Privacy is a Myth
EM 835 Information Accountability and Web Privacy Strategies

    M. Frye
    H. Hess, Media Rain
    S. Kamberi, Penny Galaxy
    J. Murray, Murtek Viper
    K. Ostler, Addisonbow
    I. Spencer, Zkittykitty
    C. Steele, Xavia Fluta
    B. Truman, D’Lightful Doowangle

    …and the 23 students in EM 835


 Dr. Cynthia Calongne, Colorado Technical University   April 18, 2012
 2012 TCC Worldwide Online Conference
Museum of Web Privacy
Student Museum on Web Privacy
Introduction
• What kind of e-mail and web activity
  monitoring for students in middle school
  and high school is acceptable?
Student Privacy & the Classroom
Content Filter & Key Logger
Smart Desk
Barbara -
   D’Lightful                                                   Karl -
   Doowangle                                                    Addisonbow




                              Project Partners


   The Project – Copyright Learning Module
Idea: Learning Module – Engineering Design & Copyright/Patent Relationships

Develop a Learning Design Studio of an online module about Engineering Design
Ideas/Contractual Work and the relationship with the Patent/Copyright process.
Goal: Outline, identify, and highlight up to date issues regarding intellectual property and
copyright/patents. In addition, host this as an online learning module in a
Virtual World Environment like Second Life.
Ideal: Develop a Holodeck or similar tool in Second Life to package a learning module to
pose situations to visitors and then provide information leading to a solution with focus
on Patent/Copyright Laws.

                                                   Design/Build –
     Research –                                    •SL Platform to support
     •Copyright Law                                •Content Presentations
     •Needs Assessment                             •Activities
     •Learning Requirements



                                                                       Analyze –
                                                                       •Observations
                                                                       •Feedback
                                                                       •Survey - Results


         The Design Process - Learning Module
Content:
                                •Information Content
                                •Sources
                                •Creative Content
                                •Learning /Problems
                                •Solutions




  Context:
  •Synchronous Activities
  •Asynchronous Activities
  •Combinations – Linear / Non-linear



The Project – Copyright Learning Module
Visit us live in           See the tour
 Second Life                slideshow




Copyright Learning Module = RESULTS
Ideas &
Discoveries                Futuring:
                           •Additional Copyright Solutions
                           •Additional Fields of Application
                           • Similar Modules for different topics

                                     Design Solutions

Innovations:
•Virtual Worlds
•Emerging Media
•Artificial Intelligence




Copyright Learning Module = ROOM FOR MORE
How is My Identity Currently Defined?
•   Drivers License                              •   Birth Certificate
     – License Number                                 – Parents Information
     – Name                                           – Birth Date
     – Address (Street, City, State, Zip Code)        – Birth Location
     – Hair Color                                     – Hand and Feet Prints
     – Eye Color                                      – Picture
     – Height                                         – Blood Sample
     – Weight                                    •   College ID
     – Organ Donor                                    – Name of College
•   Social Security Card                              – Name
     – Work Eligibility Number                        – Year
•   Passports (E-Passport)                       •   Genealogy
     – Paper Trail with RFID Tag                      – Heritage
•   Credit Cards                                 •   Medical EMR
     – Card Number                               •   Gender
     – Name                                           – Male
     – Security Feature Number (3 digit)              – Female
•   User Name / Password / Pass Phrase                – Transgender
Mobile Tracking Location-Based
Services Continue to Grow




  Foursquare alone has over 5,000,000 registered users
  Google latitude allows users to do micro-coordination
So why do we share?

      use location
    abstractions to
    scaffold privacy
       concerns
                       share precise location (GPS)
                                    &
  share nothing
                           max social benefits
        &
no social benefits
The Best Facial Emotion Extraction
     Method for Second life
   How having better avatar facial features and expressions in
      Second life can provide a more real-life like form of
                        communication
Three Methods




Facial Emotion Extraction through Text (SL)   Facial Emotion Extraction using Kinect
                                                           (Microsoft)




                                              Facial Emotion Extraction using Webcam
                                                              (nVisio)
Results
Method                     Implementation                 Feasibility                       Integration
Extracting emotion            Already implemented in          Uses text chat which              Users can integrate it by
through user text             SL through Second Life          means total immersion of          buying Automatic Facial
                              Marketplace                     communication in the              Animation HUDs
                                                              virtual world to mimic real       Not all users, especially
                                                              face-to-face                      new users, are willing to
                                                              communication is not              pay for the HUDs.
                                                              feasible

Extracting emotion using      SL can be accessed              No real indication that           Users need to buy Xbox
motion capture                through the Xbox 360            Linden Labs is up for sale.       360 and Kinect in order
                              console via Xbox LIVE           Not feasible to believe           to integrate this
technology via Xbox and
                              through Wi-FI                   users are willing to buy          technology.
Kinect                        connection                      expensive hardware just to
                              Implies Microsoft buying        use SL
                              Linden Labs

Extracting emotion using      Linden Labs hiring              Most users own laptops            Users do not need to do
nVisio’s technology via       nVisio                          Most laptops have                 anything except for using
                                                              webcams                           their webcams in SL
webcams (Best Method)
                              Finding a method to use         nVisio is a start-up              Can be integrated free via
                              the extracted data from         company willing to work           the free Second Life
                              nVisio’s technology to          with others                       Viewer
                              apply to 3D avatar facial
                              features.
‘
Cyberstalking : Worse Than
   Personal Harassment
Cyberstalking takes many forms. Among them:

                      • Installing spyware on a target's
                        computer or via email
                      • GPS surveillance of the movement
                        of victims
                      • Posting personal or false and
                        humiliating information about the
                        victim on the Internet
                      • Sending harassing emails & msgs
                      • Using social media such as
                        Facebook or Twitter to post false
                        and humiliating information
Cyberstalking
It’s not a Game
  Cyberstalking and cybercrimes are
  on the rise as more and more
  private information becomes
  easily accessible on the internet.
  Advances in technology have
  allowed stalking to go online, with
  perpetrators accessing personal
  information.
Bluesnarfing Prevention

•   Education and awareness are key.

•   Set Bluetooth to non-discovery mode.

•   MAC address filtering.

•   Encryption.

•   User-set passwords.

•   Download latest software version.

•   Be wary of strangers.
Individual Therapy Session Privacy
Providing Privacy for Online Consultations
Notecard

 Project Topic: An Investigation Of Privacy Within Virtual World Therapy
                                 Sessions

Online therapy is a type of psychological treatment where patients and mental
health professionals communicate and address mental issues. This type of
therapy has been utilized for conditions such as post traumatic stress disorder,
depression, eating disorders, and chronic pain. It is particularly useful to patients
who want to be treated and want to remain anonymous or cannot attend in office
consultations and visits.

The project is a virtual world simulation that evaluates two types of online
therapy sessions: group therapy and individual therapy. Participants within the
therapy sessions interact via avatars. The goal of the simulation is to identify
and contrast participant web privacy and information accountability issues
during these sessions.
Group Therapy Session Privacy
Content Removal
       Countries with the Highest Concern
                    Google Complaints
1400



1200



1000



800



600
                                        Google Complaints

400



200



  0
Countries with Less Concern
   •   Belarus
   •   Bolivia
   •   Chile
   •   Costa Rica
   •   Czech Republic
   •   Ecuador
   •   Egypt
   •   Guatemala
   •   Honduras
   •   Hungary
   •   Kuwait
                        No Complaints Filed with Google
   •   Paraguay
   •   Philippines
   •   Romania
   •   Saudi Arabia
   •   South Africa
   •   Ukraine
   •   Uruguay
   •   Venezuela
Privacy by Internet Penetration
• Countries with the most privacy concern
  averaged 72% Internet Penetration

• Countries with the least privacy concern
  averaged 38% Internet Penetration
Cloud Computing & Security
• Security is a major concern of companies
  who want to move to the cloud
• Cloud providers obtain certifications
  through auditing to verify they are secure
• Example Certifications
  – PCI
  – CMMI
  – NIST 800-53
For More Information
• Cyberstalking Comic
  http://nclc350group4.pbworks.com/w/page/7391773/Week%208%20Wiki%20Assignment



• Cyberbullies to be targeted by schools
  http://paulhurst.wordpress.com/2007/09/21/cyberbullies-to-be-targeted-by-schools/
Privacy is a Myth
EM 835 Information Accountability and Web Privacy Strategies
 Join us for a Treasure Hunt & tour of these simulations on Thursday,
      April 19, 2012 at 1600 HST, 2000 Mountain in Second Life!

      Many thanks to the        M. Frye
     23 students in EM 835      H. Hess, Media Rain
                                S. Kamberi, Penny Galaxy
                                J. Murray, Murtek Viper
                                K. Ostler, Addisonbow
                                I. Spencer, Zkittykitty
                                C. Steele, Xavia Fluta
                                B. Truman, D’Lightful Doowangle


Dr. Cynthia Calongne, Colorado Technical University    April 18, 2012
2012 TCC Worldwide Online Conference

Privacy is a Myth TCC 2_12065

  • 1.
    Privacy is aMyth EM 835 Information Accountability and Web Privacy Strategies M. Frye H. Hess, Media Rain S. Kamberi, Penny Galaxy J. Murray, Murtek Viper K. Ostler, Addisonbow I. Spencer, Zkittykitty C. Steele, Xavia Fluta B. Truman, D’Lightful Doowangle …and the 23 students in EM 835 Dr. Cynthia Calongne, Colorado Technical University April 18, 2012 2012 TCC Worldwide Online Conference
  • 2.
  • 3.
    Student Museum onWeb Privacy
  • 4.
    Introduction • What kindof e-mail and web activity monitoring for students in middle school and high school is acceptable?
  • 5.
    Student Privacy &the Classroom
  • 6.
    Content Filter &Key Logger
  • 7.
  • 8.
    Barbara - D’Lightful Karl - Doowangle Addisonbow Project Partners The Project – Copyright Learning Module Idea: Learning Module – Engineering Design & Copyright/Patent Relationships Develop a Learning Design Studio of an online module about Engineering Design Ideas/Contractual Work and the relationship with the Patent/Copyright process.
  • 9.
    Goal: Outline, identify,and highlight up to date issues regarding intellectual property and copyright/patents. In addition, host this as an online learning module in a Virtual World Environment like Second Life. Ideal: Develop a Holodeck or similar tool in Second Life to package a learning module to pose situations to visitors and then provide information leading to a solution with focus on Patent/Copyright Laws. Design/Build – Research – •SL Platform to support •Copyright Law •Content Presentations •Needs Assessment •Activities •Learning Requirements Analyze – •Observations •Feedback •Survey - Results The Design Process - Learning Module
  • 10.
    Content: •Information Content •Sources •Creative Content •Learning /Problems •Solutions Context: •Synchronous Activities •Asynchronous Activities •Combinations – Linear / Non-linear The Project – Copyright Learning Module
  • 11.
    Visit us livein See the tour Second Life slideshow Copyright Learning Module = RESULTS
  • 12.
    Ideas & Discoveries Futuring: •Additional Copyright Solutions •Additional Fields of Application • Similar Modules for different topics Design Solutions Innovations: •Virtual Worlds •Emerging Media •Artificial Intelligence Copyright Learning Module = ROOM FOR MORE
  • 13.
    How is MyIdentity Currently Defined? • Drivers License • Birth Certificate – License Number – Parents Information – Name – Birth Date – Address (Street, City, State, Zip Code) – Birth Location – Hair Color – Hand and Feet Prints – Eye Color – Picture – Height – Blood Sample – Weight • College ID – Organ Donor – Name of College • Social Security Card – Name – Work Eligibility Number – Year • Passports (E-Passport) • Genealogy – Paper Trail with RFID Tag – Heritage • Credit Cards • Medical EMR – Card Number • Gender – Name – Male – Security Feature Number (3 digit) – Female • User Name / Password / Pass Phrase – Transgender
  • 14.
    Mobile Tracking Location-Based ServicesContinue to Grow Foursquare alone has over 5,000,000 registered users Google latitude allows users to do micro-coordination
  • 15.
    So why dowe share? use location abstractions to scaffold privacy concerns share precise location (GPS) & share nothing max social benefits & no social benefits
  • 16.
    The Best FacialEmotion Extraction Method for Second life How having better avatar facial features and expressions in Second life can provide a more real-life like form of communication
  • 17.
    Three Methods Facial EmotionExtraction through Text (SL) Facial Emotion Extraction using Kinect (Microsoft) Facial Emotion Extraction using Webcam (nVisio)
  • 18.
    Results Method Implementation Feasibility Integration Extracting emotion Already implemented in Uses text chat which Users can integrate it by through user text SL through Second Life means total immersion of buying Automatic Facial Marketplace communication in the Animation HUDs virtual world to mimic real Not all users, especially face-to-face new users, are willing to communication is not pay for the HUDs. feasible Extracting emotion using SL can be accessed No real indication that Users need to buy Xbox motion capture through the Xbox 360 Linden Labs is up for sale. 360 and Kinect in order console via Xbox LIVE Not feasible to believe to integrate this technology via Xbox and through Wi-FI users are willing to buy technology. Kinect connection expensive hardware just to Implies Microsoft buying use SL Linden Labs Extracting emotion using Linden Labs hiring Most users own laptops Users do not need to do nVisio’s technology via nVisio Most laptops have anything except for using webcams their webcams in SL webcams (Best Method) Finding a method to use nVisio is a start-up Can be integrated free via the extracted data from company willing to work the free Second Life nVisio’s technology to with others Viewer apply to 3D avatar facial features.
  • 19.
    ‘ Cyberstalking : WorseThan Personal Harassment
  • 20.
    Cyberstalking takes manyforms. Among them: • Installing spyware on a target's computer or via email • GPS surveillance of the movement of victims • Posting personal or false and humiliating information about the victim on the Internet • Sending harassing emails & msgs • Using social media such as Facebook or Twitter to post false and humiliating information
  • 21.
    Cyberstalking It’s not aGame Cyberstalking and cybercrimes are on the rise as more and more private information becomes easily accessible on the internet. Advances in technology have allowed stalking to go online, with perpetrators accessing personal information.
  • 22.
    Bluesnarfing Prevention • Education and awareness are key. • Set Bluetooth to non-discovery mode. • MAC address filtering. • Encryption. • User-set passwords. • Download latest software version. • Be wary of strangers.
  • 23.
    Individual Therapy SessionPrivacy Providing Privacy for Online Consultations
  • 24.
    Notecard Project Topic:An Investigation Of Privacy Within Virtual World Therapy Sessions Online therapy is a type of psychological treatment where patients and mental health professionals communicate and address mental issues. This type of therapy has been utilized for conditions such as post traumatic stress disorder, depression, eating disorders, and chronic pain. It is particularly useful to patients who want to be treated and want to remain anonymous or cannot attend in office consultations and visits. The project is a virtual world simulation that evaluates two types of online therapy sessions: group therapy and individual therapy. Participants within the therapy sessions interact via avatars. The goal of the simulation is to identify and contrast participant web privacy and information accountability issues during these sessions.
  • 25.
  • 26.
    Content Removal Countries with the Highest Concern Google Complaints 1400 1200 1000 800 600 Google Complaints 400 200 0
  • 27.
    Countries with LessConcern • Belarus • Bolivia • Chile • Costa Rica • Czech Republic • Ecuador • Egypt • Guatemala • Honduras • Hungary • Kuwait No Complaints Filed with Google • Paraguay • Philippines • Romania • Saudi Arabia • South Africa • Ukraine • Uruguay • Venezuela
  • 28.
    Privacy by InternetPenetration • Countries with the most privacy concern averaged 72% Internet Penetration • Countries with the least privacy concern averaged 38% Internet Penetration
  • 29.
    Cloud Computing &Security • Security is a major concern of companies who want to move to the cloud • Cloud providers obtain certifications through auditing to verify they are secure • Example Certifications – PCI – CMMI – NIST 800-53
  • 30.
    For More Information •Cyberstalking Comic http://nclc350group4.pbworks.com/w/page/7391773/Week%208%20Wiki%20Assignment • Cyberbullies to be targeted by schools http://paulhurst.wordpress.com/2007/09/21/cyberbullies-to-be-targeted-by-schools/
  • 31.
    Privacy is aMyth EM 835 Information Accountability and Web Privacy Strategies Join us for a Treasure Hunt & tour of these simulations on Thursday, April 19, 2012 at 1600 HST, 2000 Mountain in Second Life! Many thanks to the M. Frye 23 students in EM 835 H. Hess, Media Rain S. Kamberi, Penny Galaxy J. Murray, Murtek Viper K. Ostler, Addisonbow I. Spencer, Zkittykitty C. Steele, Xavia Fluta B. Truman, D’Lightful Doowangle Dr. Cynthia Calongne, Colorado Technical University April 18, 2012 2012 TCC Worldwide Online Conference

Editor's Notes

  • #14 Throughout history, humans have endeavored to establish a form of individual identity. Of notable concern is our paper trail identification system we currently use today. Driver’s licenses, social security cards, passports, credit cards, username / password / pass phrase authentication, and even our birth certificate are all paper trail identity representations of us; the problem with a paper trail system is it can be seemingly absent or pilfered, knowingly or unknowingly replicated, and used fictitiously and of course, since it is our information, we are held accountable for its use, even if it is used without our knowledge. In the world of wired, wireless and open air communication technology, to prove oneself is derived from a username and password combination which at best provides minimal security and accessibility. If our society operated on a honesty trusted policy, and everyone involved played in congruence, security would be a moot point; however, given that there are a certain aspect of population that derives benefit from the bane of others, security measures have taken shape in an attempt to thwart unwanted infiltrators such as the Person in the Middle (PitM) [9] attacker / observer or some backdoor malware that records your information while you type. While the PitM attacker is not preventable at this venture of society, perhaps it will become moot with the addition of the digital me project and the e-Passport.
  • #15 “Foursquare is a mobile application that makes cities easier to use and more interesting to explore. It is a friend-finder, a social city guide and a game that challenges users to experience new things, and rewards them for doing so. Foursquare lets users ”check in“ to a place when they‘re there, tell friends where they are and track the history of where they’ve been and who they‘ve been there with.”