background preloader

What are you revealing online? Much more than you think

What are you revealing online? Much more than you think
What can be guessed about you from your online behavior? Two computer privacy experts — economist Alessandro Acquisti and computer scientist Jennifer Golbeck — on how little we know about how much others know. The best indicator of high intelligence on Facebook is apparently liking a page for curly fries. At least, that’s according to computer scientist Jennifer Golbeck (TED Talk: The curly fry conundrum), whose job is to figure out what we reveal about ourselves through what we say — and don’t say — online. Of course, the lines between online and “real” are increasingly blurred, but as Golbeck and privacy economist Alessandro Acquisti (TED Talk: Why privacy matters) both agree, that’s no reason to stop paying attention. TED got the two together to discuss what the web knows about you, and what we can do about the things we’d rather it forgot. I hear so much conflicting information about what I should and shouldn’t be posting online. Jennifer Golbeck: I agree with that. AA: Indeed. Related:  Privacy & SecuritySNT

How you helped create the crisis in private data As Facebook’s Mark Zuckerberg testifies before Congress, he’s likely wondering how his company got to the point where he must submit to public questioning. It’s worth pondering how we, the Facebook-using public, got here too. The scandal in which Cambridge Analytica harvested data from millions of Facebook users to craft and target advertising for Donald Trump’s presidential campaign has provoked broad outrage. More helpfully, it has exposed the powerful yet perilous role of data in U.S. society. Repugnant as its methods were, Cambridge Analytica did not create this crisis on its own. The allure of aggregate data Businesses and governments have led the way. For its part, the federal government, from the earliest census in 1790 to the creation of New Deal social welfare programs, has long relied on aggregate as well as individual data to distribute resources and administer benefits. Probing the personal Citizens were not just unwitting victims of these schemes. Revealing ourselves

Thématique : les réseaux sociaux Les réseaux sociaux Séance 1 : Les réseaux sociaux (RS) Préambule possible : Vidéo histoire des réseaux sociaux (Delagrave) 1- Lister les RS utilisés par les élèves pour partir de leurs pratiques (google form, Carte mentale ou schéma de Fred Cavazza) 2- Montrer la vidéo Visionnage de la vidéo en classe. Les élèves (en individuel pour par petits groupes) doivent : Lister les réseaux sociaux personnifiés dans la vidéo Retrouver les principales caractéristiques des réseaux sociaux présentés dans la vidéo de façon humoristique (Ex : Google plus nommé ici Google moins : car très peu utilisé, peu clair et a d'ailleurs disparu depuis…) Fiche simplifiée pour guider : Mettre en parallèle avec le premier exercice. 3- Par petit groupe ou en individuel, choix d’un RS et présentation de ce réseau (Ressource : presentation économique d’un réseau social par Matthieu Tranvan) Séance 2 : Les traces (suite) Définition . 4.

How Important Are Students' Digital Footprints? Melissa Davis , Melissa Davis, CEO & Co-Founder of GoEnnounce.com Posted 09/22/2014 8:06AM | Last Commented 09/30/2014 6:34AM In an age where everything can be “Googled” and online privacy no longer exists, students have a whole new reputation at stake—their digital reputation, or their digital footprint. A digital footprintis any online information about a person that can be searched, shared, and seen by a large, invisible audience. According to Educator’s Technology, “Managing one’s digital identity is a skill, so to speak, that we need to learn and teach our kids and students about. Students may not understand the implications of what is shared via social media, and parents and teachers need to be cognizant and start teaching students about the effects and how to manage their own digital footprints. So how serious is this, really? Here are five steps to get started. 1. 2. 3. 4. 5.

Explain Everything on Chromebooks! - Explain Everything™ Interactive Whiteboard We are thrilled to announce that Explain Everything is now available on Chromebooks! As more schools implement Chromebooks in the classroom, teachers and students have been asking about a Chromebook version of our app and we’re happy to provide this first version of one. You can download the app on the Chrome Web Store and use it for free for 30 days. After 30 days the app requires a single-time purchase license key ($2.99 USD). Bulk purchasing discounts are available starting at 50%. Explain Everything for Chrome OS has all of the functions and features in our Android version with a few exceptions including the import and export destinations. Share your experiences with the new Chromebook version of Explain Everything by rating and leaving a review.If you have any issues or questions regarding Explain Everything, please let us know by contacting support@explaineverything.com or by using the support form on our website.

Amazon patent reveals 'voice sniffer algorithm' that could analyze conversations Amazon's Echo smart speaker starts up after a user calls for Alexa, the artificial intelligence that powers the device, but a recent patent suggests that the next step for the device may be listening in on any conversation -- not just after the "Alexa" command is said by its user. An algorithm proposed in a pending patent filed by the e-commerce giant in 2017 shows advanced artificial intelligence that would allow an Amazon device to listen to a conversation and analyze it for certain words that are said. A "voice sniffer algorithm" is what the patent calls the technology. "The more words they collect, the more the company gets to know you," Daniel Burrus, a tech analyst with Burrus Research Associates, Inc., told ABC News. The algorithm uses positive trigger words like, "prefer" and "bought" or negative trigger words such as, "hate" or "disliked," and then the device can "capture adjacent audio that can be analyzed" for keywords, gauging interest levels in various products.

Une centaine d'études scientifiques remises en question par la découverte d'un bug informatique Des chercheurs hawaïens ont dévoilé puis corrigé une erreur dans le code d’un logiciel utilisé en chimie depuis 2014. Un glitch dans la matrice et tout est faussé ! Une équipe de chimistes, chercheurs à l’université d’Hawaï, examinait récemment des cultures de cyanobactéries (ou « algues bleus ») afin de trouver des composés capables de lutter contre le cancer. Au moment de vérifier la composition d’échantillons grâce à un programme codé en Python, elle s’est aperçue qu’elle variait de manière significative selon l’OS utilisé. Ils révèlent notamment que le script – dont le logiciel se sert pour faire fonctionner n’importe quel appareil de spectroscopie à résonance magnétique nucléaire – date de 2014. « Cette simple erreur de code remet en question les conclusions d’un grand nombre de publications concernant une large variété de sujets dont la majorité ne mentionne même pas avec quel OS le programme a été exploité, déclarent les chercheurs dans leur article.

Education Week Published Online: December 8, 2011 By Robin L. Flanigan Stellar transcripts aside, students now have to worry about an increasing number of colleges peering at their social-networking pages online—and potentially denying their applications because of what they find there. The number of college-admissions officials using Facebook and other social-networking sites to learn more about applicants quadrupled over the past year, according to New York City-based Kaplan Test Prep, the test preparation division of Kaplan Inc. In the company’s 2011 survey of admissions officers from the top 500 colleges and universities, 24 percent said they have viewed publicly available pages to get a clearer picture of an applicant, while 20 percent turned to Google. Educators, mostly at the high school level, use assemblies, classroom discussions, and guidance sessions to warn students about such consequences. “The disconnect happens because of their age and level of maturity,” said Franklin N. Next, Mr. Mr.

Trio: mash it up How Europe’s new privacy rule is reshaping the internet If you’ve been looking for it, you may have seen a lot of privacy policies change in the past few months. From Google to Slack, companies are quietly updating terms, rewriting contracts, and rolling out new personal data tools in preparation for a massive shift in the legal landscape. So far, it’s mostly been a problem for legal departments, but as policy changes and contract fights go public, it’s started affecting the average web user, too. The rule is called the General Data Protection Regulation (or GDPR), and it’s poised to reshape some of the messiest parts of the internet. What is the GDPR? The General Data Protection Regulation is a rule passed by the European Union in 2016, setting new rules for how companies manage and share personal data. Much of the GDPR builds on rules set by earlier EU privacy measures like the Privacy Shield and Data Protection Directive, but it expands on those measures in two crucial ways. What’s going to change? It’s too early to say.

Intelligence artificielle En 2017, la MAIF a lancé le cycle de conférences 2050 IA : retour vers demain. Une série de rencontres pour mieux comprendre l’intelligence artificielle et réfléchir à ses usages, actuels et futurs. Des objets connectés aux voitures autonomes, en passant par les assistants personnels et autres robots conversationnels, que se passe-t-il dans la « boîte noire » de l’IA qui les anime ? Marjolaine Grondin est la cofondatrice et CEO de Jam, un chabot conversationnel qui utilise Messenger pour conseiller des bons plans aux étudiants. Axelle Lemaire, ancienne secrétaire d'État en charge du Numérique et de l'Innovation, est responsable de la plateforme Terra Numerata du cabinet de conseil Laurent Berger, dont elle est associée. Vincent le Cerf a fondé la société Metagenia, éditrice de logiciels et prestataire de formation dans les technologies du génie logiciel.

Related: