In our always-on culture we are constantly tethered to our digital devices and we leave behind a digital trail each time we are online.
Whether it is what we are looking at online, which bridges we drive over, where we are when we make a phone call, our purchasing habits, or what our profile answers are on dating sites, all of this personally identifying information can be used, sold, and shared online to create an extremely detailed representation of our lives.
Is convenience a big enough trade off for our privacy? How can we understand how our data is collected and used - and how can we have some semblance of control with how our information is used?
In this session, Leigh-Chantelle offers solutions to help attendees understand how our digital trails are created and some of the things we can do to alleviate the harm, including how we can pause, consider, and decide to make lifelong healthy digital habits.
Watch the video on YouTube: https://youtu.be/T48TTfgS0jw
See more events for #DataScienceWeek 2021: https://datascienceweek.org/968-2/
Finding balance with technology in our always-on culture with Leigh-ChantelleLeigh-Chantelle
Slides from Leigh-Chantelle on digital balance, created for and presented on 16 February to Golden Key Academy members.
In this session, Leigh-Chantelle explained concepts around cyberpsychology, digital wellness, and (her term) digital equilibrium. She gave tips and tricks to help with understanding technology consumption, balancing technology needs, and empowering others towards practices for conscious and mindful lifelong healthy habits and digital boundaries to thrive online in our always-on digital culture.
Watch the video: https://youtu.be/HV1coparS6I
Introduction to Cyberpsychology, Digital Wellness, and Digital Equilibrium by...Leigh-Chantelle
Leigh-Chantelle introduced cyberpsychology, digital wellness, and (her term) digital equilibrium, plus offered tips and tricks to thriving online in our always-on digital culture to the Rotary Club of Brisbane on Monday 15 February 2021.
Here is the video: https://youtu.be/hwms4Csbs0s
This was the second part of her presentation, the first is An Overview of Being Vegan in 2021
Top Tips for Tech Balance & Digital Wellness with Leigh-Chantelle for Humane ...Leigh-Chantelle
Leigh-Chantelle's presentation on tips to help with technology balance was presented on 17 November 2021 to Humane Technology Australia.
In this session, Leigh-Chantelle gave tips and tricks to help with understanding technology consumption, balancing technology needs, and practices for conscious and mindful lifelong healthy habits and digital boundaries to thrive online in our always-on digital culture.
The tips are available in poster form: https://digital-equilibrium.com/resources
Video on Youtube: https://www.youtube.com/watch?v=LNlTRPnFDYk
NEW website: https://digital-equilibrium.com
See more on Humane Technology Australia: https://humanetechnology.com.au
Promoting veganism online workshop at Vegan Summer Fest BrightonLeigh-Chantelle
Leigh-Chantelle from Viva la Vegan! gives her Promoting Veganism Online workshop at Vegan Summer Fest Brighton.
Sunday 4 June
Brighton, England, UK
Being vegan is not enough, we need to be using our skills to promote the positive and inclusive elements of the vegan lifestyle when we can. Leigh-Chantelle shares her expertise on how to effectively use our time and energy to promote the core ethics of veganism online, and inspire others to become more effective activists in every possible arena. Learn more about working together, dealing with trolls, online etiquette and leading by example from a 20-year vegan veteran. Find out more about how you can help promote and market yourself, your product, your brand or your vision for a better world using Social Media and other means online.
Bank of America Digital Wellbeing Presentation Salema Veliu
Exploring some of the new challenges emerging with transformative technology including:
- Understanding Human psychosocial and technology needs and preferences (PsychoTechnology).
• New Mental Health Digital disorders including but not limited to Techno Stress.
• Techno Values and Identities.
Why we need to:
- Reshape and rethink our conditioning with technology.
Protect mental health, human interaction and values.
• The importance of finding balance between the artificial and natural worlds.
• Show a keener interest in Digital Human rights and Technology with AI governance and regulation.
A presentation from Natalie Bidnick on popular sites and apps used by teens today. All information copyrighted by Natalie Bidnick and may not be reused without written permission. Questions? Email nataliebidnick@gmail.com
TECHNOLOGY ,SOCIAL MEDIA AND TODAY'S YOUTHsunanditaAnand
THIS PRESENTATION CONTAINS BRIEF INFORMATION ABOUT TECHNOLOGY,SOCIAL MEDIA AND YOUTH, EVOLUTION AND USE OF TECHNOLOGY,POSITIVE AND NEGATIVE EFFECTS OF SOCIAL MEDIA ON TODAY'S YOUTH,AND WAYS TO DEAL WITH -VE EFFECTS OF SOCIAL MEDIA .
My final project I wanted to mix a bunch of our current technologies into a new way using the theories we have discussed during the semester. I didn’t want to make the new technologies too high tech, because we need to think 10 years isn’t that long. How far have we come in 10 years? So I stuck to technologies that we have today, but added realistic traits to each. After I created these new technologies I added the theories in and how they relate to each advancement.
Finding balance with technology in our always-on culture with Leigh-ChantelleLeigh-Chantelle
Slides from Leigh-Chantelle on digital balance, created for and presented on 16 February to Golden Key Academy members.
In this session, Leigh-Chantelle explained concepts around cyberpsychology, digital wellness, and (her term) digital equilibrium. She gave tips and tricks to help with understanding technology consumption, balancing technology needs, and empowering others towards practices for conscious and mindful lifelong healthy habits and digital boundaries to thrive online in our always-on digital culture.
Watch the video: https://youtu.be/HV1coparS6I
Introduction to Cyberpsychology, Digital Wellness, and Digital Equilibrium by...Leigh-Chantelle
Leigh-Chantelle introduced cyberpsychology, digital wellness, and (her term) digital equilibrium, plus offered tips and tricks to thriving online in our always-on digital culture to the Rotary Club of Brisbane on Monday 15 February 2021.
Here is the video: https://youtu.be/hwms4Csbs0s
This was the second part of her presentation, the first is An Overview of Being Vegan in 2021
Top Tips for Tech Balance & Digital Wellness with Leigh-Chantelle for Humane ...Leigh-Chantelle
Leigh-Chantelle's presentation on tips to help with technology balance was presented on 17 November 2021 to Humane Technology Australia.
In this session, Leigh-Chantelle gave tips and tricks to help with understanding technology consumption, balancing technology needs, and practices for conscious and mindful lifelong healthy habits and digital boundaries to thrive online in our always-on digital culture.
The tips are available in poster form: https://digital-equilibrium.com/resources
Video on Youtube: https://www.youtube.com/watch?v=LNlTRPnFDYk
NEW website: https://digital-equilibrium.com
See more on Humane Technology Australia: https://humanetechnology.com.au
Promoting veganism online workshop at Vegan Summer Fest BrightonLeigh-Chantelle
Leigh-Chantelle from Viva la Vegan! gives her Promoting Veganism Online workshop at Vegan Summer Fest Brighton.
Sunday 4 June
Brighton, England, UK
Being vegan is not enough, we need to be using our skills to promote the positive and inclusive elements of the vegan lifestyle when we can. Leigh-Chantelle shares her expertise on how to effectively use our time and energy to promote the core ethics of veganism online, and inspire others to become more effective activists in every possible arena. Learn more about working together, dealing with trolls, online etiquette and leading by example from a 20-year vegan veteran. Find out more about how you can help promote and market yourself, your product, your brand or your vision for a better world using Social Media and other means online.
Bank of America Digital Wellbeing Presentation Salema Veliu
Exploring some of the new challenges emerging with transformative technology including:
- Understanding Human psychosocial and technology needs and preferences (PsychoTechnology).
• New Mental Health Digital disorders including but not limited to Techno Stress.
• Techno Values and Identities.
Why we need to:
- Reshape and rethink our conditioning with technology.
Protect mental health, human interaction and values.
• The importance of finding balance between the artificial and natural worlds.
• Show a keener interest in Digital Human rights and Technology with AI governance and regulation.
A presentation from Natalie Bidnick on popular sites and apps used by teens today. All information copyrighted by Natalie Bidnick and may not be reused without written permission. Questions? Email nataliebidnick@gmail.com
TECHNOLOGY ,SOCIAL MEDIA AND TODAY'S YOUTHsunanditaAnand
THIS PRESENTATION CONTAINS BRIEF INFORMATION ABOUT TECHNOLOGY,SOCIAL MEDIA AND YOUTH, EVOLUTION AND USE OF TECHNOLOGY,POSITIVE AND NEGATIVE EFFECTS OF SOCIAL MEDIA ON TODAY'S YOUTH,AND WAYS TO DEAL WITH -VE EFFECTS OF SOCIAL MEDIA .
My final project I wanted to mix a bunch of our current technologies into a new way using the theories we have discussed during the semester. I didn’t want to make the new technologies too high tech, because we need to think 10 years isn’t that long. How far have we come in 10 years? So I stuck to technologies that we have today, but added realistic traits to each. After I created these new technologies I added the theories in and how they relate to each advancement.
Learning objectives
You will learn how to look after your personal health, safety, relationships and work-life balance in a digital setting
You will know how to be digitally responsible in a way that doesn’t harm others
You will understand the impacts of social media on your psychological wellbeing and what you can do
You will learn how digital technology impacts your physical health
You will become aware of how digital knowledge is a poor substitute for learning in the real world
Social media and young people's mental health and wellbeingmResearcher
Social media has revolutionised the way we connect with each other. Platforms such as Facebook, Twitter and Instagram are now used by one in four people worldwide.1 The use of social media has become an integral part of many people’s lives, connecting them with friends, family and strangers from across the globe.
Recent presentation offering a broad introduction to to the digital age. Social media plays a key role in this PPT, but the real topic is networks and how individuals and organizations are seeking advantage through the wise use of networks.
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...Rauf Khalid
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFESSIONALLY) RELATING FROM IT TO CS TO SE.
Definition – What does Computing mean?
Computing is the process of using computer technology to complete a given goal-oriented task.
Amanda Lenhart's presentation to the New York Department of Health and Mental Hygiene talk presents an overview of Pew Internet project data on teens and social media, including teen tech tool ownership, communication patterns over social networks and mobile phones as well analysis of how young adults 18-29 seeking health information online.
Computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.
Learning objectives
You will learn how to look after your personal health, safety, relationships and work-life balance in a digital setting
You will know how to be digitally responsible in a way that doesn’t harm others
You will understand the impacts of social media on your psychological wellbeing and what you can do
You will learn how digital technology impacts your physical health
You will become aware of how digital knowledge is a poor substitute for learning in the real world
Social media and young people's mental health and wellbeingmResearcher
Social media has revolutionised the way we connect with each other. Platforms such as Facebook, Twitter and Instagram are now used by one in four people worldwide.1 The use of social media has become an integral part of many people’s lives, connecting them with friends, family and strangers from across the globe.
Recent presentation offering a broad introduction to to the digital age. Social media plays a key role in this PPT, but the real topic is networks and how individuals and organizations are seeking advantage through the wise use of networks.
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...Rauf Khalid
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFESSIONALLY) RELATING FROM IT TO CS TO SE.
Definition – What does Computing mean?
Computing is the process of using computer technology to complete a given goal-oriented task.
Amanda Lenhart's presentation to the New York Department of Health and Mental Hygiene talk presents an overview of Pew Internet project data on teens and social media, including teen tech tool ownership, communication patterns over social networks and mobile phones as well analysis of how young adults 18-29 seeking health information online.
Computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
A person's “digital footprint” reflects how he or she actively participates in the digital universe, including use of the Internet and social networks, e-mail, cell phones, digital cameras and credit cards.
A summary of the mega-trends that are positioned to drive change in the economic, political and social environment in 2020 and beyond as viewed by Ernst and Young.
A summary of the mega-trends that are positioned to drive change in the economic, political and social environment in 2020 and beyond as viewed by Ernst and Young.
Hi :) Aeturnist#2 Issued. My article on “Mobile Security” is published in this issue :) This article covered brief history of mobile security, Vulnerability Analysis, Why Malware Attacks? Why on Android? How to Protect Your Device and Importance of Mobile Data Security. Hope you guys enjoy reading… :)
Similar to How your data can be used against you #DataScienceWeek presentation by Leigh-Chantelle (20)
Leigh-Chantelle's Modelling Digital Wellness class for the Shine From Within...Leigh-Chantelle
Leigh-Chantelle's Modelling Digital Wellness class was presented on Saturday 19 November 2022 for the Shine From Within Online Academy.
In our always-on digital culture, digital boundaries are essential to thrive in our online spaces and our offline interactions. In this session, Leigh-Chantelle gave tips and tricks to help with using technology as a tool and not a compulsion.
⚡️Understand technology consumption
⚡️Learn how to balance technology needs
⚡️Discover practices for conscious and mindful lifelong healthy digital habits
Intro by Shine From Within founder and director, Amanda Rootsey.
Top Tips for Tech Balance & Digital Wellness poster: https://digital-equilibrium.com/resources
VIDEO on YouTube: https://www.youtube.com/watch?v=mHDhYdBN42I
Digital Equilibrium website: https://digital-equilibrium.com
Shine From Within: https://shinefromwithin.com.au
Shine From Within Online Academy: https://shinefromwithin.academy
An Overview of Being Vegan in 2021 by Leigh-ChantelleLeigh-Chantelle
Leigh-Chantelle from Viva la Vegan! gives an overview of being vegan in 2021, how we can all lead by example to make more conscious and mindful choices in all areas of life, with a particular focus on environmental aspects, cultured meat, and working with farmers who are wanting to transition to non-animal farming.
Watch the video: https://youtu.be/aFRS-V5eZsk
This was the first part of her presentation for the Rotary Club of Brisbane on Monday 15 February 2021, the second was the Introduction to Cyberpsychology, Digital Wellness, and Digital Equilibrium
Leigh-Chantelle's OCURA2020 Presentation on Preschoolers and their Engagement...Leigh-Chantelle
Here's a presentation I gave as part of the Online Conference for Undergraduate Research Australia (OCURA). It's about my psychology Honours thesis research project on social robots and how preschoolers interact with them.
My thesis is due the end of October, so not all the results are presented, but I hope you get a great introduction to this project that has taken up a lot of my time this year.
WATCH the video on YouTube: https://youtu.be/5jILy4mLH_Y
Tips for Social Media, Online Etiquette & Taking Time OutLeigh-Chantelle
Leigh-Chantelle's presentation in Brisbane on Saturday 18 March for local Not For Profits to encourage their understanding of Social Media, best practices and most suitable channels to use. Online Etiquette, and Taking Time Out also covered.
See http://epicentreequilibrium.com to book Leigh-Chantelle
Download Top Tips for Taking Time Out flyer: http://www.leigh-chantelle.com/684-top-tips-for-taking-time-out-flyer.html
Marketing Yourself and Veganism Online by Leigh-Chantelle at Animal Activists...Leigh-Chantelle
Leigh-Chantelle from Viva la Vegan! gives her Marketing Yourself and Veganism Online presentation at the Animal Activists Forum.
Saturday 15 October, 2016
Southport, Australia
The blurb:
Being vegan is not enough, we need to be using our skills to promote the positive and inclusive elements of the vegan lifestyle every chance we get. Leigh-Chantelle shares her expertise on how to effectively use our time to promote the core ethics of veganism online, and inspire others to become more effective activists in every possible arena.
Learn more about working together, dealing with trolls, online etiquette and leading by example from a 20-year vegan veteran. Find out more about how you can help promote and market yourself, your product, your brand or your vision for a better world using Social Media and other means online.
Ethics Beyond the Plate presentation by Leigh-Chantelle at Bali Vegan FestivalLeigh-Chantelle
Leigh-Chantelle from Viva la Vegan! gives her Ethics Beyond the Plate presentation at the 2nd Bali Vegan Festival.
Sunday 9 October
Ubud, Bali, Indonesia
The blurb:
With the mainstream media watering down the meaning of veganism with it's dietary, fitness and weight-loss focus, is the vegan movement losing its core ethics? There are many reasons and benefits to go - and stay - vegan. Including the environment, labour rights, human rights, animal rights, ethics, feminism, and other intersectionality issues. How can we learn from other social justice movements to move forward in a more inclusive and intersectional way? If more people stay vegan long-term due to ethical reasons, how can we promote consciousness-raising, non-oppression, non-objectification, and anti-consumerism for and beyond the vegan lifestyle?
Find out more about how we can work together as vegans and activists to promote inclusivity, learn from other movements, and lead by example to promote compassion to ALL we encounter. Learn how to become a more effective activist and make these much-needed changes with Leigh-Chantelle's Ethics Beyond the Plate talk.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
How your data can be used against you #DataScienceWeek presentation by Leigh-Chantelle
1. 11 MAY 2021 #DATASCIENCEWEEK
Leigh-Chantelle
HOW YOUR DATA CAN BE
USED AGAINST YOU
2. The Internet continuously changes and evolves - it’s different that what it once was when you joined
Anonymity is important and essential for a free and open internet
Our online footprints are more visible and more permanent
COVID-19 has turbocharged digital adoption for contract tracing and movement control apps and using
Arti
f
icial Intelligence (AI) for decision making
New technologies are yet to show the full extend of their risks, limitations, and consequences of tracking
citizens, students, and workers; and having shortsighted data privacy policies
Australia is the only developed country without a digital rights bill
TECHNOLOGY
3. Always-on cultured tethered to digital devices
With work from home and online learning the norm, more scrutiny is needed for our practices and the
technology we rely on
COVID encouraged technology companies, businesses, and governments to roll out technology
without understanding or anticipating risks for privacy and safety
Tech companies have been designed to collect information about you to sell it to advertisers - your
data is bundled together to create your digital pro
f
ile and sold to the highest bidder
The more data collected on you, the more risk to your privacy
TECHNOLOGY USE
4. People in power come up with bad technology and have the resources to roll these out and market to
consumers
Techno-solutionism: The way we accept technology solutions as easy and quick ways to solve real-
world and complex issues - it is NOT magic
Complex issues need deep understanding and true debate to come up with complex and real
solutions
Technology solutions often harm the vulnerable people they are meant to protect
e.g., app to verify consent before adults engage in sex; Robodebt
TECHNO-SOLUTIONISM
5. Trust in technology fell all around the world in 2020 (70 out of 100)
Popularity in technology has helped protect the industry from critics and regulators, but this
is declining
Social media companies trust score is 46 - below other business categories
The increasing dif
f
icult relationship between technology and the public is blamed for the fall
of trust e.g., misinformation, bias in AI, and privacy issues
CEOs are encouraged to “act
f
irst, talk later”
TRUST IN TECHNOLOGY
Axios, 2021
6. Dropbox: Almost 70M customers a
ff
ected in 2012, emails and passwords
Facebook: 500M+ breached accounts (20% of FB subscribers) in April 2021. Associating phone numbers to
identities. Also names and genders, with a lot of data including DOB, location, relationship status, and employer.
Kickstarter: Almost 5.2M members February 2013, email, usernames, and passwords
LinkedIn: 500M pro
f
iles April 2021 including full names, email, phone number, workplace information and more
NurseryCam: 10+ thousand accounts February 2021 exposed with email addresses
Oxfam Australia: 11.8 million accounts in March 2021, names, phone numbers, addresses, gender and DOB.
Small number of people had partial credit card data exposed, some had bank name, account number, and BSB
exposed.
Patreon: 2.3M+ records October 2015, emails, payment history, addresses, private messages, and website
activity
ProctorU: 400+ thousand user June 2020, email, names, passwords, phone numbers, addresses, usernames
Snapchat: 4.6M in January 2014 (one week after vulnerabilities were detailed) including usernames and phone
numbers, and locations exposed
DATA HACKED & SHARED
haveibeenpwned.com
7. Apps and websites can access:
Phone and email contacts
Call logs
Passwords
Internet and Calendar data
Device location data and frequented locations
Unique device ID
Data on how you use an app
Age, interests, purchasing habits, health, social
This information is collected and most likely shared with other companies - usually disclosed in a privacy policy
YOUR DIGITAL PROFILE
8. Social media platforms are being called out for their bad practices such as
f
lawed content moderation, rampant tracking,
algorithmic bias, harmful recommendations, limited political ad transparency, tax evasion, sexual harassment charges and more
with disinformation and hate speech accelerated by algorithmic recommendations (Mozilla, 2020).
Pro
f
iting off vulnerabilities of users is not a glitch in the social media system, it’s central to how their business model works
By interacting on any social media platform, the information gathered about you is used to target you with advertisements you
will click on - for adults, young people, those susceptible to advertising
The longer you are engaging with content on a social media platform, the more highly-personalised advertising can be sold,
based on detailed pro
f
iles on all users, including highly-sensitive information
Social media is not regulated (unlike radio and television) and dif
f
icult to track
We are the product when our data is bought and sold without out knowledge or agreement
SOCIAL MEDIA
9. As global dependency on big tech grew with the
pandemic and lockdowns, the big 7 technology
companies (Apple, Microsoft, Amazon, Alphabet/Google,
Facebook, along with China’s Tencent/WeChat and
Alibaba) increased their power and pro
f
its (PwC, 2020)
Companies are racing to collect as much personal data
as possible, thinking in terms of money, ease of use, and
immediacy instead of the consequences of exposure and
targets for attack
More privacy by design is required than
f
ixing up privacy
issues after the event
TECHNOLOGY USE & POWER
10. OUR IPHONES
Orange (microphone) and Green (camera) dots provide a
visual indication on iPhone or iPads when apps are using
(iOS 14 update in Sept 2020)
Camera includes BOTH camera and microphone access -
both colours will not show at once
Go to Control Centre to check what app is using your
camera or microphone
Update your access in the Privacy section of your
Settings
Facebook is NOT listening to your conversations - you
are predictable due to your online digital trail
HowToGeek.com
11. AppTrackingTransparency/Apple’s Cross-Track opt-out
Stop apps from tracking your activity for advertising using a prompt
Settings > Privacy > Tracking > Allow Apps to Request to Track OFF
(manually only used by 3% of American iOS users in the past)
55% of people say they would not allow Facebook to track them on other
apps if prompted (TapResearch, 2021)
98% of Facebook’s revenue comes from advertising - ATT could result in a
7% loss to revenue (Mobile Dev Memo, 2021)
Only 13% worldwide & 4% of Americans are opting-in (Flurry, May 8 2021)
OUR PHONES: IOS 14.5 UPDATE
12. Normalising surveillance technologies (e.g., spyware for partners and tools for
monitoring children, students, and workers) increases abuse for vulnerable people and
encourages control (Citizen Lab, 2019)
Smart devices and IOT devices collect and share a LOT of data
Our desire for so-called security is its own security threat - Andrew G Ferguson, law
professor
SECURITY
13. Mozilla.org have created a *Privacy Not Included guide for apps and products that do not meet their
minimum security standards (encryption, automatic security updates, strong passwords, vulnerability
management, and privacy practices), shares and sells data, does not allow deletion of data,
readability of privacy information, and a poor track record of data protection
Smart home, home of
f
ice, toys and games, pets, entertainment, wearables, dating apps, and sex toys
Some of the worst: Amazon Ring products, most dating apps - especially Facebook Dating and Match
Group (Tinder, Grindr, Hinge etc), Roku, Schlage, Xiaomi
Some of the best: Apple, Eufy, Garmin, iRobot, and Lex dating app
*PRIVACY NOT INCLUDED
foundation.mozilla.org/privacynotincluded
14. Dating apps are not immune to security and privacy issues
Aspects shared include location, sexual orientation, HIV data, political leanings, date of birth, religion
The worst: Facebook Dating and Match Group (45 dating apps including Tinder, Grindr, Hinge, OKCupid, Match)
Match Group privacy policy states that you allow them to share your personal information with other Match Group
sites for non-commercial purposes
When you connect social media accounts (Instagram or Facebook) both the original app and the linked app collect
more information TOGETHER - do not link your dating apps
Researchers point out that algorithms (particularly for Tinder) have prejudice designed into it based on race,
gender, ethnicity, or age
The better ones: eHarmony, Happn, Lex
OUR RELATIONSHIPS ONLINE
15. Technology can be misused, especially for family violence, with double the risk for Indigenous women
Technology-facilitated abuse is gendered: 96% male perpetrators, 93% female victims
Tracking apps on phones are increasingly used for abusive partners to keep track of women and children keeping them
constantly fearful and anxious
Ex-partners can also constantly text or use social media to send threats - especially anonymous accounts
GPS tracking increased by 244.8%, camera use increased by 183.2%, and children used as a monitor for their mother
increased by 346.6% since 2015 (WESNET, 2020)
Check for door locks, tracing and monitoring devices, smart device assess, and stalking tools on phones and other digital
devices, kill switches on cars
See techsafety.org.au/resources/resources-women
OUR PAST RELATIONSHIPS
ABC.net.au
16. More data collected from the government without consent for sharing leads to more errors, which will only
worsen with the volume and speed of sharing this data.
The people most at risk are the people who access government services more than the average Australia,
marginalised groups (e.g., First Nations, disabled, elderly, and young people).
New laws could encourage the government to share any and all personal data without the public knowing or
consenting.
Concerns include weak consent requirements, lack of privacy safeguards, and bypass of existing privacy
laws (including the current Privacy Act),
f
inding a discrepancy between public statements from the
government and the legislation, and a scheme reliant on “good intent” rather than safeguards and real
protections (InnovationAus, 2021).
OUR GOVERNMENT
17. Robotdebt compared private data held by Centrelink against ATO averaged income data and generated fake
debt notices for vulnerable people even after
f
inding out it was illegal.
This cost $2 billion (was meant to raise $3B),
300 000 people were effected causing homelessness, immense trauma, stress, anxiety, mental illness, debt,
and deaths
“The government is once again getting away with being shysters, while making the little people feel like it is
they that did wrong,” quote by Fiona Forsyth from one of the victims she is representing
Centrelink disclosed a woman’s new address to her former partner who had a DVO out against him
The government demands to be trusted without
f
irst demonstrating to be trustworthy, and in fact
demonstrating the opposite. - Justin Warren, Electronic Frontiers Australia
OUR GOVERNMENT FAILS
18. The Online Safety Bill: “to keep Australians safe online”. Would increase the eSafety commissioner’s power by removing online
abuse, force app stores and services to remove app/website access, enforce veri
f
ication systems (e.g., face scan before looking
at age-restricted material)
The Data Availability and Transparency Bill: Making it easier for the government to share data with others to improve
government services. More data than necessary is being collected and could be used for more than its stated aims (e.g., NDIS
enforcement)
Privacy Act review: Review of a 30-year-old act. Focusing on reviewing personal information de
f
inition, exceptions, legal
rami
f
ications of serious invasions of privacy, noti
f
ication of people who have had their data breached. Europe’s General Data
Protection Regulation (GDPR) privacy reform is a great aim. This needs to come before the Data Availability and Transparency Bill
Surveillance Legislation Amendment (Identify and Disrupt) Bill: Amplify police powers by creating intrusive warrants without
judge signatures. The federal police and Australian Criminal Intelligence Commission (ACIC) will gain three types warrants to be
able to modify, add, delete, or copy data; access networks and devices; and take over online accounts to investigate
Digital Identity Legislation: Centralising how Australians prove their identity online. Using one login on various sites (e.g.,
Facebook and Google) including facial recognition software.
OUR GOVERNMENT: DIGITAL REFORMS
crikey.com.au
19. South Australian government redirected web users looking at press releases or for COVID information to a data-
harvesting platform, NationBuilder
Claimed that the redirections were accidental, no one knew about it, and no data was collected - privacy watchdog
concluded it was probable the government did not know this was happening
NationBuilder is a data harvesting company and campaign tool used for collecting data for political campaigns
including Trump, both sides of Brexit, and Labour NZ
Data collected includes name, job, employer, social media accounts, computer details, and internet connection - all
this information is added to an individual pro
f
ile
Political companies are exempt from the Privacy Act therefore are free to collect your personal information and data
OUR GOVERNMENT & DATA HARVESTING
ABC.net.au
20. The pandemic has provided excuses for companies and
governments to use more surveillance tactics under the guise of
public health and safety.
Responses to the pandemic allowed for more surveillance and
censorship, including how and when people are tracked, and
restrictions of online speech in more than 20 countries (Freedom
House, 2020)
Intensi
f
ication and expansion of police power during COVID
emergencies resulted in expansion of laws, reduction of scrutiny,
an authoritarianism risk, with some policing practices supersede
or undermine public health goals.
COVID policing allows intensi
f
ication of selective criminalisation
processes, with a disproportionate focus on First Nations peoples
in street policing (45% stops in NSW), and policing of radicalised
and socio-economically disadvantaged communities in public
housing.
GOVERNMENT SURVEILLANCE
Boon-Kuo, et al., 2020
21. Substandard technology from the federal government with data privacy
issues, technical
f
laws, security issues, human rights implications,
normalisation of surveillance, and a waste of taxpayer money (Digital
Rights Watch, 2021)
Tens of millions of dollars spent ($3.8M on development, $6M on other
works including the app, and an additional $64M on advertising), going
to companies involved with the Liberal party
Not ONE person from the app found that contract tracing has not
already detected
There are many issues with the COVIDSafe app including effectiveness,
privacy, and accessibility, and a major issue that people need to be close
to each other for 15 minutes to register as a close contact (9News, 2021)
AUSTRALIA’S COVIDSAFE APP
22. Can vaccinations be ethically and legally tracked to encourage travel and event attendance?
Principles necessary for using sensitive health data include transparency, limiting the
purpose and amount of data gathered, collecting only for the reason speci
f
ied, and secure
storage
Companies also need to ensure people are not discriminated against or treated unfairly
based on health status and that data is stopped from use after the pandemic ceases.
Even though regulations are unfolding when needed "The general rule from a privacy
perspective is that the extent you can do something with less information, that's usually
better" - Jennifer Geetter, partner of law (Law 360, 2021)
VACCINE PASSPORTS
23. Workplace surveillance is on the rise especially with more remote working
Technical innovations and ef
f
icacy encourage the gathering, processing, and storage of more data
Emerging issues include power dynamics of surveillance at work, use and ownership of data, pressure from the
workplace, and human resource practices
Software is used for facial recognition technology, mouse-tracking, keystrokes, websites visited, and hours worked,
and even recognising if you are concentrating or not
What once was used for security or regulation monitoring has now moved to monitoring productivity
Surveillance cannot solve the problem of employees being more productive, only strong and effective leadership can
IN THE WORKPLACE
Silicon Republic, 2021
24. Schools and universities are uncritically relying more on teaching and learning online, with
some universities using compulsory, privately-owned companies that do not have to be
transparent about the data and information they are gathering from their users
Students using these systems often have their gathered data used to develop and improve
ed tech, without negotiations from students, parents, or the faculty
Monitoring is not bene
f
icial for a learning environment; stresses students out when taking
exams; disproportionally effects women, people of colour, non-binary and trans people;
and encourages surveillance technology in education.
STUDENTS
The Nation, 2021
25. 70% of Australian teenagers use Facebook and 75% use Instagram (also owned by Facebook)
Facebook misuses personal data collected from young users targeting or creating mental health and
advertising vulnerabilities
Reset (2021) found pro
f
iles can be created for young people who have harmful or risky interests at a low
cost to advertisers e.g., reaching 1000 13-17 year olds interested in gambling (at a cost of $11.24), smoking
cigarettes ($138.50) and vaping ($210.97), alcohol ($3.03), extreme weight loss ($38.46), 18+ publications
($102.88), and online dating ($55.56)
Facebook restricts advertising alcohol, but allows targeting of people who are interested in alcohol
77.8% of 16 and 17 year olds were concerned about how much data Facebook collects about them with
65.2% disapproving of commercial advertising pro
f
iling
Sixty-
f
ive percent of parents are also uncomfortable with targeting children and tracking online
OUR CHILDREN
Au.Reset.Tech
26. Exploitative technologies have proliferated due to lack of collective understanding about
how platforms work and how they impact us. Unintended consequences take the form of
mental health, democracy, and discrimination issues.
Those of us who rely on these platforms are unknowingly complicit in a devil’s bargain,
where we trade our freedom for followers, our social cohesion for instant connection, and the
truth for what we want to hear (Exposure Labs)
Pause, Consider, Decide to ensure lifelong, healthy digital habits are created and
maintained
DIGITAL LITERACY
28. Principles to restore Big Tech trust include CEOs acting
f
irst and talking later
Responsible AI, automation, and up-skilling
Shared prosperity - new jobs and skills
Codifying trust - fair and explainable aspects
Increased diversity, equity, and inclusion
humanetech.com (US)
humanetechnology.com.au (AU)
HUMANE TECH
Axios, 2021
29. Understand and Learn more about your Technology
Check your Settings (regularly)
Do you need the App? - Can you use it on your computer instead?
Use Brave, DuckDuckGo, Vivaldi, or other search engines
Use Signal over WhatsApp and Messenger
Use a VPN (get 30 days free with my referral: tinyurl.com/4r226z7w)
TIPS
30. Control what you can
Be aware and informed
Technology is not evil - or the solution to all our
problems - it is a tool
Understand and be more aware of your behaviours
Is convenience worth trading in our privacy?
SUMMARY
The New Yorker
31. Video will be on YouTube
Slides will be on SlideShare
@leighchantelle
THANK YOU
epicentreequilibrium.com // digitalequilibrium.com // leigh-chantelle.com // vivalavegan.net