Kristen Huth's LIS 2600 blog
Tuesday, December 7, 2010
Thursday, December 2, 2010
Week 13 article
There were articles on the front page of the Post-Gazette and Tribune-Review this morning that relate to our Week 13 readings. Here is the link to the P-G one:
http://www.post-gazette.com/pg/10336/1107637-84.stm
The "Do Not Track" list would be similar to the "Do Not Call" list in that it would prevent companies from tracking your Internet activity. The FTC proposed the tool in a privacy report.
http://www.post-gazette.com/pg/10336/1107637-84.stm
The "Do Not Track" list would be similar to the "Do Not Call" list in that it would prevent companies from tracking your Internet activity. The FTC proposed the tool in a privacy report.
Wednesday, December 1, 2010
Week 13 notes
1) No place to hide site: http://www.noplacetohide.net/%20
This site was interesting and extremely relevant because we are constantly monitored. I think about that sometimes -- it seems like nothing is private. But on the other hand, when there is a shooting or terrorism plot, it always seems like they had some type of blog or digital trail that would have given clues. (Like the LA Fitness shootings in Pittsburgh in the summer of 2009 -- he has a blog in which he made suspicious comments. Or Richard Poplawski, charged with killing three Pittsburgh police officers in spring 2009 -- he made comments about killing cops on Internet radio.) Why aren't these nipped in the bud earlier if they are so closely monitored? I just think there is so much information, its impossible to mine it all -- making most of it useless.
2) TIA and data mining http://www.epic.org/privacy/profiling/tia/
It would be nice to get an update on this project, as most of the site was five years old or older. But this gave a good introduction and background of TIA. This would address some of my concerns from the above post: That there is so much being monitored, it's hard to determine what is useful in detecting threats. This is aside from the argument of whether it is ethical/moral to monitor so much ("Big Brother!"), which is a different debate. I can tell from this site that they are against much of this monitoring.
3) http://www.youtube.com/watch?v=hS8ywG5M_NQ
I got an error message saying this video had been removed because of a copyright claim by Viacom.
Kristen Huth
This site was interesting and extremely relevant because we are constantly monitored. I think about that sometimes -- it seems like nothing is private. But on the other hand, when there is a shooting or terrorism plot, it always seems like they had some type of blog or digital trail that would have given clues. (Like the LA Fitness shootings in Pittsburgh in the summer of 2009 -- he has a blog in which he made suspicious comments. Or Richard Poplawski, charged with killing three Pittsburgh police officers in spring 2009 -- he made comments about killing cops on Internet radio.) Why aren't these nipped in the bud earlier if they are so closely monitored? I just think there is so much information, its impossible to mine it all -- making most of it useless.
2) TIA and data mining http://www.epic.org/privacy/profiling/tia/
It would be nice to get an update on this project, as most of the site was five years old or older. But this gave a good introduction and background of TIA. This would address some of my concerns from the above post: That there is so much being monitored, it's hard to determine what is useful in detecting threats. This is aside from the argument of whether it is ethical/moral to monitor so much ("Big Brother!"), which is a different debate. I can tell from this site that they are against much of this monitoring.
3) http://www.youtube.com/watch?v=hS8ywG5M_NQ
I got an error message saying this video had been removed because of a copyright claim by Viacom.
Kristen Huth
Wednesday, November 24, 2010
Week 11 muddiest point
I saw that we had some updated assignment grades. Will we be getting updates on our blogs as well?
Thanks!
Thanks!
Wednesday, November 17, 2010
Subscribe to:
Posts (Atom)