background preloader

Designing for Trust

Facebook Twitter

Reading this May Harm Your Computer: The Psychology of Malware Warnings by David Modic, Ross J. Anderson. David Modic University of Cambridge Ross J. Anderson Cambridge University Computer LaboratoryJanuary 3, 2014 Abstract: Internet users face large numbers of security warnings, which they mostly ignore. To improve risk communication, warnings must be fewer but better. Number of Pages in PDF File: 31 Keywords: malware, persuasion, human computer interaction, psychology working papers series.

Big Data Lessons from Orbitz. One of the week’s interesting technology stories was On Orbitz, Mac Users Steered to Pricier Hotels, an article by Dana Mattioli in The Wall Street Journal, about how online travel company Orbitz used data mining to discover significant spending differences between their Mac and PC customers (who were identified by the operating system of the computer used to book reservations). Orbitz discovered that Mac users are 40% more likely to book a four- or five-star hotel, and tend to stay in more expensive rooms, spending on average $20 to $30 more a night on hotels.

Based on this discovery, Orbitz has been experimenting with showing different hotel offers to Mac and PC visitors, ranking the more expensive hotels on the first page of search results for Mac users. This Orbitz story is interesting because I think it provides two important lessons about big data for businesses of all sizes. The second lesson is a good example of how word of mouth has become word of data. 0inShare. Top 10 2013-Top 10. Audit Trails. AUDIT TRAILS Audit trails maintain a record of system activity both by system and application processes and by user activity of systems and applications.

In conjunction with appropriate tools and procedures, audit trails can assist in detecting security violations, performance problems, and flaws in applications. This bulletin focuses on audit trails as a technical control and discusses the benefits and objectives of audit trails, the types of audit trails, and some common implementation issues. An audit trail is a series of records of computer events, about an operating system, an application, or user activities. A computer system may have several audit trails, each devoted to a particular type of activity. Auditing is a review and analysis of management, operational, and technical controls. ACID. Set of properties of database transactions According to Gray and Reuter, the IBM Information Management System supported ACID transactions as early as 1973 (although the acronym was created later).[3] Characteristics[edit] The characteristics of these four properties as defined by Reuter and Härder are as follows: Atomicity[edit] An example of an atomic transaction is a monetary transfer from bank account A to account B.

Consistency (Correctness)[edit] Isolation[edit] Durability[edit] Examples[edit] The following examples further illustrate the ACID properties. CREATE TABLE acidtest (A INTEGER, B INTEGER, CHECK (A + B = 100)); Atomicity[edit] Atomicity is the guarantee that series of database operations in an atomic transaction will either all occur (a successful operation), or none will occur (an unsuccessful operation). Consistency failure[edit] Consistency is a very general term, which demands that the data must meet all validation rules. Isolation failure[edit] Combined, there are four actions: Boy or Girl paradox. The Boy or Girl paradox surrounds a well-known set of questions in probability theory which are also known as The Two Child Problem,[1] Mr.

Smith's Children[2] and the Mrs. Smith Problem. The initial formulation of the question dates back to at least 1959, when Martin Gardner published one of the earliest variants of the paradox in Scientific American. Titled The Two Children Problem, he phrased the paradox as follows: Mr. Gardner initially gave the answers 1/2 and 1/3, respectively; but later acknowledged that the second question was ambiguous.[1] Its answer could be 1/2, depending on how you found out that one child was a boy.

The paradox has frequently stimulated a great deal of controversy.[4] Many people argued strongly for both sides with a great deal of confidence, sometimes showing disdain for those who took the opposing view. Common assumptions[edit] First question[edit] Mr. Under the forementioned assumptions, in this problem, a random family is selected. Second question[edit] FPF Announces New Group to Develop Best Practices for Retail Location Analytics Companies « Future of Privacy.

The Future of Privacy Forum Announces New Group to Develop Best Practices for Retail Location Analytics Companies First Step for Shaping Privacy Principles for Technologies Aiming to Improve the In-Store Shopping Experience Date: July 16, 2013 WASHINGTON, D.C. – The Future of Privacy Forum (FPF) today announced that it is working with a group of leading technology companies to develop best practices for retail location analytics.

The companies, including Euclid, WirelessWERX, Mexia Interactive and ShopperTrak, provide solutions to retailers to develop aggregate reports used to reduce waiting times at check-out, to optimize store layouts and to understand consumer shopping patterns. FPF’s goal is to make sure these technologies are subject to privacy controls and are used responsibly to improve the consumer shopping experience. “ShopperTrak is working with FPF because we believe in individuals’ rights to privacy. The Factoring Dead: Preparing for the Cryptopocalypse.