This document outlines libraries' responses to issues around artificial intelligence and digital privacy. It discusses the Declaration of Cities Coalition for Digital Rights that libraries have signed onto, which supports principles like privacy, transparency, and inclusion online. It also lists digital privacy programs that libraries offer, including programs led by libraries on topics like algorithms and bias, as well as external presenter programs on artificial intelligence topics. The document promotes the role of libraries in giving individuals knowledge and confidence to navigate digital spaces without compromising their privacy or security.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
This document discusses Lauren Smith's use of social media to address professional issues in library and information science. It provides an overview of her various roles researching education and information literacy. It also outlines some of the organizations and initiatives she supports that aim to advocate for libraries, question practices through a critical lens, protect digital privacy and promote literacy as a human right. These include Voices for the Library, the Radical Librarians Collective and the Library Freedom Project.
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
Paper presentation at the Building Web Observatories Workshop in Bloomington, USA
Presenter: Kieron O'Hara
Authors: Kieron O'Hara, Alistair Sackley, Ian Brown, Ramine Tinati, Thanassis Tiropanis, Xin Wang
Safeguarding Democracy: Innovations in tech for human rightsEmily Jacobi
This weekend I spoke on the panel "Safeguarding Democracy: Innovations in Technology & Human Rights" at Netroots Nation 2012, covering Digital Democracy's process & discussing 2 case studies: Burma/Myanmar & Haiti.
Data sharing in the age of the Social MachineUlrik Lyngs
Social machines generate and consume data. A Web Observatory is proposed as an infrastructure to support data sharing among social machines and the human elements involved in data generation, analysis, and consumption. Key challenges include designing such an infrastructure for generality while addressing ethical, legal, and technological issues around metadata standards, access control, and performance across different computing platforms and stakeholder needs.
Slides from a talk at British Embassy, Paris in March 2014. Using a user-design focused approach to bringing Internet of Things tribes together and going mainstream.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
This document discusses Lauren Smith's use of social media to address professional issues in library and information science. It provides an overview of her various roles researching education and information literacy. It also outlines some of the organizations and initiatives she supports that aim to advocate for libraries, question practices through a critical lens, protect digital privacy and promote literacy as a human right. These include Voices for the Library, the Radical Librarians Collective and the Library Freedom Project.
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
Paper presentation at the Building Web Observatories Workshop in Bloomington, USA
Presenter: Kieron O'Hara
Authors: Kieron O'Hara, Alistair Sackley, Ian Brown, Ramine Tinati, Thanassis Tiropanis, Xin Wang
Safeguarding Democracy: Innovations in tech for human rightsEmily Jacobi
This weekend I spoke on the panel "Safeguarding Democracy: Innovations in Technology & Human Rights" at Netroots Nation 2012, covering Digital Democracy's process & discussing 2 case studies: Burma/Myanmar & Haiti.
Data sharing in the age of the Social MachineUlrik Lyngs
Social machines generate and consume data. A Web Observatory is proposed as an infrastructure to support data sharing among social machines and the human elements involved in data generation, analysis, and consumption. Key challenges include designing such an infrastructure for generality while addressing ethical, legal, and technological issues around metadata standards, access control, and performance across different computing platforms and stakeholder needs.
Slides from a talk at British Embassy, Paris in March 2014. Using a user-design focused approach to bringing Internet of Things tribes together and going mainstream.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
This document discusses an ISM 5021 Information and Technology Management course. It lists the names and locations of 6 students in the course. It also discusses how the group worked collaboratively on a wiki project about RFID (radio-frequency identification) technology, with each student researching and writing a section and the group editing each other's work. It emphasizes the importance of the wiki being informative, educational, entertaining, and covering a broad cross-section of the topic in an organized and harmonized manner.
The UTA Libraries offer digital humanities services including consultations and workshops through their Digital Humanities Librarian for both undergraduates and graduate students in collaboration with various programs. They provide subject guides and assistance with platforms like Omeka. Copyright consultations are available to ensure legal compliance when building and using digital collections. The libraries are expanding their digital collections through projects digitizing special collections materials on topics related to the borderlands such as the U.S.-Mexico War and Tejano Voices.
This session explores the concept of identity in today's digital era and what that means to an individual's health, as well as to society's treatment of the individual, including genetic discrimination and universal access to and affordability of medical technology advancements.
Are you interested in finding and using digital tools to enhance your research? In this workshop, Rafia Mirza from the UT Arlington Central Library will introduce you to the many different tools that are available to help you gather, process, and present your research.
This document discusses several aspects of digital literacy. It defines information literacy, data literacy, ICT literacy, web literacy, and media literacy. It also discusses frameworks for digital literacy including DigComp 2.0 and digital intelligence. The document emphasizes that digital literacies involve more than just technical skills, including new behaviors, attitudes, and abilities needed to function in a digital society. It notes that a lack of digital literacy can negatively impact people's agency and opportunities. Finally, it outlines the nine elements of digital citizenship according to ISTE/Ribble, including respecting others online, communicating appropriately, understanding legal and ethical issues, and protecting personal information and well-being.
Think before Clicking! This presentation covers the basics of what We as Common People can do to protect ourselves online. Also, How mozilla products help us do that in an easy and trusted way.
Tracey P. Lauriault gave a presentation on data and technological citizenship. She discussed how data is shaped by social and technical factors and does not exist independently. She framed data in technical, ethical, political, spatial, and philosophical terms. She described two projects she is involved in regarding open smart cities and analyzing big data use in agriculture. She raised questions about the impacts of technologies like smart cities, IoT, and AI on cities and food security. She asked how civic engagement can occur in machine-driven environments and discussed the need for human-centered approaches to technology and issues of governance, ownership, and algorithms.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
The document discusses challenges facing the Dutch government in providing information to citizens through 1600+ websites run by 1200+ organizations, and efforts to improve findability and access to information through standardizing metadata and developing knowledge models. It describes the Overheid Web Metadata Standard and linked open data initiatives to organize government information according to common properties and allow linking between datasets. The goal is to make information more accessible through semantic linking and queries based on themes, locations, life events or other structured approaches.
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
The document discusses the role of libraries in supporting digital literacy. It defines digital literacy and citizenship, which includes concepts like digital access, communication, profiles, law, rights, security and footprint. Libraries help support digital literacy through providing WiFi, digital resources, coding clubs, and workshops on topics like Minecraft and Arduino. They also help various groups like young people, older adults, and businesses improve their digital skills. Overall, libraries play a key role in developing communities' digital literacy as more activities move online.
The document is a presentation about digital citizenship given at the National Liberty Museum on November 3, 2012. It includes an agenda for the day covering topics such as defining citizenship, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, and creating a plan for teaching digital citizenship. The presentation aims to help educators understand digital citizenship and how to teach their students about it.
Library of Birmingham on the move - be2camp presentationbe2campbrum
The document discusses the Library of Birmingham's (LoB) strategy to become a digital and mobile library through 5 types of libraries - the Connected Library, the Virtual Library, the Logical Library, the Self-Service Library, and the Extended Library. It emphasizes the critical role of ICT and mobility in transforming the LoB and delivering digital services. The LoB aims to unlock its collections for a new digital user community and provide meaningful mobile services that complement online and physical experiences.
From Aspiration to Reality: Open Smart Cities
Open smart cities might become a reality for Canada. Globally there are a number of initiatives, programs, and practices that are open smart city like which means that it is possible to have an open, responsive and engaged city that is both socio-technologically enabled, but also one where there is receptivity to and a willingness to grow a critically informed type of technological citizenship (Feenberg). For an open smart city to exist, public officials, the private sector, scholars, civil society and residents and citizens require a definition and a guide to start the exercise of imagining what an open smart city might look like. There is much critical scholarship about the smart city and there are many counter smart city narratives, but there are few depictions of what engagement, participatory design and technological leadership might be. The few examples that do exist are project based and few are systemic. An open smart city definition and guide was therefore created by a group of stakeholders in such a way that it can be used as the basis for the design of an open smart city from the ground up, or to help actors shape or steer the course of emerging or ongoing data and networked urbanist forms (Kitchin) of smart cities to lead them towards being open, engaged and receptive to technological citizenship.
This talk will discuss some of the successes resulting from this Open Smart Cities work, which might also be called a form or engaged scholarship. For example the language for the call for tender of the Infrastructure Canada Smart City Challenge was modified to include as a requisite that engagement and openness be part of the submissions from communities. Also, those involved with the guide have been writing policy articles that critique either AI or the smart city while also offering examples of what is possible. These articles are being read by proponents of Sidewalk Labs in Toronto. Also, the global Open Data Conference held in Argentina in September of 2018 hosted a full workshop on Open Smart Cities and finally Open North is working toward developing key performance indicators to assess those shortlisted by Infrastructure Canada and to help those communities develop an Open Smart Cities submission. The objective of the talk is to demonstrate that it is actually possible to shift public policy on large infrastructure projects, at least, in the short term.
Leading responsible AI - the role of librarians and information professionalsNicholas Poole
Presentation by CILIP CEO Nick Poole to the global UN Library, Information and Knowledge Network via their event in Doha, Qatar on the role of librarians and information professionals in leading progress towards more responsible approaches to AI.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
This document discusses an ISM 5021 Information and Technology Management course. It lists the names and locations of 6 students in the course. It also discusses how the group worked collaboratively on a wiki project about RFID (radio-frequency identification) technology, with each student researching and writing a section and the group editing each other's work. It emphasizes the importance of the wiki being informative, educational, entertaining, and covering a broad cross-section of the topic in an organized and harmonized manner.
The UTA Libraries offer digital humanities services including consultations and workshops through their Digital Humanities Librarian for both undergraduates and graduate students in collaboration with various programs. They provide subject guides and assistance with platforms like Omeka. Copyright consultations are available to ensure legal compliance when building and using digital collections. The libraries are expanding their digital collections through projects digitizing special collections materials on topics related to the borderlands such as the U.S.-Mexico War and Tejano Voices.
This session explores the concept of identity in today's digital era and what that means to an individual's health, as well as to society's treatment of the individual, including genetic discrimination and universal access to and affordability of medical technology advancements.
Are you interested in finding and using digital tools to enhance your research? In this workshop, Rafia Mirza from the UT Arlington Central Library will introduce you to the many different tools that are available to help you gather, process, and present your research.
This document discusses several aspects of digital literacy. It defines information literacy, data literacy, ICT literacy, web literacy, and media literacy. It also discusses frameworks for digital literacy including DigComp 2.0 and digital intelligence. The document emphasizes that digital literacies involve more than just technical skills, including new behaviors, attitudes, and abilities needed to function in a digital society. It notes that a lack of digital literacy can negatively impact people's agency and opportunities. Finally, it outlines the nine elements of digital citizenship according to ISTE/Ribble, including respecting others online, communicating appropriately, understanding legal and ethical issues, and protecting personal information and well-being.
Think before Clicking! This presentation covers the basics of what We as Common People can do to protect ourselves online. Also, How mozilla products help us do that in an easy and trusted way.
Tracey P. Lauriault gave a presentation on data and technological citizenship. She discussed how data is shaped by social and technical factors and does not exist independently. She framed data in technical, ethical, political, spatial, and philosophical terms. She described two projects she is involved in regarding open smart cities and analyzing big data use in agriculture. She raised questions about the impacts of technologies like smart cities, IoT, and AI on cities and food security. She asked how civic engagement can occur in machine-driven environments and discussed the need for human-centered approaches to technology and issues of governance, ownership, and algorithms.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
The document discusses challenges facing the Dutch government in providing information to citizens through 1600+ websites run by 1200+ organizations, and efforts to improve findability and access to information through standardizing metadata and developing knowledge models. It describes the Overheid Web Metadata Standard and linked open data initiatives to organize government information according to common properties and allow linking between datasets. The goal is to make information more accessible through semantic linking and queries based on themes, locations, life events or other structured approaches.
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
The document discusses the role of libraries in supporting digital literacy. It defines digital literacy and citizenship, which includes concepts like digital access, communication, profiles, law, rights, security and footprint. Libraries help support digital literacy through providing WiFi, digital resources, coding clubs, and workshops on topics like Minecraft and Arduino. They also help various groups like young people, older adults, and businesses improve their digital skills. Overall, libraries play a key role in developing communities' digital literacy as more activities move online.
The document is a presentation about digital citizenship given at the National Liberty Museum on November 3, 2012. It includes an agenda for the day covering topics such as defining citizenship, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, and creating a plan for teaching digital citizenship. The presentation aims to help educators understand digital citizenship and how to teach their students about it.
Library of Birmingham on the move - be2camp presentationbe2campbrum
The document discusses the Library of Birmingham's (LoB) strategy to become a digital and mobile library through 5 types of libraries - the Connected Library, the Virtual Library, the Logical Library, the Self-Service Library, and the Extended Library. It emphasizes the critical role of ICT and mobility in transforming the LoB and delivering digital services. The LoB aims to unlock its collections for a new digital user community and provide meaningful mobile services that complement online and physical experiences.
From Aspiration to Reality: Open Smart Cities
Open smart cities might become a reality for Canada. Globally there are a number of initiatives, programs, and practices that are open smart city like which means that it is possible to have an open, responsive and engaged city that is both socio-technologically enabled, but also one where there is receptivity to and a willingness to grow a critically informed type of technological citizenship (Feenberg). For an open smart city to exist, public officials, the private sector, scholars, civil society and residents and citizens require a definition and a guide to start the exercise of imagining what an open smart city might look like. There is much critical scholarship about the smart city and there are many counter smart city narratives, but there are few depictions of what engagement, participatory design and technological leadership might be. The few examples that do exist are project based and few are systemic. An open smart city definition and guide was therefore created by a group of stakeholders in such a way that it can be used as the basis for the design of an open smart city from the ground up, or to help actors shape or steer the course of emerging or ongoing data and networked urbanist forms (Kitchin) of smart cities to lead them towards being open, engaged and receptive to technological citizenship.
This talk will discuss some of the successes resulting from this Open Smart Cities work, which might also be called a form or engaged scholarship. For example the language for the call for tender of the Infrastructure Canada Smart City Challenge was modified to include as a requisite that engagement and openness be part of the submissions from communities. Also, those involved with the guide have been writing policy articles that critique either AI or the smart city while also offering examples of what is possible. These articles are being read by proponents of Sidewalk Labs in Toronto. Also, the global Open Data Conference held in Argentina in September of 2018 hosted a full workshop on Open Smart Cities and finally Open North is working toward developing key performance indicators to assess those shortlisted by Infrastructure Canada and to help those communities develop an Open Smart Cities submission. The objective of the talk is to demonstrate that it is actually possible to shift public policy on large infrastructure projects, at least, in the short term.
Leading responsible AI - the role of librarians and information professionalsNicholas Poole
Presentation by CILIP CEO Nick Poole to the global UN Library, Information and Knowledge Network via their event in Doha, Qatar on the role of librarians and information professionals in leading progress towards more responsible approaches to AI.
Digital competence, digital citizen, digital hygienePirje Meri
This document provides an overview of digital competencies, digital citizenship, digital ethics, and digital hygiene. It discusses:
- The importance of developing digital competencies throughout one's education and career.
- The European Digital Competence Framework which describes digital competence as consisting of 5 areas: information and data literacy, communication and collaboration, digital content creation, safety, and problem solving.
- The concepts of digital citizenship and etiquette (netiquette), including responsibilities and proper online behavior.
- Copyright and intellectual property, the importance of proper referencing, and Creative Commons licensing.
- Digital hygiene and the need for safe online practices like using strong passwords, backing up data, and
How library and information professionals improve digital inclusion.
This statement from the Chartered Institute of Library & Information Professionals explains:
What digital inclusion is
How it benefits people, communities and society
How libraries and staff can support and improve digital inclusion
Librarians, knowledge workers & Information literacyBrano Frk
Librarians are now knowledge workers and information literacy educators in the knowledge society. They curate, create, and promote content using social tools and new technologies like virtual and augmented reality. Librarians filter and connect users to information streams through various apps, tools, and services, helping to navigate the changing information landscape. As facilitators and experimenters, they provide spaces for digital media, networking, and creation using hacker spaces and labs. Overall, librarians act as beacons shining light on the path to the knowledge society by mapping communities and enabling collaboration.
This document defines digital literacy, technophilia, and digital citizenship.
Digital literacy refers to the skills needed to use digital devices like smartphones and computers for communication, expression, and advocacy. Technophilia is an enthusiasm for technology. Digital citizenship involves appropriate and responsible technology use.
The document outlines the key aspects of digital citizenship, including digital access, communication, literacy, etiquette, law, rights and responsibilities, health and wellness, security, and commerce. It emphasizes principles of respecting oneself and others, educating oneself and connecting with others, and protecting oneself and others when using digital tools and online spaces.
This document discusses digital citizenship and its applications for English language teaching. It defines digital citizenship as the norms of behavior regarding technology use. The 9 elements of digital citizenship are outlined, including digital access, commerce, communication, literacy, etiquette, law, rights and responsibilities, and security. The role of teachers is to foster digital citizenship skills like critical thinking, ethical use, and understanding social reasons for technology policies. Examples of how to teach digital media safety, raise awareness of digital footprints and reputation, and foster literacy competencies like copyright are provided. Developing a culture of online interaction and sharing relevant experiences can help students become safe and effective digital communicators.
This document provides an overview of a conference called Digital Together. It includes:
- The names and roles of three speakers at the conference: Lizzie Hodgson, William Benson, and Jon Pratty.
- A brief summary of Jon Pratty's work developing digital projects.
- Topics that will be covered include mobile culture, how digital is integrated into businesses, data collection, connectivity, skills for the digital economy, new digital economies and products, smart regions versus cities, and the Internet of Place.
- The document encourages attendees to think about how digital impacts different areas and how to better connect places, culture, people and services through digital tools.
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16KC Digital Drive
The document discusses the role of local governments in promoting digital equity and accessibility. It provides two case studies of cities that have implemented broadband initiatives: Portland, Oregon launched a broadband plan and digital equity action plan to promote affordable high-speed internet access, while Sandy, Oregon started a municipal broadband utility called SandyNet that now provides gigabit speeds to 60% of residents. The document also discusses how cities can become more responsive by using technology to improve services and quality of life, as well as ensuring digital inclusion for all groups like youth and older adults.
An introductory presentation for the Council of Europe INGOs introducing the transversal workig group called Digital Citizen. The group will deal with Education, Humand Rights and Democracy using a forward looking approach to policy making.
Boosting ICT Training in Public LibrariesÅke Nygren
The document discusses boosting digital literacy training in public libraries by taking a more holistic approach. It argues that libraries should embed digital literacy training in all aspects of their services and events, rather than offering standalone ICT courses. Digital literacy is important for helping people engage with online learning that is already happening through peer and interest groups. The document calls on different digital literacy groups within libraries to unite behind a single, connected strategy and emphasizes tools like digital badges that can recognize skills people gain through informal online learning.
This document discusses challenges and opportunities related to artificial intelligence and democratic resilience. It begins by outlining different stakeholders in AI development and noting an unequal dynamic. It then examines principles of AI power and examples of potential threats, such as curtailing freedom and magnifying inequality. The document proposes a framework for democratic resilience centered around the pillars of liberty, fraternity, and equality. It discusses the promise of AI for democratic governance if developed sustainably and humanistically. Specific policy examples and best practices are provided. The document concludes by outlining areas for further cooperation, such as setting a framework to improve citizen communications and path-building from principles to policy.
This document discusses digital rights and responsibilities. It defines digital rights and responsibilities as the privileges and freedoms extended to digital technology users, along with the behavioral expectations that come with those privileges. It then lists some key digital rights, which include rights to freedom of expression, privacy, credit for personal works, digital access, and identity. The document emphasizes that using the internet is a privilege that requires responsible behavior. It provides some technology facts and explains why digital rights and responsibilities are important for communication, knowledge, and understanding basic rights in the digital world.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
3. Declaration of Cities Coalition for Digital Rights
1. Universal and equal access to the internet, and
digital literacy
2. Privacy, data protection and security
3. Transparency, accountability, and non-
discrimination of data, content and algorithms
4. Participatory Democracy, diversity and inclusion
5. Open and ethical digital service standards
https://citiesfordigitalrights.org/declaration
5. To give individuals the knowledge
and confidence they need to
navigate digital spaces without
compromising their privacy and
security.
Digital Privacy Initiative
10. AI: Library-led Programs
• Algorithmic Literacy 1: Understanding Algorithms and Bias
• Artificial Intelligence (Digital Literacy for Youth series)
• Do-It-Yourself Artificial Intelligence: Image Recognition
• Do-It-Yourself Artificial Intelligence: Voice Recognition
• Is the Internet the Same for Everyone? Understanding Algorithms and
Bias
• Information Gathering, Artificial Intelligence and Behaviour Modification
• Learning Circle: Elements of Artificial Intelligence (AI)
11. AI: External Presenter Programs
• AI, the Internet & Privacy Disobedience during COVID-19
• Artificial Intelligence for all: Making Algorithms Work for a Better Society
• Artificial Intelligence and Society
• Building Trust in Artificial Intelligence
• Does Automation Threaten Democracy?
• How are Algorithms Rewriting the Rules of Work
• Monthly Tech Meet-Up: DeCentralization
• The Future of Work and Death
• The Robot Will See You Now: Artificial Intelligence in Medicine
• The Social Cost of the Information Age
• When Algorithms Disrupt Social Justice
Overview
Strategic and partnership framework and Why Libraries?
Digital Privacy initiative
Algorithmic Literacy program examples
As foundation to where our Digital Privacy Initiative sits:
TPL’s strategic plan is our commitment to building success, resilience and well-being for our city.
We have 5 Strategic Priorities, with Digital Inclusion & Literacy as the 2nd.
Access to technology and the skills to navigate and use it are critical for all Torontonians to be successful, connected and well.
While technology and the internet are available they can be expensive, and ways to understand and use them are not always easy to access.
Our Digital Privacy initiatives are grounded in working to offer programs and services to help Torontonians have the digital literacy skills they need to succeed in the digital world.
All of our strategic priorities are also considered through an Equity Lens. We are committed to helping level the playing field for all Torontonians with a particular focus on equity-seeking groups and vulnerable populations, breaking down barriers to access and increasing inclusion so everyone who wants to use the library feels welcome and represented in our spaces, is able to access our services, and can benefit from the outcomes we’re driving.
We have 3 Enablers, with Partnerships identified as critical to achieving our goals.
Partnerships have been key in enhancing our capacity and in ensuring our Digital Privacy programs are informed or delivered by industry and academic experts.
From the City level, in June 2019, the City of Toronto became a signatory on the declaration of Cities for Digital Rights.
As part of that adoption and in recognition of the work TPL already had begun in this area, City Council funded a new position for TPL to be dedicated to the creation of programming to further digital safety and literacy in support of the declaration’s 5 principles. I’ll highlight the first 3 as they speak to the importance of offering digital privacy programs and services:
1. Universal and equal access to the internet, and digital literacy
Everyone should have access to affordable and accessible internet and digital services on equal terms, as well as the digital skills to make use of this access and overcome the digital divide.
2. Privacy, data protection and security
Everyone should have privacy and control over their personal information through data protection in both physical and virtual places, to ensure digital confidentiality, security, dignity and anonymity, and sovereignty over their data, including the right to know what happens to their data, who uses it and for what purposes.
3. Transparency, accountability, and non-discrimination of data, content and algorithms
Everyone should have access to understandable and accurate information about the technological, algorithmic and artificial intelligence systems that impact their lives, and the ability to question and change unfair, biased or discriminatory systems.
TPL launched our Digital Privacy initiative in 2016 with the aims to empower Torontonians with the knowledge and confidence they need to navigate digital spaces without compromising their privacy and security.
I’ll provide a brief overview of the range of programs and services we’ve offered to help give a flavor of the kinds of initiatives that public libraries can do to support their communities and their understanding of digital privacy and algorithmic literacy issues.
Our initiative has included:
A series of branch and online programs
A Tor Browser Project.
A digital privacy expo that brought together experts to discuss data and personal security
An interactive art installation
And an instructional video series
And some initiatives focused more on Algorithmic literacy have included:
Algorithmic literacy workshops to help library users understand the complexity of their online environments
Programs with Do-it-Yourself machine learning kits that support self-directed tinkering
A speaker series with leading AI researchers, experts and critics, and a
A stakeholders forum to share AI programming information and identify potential collaborations
Let me run though a few of these examples
Note the positioning of Digital Literacy in TPL’s promotional materials for our Live and Online programming
TPL offers a recurring four courses over four weeks Digital Privacy series that covers how to better understanding the threats - and myths - about online security and knowing how to strengthen your computer and online security.
Curriculum covers a wide-range of in-person and hands-on activities on how to use both public computing environments and personal devices safely; and navigating the internet and social media with privacy in mind
Programs with external presenters have included speakers from the Canadian Civil Liberties Association's Privacy, Surveillance, and Technology Project, the Office of the Information and Privacy Commissioner of Ontario, the Canadian Institute for Advanced Research, and leading academics and legal scholars on a range of topics including Privacy and Freedom, Cyberattacks and Digital Privacy, Privacy Rights, and User Privacy on the Web
In 2018 the TOR browser was installed on TPL learning center computers, the computers we use for our in-person computer education courses.
The TOR browser is a free and open source web browser that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.
Our intention is that in order to help people learn how to protect themselves against online tracking, surveillance, and censorship, we need the tools available for in-person instruction.
TPL’s four-week Digital Privacy course includes instruction on what the TOR browser is and how to download it onto your personal computer or device.
This initiative won a 2019 American Library Association Presidential Citation for Innovative International Library Projects
In partnership with Tor, the CitizenLab at the University of Toronto, and the Digital Justice Lab, TPL hosted a full day in-person Digital Privacy Expo with over 340 attendees and featuring four key sessions:
Privacy and security on the 21st Century Internet
Your Privacy and the Law in Canada
Talking Privacy Tech: a round-table with leading technologists
Spyware and Malware: an insider's perspective
Glass Room Experience IoT (Internet of Things)
TPL hosted the Glass Room Experience, a temporary interactive art installation by Mozilla and Tactical Tech.org
It explores the companies and mechanisms that make our everyday technologies and the connection to the Internet of Things (IoT).
Participants were invited to Play Fake or Real to see how smart they are in knowing about the world of smart devices.
TPL Programs on Artificial Intelligence began in 2019.
Over 35 programs have been offered and through the Covid-19 pandemic period, 7 have been offered online
This list outlines some of the key courses that TPL has developed
We’ve developed a class called: Algorithmic Literacy 1: Understanding Algorithms and Bias. In it, participants:
Explore how decision-making algorithms effect your experience online.
Learn about Algorithmic Bias - how decision-making algorithms can have negative consequences
In Do-It-Yourself Artificial Intelligence: Image Recognition participants explore the foundations of machine learning using Google's AIY Vision kit and get hands on with weighted algorithms and the 'mechanics' of image recognition, and try to answer the question, "Can a computer tell how you are feeling?"
In Do-It-Yourself Artificial Intelligence: Voice Recognition participants explore the foundations of machine learning using Google's AIY Voice kit. They train Google's voice assistant to their voice, and see how it 'learns'!
Just as with Digital Privacy programs, it has been critical to have external experts and partners bring their expertise to TPL programs.
External presenters have included representatives from the Open News Network, Open Data with the City of Toronto, University of Toronto researchers from law, bioethics, and computer science, the Data & Society Research Institute in NYC, as well as a number of authors
One program to highlight is also the result of our partnerships.
TPL has an Innovation Council – an advisory group of leading tech, academic, and private and public sector leaders that advise us on TPL’s program and service directions.
In 2020, we started an Innovation Council Presents series where member of host programs and bring their networks to TPL programs
This example was Women in AI (recorded)
Led by TPL Innovation Council member, Pamela Robinson (Associate Dean, Graduate Studies, Ryerson University); Suzie Dunn (PhD candidate and University of Ottawa professor, Faculty of Law); and Renata Avila (Guatemalan International Human Rights Lawyer and author)
As the use of machine learning and advanced computation/Artificial Intelligence continues to gain attention, the discussion tends to focus on disruption, innovation and threats. Many of the leaders receiving attention are men.
This panel shared the work of women leading efforts using AI and explore issues including gender and racial bias in AI use and how approaching AI through a diversity and inclusion lens can lead to different outcomes.
I’d like to close with encouragement to take on similar programming in your libraries. TPL is happy to share curriculum or talk further if you have questions.