Cyberspace Governance:

Size: px
Start display at page:

Download "Cyberspace Governance:"

Transcription

1 Cyberspace Governance: security, surveillance and privacy: metadata Virgilio Almeida Harvard University Cambridge, October 2016

2 References YA De Montjoye, CA Hidalgo, M Verleysen, VD Blondel, Unique in the crowd: The privacy bounds of human mobility Nature ScienMfic Reports, March YA De Montjoye, L Radaelli, VK Singh, Unique in the shopping mall: On the re- idenmfiability of credit card metadata, Science Vol. 347, Issue 6221, Hal Abelson et al., Keys under Doormats: MandaMng insecurity by requiring government access to all data and communicamons, Journal of Cybersecurity, Vol. 1(1) (2015). Virgilio Almeida, Doneda, Danilo and Marilia Monteiro, Governance Challenges for the Internet of Things, IEEE Internet CompuMng, vol. 19, no. 4, 2015

3 Course Outline The central goal of the course is to present students a combinamon of knowledge from mulmple disciplines in order to allow them to carry out evidence- based analysis of problems and issues related to cyberspace governance. Weeks : Cyberspace and Internet Governance Concepts a. The development of Internet, the main principles governing Internet b. The Regime Complex for Managing Global Cyber AcMviMes c. The Convergence of Social and Technological Networks d. Internet governance concepts and models e. ICANN and management of domain names f. IANA and management of IP addresses, the case of IPv6

4 Examples of the data-oriented approach Science and Nature armcles Privacy in the Crowd: the privacy bounds of human mobility Privacy in the Shopping Mall: on the reindenmfiability of credit card metadata Propose Changes to Policies Policy Issue: PRIVACY Collect Data: Mobility & Financial Analyze QuanHtaHve Results Create Empirical Data Models for Re- idenhficahon

5 Data can shed light on some key problems in cyberspace governance QuanMtaMve Research to Analyze Public and Private Policies for Cyberspace Development of Regulatory Models Interdisciplinary Studies Empirical Models AnalyMcal Models DATA

6 YA de Montjoye, L Radaelli, VK Singh, AS Pentland Science 347 (6221), UNIQUE IN THE SHOPPING MALL

7 Characteristics of the work It uses 3 months of credit card records for 1.1 million people It shows that four spamotemporal points are enough to uniquely re- idenmfy 90% of individuals. It shows that knowing the price of a transacmon increases the risk of reidenmficamon by 22%, on average. In science, it is essenmal for the data to be available and shareable. Sharing data allows scienmsts to build on previous work, replicate re- sults, or propose alternamve hypotheses and models. These metadata are generated by our use of technology and, hence, may reveal a lot about an individual. Making these data sets broadly available, therefore, requires solid quanmtamve guarantees on the risk of reidenmficamon, à privacy risks

8 Characteristics of the work: metrics Unicity quanmfies the intrinsic re- idenmficamon risk of a data set. Unicity quanmfies how much outside informamon one would need, on average, to re- idenmfy a specific and known user in a simply anonymized data set. The higher a data set s unicity is, the more reidenmfiable it is. Outside informamon could be a tweet that posimons a user at an approximate Mme for a mobility data set or a publicly available movie review for the Nehlix data set. A recent survey shows that financial and credit card data sets are considered the most sensimve personal data worldwide

9 Data Set To provide a quanmtamve assessment of the likelihood of idenmficamon from financial data, we used a data set D of 3 months of credit card transacmons for 1.1 million users in 10,000 shops The data set was simply anonymized, which means that it did not contain any names, account numbers, or obvious idenmfiers.

10 Results The risk of re- idenmficamon of D is quanmfied by unicity ε. Unicity is the risk of re- idenmficamon knowing p pieces of outside informamon about a user. It evaluates ε(p) of D as the percentage of its users who are re- idenmfied with p randomly selected points from their financial trace. Example: Suppose you are searching for Sco1 in a simply anonymized credit card data set. You know two points about Sco1: he went to the bakery on 23 September and to the restaurant on 24 September. Searching through the data set reveals that there is one and only one person in the enare data set who went to these two places on these two days. S(I p ) is thus equal to 1, Sco1 is re- idenafied, and you now know all of his other transacaons, such as the fact that he went shopping for shoes and groceries on 23 September, and how much he spent. Financial traces contain one addimonal column that can be used to reidenmfy an individual: the price of a transacmon. A piece of outside informamon, a spamotemporal tuple can become a triple: space, Mme, and the approximate price of the transacmon.

11 Results: metrics and plots

12 Results: metrics and plots

13 Unique in the Crowd

14 Science versus Art: in the context of cyberspace governance Science Principles Fundamental laws ExplanaMon Discovery Analysis DissecMon Art PracMce Skilled performance AcMon InvenMon Synthesis construcmon To understand informamon processes, computer scienmsts must observe phenomena, formulate explanamons, and test them. This is the scienmfic method Art refers to useful practices of a field. (*)Walter Tichy, Should Computer Scientists Experiment More?

15 Comments on the methods SCIENCE OBJECTS DOMINATING METHOD Logic & Mathematics Simple Abstract objects: propositions, numbers, Reductionism (analysis) Deduction Internet cyberspace Natural Sciences Social Sciences Humanities Natural objects: physical bodies, fields and interactions, living organisms Social objects: human individuals, groups, society, Cultural objects : human ideas, actions and relationships, language, artifacts Hypothetico-deductive method Hypothetico-deductive method + Hermeneutics Hermeneutics, Theory & methodology of interpretation (*)Gordana DODIG- CRNLOVIC ScienMfic Methods in Computer Science

16 Comments on the methods An example of a research quesmon: What privacy means in the digital age where everything is recorded and we leave permanent traces of our idenaty everywhere, whether we like it or not. So what is the relaaon between metadata and privacy? (*)Gordana DODIG- CRNLOVIC ScienMfic Methods in Computer Science

17 The Scientific Method Research question? ExisMng Knowledge 1 Theory SelecMon 6 Hypothesis must be adjusted Hypothesis 2 Hypothesis must be adjusted Old or New Theory confirmed 5 PredicMon 3 Tests & ObservaMon 4

18 Examples of the data-oriented approach Privacy in the Crowd: the privacy bounds of human mobility Privacy in the Shopping Mall: on the reindenmfiability of credit card metada Policy Issue: PRIVACY Propose Changes to Policies Collect Data: Mobility & Financial Analyze QuanHtaHve Results Create Empirical Data Models for Re- idenhficahon

19 Next Class 1. One or two paragraphs describing areas of interest (i.e., potenmal problems or topics) for the course project. I will review the proposals and suggest references. 2. Chapters 5 of DeNardis Book 3. Anne Edmundson, Roya ENsafi, Nick Feamster, Jennifer Rexford,Characterizing and Avoiding RouMng Detours Through Surveillance States, May Hal Abelson et al., Keys under Doormats: MandaMng insecurity by requiring government access to all data and communicamons, Journal of Cybersecurity, Vol. 1(1) (2015).

20 THANKS!

Cybersecurity Governance

Cybersecurity Governance Cybersecurity Governance Virgilio Almeida Harvard University Cambridge, September 2016 Discussion papers Elaine Mcardlle, The New Age of Surveillance, Harvard Law Today hgp://today.law.harvard.edu/feature/new-

More information

OSHA & Arc Flash. Scott Ray Distribution Project Engineer POWER Engineers, Inc.

OSHA & Arc Flash. Scott Ray Distribution Project Engineer POWER Engineers, Inc. OSHA & Arc Flash Scott Ray Distribution Project Engineer POWER Engineers, Inc. Outline Arc Flash Overview OSHA Overview Arc Flash Study Next Steps Why This Method? Questions Methodology Steps Analysis

More information

sdi ontology and implications for research in the developing world

sdi ontology and implications for research in the developing world sdi ontology and implications for research in the developing world yola georgiadou beyond sdi september 20, 2006 INTERNATIONAL INSTITUTE FOR GEO-INFORMATION SCIENCE AND EARTH OBSERVATION Structure Cycle

More information

Fall Can Baykan. Arch467 Design Methods

Fall Can Baykan. Arch467 Design Methods Arch 467 Design Methods 2019 Can Baykan 1 What is design? This is the first question of design theory,design methods, philosophy of design, etc. Types of problems design, diagnosis, classification Types

More information

Research Methodologies for Management Sciences & Interdisciplinary Research in Contemporary World

Research Methodologies for Management Sciences & Interdisciplinary Research in Contemporary World MPRA Munich Personal RePEc Archive Research Methodologies for Management Sciences & Interdisciplinary Research in Contemporary World Syed Akif Hasan and Muhammad Imtiaz Subhani and Ms. Amber Osman Iqra

More information

Economic Clusters Efficiency Mathematical Evaluation

Economic Clusters Efficiency Mathematical Evaluation European Journal of Scientific Research ISSN 1450-216X / 1450-202X Vol. 112 No 2 October, 2013, pp.277-281 http://www.europeanjournalofscientificresearch.com Economic Clusters Efficiency Mathematical Evaluation

More information

On the Internet, No One Knows You re A Researcher

On the Internet, No One Knows You re A Researcher On the Internet, No One Knows You re A Researcher Elizabeth Buchanan, Ph.D. Center for Information Policy Research School of Information Studies University of Wisconsin-Milwaukee Thanks to the National

More information

Towards a Software Engineering Research Framework: Extending Design Science Research

Towards a Software Engineering Research Framework: Extending Design Science Research Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

The Nature of Science in The Next Generation Science Standards

The Nature of Science in The Next Generation Science Standards The Nature of Science in The Next Generation Science Standards Scientists and science teachers agree that science is a way of explaining the natural world. In common parlance, science is both a set of

More information

Graph simple non-linear relations with and without the use of digital technologies and solve simple related equations.

Graph simple non-linear relations with and without the use of digital technologies and solve simple related equations. ACMNA296 7 8 9 10 11 12 TI-Nspire Investigation Student 50 min Objective Graph simple non-linear relations with and without the use of digital technologies and solve simple related equations. Introduction

More information

Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011

Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011 Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011 Preamble General education at the City University of New York (CUNY) should

More information

Do Populations Conform to the Law of Anomalous Numbers?

Do Populations Conform to the Law of Anomalous Numbers? Do Populations Conform to the Law of Anomalous Numbers? Frédéric SANDRON* The first significant digit of a number is its leftmost non-zero digit. For example, the first significant digit of the number

More information

On the Monty Hall Dilemma and Some Related Variations

On the Monty Hall Dilemma and Some Related Variations Communications in Mathematics and Applications Vol. 7, No. 2, pp. 151 157, 2016 ISSN 0975-8607 (online); 0976-5905 (print) Published by RGN Publications http://www.rgnpublications.com On the Monty Hall

More information

COMPLEXITY MEASURES OF DESIGN DRAWINGS AND THEIR APPLICATIONS

COMPLEXITY MEASURES OF DESIGN DRAWINGS AND THEIR APPLICATIONS The Ninth International Conference on Computing in Civil and Building Engineering April 3-5, 2002, Taipei, Taiwan COMPLEXITY MEASURES OF DESIGN DRAWINGS AND THEIR APPLICATIONS J. S. Gero and V. Kazakov

More information

Analogies Between Science and Design: What Models of Science Can Learn from Models of Engineering Design? Christian Schunn University of Pittsburgh

Analogies Between Science and Design: What Models of Science Can Learn from Models of Engineering Design? Christian Schunn University of Pittsburgh Analogies Between Science and Design: What Models of Science Can Learn from Models of Engineering Design? Christian Schunn University of Pittsburgh What I won t talk about Psychology of Science Complex

More information

SELFRIDGE AIR TRAFFIC CONTROL Mark Winsor, Air Traffic Manager, Steven Oliver, RAPCON Chief Controller,

SELFRIDGE AIR TRAFFIC CONTROL Mark Winsor, Air Traffic Manager, Steven Oliver, RAPCON Chief Controller, SELFRIDGE AIR TRAFFIC CONTROL Mark Winsor, Air Traffic Manager, 239-5190 Steven Oliver, RAPCON Chief Controller, 239-4517 APPROACH CONTROL AIRSPACE Click Click Click MTC NOT TO SCALE MTC

More information

Artificial Intelligence: Your Phone Is Smart, but Can It Think?

Artificial Intelligence: Your Phone Is Smart, but Can It Think? Artificial Intelligence: Your Phone Is Smart, but Can It Think? Mark Maloof Department of Computer Science Georgetown University Washington, DC 20057-1232 http://www.cs.georgetown.edu/~maloof Prelude 18

More information

Revised East Carolina University General Education Program

Revised East Carolina University General Education Program Faculty Senate Resolution #17-45 Approved by the Faculty Senate: April 18, 2017 Approved by the Chancellor: May 22, 2017 Revised East Carolina University General Education Program Replace the current policy,

More information

Thoughts on Reimagining The University. Rajiv Ramnath. Program Director, Software Cluster, NSF/OAC. Version: 03/09/17 00:15

Thoughts on Reimagining The University. Rajiv Ramnath. Program Director, Software Cluster, NSF/OAC. Version: 03/09/17 00:15 Thoughts on Reimagining The University Rajiv Ramnath Program Director, Software Cluster, NSF/OAC rramnath@nsf.gov Version: 03/09/17 00:15 Workshop Focus The research world has changed - how The university

More information

DRAFT 2016 CSTA K-12 CS

DRAFT 2016 CSTA K-12 CS 2016 CSTA K-12 CS Standards: Level 1 (Grades K-5) K-2 Locate and identify (using accurate terminology) computing, input, and output devices in a variety of environments (e.g., desktop and laptop computers,

More information

Advanced Cyberinfrastructure for Science, Engineering, and Public Policy 1

Advanced Cyberinfrastructure for Science, Engineering, and Public Policy 1 Advanced Cyberinfrastructure for Science, Engineering, and Public Policy 1 Vasant G. Honavar, Katherine Yelick, Klara Nahrstedt, Holly Rushmeier, Jennifer Rexford, Mark D. Hill, Elizabeth Bradley, and

More information

Tutorial: Metaphysics of Business Technology Research

Tutorial: Metaphysics of Business Technology Research Tutorial: Metaphysics of Business Technology Research Workshop on Social Aspects in Business Intelligence and Technology (SABIT), 24 March, 2015, Nice, France Janne J. Korhonen, Aalto University, Finland

More information

Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose

Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose John McCarthy Computer Science Department Stanford University Stanford, CA 94305. jmc@sail.stanford.edu

More information

Open Science for the 21 st century. A declaration of ALL European Academies

Open Science for the 21 st century. A declaration of ALL European Academies connecting excellence Open Science for the 21 st century A declaration of ALL European Academies presented at a special session with Mme Neelie Kroes, Vice-President of the European Commission, and Commissioner

More information

Research & Development (R&D) defined (3 phase process)

Research & Development (R&D) defined (3 phase process) Research & Development (R&D) defined (3 phase process) Contents Research & Development (R&D) defined (3 phase process)... 1 History of the international definition... 1 Three forms of research... 2 Phase

More information

Chapter 2 Scientific Method

Chapter 2 Scientific Method Chapter 2 Scientific Method Day Activity Homework 1 Notes I,II Cost/Benefit Case* Article Analysis 2 Notes III, IV Metric System WS/ Oil Spill Experiment* Graphing* 3 Notes V Satellite Imaging Activity*

More information

Fortunately, there are many good answers to this question!

Fortunately, there are many good answers to this question! The Many Reasons we Teach Science and What Everyone Should Know about How it Works ESTABLISH and SMEC 2012 Dublin City University 7-9 June, 2012 William F. McComas Parks Family Professor of Science Education

More information

INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS

INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS M.Baioletti, A.Milani, V.Poggioni and S.Suriani Mathematics and Computer Science Department University of Perugia Via Vanvitelli 1, 06123 Perugia, Italy

More information

Employment for All! Spectrum AGM Conrad Tyrkin October 2014

Employment for All! Spectrum AGM Conrad Tyrkin October 2014 Employment for All! Spectrum AGM Conrad Tyrkin October 2014 Thanks for having me! Today I want to talk about: - Who I am - Why we are talking about jobs - What we are doing about ge:ng jobs for everyone

More information

Computer & Information Science & Engineering (CISE)

Computer & Information Science & Engineering (CISE) Computer & Information Science & Engineering (CISE) Wendy J. Nilsen, PhD Computer and Information Science and Engineering http://www.nsf.gov/cise Advanced Cyberinfrastructure Computing & Communication

More information

Master of Comm. Systems Engineering (Structure C)

Master of Comm. Systems Engineering (Structure C) ENGINEERING Master of Comm. DURATION 1.5 YEARS 3 YEARS (Full time) 2.5 YEARS 4 YEARS (Part time) P R O G R A M I N F O Master of Communication System Engineering is a quarter research program where candidates

More information

Creating Scientific Concepts

Creating Scientific Concepts Creating Scientific Concepts Nancy J. Nersessian A Bradford Book The MIT Press Cambridge, Massachusetts London, England 2008 Massachusetts Institute of Technology All rights reserved. No part of this book

More information

CONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS...

CONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS... CONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS... XXI 1 INTRODUCTION... 1 1.1 Problem Definition... 1 1.2 Research Gap

More information

Introduction to Computer Science - PLTW #9340

Introduction to Computer Science - PLTW #9340 Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional

More information

How NFPA 921 can serve as your guide when scaling the subrogation mountain

How NFPA 921 can serve as your guide when scaling the subrogation mountain How NFPA 921 can serve as your guide when scaling the subrogation mountain 1 A subrogation case is never an easy mountain to climb. The climb is difficult under the best of circumstances. The terrain is

More information

FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR

FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR - DATE: TO: CHANCELLOR'S OFFICE FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR JUN 03 2011 June 3, 2011 Chancellor Sorensen FROM: Ned Weckmueller, Faculty Senate Chair UNIVERSITY OF WISCONSIN

More information

Office of Science and Technology Policy th Street Washington, DC 20502

Office of Science and Technology Policy th Street Washington, DC 20502 About IFT For more than 70 years, IFT has existed to advance the science of food. Our scientific society more than 17,000 members from more than 100 countries brings together food scientists and technologists

More information

A Modified Perspective of Decision Support in C 2

A Modified Perspective of Decision Support in C 2 SAND2005-2938C A Modified Perspective of Decision Support in C 2 June 14, 2005 Michael Senglaub, PhD Dave Harris Sandia National Labs Sandia is a multiprogram laboratory operated by Sandia Corporation,

More information

Outline of Presentation

Outline of Presentation Understanding Information Seeking Behaviors and User Experience: How to Apply Research Methodologies to Information Technology Management and New Product Design By Denis M. S. Lee Professor of Computer

More information

Chapter 1: About Science

Chapter 1: About Science Lecture Outline Chapter 1: About Science This lecture will help you understand: What Science Is Scientific Measurements Mathematics The Language of Science Scientific Methods Science, Art, and Religion

More information

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East** ` 17.181/17.182 SUSTAINABLE DEVELOPMENT Week 4 Outline Cyberspace and Sustainability 1. ISSUES left over from WEEK 3 Brief Review Some Empirical Views 2. CYBERSPACE Relevance to Sustainability? Critical

More information

Connectivity in Social Networks

Connectivity in Social Networks Sieteng Soh 1, Gongqi Lin 1, Subhash Kak 2 1 Curtin University, Perth, Australia 2 Oklahoma State University, Stillwater, USA Abstract The value of a social network is generally determined by its size

More information

The Beauty and Joy of Computing

The Beauty and Joy of Computing The Beauty and Joy of Computing UC Berkeley EECS Sr Lecturer SOE Dan Lecture #13 Social Implications of Computing III This meeting of privacy experts just finished, and the key questions that emerge: Will

More information

JonDonym Users Information Privacy Concerns

JonDonym Users Information Privacy Concerns JonDonym Users Information Privacy Concerns David Harborth and Sebastian Pape Chair of Mobile Business & Multilateral Security Goethe University Frankfurt am Main September 18th 2018 IFIP SEC 2018 Poznan

More information

Micro-synchrophasors for distribution systems: implications for grid reliability and resilience

Micro-synchrophasors for distribution systems: implications for grid reliability and resilience Micro-synchrophasors for distribution systems: implications for grid reliability and resilience i-pcgrid March 31, 2017 Dr. Alexandra (Sascha) von Meier Director, Electric Grid Research, California Institute

More information

_ To: The Office of the Controller General of Patents, Designs & Trade Marks Bhoudhik Sampada Bhavan, Antop Hill, S. M. Road, Mumbai

_ To: The Office of the Controller General of Patents, Designs & Trade Marks Bhoudhik Sampada Bhavan, Antop Hill, S. M. Road, Mumbai Philips Intellectual Property & Standards M Far, Manyata Tech Park, Manyata Nagar, Nagavara, Hebbal, Bangalore 560 045 Subject: Comments on draft guidelines for computer related inventions Date: 2013-07-26

More information

Introduction to VLSI ASIC Design and Technology

Introduction to VLSI ASIC Design and Technology Introduction to VLSI ASIC Design and Technology Paulo Moreira CERN - Geneva, Switzerland Paulo Moreira Introduction 1 Outline Introduction Is there a limit? Transistors CMOS building blocks Parasitics

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

MAT 1272 STATISTICS LESSON STATISTICS AND TYPES OF STATISTICS

MAT 1272 STATISTICS LESSON STATISTICS AND TYPES OF STATISTICS MAT 1272 STATISTICS LESSON 1 1.1 STATISTICS AND TYPES OF STATISTICS WHAT IS STATISTICS? STATISTICS STATISTICS IS THE SCIENCE OF COLLECTING, ANALYZING, PRESENTING, AND INTERPRETING DATA, AS WELL AS OF MAKING

More information

Indiana K-12 Computer Science Standards

Indiana K-12 Computer Science Standards Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,

More information

If These Crawls Could Talk: Studying and Documenting Web Archives Provenance

If These Crawls Could Talk: Studying and Documenting Web Archives Provenance If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby

More information

Techniques for Generating Sudoku Instances

Techniques for Generating Sudoku Instances Chapter Techniques for Generating Sudoku Instances Overview Sudoku puzzles become worldwide popular among many players in different intellectual levels. In this chapter, we are going to discuss different

More information

Paid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends

Paid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends Paid Surveys Secret The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report Published by Surveys & Friends http://www.surveysandfriends.com All Rights Reserved This

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Human-Computer Interaction Research: a Paradigm Clash?

Human-Computer Interaction Research: a Paradigm Clash? Human-Computer Interaction Research: a Paradigm Clash? G. W. MATTHIAS RAUTERBERG TECHNICAL UNIVERSITY EINDHOVEN FACULTY INDUSTRIAL DESIGN USER-CENTERED ENGINEERING GROUP (UCE) DEN DOLECH 2, 5600 MB EINDHOVEN,

More information

All that begins... peace be upon you

All that begins... peace be upon you All that begins... peace be upon you Faculty of Mechanical Engineering Department of Thermo Fluids Mechanical Engineering «an etymology» Abu Hasan ABDULLAH September 2017 Outline 1 Science & Engineering

More information

Take Control of Sudoku

Take Control of Sudoku Take Control of Sudoku Simon Sunatori, P.Eng./ing., M.Eng. (Engineering Physics), F.N.A., SM IEEE, LM WFS MagneScribe : A 3-in-1 Auto-Retractable Pen

More information

The Beauty and Joy of Computing

The Beauty and Joy of Computing The Beauty and Joy of Computing Data UC Berkeley EECS Sr Lecturer SOE Dan Bendable Displays!!! http://abcnews.go.com/technology/lgsflexible-screens-rolling-off-factory-lines/ story?id=20498107! Data and

More information

Ana Vang. LS00376_001 South Burlington- 1961

Ana Vang. LS00376_001 South Burlington- 1961 The Hydrologic Impacts of the Vermont Interstate Highway System Ana Vang LS00376_001 South Burlington- 1961 Outline Project Goals Interstate History Vermont Interstate Build- out and Impervious Surface

More information

Journal of Unconventional Oil and Gas Resources

Journal of Unconventional Oil and Gas Resources Journal of Unconventional Oil and Gas Resources 15 (2016) 146 157 Contents lists available at ScienceDirect Journal of Unconventional Oil and Gas Resources journal homepage: www.elsevier.com/locate/juogr

More information

What does the EUR-ACE Bachelor and Master label stay for?

What does the EUR-ACE Bachelor and Master label stay for? What does the EUR-ACE Bachelor and Master label stay for? ENAEE Conference Leuven, Sept. 2013 Dr.-Ing. Martin Molzahn ASIIN Accreditation Commission for Degree Programmes EUR-ACE label: increasing demand

More information

Nine Weeks: First Curriculum Map Instructor: Abbie Merryman Class: Photography & Digital Image Grade: 9-12 Shadyside Local Schools Building:

Nine Weeks: First Curriculum Map Instructor: Abbie Merryman Class: Photography & Digital Image Grade: 9-12 Shadyside Local Schools Building: Weeks: First Curriculum Map Instructor: Abbie Merryman Class: Photography & Digital Image Grade: 9-12 Shadyside Local Schools Building: Shadyside High Schoool Weeks Cognitive & Creative Learning Processes

More information

Comparative Study of various Surveys on Sentiment Analysis

Comparative Study of various Surveys on Sentiment Analysis Comparative Study of various Surveys on Milanjit Kaur 1, Deepak Kumar 2. 1 Student (M.Tech Scholar), Computer Science and Engineering, Lovely Professional University, Punjab, India. 2 Assistant Professor,

More information

Statistical Thinking & Methodology: Pillars of Data Availability & Quality in the Big Data Era

Statistical Thinking & Methodology: Pillars of Data Availability & Quality in the Big Data Era Statistical Thinking & Methodology: Pillars of Data Availability & Quality in the Big Data Era Pedro Luis do Nascimento Silva Principal Researcher, ENCE Contents Context Data quality Quality frameworks

More information

Computational Sciences and Engineering (CSE): A New Paradigm in Scientific Research & Education. Abul K. M. Fahimuddin

Computational Sciences and Engineering (CSE): A New Paradigm in Scientific Research & Education. Abul K. M. Fahimuddin Computational Sciences and Engineering (CSE): A New Paradigm in Scientific Research & Education Abul K. M. Fahimuddin Scientific Research Staff Germany Motivation: Chemical Dispersion in Urban Areas Motivation:

More information

Science of Computers: Epistemological Premises

Science of Computers: Epistemological Premises Science of Computers: Epistemological Premises Autonomous Systems Sistemi Autonomi Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università

More information

* * GEOGRAPHY 0460/04

* * GEOGRAPHY 0460/04 Cambridge IGCSE *0123456789* GEOGAPHY 0460/04 Paper 4 Alternative to Coursework r examination from 2020 SPECIME PAPE You must answer on the question paper. You will need: Insert (enclosed) uler Calculator

More information

Elements of Scholarly Discourse in a Digital World

Elements of Scholarly Discourse in a Digital World Elements of Scholarly Discourse in a Digital World Victoria Stodden Graduate School of Library and Information Science University of Illinois at Urbana-Champaign Center for Informatics Research in Science

More information

Use of ICT Technologies and its Dependency Level among P.G. Students and Faculty Members of G.B. Pant University of Agriculture and Technology

Use of ICT Technologies and its Dependency Level among P.G. Students and Faculty Members of G.B. Pant University of Agriculture and Technology Use of ICT Technologies and its Dependency Level among P.G. Students and Faculty Members of G.B. Pant University of Agriculture and Technology P. Mahesh Chandra Belwal 1 and M.Sadik Batcha 2 1 Research

More information

The Importance of Scientific Reproducibility in Evidence-based Rulemaking

The Importance of Scientific Reproducibility in Evidence-based Rulemaking The Importance of Scientific Reproducibility in Evidence-based Rulemaking Victoria Stodden School of Information Sciences University of Illinois at Urbana-Champaign Social and Decision Analytics Laboratory

More information

USER RESEARCH: THE CHALLENGES OF DESIGNING FOR PEOPLE DALIA EL-SHIMY UX RESEARCH LEAD, SHOPIFY

USER RESEARCH: THE CHALLENGES OF DESIGNING FOR PEOPLE DALIA EL-SHIMY UX RESEARCH LEAD, SHOPIFY USER RESEARCH: THE CHALLENGES OF DESIGNING FOR PEOPLE DALIA EL-SHIMY UX RESEARCH LEAD, SHOPIFY 1 USER-CENTERED DESIGN 2 3 USER RESEARCH IS A CRITICAL COMPONENT OF USER-CENTERED DESIGN 4 A brief historical

More information

2 Smart Cities. Big Data, Real Time Transport, Social Media, and Urban Simulation Michael

2 Smart Cities. Big Data, Real Time Transport, Social Media, and Urban Simulation Michael 5 th February 2014 2 Smart Cities Big Data, Real Time Transport, Social Media, and Urban Simulation Michael Batty m.batty@ucl.ac.uk @jmichaelbatty http://www.complexcity.info/ http://www.casa.ucl.ac.uk/

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia.

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia. COS 109: Computers in our World Andrea LaPaugh aslp@cs.princeton.edu www.cs.princeton.edu/~aslp 304 Computer Science Building, 258-4568 (email is always better) TAs: Jacopo Cesareo, 103B CS Building, jcesareo@...,

More information

Big data for the analysis of digital economy & society Beyond bibliometrics

Big data for the analysis of digital economy & society Beyond bibliometrics 0 Big data for the analysis of digital economy & society Beyond bibliometrics Stephane Berghmans, DVM PhD VP Academic & Research Relations EU, Elsevier With support from Judith Kamalski (Analytical Services)

More information

Internet of Things. (Ref: Slideshare)

Internet of Things. (Ref: Slideshare) Internet of Things (Ref: Slideshare) Contents Introduction/Overview The Internet of Things Applications of IoT Challenges and Barriers in IoT Future of IoT Internet Revolution Impact of the Internet Education

More information

Research Statement. Imani Palmer

Research Statement. Imani Palmer Research Statement Imani Palmer I have a profound passion for security and privacy research. My key research focuses on science of security, applied hacking, and security education. My current research

More information

Computational Reproducibility in Medical Research:

Computational Reproducibility in Medical Research: Computational Reproducibility in Medical Research: Toward Open Code and Data Victoria Stodden School of Information Sciences University of Illinois at Urbana-Champaign R / Medicine Yale University September

More information

code V(n,k) := words module

code V(n,k) := words module Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible

More information

POLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS

POLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS Faculty of Computer Science - University of Indonesia POLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS RESEARCH METHODOLOGY CLASS Lecturer : RIRI SATRIA Date : October

More information

The Need for Hypotheses in Informatics

The Need for Hypotheses in Informatics The Need for Hypotheses in Informatics Alan Bundy University of Edinburgh 9-Oct-10 1 The Significance of Research 9-Oct-10 2 Importance of Hypotheses Science and engineering proceed by the formulation

More information

Thanks, and Apologies What This Lecture will be About

Thanks, and Apologies What This Lecture will be About 5 October 2013 Prix Vautrin Lud Smart Cities, Virtual Realities & Big Data in the Global Age Michael Batty m.batty@ucl.ac.uk @jmichaelbatty http://www.complexcity.info/ http://www.spatialcomplexity.info/

More information

1 Name of Course Module: History and Philosophy of Science-2. 2 Course Code: 3 Name(s) of academic staff: Prof. C. K. Raju

1 Name of Course Module: History and Philosophy of Science-2. 2 Course Code: 3 Name(s) of academic staff: Prof. C. K. Raju 1 Name of Course Module: History and Philosophy of Science-2 2 Course Code: 3 Name(s) of academic staff: Prof. C. K. Raju 4 Rationale for the inclusion of the course/module in the programme: 1. Part 1

More information

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Fundamentals (Normally to be taken during the first year of college study) 1. Towson Seminar (3 credit hours) Applicable Learning

More information

Level Below Basic Basic Proficient Advanced. Policy PLDs. Cognitive Complexity

Level Below Basic Basic Proficient Advanced. Policy PLDs. Cognitive Complexity Level Below Basic Basic Proficient Advanced Policy PLDs (Performance Level Descriptors) General descriptors that provide overall claims about a student's performance in each performance level; used to

More information

Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema

Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Neeraj Sharma Associate Professor Department of Computer Science Punjabi University, Patiala (India) ABSTRACT

More information

Riel Miller, UNESCO, Riel Miller Head of Foresight

Riel Miller, UNESCO, Riel Miller Head of Foresight Riel Miller Head of Foresight The Emergent Present: Repetition & Difference In an emergent present the only constant is change the change of that which repeats and that which is different. The future only

More information

CONCURRENT AND RETROSPECTIVE PROTOCOLS AND COMPUTER-AIDED ARCHITECTURAL DESIGN

CONCURRENT AND RETROSPECTIVE PROTOCOLS AND COMPUTER-AIDED ARCHITECTURAL DESIGN CONCURRENT AND RETROSPECTIVE PROTOCOLS AND COMPUTER-AIDED ARCHITECTURAL DESIGN JOHN S. GERO AND HSIEN-HUI TANG Key Centre of Design Computing and Cognition Department of Architectural and Design Science

More information

Because what is Known must be Shared

Because what is Known must be Shared Because what is Known must be Shared Academic Experience as Intellectual Property Dr Evangelia Lipitakis Solutions Consultant Clarivate Analytics Evangelia.lipitakis@clarivate.com Father of Citation Indexing

More information

Trusted Data Intermediaries

Trusted Data Intermediaries Workshop Summary Trusted Data Intermediaries Civil society organizations increasingly use a combination of money, time and digital data for public good. The question facing these organizations is how to

More information

Harmonic Distortion Levels Measured at The Enmax Substations

Harmonic Distortion Levels Measured at The Enmax Substations Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned

More information

Slide 15 The "social contract" implicit in the patent system

Slide 15 The social contract implicit in the patent system Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from

More information

Design thinking, process and creative techniques

Design thinking, process and creative techniques Design thinking, process and creative techniques irene mavrommati manifesto for growth bruce mau Allow events to change you. Forget about good. Process is more important than outcome. Don t be cool Cool

More information

Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society

Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society State of the Art Agenda Technological Potential & Legal Implications Looking Ahead: Key Policy

More information

Unit 11 Probability. Round 1 Round 2 Round 3 Round 4

Unit 11 Probability. Round 1 Round 2 Round 3 Round 4 Study Notes 11.1 Intro to Probability Unit 11 Probability Many events can t be predicted with total certainty. The best thing we can do is say how likely they are to happen, using the idea of probability.

More information

INTRODUCTION TO CULTURAL ANTHROPOLOGY

INTRODUCTION TO CULTURAL ANTHROPOLOGY Suggested Course Options Pitt Greensburg- Dual Enrollment in Fall 2018 (University Preview Program) For the complete Schedule of Classes, visit www.greensburg.pitt.edu/academics/class-schedules ANTH 0582

More information

Overview of the Research Process Comments by Dan A. Simunic, UBC

Overview of the Research Process Comments by Dan A. Simunic, UBC Overview of the Research Process Comments by Dan A. Simunic, UBC Craft of Accounting Research Workshop June 2016 Planning a Research Project Idea Research Question(s) What has already been done? Literature

More information

INVESTIGATING BINAURAL LOCALISATION ABILITIES FOR PROPOSING A STANDARDISED TESTING ENVIRONMENT FOR BINAURAL SYSTEMS

INVESTIGATING BINAURAL LOCALISATION ABILITIES FOR PROPOSING A STANDARDISED TESTING ENVIRONMENT FOR BINAURAL SYSTEMS 20-21 September 2018, BULGARIA 1 Proceedings of the International Conference on Information Technologies (InfoTech-2018) 20-21 September 2018, Bulgaria INVESTIGATING BINAURAL LOCALISATION ABILITIES FOR

More information

IAEA Training in level 1 PSA and PSA applications. PSA Project. IAEA Guidelines for PSA

IAEA Training in level 1 PSA and PSA applications. PSA Project. IAEA Guidelines for PSA IAEA Training in level 1 PSA and PSA applications PSA Project IAEA Guidelines for PSA Introduction The following slides present the IAEA documents that deal with procedures, guidance and good practices

More information

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)

HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,

More information