in a pattern which is unique to you and your printer; a way of tracking or tracing back a page to you

Video: "Homo Interneticus?" Most inventions now

come from collaboration and connections **idea of the public sphere Most inventions are found in urban areas were there are a lot of different kinds of people; just like the web

Video: BBC "Inside the Dark Web" Who analyzes the information

computers and algorithms machines can look at everything as a big picture and find trends that humans can't

Article: Pew Research Center "The future of well-being in tech" Benefits of digital life (more helped than harmed)

connection commerce, government, and society crucial intelligence contentment continuation toward quality

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Hard News

content about politics and the economy only 7% of content people click on is hard news

Future Crimes "Connected, Dependent, and Vulnerable" Brain Virus

created in 1986 and intended to make sure pirating of the software was not done ironic: they included a warning on their floppy disk of the virus and gave their address and phone number

Video: "Enemy of the State?" "ultimate example" of unintended consequences

how Twitter threatened a regime Twitter was used to form protests in Iran and to let the world know what was happening in Iran **new communication structures did not cause the uprising in Iran, but it gave them the tools

Video: "Homo Interneticus?" Hedgehog v. Fox

how we think -- associatively v. linearly Hedgehog: passive and stays on one page, very linear Fox: jumps around clicking on new links and doesn't sit still, very associative (more generation web)

Future Crimes "Connected, Dependent, and Vulnerable" Viruses

insert a copy of themselves into another program

Digitized Lives ch 4: "Is Everybody Equal Online?" the web

is being used to promote and deepen inequalities

Video: "Enemy of the State?" How is Web "shaking up world politics"

it can be captured by eye witnesses in real time & be replayed, it is unmediated

Vanity Fair article Deep web

it cannot be access through ordinary search engines

Video: BBC "Inside the Dark Web" Tor does what for its users? and who uses it around the world?

it gives each person the ability to read and speak freely without getting data used against them later Around the world people in the Middle East, China, Iran, and anywhere the internet is limited or controlled uses it; people in the western world use it to whistleblow

Digitized Lives ch 4: "Is Everybody Equal Online?" Social invisibility

it is NOT the solution

Video: "Enemy of the State?" "Portable Homeland"

it is a dispersed community where beliefs are reinforced; different worlds linking the same goal as if they live in the same place this is the flip-side of Thiel's vision; it narrows identity and community; turns community against the world

John Oliver's Encryption video Encryption

it is crucial to our lives today as passwords are used for everything

Video: BBC "Inside the Dark Web" Problems with using encryption & how the market can help

it is difficult to encrypt content in a user-friendly way Market will help: It will allow people to express their wants and needs for privacy Numbers can work in their favor Limits of privacy can be set within the market

Video: "Homo Interneticus?" Korea

it is most wired place digitally enhanced 10x quicker download speed Young kids are getting addicted because they start at a young age with the internet shows us what US will look like

Video: "How Hackers Changed the World" Anonymous How does Stanley Cohen compare Anonymous' online activities to real world civil rights protests?

it is no different than standing on a street corner chanting or doing a sit in at a school they both want the same goal and outcome, they are just different vehicles

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Hypponen's argument with privacy

it is not a question of privacy and security it IS a question of freedom and control

Coleman "Hacker, Hoaxer, Whistleblower, Spy" Surveillance

it is really a highly effective form of social control Knowledge of always being watched changes our behavior The inability to associate secretly means there is no longer any possibility for free association

Video: "Homo Interneticus?" Clay Shirky and Stephen Fry react to the centrality of Facebook

it is third largest population in the world feels like they would have done the same thing if technology was around for them at that age, but also think there is something dangerous and unnecessary about it

"Inside the Dark Web" article If the web went dark

it would be free from state-sponsored censorship it would be secure by design the passive gathering of person data for profit would vanish

Video: BBC "Inside the Dark Web" Dread Pirate Roberts

leader of Silk Road FBI found him after going undercover on the Silk Road site, and took him and the site down But only temporarily because Silk Road is back up and running

Vanity Fair article Sleeper call

lying in wait as an asset to be used as a last resort (like a nuclear weapon)

Video: "Homo Interneticus?" Obama campaign

more involvement in politics with new media social media was used more to communicate beliefs, create and promote content supporters could do it their way

Digitized Lives ch 4: "Is Everybody Equal Online?" Ways to overcome cultural biases

most effective: to bring greater gender, class, and race diversity to the design or digital devices and processes 2nd most effective: to extend the cultural competencies of those from the default subject position through various kinds of training

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Soft news

news about social things like the Kardashians

Future Crimes "Connected, Dependent, and Vulnerable" Trojans

often look like legitimate pieces of software and are activated when a user is tricked into loading and executing the files on a targeted system create "back doors" for hackers to stay present in other softwares and deceive users to open or click on certain applications Ex: Germany used these on their citizen criminals

Video: "Enemy of the State?" Twitter's driving principle

openness & the free flow of info

Digitized Lives ch 4: "Is Everybody Equal Online?" Disabilities are an issue of social and political matters, not technical

our culture defines "normal" Disability is not a fact, it is the attitude our culture set up "people with disabilities" v. "disabled people"

Vanity Fair article Penetration tester

performs security audits and hacking into corporation's networks to explore weaknesses; they send recommendations on how to fix back doors

Video: "How Hackers Changed the World" Anonymous What happened in February 2008

protests world wide against Scientology 10,000+ people Significance: Anonymous found their culture and their group; there was a real chance to meet people like them as well as end Anonymity amongst one another

Article: Pew Research Center "The future of well-being in tech" Invention ideas to ease problems (potential remedies)

re-image systems reinvent tech regulate redesign media literacy recalibrate expectations fated to fail

Digitized Lives ch 4: "Is Everybody Equal Online?" Default Subject position or Default Identity

refers to the process by which straight, white, middle-class, Euro-American male culture assumptions and values were built into the hardware and software unintentionally Usually these settings remain invisible and don't get changed because they have to be intentionally changed ex: wikipedia under-represents women; more than half of the web is available in English

Video: "Homo Interneticus?" Andrew Keen's response to distractions

says students are unwilling to think; we can no long concentrate

Wired Magazine article: "When will the internet be safe for Women?" Clark's Swatting Hoax Act of 2015

she introduced this bill to prohibit the false reporting of emergency situations then someone swatted her

Video: "Homo Interneticus?" Dunbar Number

shows that we can only have a certain number of friendship at a time Facebook actually proves this Dunbar number to be too high because we only interact with a small number of our friends

NY Times Article: "When Algorithms Discriminate" Algorithms are NOT objective

software is not free of human influence Algorithms are written and maintained by people and machines learning algorithms adjust what they do based on people's behavior It is possible that algorithms reinforce human prejudices

Future Crimes "Connected, Dependent, and Vulnerable" zero-day attacks

takes advantage of previously unknown vulnerabilities in a computer application that developers and staff have not had time to address; if they are looking for something specific they will not question something that does not look like that item Ex: bonnie & clyde robbing a bank

Video: BBC "Inside the Dark Web" GCHQ Bude

tapping wires and analyzing everything that comes across them Weak spot of the cable is every 50 miles where the signal gets weak and is repeated GCHQ is not transparent or held accountable for their actions which is worry some because we don't know their intentions Wire tapping was found out by a whistle-blower

NY Times Article: "When the Internet Thinks It Knows You" Blogging

technology undermining the gatekeepers

John Oliver's Encryption video Encryption: Apple and the government

the FBI cannot access the a terrorists phone so they want apple to create a code that is like a "master key" the problem: a code for one will open all and nobody wants that; what stops them from asking them to do it for another and another and another

"Inside the Dark Web" article Bitcoins

the currency of the dark web it is a peer-to-peer digital currency that uses cryptographic exchanges to verify transactions (no governments or banks)

Digitized Lives ch 4: "Is Everybody Equal Online?" E-Racialization

the digitization of race ex: avatars, characters in a game, racial discourse among users of the web, defined portals, exaggeration of physical features, cyber-ghettos on social emdia

Video: "Enemy of the State?" consequences of decentralization and oppenness

the internet and web is resilient to being turned down quickly

Coleman "Hacker, Hoaxer, Whistleblower, Spy" Doxxing

the leaking of private information; a grey area because some of this could be found on publicly accessible websites anyways ex: SS #, banking #

Time Magazine Article: "How Trolls are Ruining the Internet" Trolls

the monsters who hide in darkness and threaten people internet trolls do it for the laughs (lulz) the enjoy illuminating guilibity they feed on attention

Video: BBC "Inside the Dark Web" Connection between data and control

the more data out there means you are being controlled more and are less free data is all about control if people feel like or know they are being watched, they will act differently or not say certain things

Video: "Homo Interneticus?" Network Effect

the more people connected means the more value their is to everyone on it it is self-sustaining aka more nodes=more value

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Exposed

the percentage that they actually saw (includes the algorithm)

Backchannel Article: "Did Facebook's Big New Study Kill My Filter Bubble Thesis?" Selected

the percentage they actually clicked on

Digitized Lives ch 4: "Is Everybody Equal Online?" Racialization

the process of creating racial categories New media has the ability to change racism, but it tends to reinforce the stereotypes

"Inside the Dark Web" article The good of the Dark Web

the weight of human rights has been lifted and there is a right to freedom of opinion and expression as well as the right to seek and receive info Tor is supporting the basic human right It is a security researchers job to clean the dark web up

Future Crimes "Connected, Dependent, and Vulnerable" Hacking then v. now

then: for laughs and to show that they can hack now: for money, information, and power

Video: BBC "Inside the Dark Web" Crocker's discovery about internet

there were vulnerability to generic domains and their names at the heart of the upgrade is complex cryptography

Future Crimes "Connected, Dependent, and Vulnerable" Physical Borders

they are less clear in an online world; there are not really any borders country hopping: it is a strength of the internet that we can be anywhere, but also a way for people with ill intentions to take advantage of

Video: "How Hackers Changed the World" Anonymous what happened with Anonymous in 2006-2007

they became more organized and not just posting things anymore Hal Turner (a Neo-Nazi radio host): Anonymous would call into his radio station to harass him, but he wouldn't back down. He would give it right back to them. Anonymous would send him things he had to pay for and therefore they destroyed his ability to pay for his radio station, so he was out of the media and the public

Video: "Enemy of the State?" Chinese government, the web, and the Great Firewall

they cannot turn off the web because businesses and universities live off their ability to connect with the western countries "Great Firewall": to censor the web; block western sites that are critical of their politics biggest challenge is the inward citizens that are talking (Earthquake came from citizen sources)

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Hactivists

they do it for their own pleasure and political reasons Protests and civil action

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" Online Criminals

they do it to make money, and they make millions usually do it from the back end, illegally

Video: "Homo Interneticus?" Benefits of the web

they want more info to understand connections of everyone from every where real time global brain, aka collaboration gives us all a voice and levels society

Video: Troll Hunters What motivates trolls and what types of threats do they make?

they want to create chaos (usually racist, sexist, and trying to provoke a response) threats include: rape, racist threats, and death threats

Video: "How Hackers Changed the World" Anonymous how Anonymous members recognized each other

through symbols and phrases that only Anonymous members would know

Video: BBC "Inside the Dark Web" The Internet of Things

to make IOT useful, the inhabitants of homes and users intimate details have to be revealed ex: when people are home, when they start or end their day, etc. Movement of the home is now documented and stored

Video: "How Hackers Changed the World" Anonymous The point of trolling

to make people angry and for humor; to teach people that take the internet too seriously a lesson

Video: "Enemy of the State?" Web's tools & Community

tools: routes around censorship and connections for solidarity; a group to come together Community: allows people to be in a community that are not geographically closed and can decide at any time to be a part of it

Video: "Homo Interneticus?" Downsides of the web

tracking spin our ideas government can spy and manipulate our desire to profit overrides our imagination mirrors society in both good and evil

Video: Troll Hunters Model's troll

unashamed impossible to track down

Video: "Enemy of the State?" Redundancy

uninterruptible data supplies; they all link to different servers so they cannot take down the internet

Video: BBC "Inside the Dark Web" Tor and Wikileaks

used for whistleblowing and submitting anonymously to Wikileaks from Tor

"Inside the Dark Web" article Spiders

used in the surface web (Google) automated programs that follow all links on a webpage, building a complete picture of the surface web

Video: Troll Hunters Advice given to victims of trolling

usually things like "toughen up" "if you can't handle it, get off" "its just words" you never know who is behind the screen and how serious they are there are real consequences young, emotional people are vulnerable and at risk of suicide

Video: BBC "Inside the Dark Web" Bitcoin

virtual money; does not use any banks or institutions; anonymously moving money; every computer is monitoring so manipulated transactions cannot carry through controversy: it is hard to trace where it comes from, like cash

TEDxBrussels: "Mikko Hypponen: Three types of online attacks" The majority of crimes

we are more likely to encounter a crime online than in we are in the "real world"

Video: "Homo Interneticus?" information loop

we can constantly replace and predict future based on information; we are always getting info Facebook used Newsfeed for the info loop

Video: "Homo Interneticus?" Marshall McLuhan and judging new media

we judge new media based on old media we judge the content rather than the network, production, and meaning The role of the user in viral culture is to be engaged and power the story

Video: BBC "Inside the Dark Web" Tim Berners-Lee's comments on privacy, transparency, and technology

we need to have technology that respects privacy and transparency

"Inside the Dark Web" article laws

we need to write laws to reflect our ethics - codes are now laws

"Inside the Dark Web" article Hidden Service

websites that can only be accessed from within Tor sometimes used to provide illegal merchandise and services because locations are difficult to ascertain Nobody knows who operates these sites

Video: "Enemy of the State?" Internet protocols and censorship

when a site is blocked, hardware tries to find another way around it and get to the site


Set pelajaran terkait

Chapter 9: Production and Operations Management

View Set

Parathyroid hormone and Vitamin D

View Set

Encountering the Old Testament, Chapter 1

View Set

Chapter 22 Vet Diagnostic Imaging: Dental Radiography

View Set

Public Health - Quiz and Kahoot for Exam 2

View Set