This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
2. Disaster Cooperation requires trust
• Necessary (but not necessarily sufficient) Robert Aexelrod
• Long-term relationship
• Frequent contact with opportunity to cheat/cooperate
• Recognize other’s agents and interests
• Institutional memory to keep track of cheating (e.g., corruption)
RUSI P.H. Longstaff 2014
and cooperating
• Maybe industry or government or NGO
• Between
• Donor and Donor
• Donor and Recipient
3. We do not need to all agree
• We do need to expect that there will be
surprises in complex, unpredictable
environments
• “Disaster” (without a star)
RUSI P.H. Longstaff 2014
• We need to know the other’s interests -
what will guide them
• Regime A (SOP)
• Regime B (disaster plans)
• Regime C (everybody for themselves or a
guiding star)
4. Interests/Goals
• Resistance (The Citadel)
• In battle, surprise or superior force reduces
ability to resist
• Tendency to fail catastrophically
RUSI P.H. Longstaff 2014
• Trust high until failure
• Resilience (Surviving to operate another
day)
• Static: Bouncing back – return to “normal”
• Adaptive: Bouncing forward
• Trust built and reinforced often
5. Some current research efforts
for resilience
• NSF: Microscope v. Kaleidoscope
• Defining, Measuring and Predicting
• Trusted sources of information
• Citizens as assets
• Citizen Sensors then and now
RUSI P.H. Longstaff 2014
• Citizens as responders/organizers: Panic or partner
• Adaptive regulation/control
• For crisis
• Empowering Improvisation: human and technical
• For creeping disasters: Set up sensors that indicate when
• adaptive mechanisms are failing (e.g. Challenges cascade)
• tipping points are near
• buffers/reserves are near exhaustion
6. Breaking resilience:
Introduce surprises that are
• Too novel
• Black Swans and Unknown-Unknowns
• Too fast
• No connection to fast scale
• Slow to adapt (tight coupling, llooww lleeaarrnniinngg))
• Too many
• Not enough diversity or enough weak ties to resources
to deal with MULTIPLE TYPES
• A few surprises (experience) is good but too many is
bad