This presentation was provided by Skott Klebe of EBSCO during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018.
This document provides an overview and example of getting started with WebAuthn. It discusses the WebAuthn specification and terminology. It then demonstrates how to set up sample code to handle WebAuthn registration and login requests and responses. Specifically, it shows the structure of registration and login options that are sent to clients, and the credential responses that are returned, including parsing the response details. Key areas like challenges, credentials, attestation, and extensions are described. The document aims to help attendees understand how WebAuthn works at a high level and see an example implementation.
Privacy is becoming an important search engine ranking factor as it increases user trust and engagement. Websites can improve their privacy scores through both on-site and off-site factors such as implementing SSL encryption, having a readable privacy policy, positive reviews from trusted third-party sources, and maintaining a good social media reputation. Search engines are exploring ways to automatically evaluate these privacy-related qualities by blending various scoring metrics like security, privacy, reviews, social sentiment, and authorship.
WebAuthn - The End of the Password As We Know It?Thomas Konrad
WebAuthn has been around for some time now, and it has quite some potential to shape the future of authentication. In this Meetup, we'll explore how it works and walk through a sample implementation. Questions we'll answer in this Meetup:
- What is WebAuthn?
- How exactly does it work?
- How is WebAuthn better than traditional password authentication?
- How can I implement WebAuthn for my web application?
- Is WebAuthn multi-factor authentication?
- What are the weaknesses and practical pitfalls?
- What about user and public key enumeration?
- Is WebAuthn also usable for computer logins and on smartphones?
- Does it have the potential to superseed password authentication?
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
The document discusses four hacks to mitigate breach risk under the GDPR. The first hack is to embrace the core tenants of GDPR such as privacy by design and data minimization. The second hack is to reduce risk with multi-factor authentication (MFA) by requiring multiple factors for authentication. The third hack is to improve the user experience of authentication with transparent authentication methods like device pairing. The fourth hack is to secure the entire customer journey.
Lanyrd is now integrated with Eventbrite to allow users to connect their accounts and automatically sync event attendance between the two platforms. This will help users network with other attendees before and after events more effectively by tying their profiles together across services.
The free, one-hour webinar, Sourcing with Social Media: Tips from a Corporate Sleuth, was originally held Nov. 13, 2013.
During this session, the principal in a competitive-intelligence firm will teach you how to harness social media to identify “influencers” – both regionally and nationally – in industries you cover, as well as how to contact them successfully.
YOU WILL LEARN HOW TO:
Find people who are experts on the topics related to your story
Identify sources at a regional and a national level
Get from their handle to their real name, and find them on many sites
“Listen in” on these people as they broadcast across a variety of social media
Determine their tone related to the topic – pro/against, etc.
Determine the extent of their reach; when they talk, how many people listen?
Determine the best way to reach out to them and make contact
YOUR INSTRUCTOR
Sean Campbell is a co-owner of Cascade Insights, a competitive-intelligence and market-research firm near Portland, Ore., that serves the technology industry. Before founding Cascade in 2006, he co-created and sold 3 Leaf, a technical consultancy that worked for some of the world’s largest technology companies, including Microsoft and Intel.
He teaches courses in industry analysis and competitive intelligence in Willamette University’s MBA Program.
His book, “Going Beyond Google: Gathering Internet Intelligence,” which he co-authored with Cascade co-owner Scott Swigart, was listed as a best read by the Strategic and Competitive Intelligence Professionals Association for 2009 and 2010.
View or download this Cascade Insights primer to learn more about Campbell’s company.
For more information training opportunities for business journalists, please visit http://businessjournalism.org.
Behaviour Driven Development is a powerful collaboration technique that can empower teams to deliver higher value features to the business faster and more effectively. But although Behaviour Driven Development is based on a number of simple principles, it can go dramatically wrong in a myriad of different ways.
In this talk we discuss twelve BDD anti-patterns we frequently encounter in real-world BDD projects, anti-patterns that can dramatically reduce the effectiveness of BDD as a practice, and that can even cause BDD adoption to fail entirely. Looking at everything from insufficient collaboration practices to poor use of test automation tooling, from teams that test too much to teams that forget the most important scenarios, we will look at the many different ways that BDD can go wrong, and how it should be done.
We will use real-world examples to illustrate each of these anti-patterns. You will learn how to spot these issues in your own projects, and more importantly how to avoid them in the first place.
This document provides an overview and example of getting started with WebAuthn. It discusses the WebAuthn specification and terminology. It then demonstrates how to set up sample code to handle WebAuthn registration and login requests and responses. Specifically, it shows the structure of registration and login options that are sent to clients, and the credential responses that are returned, including parsing the response details. Key areas like challenges, credentials, attestation, and extensions are described. The document aims to help attendees understand how WebAuthn works at a high level and see an example implementation.
Privacy is becoming an important search engine ranking factor as it increases user trust and engagement. Websites can improve their privacy scores through both on-site and off-site factors such as implementing SSL encryption, having a readable privacy policy, positive reviews from trusted third-party sources, and maintaining a good social media reputation. Search engines are exploring ways to automatically evaluate these privacy-related qualities by blending various scoring metrics like security, privacy, reviews, social sentiment, and authorship.
WebAuthn - The End of the Password As We Know It?Thomas Konrad
WebAuthn has been around for some time now, and it has quite some potential to shape the future of authentication. In this Meetup, we'll explore how it works and walk through a sample implementation. Questions we'll answer in this Meetup:
- What is WebAuthn?
- How exactly does it work?
- How is WebAuthn better than traditional password authentication?
- How can I implement WebAuthn for my web application?
- Is WebAuthn multi-factor authentication?
- What are the weaknesses and practical pitfalls?
- What about user and public key enumeration?
- Is WebAuthn also usable for computer logins and on smartphones?
- Does it have the potential to superseed password authentication?
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
The document discusses four hacks to mitigate breach risk under the GDPR. The first hack is to embrace the core tenants of GDPR such as privacy by design and data minimization. The second hack is to reduce risk with multi-factor authentication (MFA) by requiring multiple factors for authentication. The third hack is to improve the user experience of authentication with transparent authentication methods like device pairing. The fourth hack is to secure the entire customer journey.
Lanyrd is now integrated with Eventbrite to allow users to connect their accounts and automatically sync event attendance between the two platforms. This will help users network with other attendees before and after events more effectively by tying their profiles together across services.
The free, one-hour webinar, Sourcing with Social Media: Tips from a Corporate Sleuth, was originally held Nov. 13, 2013.
During this session, the principal in a competitive-intelligence firm will teach you how to harness social media to identify “influencers” – both regionally and nationally – in industries you cover, as well as how to contact them successfully.
YOU WILL LEARN HOW TO:
Find people who are experts on the topics related to your story
Identify sources at a regional and a national level
Get from their handle to their real name, and find them on many sites
“Listen in” on these people as they broadcast across a variety of social media
Determine their tone related to the topic – pro/against, etc.
Determine the extent of their reach; when they talk, how many people listen?
Determine the best way to reach out to them and make contact
YOUR INSTRUCTOR
Sean Campbell is a co-owner of Cascade Insights, a competitive-intelligence and market-research firm near Portland, Ore., that serves the technology industry. Before founding Cascade in 2006, he co-created and sold 3 Leaf, a technical consultancy that worked for some of the world’s largest technology companies, including Microsoft and Intel.
He teaches courses in industry analysis and competitive intelligence in Willamette University’s MBA Program.
His book, “Going Beyond Google: Gathering Internet Intelligence,” which he co-authored with Cascade co-owner Scott Swigart, was listed as a best read by the Strategic and Competitive Intelligence Professionals Association for 2009 and 2010.
View or download this Cascade Insights primer to learn more about Campbell’s company.
For more information training opportunities for business journalists, please visit http://businessjournalism.org.
Behaviour Driven Development is a powerful collaboration technique that can empower teams to deliver higher value features to the business faster and more effectively. But although Behaviour Driven Development is based on a number of simple principles, it can go dramatically wrong in a myriad of different ways.
In this talk we discuss twelve BDD anti-patterns we frequently encounter in real-world BDD projects, anti-patterns that can dramatically reduce the effectiveness of BDD as a practice, and that can even cause BDD adoption to fail entirely. Looking at everything from insufficient collaboration practices to poor use of test automation tooling, from teams that test too much to teams that forget the most important scenarios, we will look at the many different ways that BDD can go wrong, and how it should be done.
We will use real-world examples to illustrate each of these anti-patterns. You will learn how to spot these issues in your own projects, and more importantly how to avoid them in the first place.
This document discusses OpenSocial, a common API for social applications across websites. It describes how OpenSocial allows applications to access user and friend data, post activities, store persistent data, and more. It also outlines the developer tools and resources Netlog provides for building OpenSocial applications, including Javascript and REST APIs, localization support, and developer sandboxes.
Proxy : effective logs for tracking down usage trendsProxies Rent
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.
Patterns to Bring Enterprise and Social Identity to the Cloud CA API Management
In this session, we will look at strategies to incorporate identity into cloud applications. Enterprise
identity or social login can both be a part of your go-to-cloud strategy, but you must plan for this
upfront, rather than try to retrofit identity and access control at a later date.
Actionable Insights with Google Analytics - Ben Rogers - Attacat Internet Mar...Attacat Internet Marketing
The presentation given by Ben Rogers, of Attacat Internet Marketing, to the New Media Breakfast group in Edinburgh & Glasgow.
For more information please contact Attacat Internet Marketing directly.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
The document discusses improving the developer experience for self-sovereign identity (SSI). It introduces Streetcred ID, a platform that enables organizations and individuals to exchange secure digital credentials. Streetcred ID's tools allow organizations to integrate decentralized identity into existing systems and issue verifiable credentials to users, who can then prove claims about themselves to other parties. An example is given of a user seamlessly providing proof of identity attributes to a landlord using Streetcred ID.
Feldman Feldman & Associates, PC is an immigration law firm located in San Diego, California. The firm’s experienced immigration attorneys combine top-notch legal expertise with excellent client service in all areas of immigration law.
Collaboration between LINE, Microsoft and AI by the developers, for the devel...LINE Corporation
LINE DEVELOPER DAY 2017 B-3
Microsoft Bot Framework and Microsoft Cognitive Services help accelerate bot application development. I will link them to the LINE Messaging API, and show you how an exciting bot application is made through a live coding performance. The heat is on!
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, emails, and other online accounts. It also offers advice on using secure passwords, identifying phishing attempts, and being cautious with personal information online and when using public computers.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, email clients, and other online accounts. It also offers advice on using strong and unique passwords, being wary of phishing scams, and taking precautions with personal information online and on public computers.
The document introduces ZOCCAM, a platform that streamlines the home buying process. It enables parties to securely send funds and documents to escrow agents and authenticate borrower identification. The platform simplifies the process through a mobile app that allows users to select an escrow agent, enter property details, attach contracts, capture checks, and deliver funds and documents. It provides benefits like increased security, faster transaction times, cost savings, and consumer empowerment through real-time notifications and an automated process.
ZOCCAM streamlines the closing process so you can focus on what matters most. The ZOCCAM platform offers earnest money deposit delivery, wiring instructions, document management, ID authentication, and closing funds delivery with real-time notifications. Funds are sent directly to the escrow recipient's bank. Get on board ZOCCAM Today!!
The convergence of information and cybersecurity is highly relevant in the context of your reputational and financial concerns, a combination of physical and cyber security applied to your requirements will strengthen your overall security posture and resilience to risk. In this article I am explaining how to protect your digital security and privacy as an individual, but the strategies are equally suited for small businesses as well.
The document is a Record of Completion from Stanford University's Center for Professional Development. It certifies that Tranquilino Ortega Jr. completed six courses as part of the Advanced Project Management Certificate program between March 2015 and September 2015, including courses on strategy execution, leading change, executing complex programs, and project innovation through design thinking. The document provides instructions for verifying its authenticity using Adobe Reader and details on earning Professional Development Units for continuing education.
SLA CI Division Webinar: Using the Internet to Research Private CompaniesAugust Jackson
The document provides guidance on researching private companies using publicly available online sources. It discusses researching a company's website, legal and regulatory filings, news sources, industry associations and journals, job postings, and social networks to find information about a company's locations, employees, finances, products, competitors and leadership without contacting the company directly. Directories of relevant databases, newspapers, industries and people search engines are included in an appendix.
How to Leverage LinkedIn - What Every Financial Planner and IFA Needs to KnowPhilip Calvert
- LinkedIn is a professional social networking site with over 100 million users that allows users to connect with colleagues, find jobs, and showcase their professional expertise.
- The document provides tips for financial planners and IFAs (independent financial advisors) to leverage LinkedIn, including investing time in their profile, using relevant keywords, answering questions, and joining groups.
- LinkedIn can be a powerful networking and business development tool if users actively engage with the platform by customizing their profile, connecting with others, and sharing content in areas of expertise.
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsAmazon Web Services
Go beyond cyber basics and learn how to enable threat detection to proactively monitor and get ahead of unusual user behaviors, account anomalies, and even data breaches. Leverage AI/ML to quickly and accurately assess your organization’s vulnerabilities without human intervention, and build a better cyber strategy that's ready for anything.
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...Brian Campbell
A short technical introduction, presented at an OWASP Vancouver chapter meeting, to some aspects of JOSE (JWS, JWE, and JWK) as well as JSON Web Token (JWT).
Crawling and Processing the Italian Corporate WebSpeck&Tech
SpazioDati collects public information about all Italian companies from many different sources, the most challenging being the World Wide Web Our Internet Data Gathering project crawls and processes data from the entire Italian web, using distributed frameworks such as Hadoop, Nutch, Elasticsearch and Spark ✨ This talk will give an overview of the extraction pipeline and present some of the issues we tackled during and after development.
The document provides tips for SEO (search engine optimization) for public relations professionals. It discusses how various PR tactics can affect SEO, such as optimizing press releases, newsrooms, digital assets, and micromedia. It also covers when paid search (PPC) may be better than SEO for PR purposes. Other topics include choosing keywords, on-page SEO basics, optimizing press releases, newsroom optimization tactics, and measuring the value of SEO. The overall focus is on how PR professionals can leverage SEO strategies to promote their content and messaging.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This document discusses OpenSocial, a common API for social applications across websites. It describes how OpenSocial allows applications to access user and friend data, post activities, store persistent data, and more. It also outlines the developer tools and resources Netlog provides for building OpenSocial applications, including Javascript and REST APIs, localization support, and developer sandboxes.
Proxy : effective logs for tracking down usage trendsProxies Rent
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.
Patterns to Bring Enterprise and Social Identity to the Cloud CA API Management
In this session, we will look at strategies to incorporate identity into cloud applications. Enterprise
identity or social login can both be a part of your go-to-cloud strategy, but you must plan for this
upfront, rather than try to retrofit identity and access control at a later date.
Actionable Insights with Google Analytics - Ben Rogers - Attacat Internet Mar...Attacat Internet Marketing
The presentation given by Ben Rogers, of Attacat Internet Marketing, to the New Media Breakfast group in Edinburgh & Glasgow.
For more information please contact Attacat Internet Marketing directly.
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
The document discusses improving the developer experience for self-sovereign identity (SSI). It introduces Streetcred ID, a platform that enables organizations and individuals to exchange secure digital credentials. Streetcred ID's tools allow organizations to integrate decentralized identity into existing systems and issue verifiable credentials to users, who can then prove claims about themselves to other parties. An example is given of a user seamlessly providing proof of identity attributes to a landlord using Streetcred ID.
Feldman Feldman & Associates, PC is an immigration law firm located in San Diego, California. The firm’s experienced immigration attorneys combine top-notch legal expertise with excellent client service in all areas of immigration law.
Collaboration between LINE, Microsoft and AI by the developers, for the devel...LINE Corporation
LINE DEVELOPER DAY 2017 B-3
Microsoft Bot Framework and Microsoft Cognitive Services help accelerate bot application development. I will link them to the LINE Messaging API, and show you how an exciting bot application is made through a live coding performance. The heat is on!
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, emails, and other online accounts. It also offers advice on using secure passwords, identifying phishing attempts, and being cautious with personal information online and when using public computers.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, email clients, and other online accounts. It also offers advice on using strong and unique passwords, being wary of phishing scams, and taking precautions with personal information online and on public computers.
The document introduces ZOCCAM, a platform that streamlines the home buying process. It enables parties to securely send funds and documents to escrow agents and authenticate borrower identification. The platform simplifies the process through a mobile app that allows users to select an escrow agent, enter property details, attach contracts, capture checks, and deliver funds and documents. It provides benefits like increased security, faster transaction times, cost savings, and consumer empowerment through real-time notifications and an automated process.
ZOCCAM streamlines the closing process so you can focus on what matters most. The ZOCCAM platform offers earnest money deposit delivery, wiring instructions, document management, ID authentication, and closing funds delivery with real-time notifications. Funds are sent directly to the escrow recipient's bank. Get on board ZOCCAM Today!!
The convergence of information and cybersecurity is highly relevant in the context of your reputational and financial concerns, a combination of physical and cyber security applied to your requirements will strengthen your overall security posture and resilience to risk. In this article I am explaining how to protect your digital security and privacy as an individual, but the strategies are equally suited for small businesses as well.
The document is a Record of Completion from Stanford University's Center for Professional Development. It certifies that Tranquilino Ortega Jr. completed six courses as part of the Advanced Project Management Certificate program between March 2015 and September 2015, including courses on strategy execution, leading change, executing complex programs, and project innovation through design thinking. The document provides instructions for verifying its authenticity using Adobe Reader and details on earning Professional Development Units for continuing education.
SLA CI Division Webinar: Using the Internet to Research Private CompaniesAugust Jackson
The document provides guidance on researching private companies using publicly available online sources. It discusses researching a company's website, legal and regulatory filings, news sources, industry associations and journals, job postings, and social networks to find information about a company's locations, employees, finances, products, competitors and leadership without contacting the company directly. Directories of relevant databases, newspapers, industries and people search engines are included in an appendix.
How to Leverage LinkedIn - What Every Financial Planner and IFA Needs to KnowPhilip Calvert
- LinkedIn is a professional social networking site with over 100 million users that allows users to connect with colleagues, find jobs, and showcase their professional expertise.
- The document provides tips for financial planners and IFAs (independent financial advisors) to leverage LinkedIn, including investing time in their profile, using relevant keywords, answering questions, and joining groups.
- LinkedIn can be a powerful networking and business development tool if users actively engage with the platform by customizing their profile, connecting with others, and sharing content in areas of expertise.
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsAmazon Web Services
Go beyond cyber basics and learn how to enable threat detection to proactively monitor and get ahead of unusual user behaviors, account anomalies, and even data breaches. Leverage AI/ML to quickly and accurately assess your organization’s vulnerabilities without human intervention, and build a better cyber strategy that's ready for anything.
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...Brian Campbell
A short technical introduction, presented at an OWASP Vancouver chapter meeting, to some aspects of JOSE (JWS, JWE, and JWK) as well as JSON Web Token (JWT).
Crawling and Processing the Italian Corporate WebSpeck&Tech
SpazioDati collects public information about all Italian companies from many different sources, the most challenging being the World Wide Web Our Internet Data Gathering project crawls and processes data from the entire Italian web, using distributed frameworks such as Hadoop, Nutch, Elasticsearch and Spark ✨ This talk will give an overview of the extraction pipeline and present some of the issues we tackled during and after development.
The document provides tips for SEO (search engine optimization) for public relations professionals. It discusses how various PR tactics can affect SEO, such as optimizing press releases, newsrooms, digital assets, and micromedia. It also covers when paid search (PPC) may be better than SEO for PR purposes. Other topics include choosing keywords, on-page SEO basics, optimizing press releases, newsroom optimization tactics, and measuring the value of SEO. The overall focus is on how PR professionals can leverage SEO strategies to promote their content and messaging.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the closing segment of the NISO training series "AI & Prompt Design." Session Eight: Limitations and Potential Solutions, was held on May 23, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the seventh segment of the NISO training series "AI & Prompt Design." Session 7: Open Source Language Models, was held on May 16, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the sixth segment of the NISO training series "AI & Prompt Design." Session Six: Text Classification with LLMs, was held on May 9, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fifth segment of the NISO training series "AI & Prompt Design." Session Five: Named Entity Recognition with LLMs, was held on May 2, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fourth segment of the NISO training series "AI & Prompt Design." Session Four: Structured Data and Assistants, was held on April 25, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the third segment of the NISO training series "AI & Prompt Design." Session Three: Beginning Conversations, was held on April 18, 2024.
This presentation was provided by Kaveh Bazargan of River Valley Technologies, during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by Dana Compton of the American Society of Civil Engineers (ASCE), during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the second segment of the NISO training series "AI & Prompt Design." Session Two: Large Language Models, was held on April 11, 2024.
This presentation was provided by Teresa Hazen of the University of Arizona, Geoff Morse of Northwestern University. and Ken Varnum of the University of Michigan, during the Spring ODI Conformance Statement Workshop for Libraries. This event was held on April 9, 2024
This presentation was provided by William Mattingly of the Smithsonian Institution, during the opening segment of the NISO training series "AI & Prompt Design." Session One: Introduction to Machine Learning, was held on April 4, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the eight and final session of NISO's 2023 Training Series on Text and Data Mining. Session eight, "Building Data Driven Applications" was held on Thursday, December 7, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the seventh session of NISO's 2023 Training Series on Text and Data Mining. Session seven, "Vector Databases and Semantic Searching" was held on Thursday, November 30, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the sixth session of NISO's 2023 Training Series on Text and Data Mining. Session six, "Text Mining Techniques" was held on Thursday, November 16, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fifth session of NISO's 2023 Training Series on Text and Data Mining. Session five, "Text Processing for Library Data" was held on Thursday, November 9, 2023.
This presentation was provided by Todd Carpenter, Executive Director, during the NISO webinar on "Strategic Planning." The event was held virtually on November 8, 2023.
More from National Information Standards Organization (NISO) (20)
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
2. z
EBSCO Information Services
§ About EBSCO
§ Because EBSCO Information Services is a part of the information
technology community, our needs are those of our customers.
We’re dedicated to developing customizable services, supporting
the technology needs of our customers and creating strong user
experiences to help libraries and other institutions support their end
users and improve access to information.
3. z
Intro
§ Skott Klebe
§ Platform Security Architect
§ More than twenty years’ experience in security and compliance in
academic publishing
4. z
Importance of Privacy
§ Safety in ourselves
§ The identity trade – it’s forever
§ You may trust the first recipient, but you can’t trust everyone they
trust
§ Example: Facebook
§ Accumulated a valuable asset: our online lives
§ Exposed it to any partner that signed an agreement
§ Seems to have made no attempt to enforce the agreement for years
§ Partner allegedly breached the agreement
5. z
Attitudes toward personal information
§ US – personaldata is property*
§ You contract away use of it on
almost every web page you look at
§ To the site owner
§ to partners of the site owner
§ to partners’ partners
* SpecialCOPPA exception for
children under 13
§ EU – personaldata is like your body
§ Can’t contract it away –
it’s always yours
§ GDPR forces processing information
in ways that the owners continue to
control it
§ Report
§ Correct
§ Forget
§ Sentiment derives from recent
experience with repressive regimes
7. z
z
How do we do
better?
Software doesn’t
meet requirements
without design,
implementation,and
testing
Security and privacy
are requirements
Therefore, we must
design, implement,
and test for them
10. z
Identification
§ Must be globally unique
§ Not my name
§ Must be able to be presented by me
§ A string I know – “skott” or “dude1879”
§ An object, like my computer or my phone
§ My fingerprint, face, or DNA
§ An IP address from a range associated
with my institution
§ A cookie stored in my browser’s database
Institutional
identity
11. z
Authentication
§ Something that only I can present
§ A secret
§ My fingerprint, retina, face, or DNA
§ My unlocked phone
§ Address from my institution’s IP range
Institutional
authentication
12. z
Interaction
§ How a service communicates with me
§ Phone numbers
§ Email addresses
§ Screen name
§ Real name
§ How I communicate with other people who use the service
§ Screen name
§ Real name
§ E-mail address
18. z
Identity – the Tripartite Identity Pattern
§ 2008 design codified at Yahoo
§ Separation of concerns
§ Don’t display login ID’s as a name
§ Don’t use the login ID as the root key of
every part of identity
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
19. z
Why We Try
#1:
The Buzz
Disclosures
§ Before Google Plus, there was Google Buzz
§ If you had GMail, Google offered you a public
Buzz identity
§ If you declined, they still turned parts of Buzz
on for you
§ E.g., your friend graph
§ It you accepted, your e-mail contacts became
your public social network
20. z
Why We Try
#1:
The Buzz
Disclosures
§ Private became Public
§ Your relationship to your therapist
§ Your current contact information to your ex or
stalker
§ FTC consent order
https://www.ftc.gov/news-
events/press-releases/2011/10/ftc-
gives-final-approval-settlement-
google-over-buzz-rollout
21. z
TIP in Practice – the core
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Must be optional
Session
Token
f123ab456fde
Institution
ID
159
Must be optional
Demographics
Home address, e.g.
In libraries, we’re
usually adding one or
more layers of
institution, and also
authenticating the
institution via IP.
22. z
TIP in Practice:
other associations
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Demographics
Home address, e.g.
We tie a number of other kinds of data to the identity as well.
23. z
TIP in Practice:
other associations
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Demographics
Home address, e.g.
We tie a number of other kinds of data to the identity as well.
24. z
TIP in Practice:
other associations
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Demographics
Home address, e.g.
We tie a number of other kinds of data to the identity as well.
25. z
TIP in Practice:
other associations
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Demographics
Home address, e.g.
We tie a number of other kinds of data to the identity as well.
26. z
TIP in Practice:
other associations
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Demographics
Home address, e.g.
Published
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
We tie a number of other kinds of data to the identity as well.
27. z
TIP in Practice:
forget me!
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Demographics
Home address, e.g.
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
Published
28. z
TIP in Practice:
forget me!
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Demographics
Home address, e.g.
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
Published
29. z
TIP in Practice:
forget me!
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Internal
Identifier
5271009
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
Published
30. z
TIP in Practice:
forget me!
Institution
ID
159
Shopping cart
5271009 Toothbrush
Toothpaste
…
Search
History
5271009 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Internal
Identifier
5271009
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
Published
We may want to avoid
tying the cart and the
search results
31. z TIP in Practice:
additional diligence
Internal
Identifier
5271009
Login
ID
sklebe
Screen Name
“Skott from MA”
Session
Token
f123ab456fde
Institution
ID
159
Shopping cart
330bd811f Toothbrush
Toothpaste
…
Search
History
0aef18542 helicopters
web servers
…
Patron usage
logs
5271009 Article 1
Article 2
…
6655321 Article 21
Article 22
…
… Article 1
Article 2
…
Demographics
Home address, e.g.
Published
Usage reports
Journal 1 5 unique readers
Journal 2 15 unique readers
hash(“cart-5271009”)
hash(“search-5271009”)
Mathematically
impossible to tie to
each other or the key
Do we need to be concerned about the
sensitivity of this kind of data?
32. z
§ AOL released a large set of anonymized user search history
§ Intended for researchers to improve understanding of
search behaviors
§ Solving the ”Apache” problem, e.g.
§ The New York Times easily identified individuals
§ https://www.nytimes.com/2006/08/09/technolo
gy/09aol.html
§ AOL apologized, deleted the data within days
§ Defended a class action lawsuit
§ The data is still available online
Why We Try
#2:
34. zObligations of System Design
Understand the data
• Could it harm the user?
• When combined with
something else?
• When shared with a
partner?
1
Think about privacy
from the start
• Can we delete this data
without breaking?
• Can we minimize retention?
• Can we confine it in one
place?
• Can we involve a partner?
2
Don’t forget costs &
risks of retention
• Compliance
• Liability
• Keeping that data may be
more expensive than
deleting it
3