Monday, December 20, 2010

Net Neutrality Legislation Passes in the US!

"The Federal Communications Commission is poised on Tuesday to pass net neutrality regulations, rules that would for the first time prevent Internet service providers from blocking or giving preferential treatment to Web sites on their networks."

A win for open access on hard-wires broadband. However, 3G networks will be open to data-throttling.

http://voices.washingtonpost.com/posttech/2010/12/fcc_copps_to_vote_in_favor_of.html?hpid=topnews

Monday, December 13, 2010

Inside Job

Saw this movie a few days ago (imdb) and thought -
Is the global financial crisis an example of ethical egoism being unstable? Will it stabilize, or are the egos/interests of those involved too deeply associated with the legislation controlling the financial sector (specifically in the US).

Sunday, December 12, 2010

Has the Internet changed science?

I saw this interesting essay the other day about the impact of the internet and "big data" on science, and thought I'd share it here. Data mining in science is an impact of computing we didn't really get to talk about when we covered data mining, and may well wind up being a pretty important impact.

Link is here: http://www.wisdomofwhores.com/wp-content/uploads/2010/12/Prospect_Big_data.pdf

Saturday, December 11, 2010

"Delete Facebook Account" search on Google

The search "delete facebook account" is more popular on Google. Found the stats on this to be pretty interesting:

http://www.google.com/insights/search/#q=delete%20facebook%20account&cmpt=q

Any connection with the stats and facebook users being aware of privacy issues?

Wednesday, December 8, 2010

Live updates of DDoS attacks against Visa/Mastercard

http://www.guardian.co.uk/news/blog/2010/dec/08/wikileaks-us-embassy-cables-live-updates

The technological and commercial skirmishes over WikiLeaks escalated into a full-blown online assault yesterday when, in a serious breach of internet security, a concerted online attack by activist supporters of WikiLeaks succeeded in disrupting MasterCard and Visa.

The acts were explicitly in "revenge" for the credit card companies' recent decisions to freeze all payments to the site, blaming illegal activity. Though it initially would acknowledge no more than "heavy traffic on its external corporate website", MasterCard was forced to admit last night that it had experienced "a service disruption to the MasterCard directory server", which banking sources said meant disruption throughout its global business.

Later, Visa's website was also inaccessible. A spokeswoman for Visa said the site was "experiencing heavier than normal traffic" and repeated attempts to load the Visa.com site was met without success.


Friday, December 3, 2010

CAN-SPAM Act in action

23 year old Russian spammer pleaded not guilty against spam related charges today. It's estimated that he was responsible for up to a third of the world's spam mail.
He's being charged with laws implemented by the CAN-SPAM Act. I think it'll be interesting to see how his trial lasts.

http://ca.reuters.com/article/technologyNews/idCATRE6B25FW20101203

see what information is collected about you

starting in January, we will be able to see what advertising/data-mining companies know about us based on our online movements.



http://betteradvertising.com/

New York professor installs camera in head

 We had a really interesting last CS430 lecture today talking about what we think the future may look like and how this would impact society. While this isn't exactly state of the art technology, I came across this article where a professor (Bilal) implants a camera on the back of his head.

http://www.cnn.com/2010/US/12/02/new.york.camera.head/index.html?hpt=C1

There are obvious privacy concerns and university authorities require a cover  over the lens when Bilal is teaching on campus.

Monday, November 29, 2010

WikiLeaks 9/11

I am pretty sure many people have read or heard about this today.
Just want to share to people who have not realize this.

A brief summary of this is about 250000 highly confidential US diplomatic documents have been leaked out. I think this is related to our security topic.

http://wikileaks.org/

Sunday, November 28, 2010

Another side of technology and society

I thought I'd share this article on biotechnology and society. It touches on a lot of issues that can be relevant to technology and society in general, and indeed there is a brief discussion of AI and computing towards the end of the article: http://www.matnat.uio.no/forskning/utdanning/forskerkurs/MNSES/host2009/midgley.pdf

Thursday, November 25, 2010

Can you go to jail because of your tweets?

Few days ago, South and North Korea had a military confrontation. Amidst the flood of news articles on that subject, one article caught my eyes. It was saying that the South Korean police is arresting anyone who are spreading false rumors.
A few people were arrested because they either send cell phone text messages to random people or wrote on their social network services (such as Facebook wall or Twitter) false information such as Kim Jong-il is dead or North Korean army officially invaded the South.

There have been some people saying because of the wide reach of technology and especially wide reach of the social networking services it has become so easy for rumors to spread out. There was a study saying that most people spread the rumor over Facebook or Twitter without even checking whether the rumor is true or not.

So, here's my question. If I get arrested based on what I post on my Facebook wall, is that a violation of my freedom of speech? Also, am I responsible to check everything I post is true? Are my posts weigh as important as official news articles from professional journalists (like those work for CBC or CNN)?

Tuesday, November 23, 2010

Judge Bars ‘Fair Use’ Defense in Xbox Modding Trial

Just came across this earlier... found it very interesting as we specifically discussed what is and isn't fair use in class, and I was under the assumption that this WOULD be fair use. However, the judge apparently doesn't think so. Maybe the definition needs to be revamped in this new era?

Thoughts?

http://www.wired.com/threatlevel/2010/11/crippen/

Sunday, November 21, 2010

E-mail Privacy

Interesting story for those who follow hockey. Colin Campbell, the current senior vice president and director of hockey operations is being questioned for several emails he sent discussing calls made by referees. The biggest controversy centering around Campbell is his unhappiness about a high-sticking penalty assessed to his son.

Campbell has the power to suspend players so there are obvious "conflict of interest" concerns if his son is a player in the league. Tyler Dellow writes the blog and works as a lawyer in Toronto. He says "the morals of this little tale? There are many. Never put anything into an email that you wouldn’t be fine with seeing in print on the front page of a national newspaper."
Should e-mails be considered private conversations? Do we have to watch what we write in our emails? Apparently a lawyer thinks we should be careful!

Pin-less debit card

http://news.sympatico.ca/oped/coffee-talk/pin-less_debit_cards_coming_to_banks/5b7eb7aa

so starting from next summer, we maybe able to see this in Canada.
The basic idea of this card is to flash it above a detecting device and your items would be paid.

Personally, I think this idea is similar to those smart card idea. For example, in HK, we have the Octopus Card ( for more information go here: http://www.octopus.com.hk/home/en/index.html ) for many years already. Hence, I think Canada is a bit slow in using these technology.

Also, I kind of agree with the man in the news video that why they don't integrate this service into mobile devices? I am not 100% sure but I heard from my friends from Japan that they can do these similar transactions using their mobile devices. Maybe Joseph could show us some of these technology from Japan?

What do you guys think about this "new" pin-less debit card? Do you think it would be useful or effective at all?

Saturday, November 20, 2010

Old news but not everyone knows about it

So back in October, the government passed a proposal by Bell to allow, on-top of monthly charges, charge by usage after the given bandwidth is met. So it practically works like our cellular phone services, you're charged overages.
Bell is one of the major ISPs over at the east coast and some people say that the government is trying to not let outside companies to try and compete (and improve) our internet infrastructure, bringing down competition.

http://www.crtc.gc.ca/eng/archive/2010/2010-802.htm

long read, tldr; for me.

But because of this, somewhere closer to us, Shaw has implemented a trial system of overage usage charges over at Edmonton.

http://www.dslreports.com/shownews/Shaw-Confirms-Plans-To-Charge-Per-Gig-Overages-11113

They are potentially bringing it to all the provinces they service.

What does that means to a lot of us? We're for sure gonna hit the cap and they're gonna milk money off consumers. They are overcharging at around $2 a gig, now by my experience of renting servers at data centers, I can buy like an extra block of 1TB of premium bandwidth for probably less than 20 bucks a month, I pay for a shared 100mbit unmetered hub at 35bucks with a server per month thats in Germany. The theoretical cap is about 4000GB/4TB which works out to be around 115Gigs per buck at a data center. Although its different because shaw has to send the service to you and do the infrastructure, the difference is HUGE.

With new streaming services to Canada like Netflix, we are also going to have a higher usage because of streaming HD content. So the upfront cost of Netflix is 8bucks or so, but by using it, we're also using up our bandwidth, which besides from the monthly cost, now has the overage usage cost, so we'll need to factor in the cost per movie we're streaming in the total cost of Netflix. I would probably be better off renting at Rogers than wasting my bandwidth streaming. It is also not a fair trade if you think about it. You are streaming thus you are not recording (well you can but lets say you cant). The amount of bandwidth used is not equal to the amount of data you get to store on your hard drive. In a sense it becomes a waste of bandwidth because you cant use that same portion of bandwidth again from playback because it is streamed.

Digital distribution platforms, getting more and more popular these days. Now I buy a lot of games off Steam and always delete/reinstall because of limited hard drive space. With the change, I will think twice as each game can cost me around 6 gigs of bandwidth (Black ops was 6 gigs). So besides the fact of the delete/reinstall cycle, the initial download will cost bandwidth, I will probably not bother buying anymore games online because It'll cost me another 10 bucks or so to download it. I personally do not see the future of digital distribution and DLC with implementation of these charges. Hell I'll stop my PS3 from auto-updating stuff as well. This may discourage mp3 buying sites like itunes, I'm not paying 99cents anymore, I'm paying a dollar and some cents plus tax. iTunes rental? nope not doing it 2.99 + atleast another 4 bucks for HD.

So all this may somehow tie into Net Neutrality in some ways. A question to ask is if I am getting charged per Gigabyte, is there a reason to prioritize say emails, because I am paying to use that bandwidth. Should ISPs still packet shape your transfers even though you are paying per gigabyte to use it?

so the tl:dr of all this is that the government is pretty backwards I guess.

Wednesday, November 17, 2010

International IT Security Issues: Operation Aurora and Stuxnet

Operation Aurora is the name given to a series of security compromises which affected GMail and other online services. It was widely portrayed in the popular press as an incident of international cyber-espionage, with Chinese government operatives against (mostly American) global IT firms.


Stuxnet is the name of a Windows worm. Again, the popular press portrayed it as likely to be the product of Israeli efforts to sabotage Iran's nuclear industry.


With your knowledge of computer systems and security of networked systems, do you believe these stories? Are the claims justified? Is this a kind of modern-day warfare? Have your say in the comments.

a very good animation by banksy

http://www.youtube.com/watch?v=DX1iplQQJTo

Tuesday, November 16, 2010

Body Scanners Revealed

 As mentioned in class and in the textbook, body scanners are being used more and more in international airports.  In order to increase privacy, the body scanners were supposed to be made "non-recordable" - the scanned images were not supposed to be recorded on the scanner.  However, it looks like that didn't quite work out...

http://www.msnbc.msn.com/id/40218074/?gt1=43001

Video on new Facebook Messaging

http://blogs.forbes.com/oliverchiang/2010/11/16/whats-facebook-messages-facebook-made-a-video-to-explain/

All users to get an @facebook.com email.

One feature that stuck out: FB promises to converge all SMS, emails and such in threaded conversations. They claim that privacy is not compromised.

Robots with ethics

Computers "learning" ethical theories? Meet Nao!
Interesting article describing the combination of artificial intelligence and ethical theories.

Actors unhappy with Canada's Bill C-32

There is a lot of debate over Canada's Bill C-32 which deals with copy right issues.

Actors believe the bill provides too much leeway for consumers. They are pushing for a levy to be added to hard drives and mp3 players in Canada. They are also against providing teachers with greater exemption with copy righted material used for education.

http://ca.news.yahoo.com/s/capress/101116/entertainment/actra_content

A really interesting article from the New Yorker

http://www.newyorker.com/reporting/2010/11/01/101101fa_fact_hersh

Saturday, November 13, 2010

Obama administration to target Internet privacy

After all this time, a certain degree of government regulated privacy may be in order...

Obama’s administration, in a break from previous governments that relied on the Internet industry’s self-regulation, will take a more hands-on approach to online privacy, an issue that has embroiled Internet giants Google and Facebook in recent months.

Read more:
http://www.vancouversun.com/technology/Obama+administration+target+Internet+privacy+report/3818787/story.html#ixzz15DjvKNXe

It's not "hypertext" as we know it...

Related to several topics from the censorship / online speech / internet addiction unit...


Sex, drugs more common in hyper-texting teens

By MIKE STOBBE, AP Medical Writer – Tue Nov 9, 4:09 am ET

ATLANTA – Teens who text 120 times a day or more — and there seems to be a lot of them — are more likely to have had sex or used alcohol and drugs than kids who don't send as many messages, according to provocative new research.

The study's authors aren't suggesting that "hyper-texting" leads to sex, drinking or drugs, but say it's startling to see an apparent link between excessive messaging and that kind of risky behavior.

...


http://news.yahoo.com/s/ap/20101109/ap_on_he_me/us_med_teens_texting


-----------------



I get the feeling a lot of people aren't going to notice the difference between correlation and causation...

Friday, November 12, 2010

Wednesday, November 24, 2010 is NATIONAL OPT-OUT DAY!

An activist opposed to the new airport body scanners is encouraging passengers to opt-out when security asks them to go through one of the machines on November 24 (America's Thanksgiving Day).


"...the government has done little to ensure that images taken by the devices are not saved. The TSA has asserted that the machines cannot store pictures, but security personnel at a courthouse in Florida were found to not only have saved images but shared them among colleagues in order to humiliate one of their co-workers."
More information National Opt-Out Day: http://www.optoutday.com/ As stated on the site, the goal of National Opt Out Day is to "send a message to our lawmakers that we demand change.  We have a right to privacy and buying a plane ticket should not mean that we're guilty until proven innocent.  This day is needed because many people do not understand what they consent to when choosing to fly."

Facebook for the "privacy paranoid"

Facebook has created another option for users who want to maintain more privacy: the super-logoff. It works the same way as deactivating your account, so no one can post on your wall, tag you in photos, or see your profile while you are super-loggedoff. The article itself is pretty interesting.

http://www.cnn.com/2010/TECH/social.media/11/12/facebook.superlogoff/index.html?eref=mrss_igoogle_cnn

Wednesday, November 10, 2010

Sask. man fights for Internet privacy after child porn conviction

This article kind of relates back to the privacy unit. Basically this guy was caught sharing child pornography on Limewire and claims that this activity should have been private and he therefore shouldn't have been convicted, even though he was openly sharing the files with other users. This case could also set a legal precedent for government associated ISPs to be able to give out people's contact information to law-enforcement agencies, a precedent that could potentially have implications far beyond child pornography convictions; for example, people illegally sharing files through Limewire and other similar programs might be affected.

Sask. man fights for Internet privacy after child porn conviction

Tuesday, November 9, 2010

Supreme Court Denies to Hear PATRIOT Act Challenge

Brandon Mayfield, wrongly accused as part of the Madrid bombings through matching of a partial fingerprint, has, "...lost his bid to have part of the Foreign Intelligence Surveillance Act declared unconstitutional." See the full story here:

http://www.csmonitor.com/USA/Justice/2010/1101/Supreme-Court-declines-to-hear-wrongly-accused-man-s-Patriot-Act-challenge

Sunday, November 7, 2010

Students' free speech rights on the move in the US

Normally, I try to keep blog posts very closely related to the theme of computers and society, but here's an article that underscores our discussion of the changing rules and norms of rules about free speech.

San Francisco Chronicle, November 5, 2010

Coles Notes (that's Cliff's Notes for us Americans): a court in the U.S. has declared groundless a high school student's objection to being forced to cheer for a player who assaulted her. The article includes an informative discussion and links about the steady shift in the U.S. judiciary's interpretation of free speech rights -- from favouring students' rights, to favouring institutions such as schools.

I was on the newspaper crew in high school (and thus one of the first non-university/military users of the Internet...) My teachers told me to take seriously the lessons on free speech, libel and attribution -- because the speech of students was constitutionally protected, and we had the power to enact real social change through our speech. I wonder if students today feel the same sense of empowerment and responsibility.

Anyway, in CPSC 430 we studied examples of how restrictions on electronic communications get determined by a host of factors: ethical arguments, social contract theory, Mill's Principle of Harm, and, perhaps more than we realize, cultural relativism. We saw that China's restrictions on speech on the Internet are motivated by factors that aren't so different from those that shape the laws in the U.S. and Canada -- CIPA, the Patriot Act, and PIPEDA are as much a product of the public concern of the moment, and nationalistic interests, as they are descended from universal moral laws of the kind Kant envisioned.

As UBC grads, you will be leaders and people will look to you for insight on technology. When it's your turn to decide what society should make of an emerging technology that we never imagined a few years prior, I hope you will remember CPSC 430 and take a broad view of the issues that determine society's complex relationship with information technology.

Friday, November 5, 2010

Meizu dead? Fake IPhone gone? No~no~

Here is the newest Hiphone 4GS!

http://www.youtube.com/watch?v=RJL1Az16DEo

Hiphone 4 Hiphone 4GS Features:
• GSM Compatibility: Frequencies 850MHZ, 900MHZ, 1800MHZ, 1900MHZ
• Language: English, Spanish, French, Polish, Portuguese, Italian, German, Bahasa Melayu, Bahasa Indonesia, Czech, Dutch, Vietnamese, Russian, Bulgarian, Thai, Greek.
• Hiphone 4 Hiphone 4GS Screen: 3.3 inch, QVGA high vivid touch screen, 240*320 pixels
• Hiphone 4 Hiphone 4GS SIM Card Slots: 2 Card Slots
• Hiphone 4 Hiphone 4GS SIM Card Modes: Dual SIM open, Only SIM1 open, Only SIM2 open, Flight Mode
• Hiphone 4 Hiphone 4GS Security Settings: Phone lock, Auto Keypad lock, Change password
• Hiphone 4 Hiphone 4GS Camera: Dual camera. 2.0M pixel on the rear and self-capture camera on the front panel. Supports video-shoot, the duration depends on storage.
• Audio Player: Built-in
• Ring tone: supports MP3 audio record as ring tone
• User Profiles: General, Meeting, Outdoor, Indoor, Headset, Bluetooth
• Memory: Internal 89MB memory. TF Card Support (Up to 4GB in size)
• Vibration: Support
• Hiphone 4 GPRS Support: Browse WAP Website
• Messaging: SMS, MMS, Chat
• Games: Built-in Funny Games
• E-Book Reader: TXT
• JAVA Support: JAVA 2.0
• Bluetooth Support: Bluetooth 2.0
• Power Source: Standard Li-ion Battery
• Analog TV: YES
• Virtual keypad: Support
• Audio Output: Mini USB Port
• Shape: Bar Phone
• Hiphone 4 Dimensions:113 mm*59mm*13mm

Hiphone 4 Hiphone 4GS Specification:
• Multimedia:
- Camera, Image Viewer, Video Player, FM Radio, Sound recorder.
- Audio Player, Video recorder, E-book Reader, Analog TV
• File formats:
- Music: MP3, AMR, MID, WAV
- Image: BMP, GIF, JPG, BNG
- Video: 3GP, MP4
- E-Book: TXT
• TV Function:
- Type: Analog
- Options: Channel List, Manual input, My Channel, Channel Search, Search Area
- TV Record Format: 3GP
• Digital Still Camera:
- Image Quality: High, Normal, Low
- Camera Settings: Shuttle Sound, Delay Timer, Continuous Shot
- Other Options: White Balance, Scene Mode, Effect Settings, Set Frame
- EV: 4 steps (+2 to -2)
- Banding: 50Hz / 60Hz
• Video recorder:
- Video Record Format: 3GP
- Video Quality: Normal, Low, High
- Video Settings: Effects, White Balance, LED Highlight
- EV: 4 steps (+2 to -2)
- Banding: 50Hz / 60Hz
• Sound recorder setting:
- Storage: Phone, Memory Card
- File Format: AMR, WAV, AWB
- Sound quality: Low, High
• Audio Player:
- Formats: MP3, AMR, MID, WAV
- Options: Refresh list, Settings.
- Settings: Player Settings, Sound effects, Bluetooth Settings.
• FM Radio:
- Radio FM Tuner Frequency: 87.5MHz to 108MHz
- Background Play: ON, OFF
- Loudspeakers: ON, OFF
- Record Function: Yes
• Bluetooth:
- Type: MTK BT DEVICE
- Supported Service Profiles: Handsfree, Headset, SPP, DUN, OPP, FTP, A2DP, AVRCP, HID, BIP, SyncML service.
- Options: Power, Inquiry Audio Device, Remote Control, My Device, Active Devices, Settings
• Battery Life:
- Talk Time: Up to 3 hours
- Music Play: Up to 7 hours
- Stand By: Up to 120 hours
• Personal Organizer:
- Calendar, Tasks, World Clock, Synchronization, Phone sync.

Hiphone 4 Hiphone 4GS Package Content:
• 1 x F080 Mobile Phone
• 2 x Standard Li-ion Battery
• 1 x Travel Charger
• 1 x USB Cable
• 1 x User’s Manual (English)
• 1 x wired earphones with MIC and clip

Facebook Firing

Two Pitt Meadows car-detailing workers were fired for posting nasty comments and threats against their bosses on face book. According to the article this is the first clear case of a firing related to facebook postings.

http://ca.news.yahoo.com/s/03112010/73/bc-first-clear-facebook-firing-canada-occurs-pitt-meadows.html

Recommended Reading for Tuesday: "The Image Microsoft Doesn't Want You To See"

From The Daily Mail (UK):


The image Microsoft doesn't want you to see: Too tired to stay awake, the Chinese workers earning just 34p an hour
By LIZ HULL and LEE SORRELL

Showing Chinese sweatshop workers slumped over their desks with exhaustion, it is an image that Microsoft won't want the world to see.
Employed for gruelling 15-hour shifts, in appalling conditions and 86f heat, many fall asleep on their stations during their meagre ten-minute breaks.
For as little as 34p an hour, the men and women work six or seven days a week, making computer mice and web cams for the American multinational computer company.








Thursday, November 4, 2010

Who's suing who? [Visualized]

For all the legal battles and patent infringements we hear about in class that keep popping up between Apple and Nokia, Nokia and Apple, HTC and Apple, etc. It can get overwhelming trying to keep up with everything.

Google for a Big Brother award in 2003

I find this article very interesting/entertaining about Google. Somehow it reminds me of the book 1984 by Orwell.


http://www.google-watch.org/bigbro.html

Wednesday, November 3, 2010

closing Digital Divide

While reading on topics about digital divide, I can't help but start searching statistics on Internet access again (the book uses world region in its discussion on global divide, where the statistic comes from International Communication Union. However, my understanding about the region *Asia* is that there are huge gaps within Asia itself, so there must be a lot of outliers in Asia...).

In terms of closing digital divide, I think South Korea can provide the most successful story. First of all, S. Korea has the fastest Internet connections with more than 94% of people having high-speed connections. There is an article talks about "Why Internet connections are fastest in South Korea." The article explains why S. Korea has the fastest Internet connections, and mentions several factors: the broadband industry is competitive in S. Korea, its culture places high value on education, it uses open networks and infrustractures to lower the entry barriers for small companies, it has more dense population, and most importantly, a strong government policy to promote the Internet.

Korean government not only created a special agency (Agency for Digital pportunity & Promotion) to promote the Internet usages, but also put a lot of efforts into education. There is another article that discusses how it deals with digital divide: Korea Bridges Digital Divide

I guess S. Korea has proven that as long as the government has a well-planned policy to battle the problem, the first 2 critiques Mark Warschauer made would no longer be issues?

Gaming can make a better world

Quite an interesting talking on how gaming will make our world a better place because it aspires people to collaborate and do good.

Check it out here:
http://www.ted.com/talks/jane_mcgonigal_gaming_can_make_a_better_world.html

Tuesday, November 2, 2010

Facebook knows when you'll break up...

More than meets the eye... visual analytics allows more to be pulled from the reams of data than ever before:

http://www.cnn.com/2010/TECH/social.media/11/02/facebook.breakups/index.html?hpt=T2

This raises some interesting questions regarding privacy: At what point do we draw the line as to what is public access? Is using special tools to derive more information from one's behaviours on a social networking site (for example) still respecting one's privacy?

Another interesting question: how far does your assumption of privacy extend? Consider the following: I think we're all in agreement that if you submit something to a web site, be it a submitted data field, or toggling a setting in one's user settings, for example, it constitutes a revelation of sorts and the assumption follows that at least someone may see what we've done. But what about general navigation? If you, say, hover over a button, but don't click it (think "onMouseOver")... do you expect anyone to be tracking your mouse movements? Would it bother you if they were? What if they took the general pattern of how you use your mouse on a web site to suggestion "helpful" modifications to the layout of Facebook for you? What if the software tracking your status updates on Facebook was used as part of a larger app that users could install to warn them of impending breakups from their beloveds?

Collecting vast quantities of data and using programs, such as those being created by the visual analytics folks, mean that it is possible to extract more information about you (that perhaps you didn't even know about yourself) than ever before. Who owns that information? Better yet, who has the right to extract it? In this web-centric world it's entirely too naive to simply say, "Oh, well it's Facebook's site, therefore Facebook.". Clearly we need some sort of code of conduct, or at least to have thought about it.

Just a quick brain dump....

(If you didn't get a chance to see this TED talk on visual analytics, it's available online.)

Monday, November 1, 2010

CPSC 490: CS Education (next term)

Hi all,

As I mentioned in class last time, next term I'm running a student directed seminar next term on CS education -- if you're finding an interest in what the public can and should know about CS, this is one of many issues we'll be talking about in the course! http://www.ugrad.cs.ubc.ca/~cs490/

Cheers,
Elizabeth
CPSC 490 coordinator
http://www.wired.com/magazine/2010/11/pl_print_harris/

check out this article...An interview with an atheist (maybe more appropriately a scientist) who discusses scientifically determining whether something is good or bad.

Humans Could Solve Digital Divide by Becoming the Network

Currently, research is being conducted at Queen's University of Belfast (QUB) to improve mobile internet by using humans as network nodes. The body to body network would boost coverage by sending information between themselves before reaching a base station. This would also mean that at large events, where coverage is currently decimated due to so many devices trying to connect to the network, it would actually be augmented. I found this approach to be pretty fascinating for our next generation of smart phones.

The following is an example of a body to body network:


The image states that data is streamed via "smart devices" using body to body networking

Friends at the bar are able to watch impromptu performance in real-time without depending on mobile phone network.




More on the article...

http://thefrontline.v3.co.uk/2010/11/humans-could-so.html

"Firesheep allows easy hacking over open WiFi"

I was reading the Metro Vancouver newspaper this morning when I saw this article headline:
"Firesheep allows easy hacking over open WiFi."
Basically, a software developer has created a program called firesheep which uses unsecured wireless networks to hack into other users' Facebook and Twitter accounts. He also put the program on the internet for public download. The developer says he created the program in order to educate people about the dangers of using unsecured wireless networks. I'm not sure how ethical this was of him though. It seems dangerous to make a program like this available for public download.

Here is the link to the online article:
http://www.metronews.ca/vancouver/life/article/675035--firesheep-allows-easy-hacking-over-open-wifi

Sunday, October 31, 2010

Movies about government surveillance

There are two good movies about hidden surveillance and privacy violations - "The Conversation" directed by Francis Coppola, and "Enemy of the State" starring Will Smith, and Gene Hackman is in both movies playing almost identical characters. The first one tells about a man whose obsession with his own privacy turns against him eventually. And the second one tells you what the government is capable of and how it can illegally spy on people for its own interests. Especially interesting when innocent people are involved.

More information about the movies:

The Conversation: http://www.imdb.com/title/tt0071360/
Enemy of the State: http://www.imdb.com/title/tt0120660/

Decision that Genes Shouldn't be Patentable in the U.S.

The new position was stated by the Department of Justice last Friday, October 19, in a case discussing two human genes commonly associated with breast and ovarian cancer. See the full story here:

Friday, October 29, 2010

The 1440 Campaign Cycle

A newscast re. the impact of social media on elections (particularly pertinent on the web these days).

http://www.cnn.com/video/#/video/tech/2010/10/08/politics.all.atwitter.cnn?hpt=C2


Cheers,

Kim.

Thursday, October 28, 2010

some thought about ethical theories

Not sure if anyone else in this class ever wondered why we are spending so much time learning and applying ethical theories into social issues (I keep asking myself why we are doing this), so I googled and searched: "how important are the ethical theories in modern society" and found something that somehow answers part of my questions...


This is actually the handout from a similar course offered at Stanford, the writer (probably the instructor) didn't give too much details about all the ethical theories, but it notes some problems we may consider when we apply the ethical theories (it mentions not just the for or against arguments about a theory, but also what we need to be cautious about when we apply the theories).

For example, it mentions the problems about applying utilitarianism (some points are mentioned in our textbook, but not all):

a) Actions such as deceit, murder, theft, etc. are usually morally wrong because of harmful consequences, but they can be ethically justified if it can be proven that they produce the greatest good for the greatest number. So even human and moral rights are not absolute here. If we maximize happiness for a society by enslaving a small segment of society, is this morally justified?
b) How do you define “good” and “happiness”?
c) How to avoid self-serving assumptions and prejudices in performing the cost-benefit analysis? If you do not overcome these assumptions, you end up with rationalizations of unethical or selfish behavior. The job of objectively considering all the consequences of each alternative, from the point of view of each stakeholder is very difficult.

In particular, the second and third point answer the questions I have been having. How do we define good and happiness? How do we avoid self-serving assumptions and prejudices? It seems to me our textbook author prefers less protection in IP rights, thus he uses all the examples that favour his arguments to come to a conclusion that copying software is not a bad thing. However, with a little research I also found some studies that may be used to rebut his arguments (something like the impact on sales with or without anti-piracy campaigns implemented , the impact of piracy on domestic and global economics.... ). Was there a failure to avoid self-serving assumptions or prejudices in his analysis? Was his argument a fallacy? If you do pay attention, you would notice that there is no reference at all when the author applies ethical theories to backup his arguments. It seems to me that the application of ethical theories involves more "opinion reasoning" than "evidentiary reasoning"?

Those questions have bothered me for a while, and I was wondering why or how should we evaluate the usefulness of these theories. Are they comprehensive enough for today's society? If not, are they still valuable resources to help us solve new issues? Or it's just that our approach in discussing those theories is not comprehensive enough? I guess I spot some light in the "algorithm" mentioned in the article in some extent:

And here is the "algorithm" to apply when confronted with an ethical issue (from the handout):

1. Identify and carefully define the ethical and legal issues in the case.
2. What is your first impression toward the issues, i.e., what does your moral intuition tell you?
3. Define in detail all possible courses of action.
4. Consult the appropriate codes of ethics (ACM, IEEE, corporate or organizational, etc.) for guidance.
5. Use the ethical theories (see above) to help reason about the issues.
6. What is the "best" action based on the theories and codes? If there are conflicts, which approach should take precedence under the circumstances? Why?
7. Take action.

(Yes, I think identify and define the issues is a very important step, and note that "Use the ethical theories" is only one of the 7 steps in this algorithm...)

Usage Based Billing

A backwards step by the CRTC.

http://www.cbc.ca/technology/story/2010/10/28/crtc-usage-based-billing-internet.html

Sharing Too Much on Facebook Could Cost You

Since so many of us use facebook everyday, the information in this post can be helpful to most of us, and provides some tips on how to use facebook in a safe manner to protect your identity. Also it is relevant to the material discussed in class. Enjoy!

http://www.ctv.ca/generic/generated/static/business/article1770690.html

New FireFox extension makes logging in as others on unsecured wi-fi easy

A simple add-on for firefox just released a few days ago has already been downloaded over 200,000 times, and basically allows users to "spy on the unsecured sites you are visiting" over unsecured wireless networks...

Watch the warning video, read the article, and most importantly, password protect your wireless networks!!

http://www.kwgn.com/news/kdvr-firesheep-warning-txt-102810,0,1852323.story

Mother kills her baby over Farmville

So my group is doing our project on internet addiction, and I came upon this article while checking news this morning... The sad thing is it isn't even that surprising to our generation as this happens more often by the year...

Do you think people dieing over these games justifies the 'fun' it adds to the rest of the players who play them casually?

Here's the link: http://mashable.com/2010/10/28/farmville-murder-mother-baby/

Nader

Wednesday, October 27, 2010

Judge realizes: on the Internet, no one can tell you're a kid

It's amazing how many of these articles seem to pop up now that we're studying this... :)

It's interesting to see the courts change their mind like this... even if it was 'obvious' the whole time.


Nader

Russia Crack Down on Spam

Russian polices have cracked down a major source of our viagra emails with global volumes of emails significantly dropped.

http://www.nytimes.com/2010/10/27/business/27spam.html?_r=1&ref=technology

Recommended Reading for Thursday / Tuesday: Info Security


1. What's your Facebook Data Worth?

An uncommonly good insight into the economic value of SNS data. Check out the link to evaluate how much your own FB page is worth.

--------------

Information Security and Privacy

2. The OWASP Top Ten [PDF] [wiki] [slides]
A nice overview of the top ten web application security risks.

We'll be covering the following topics:

3. Web Bugs a.k.a. Beacons a.k.a. Tracking


4. Clickjacking a.k.a. the transparent IFRAME trick


5. Cross-Site Scripting (XSS)
I find the wikipedia article rather opaque. Samy's own story of the worm and its technical description is pretty concrete. Most students should be able to understand at least the first four steps of the exploit.


Tuesday, October 26, 2010

Identity thieves crafty, prolific

I found this article about identity theft in the Vancouver Sun and I thought it might be relevant given that we're about to discuss it in class.

Identity thieves crafty, prolific

Sunday, October 24, 2010

What They Know: Interactive Infographic from WSJ

According to the Wall Street Journal:

Marketers are spying on Internet users -- observing and remembering people's clicks, and building and selling detailed dossiers of their activities and interests. The Wall Street Journal's What They Know series documents the new, cutting-edge uses of this Internet-tracking technology.

http://blogs.wsj.com/wtk/


Okay, but ... is the use of tracking technologies like web bugs really "spying"?

Really, Google?

When "I'm sorry" just isn't enough...?

http://www.telegraph.co.uk/technology/google/8083008/Google-spied-on-British-emails-and-computer-passwords.html


-kim.

Photos taken from smartphones could be GPS-tagged (privacy issues) ..

http://www.cnn.com/2010/TECH/web/10/15/photo.gps.privacy/index.html?eref=rss_topstories&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+rss/cnn_topstories+(RSS:+Top+Stories)

Saturday, October 23, 2010

"MySpace moves against apps who share user data"

This caught my attention today: MySpace has started cracking down on app developers that share personal user data. This is in violation of MySpace's terms of use. I think this fits well with our current class topic of privacy and privacy invasion.



source: http://www.cnn.com/2010/TECH/web/10/23/myspace.leaks/index.html?eref=mrss_igoogle_cnn

Friday, October 22, 2010

What do you think about the new Facebook Groups?


There's a really long analysis posted here:
http://www.switched.com/2010/10/13/facebooks-new-groups-demystified-what-they-are-and-how-to-use/

But I want to know from you guys -- what do you think of the new Facebook Groups design, and how it affects online privacy?

Patenting Virtual Currency

Zynga may be trying to patent virtual currency:

“A method, comprising:receiving, at a server, a purchase order for virtual currency from a player, wherein the purchase order was made with legal currency, and wherein the virtual currency is usable within the context of a computer-implemented game;crediting an account of the player with virtual currency, wherein the virtual currency is not redeemable for legal currency;receiving a second purchase order for a virtual object within the context of the computer-implemented game from the player, wherein the second purchase order was made with virtual currency; and debiting the account of the player based on the second purchase order.”


More on:

http://techcrunch.com/2010/10/22/zynga-virtual-currency/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

[PIC] Legalize Happy Birthday!


Haha... this just made me laugh, thought I'd share it :)


Steganography

The link below reminded me of the letter from Arnold Schwarzenegger that was shown in class to demonstrate steganography. A computer science student wrote about the advantages of disadvantages of networks and spent  5 hours formatting his paper into the acrostic Rickroll.

http://gizmodo.com/5669317/student-hides-rick-astleys-song-in-college-paper

Thursday, October 21, 2010

Have anybody recently received Facebook scam email?

Recently, I have been receiving a couple of Facebook scam emails which look like this.
Anybody encounter this in their email system?




LEGO lost its trademark for its eight-stud brick design

Even though not computer related, but it is related to trademark and the EU Court.
It seems like even trademark has no expiry date, the court can take away the trademark.

http://www.lego.com/eng/info/default.asp?page=pressdetail&contentid=218350&countrycode=2057&yearcode=&archive=false

First surgery using robots only

Surgeons in McGill University performed the first all-robot surgery. They used a robot surgeon named da Vinci and robot anesthesiologist named McSleepy. Pretty cool.

link: http://www.engadget.com/2010/10/21/first-all-robot-surgery-performed-at-mcgill-university/

Pushing the Bounds of Artistic Ownership

Lately, we've been talking a lot about ownership and rights, copyright and fair use. So it seems topical to note that English Heritage is now claiming that it owns every picture ever taken of Stonehenge. (Original takedown request) Setting aside the fact that the idea of finding and registering every Stonehenge picture taken is completely absurd, it raises interesting questions about ownership. Sure, I presume that British Heritage goes to a lot of work to handle, manage, and maintain Stonehenge. It probably costs quite a bit of money to keep those rocks standing upright. But even if we assume that Neolithic Britons decided to invent copyright law and set the length at a modest 'artist's life plus 4000 years,' it's still past that time by a good few centuries.

So can we say that British Heritage owns Stonehenge and all rights to it? They didn't really buy it. They didn't trade for it. They certainly didn't make it themselves. It's just that their distant, distant ancestors put some remarkably heavy slabs of stone in a particular place and left them there. Even if they didn't want it anymore, it's hardly as if they could just hide it in a bookshelf or stuff it in somebody's attic. But now it's there, and it's theirs, and it's popular, so they can take advantage of it. Seems a bit odd to me.

Wednesday, October 20, 2010

Hey Facebook, Here Are Some Other Companies You Can Bully Or Sue

Facebook decided to sue TeachBook (teachbook.com), a professional community for teachers because their name contains the word "book."

Does this mean Facebook will also sue: travelbook, hotelbook, ebook, doctorsbook, racebook, tastebook etc...? :)

http://techcrunch.com/2010/08/26/facebook-placebook-teachbook/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+Techcrunch+(TechCrunch)

Tuesday, October 19, 2010

"Google accidentally mapped much more than addresses, says privacy boss"

Apparently Google's street view caused some privacy concerns and even broke Canadian privacy laws by collecting personal information from wireless networks. They collected info like emails, usernames, and passwords.....awkward


http://www.thestar.com/business/article/877850--google-accidentally-mapped-much-more-than-addresses-says-privacy-boss

Entrepreneur Takes On Apple And Wins $625 Million Read more: http://www.businessinsider.com/entrepreneur-takes-on-apple-and-wins-625mm-2010-10#ixzz12

Biggest patent win ever? That is quite a huge sum of money... even for Apple. It's quite mind-boggling how even with Apple's legal team they could lose so big. I guess patents do work :)

http://www.businessinsider.com/entrepreneur-takes-on-apple-and-wins-625mm-2010-10

Nader

Google, Facebook To Microsoft’s Paul Allen: Your Argument Is Invalid!

This is related to Vince's previous post on this blog entitled "Against the Necessity of Software Patents"



http://techcrunch.com/2010/08/27/paul-allen-google-faceboo/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29



""Patent #682 “Alerting Users to Items of Current Interest.
“Defendant Facebook has infringed and continues to infringe one or more claims of the ’682 patent. Facebook is liable for infringing the ’682 patent under 35 U.S.C. § 271 by making and using websites and associated hardware and software to provide alerts that information is of current interest to a user as claimed in the patent.”
“Defendant Google has infringed and continues to infringe one or more claims of the ’682 patent. Google is liable for infringing the ’682 patent under 35 U.S.C. § 271 by making and using websites and associated hardware and software to provide alerts that information is of current interest to a user as claimed in the patent.”"

Monday, October 18, 2010

HyperMac stops selling magsafe connectors

HyperMac infringed the patent on the magsafe connector and Apple requires them to stop selling the cables before any negotiations can occur.

via

Sunday, October 17, 2010

Court says University sanction over Facebook postings violated Charter

Canadian court in Alberta ruled against U of Calgary for violating its students freedom of expression when it sanctioned the students for posting critical comments about a professor on Facebook. One of the issues here is whether the the Charter of rights applies to universities (as this is a constitutional right and only applies to government but not private entities). The court ruled that the university is not a Charter free zone and further decided that the students' Charter rights were infringed.


In particular, at paragraph 82 of the judgment, the court comments about the value of the critical comments made by the students:

"I cannot accept that expression in the form of criticism of one's profession must be restricted in order to accomplish the objective of maintaining an appropriate learning environments. I do not regard this particular kind of expression as being of little value. Students should not be prevented from expressing critical opinions regarding the subject matter or quality of the teaching they are receiving. As an educational institution, the University should expect and encourage frank and critical discussion regarding the teaching ability of professors amongst students, even in instances where the comments exchanged are unfavourable...[omitted]"

Here is a copy of the judgment:
http://btdbowman.files.wordpress.com/2010/10/reasons-for-judgment2.pdf

Basically, the Judge treated Facebook Wall as a forum for discussion, thus, a place for expressing ideas. The Judge also mentioned that to object the critics the professor should bring a civil action (if she considers the comments as defamation), not just have the school sanctioned the students for making negative comments.

Map of Online Communities - updated 2010!


I remember seeing something like this map a long time ago, and I just stumbled upon this brand new updated version from summer 2010! Enjoy. This map is based on activity levels, as supposed to number of users, (which would probably explain why Farmville is so friggin huge, it's probably used for hours on end by many people, while twitter is only accessed maybe 3 times a day for an average user? Same with 4chan's prominence among forums, maybe it's the type of thing people spend long hours on? internet addiction?) You also have to wonder about possible bias towards North American / English language activities (although there is China's "QQ" messenger, and "Euro Gulf")

My Highlights:

• Shaq in the Twitter territory
• "Former site of adult services" in Craigslist territory (crater)
• Myspace's huge importance for bands, music videos' prominence on Youtube
• "Web 3.0 (under construction)"
• "Sea of Protocol Confusion"
• Sarah Palin USA's proximity to Russia
• "Catbus Route" on the 4chan island
• Bieber Bay!

Amazing.

Saturday, October 16, 2010

New US Internet Censorship bill

This article is even more relevant to our fellow American 430'ers - but can touch us all as we all use youtube and similar services on a regular basis.. This bill could effectively overturn the recent supreme court decision that prevented Viacom from removing clips of their shows from youtube.com...


"Stop the Internet Blacklist

By David Segal and Aaron Swartz

When it really matters to them, Congressmembers can come together -- with a panache and wry wit you didn't know they had. As banned books week gets underway, and President Obama admonishes oppressive regimes for their censorship of the Internet, a group of powerful Senators -- Republicans and Democrats alike -- have signed onto a bill that would vastly expand the government's power to censor the Internet.


The Combating Online Infringement and Counterfeits Act (COICA) was introduced just one week ago, but it's greased and ready to move, with a hearing in front of the Judiciary Committee this Thursday. If people don't speak out, US citizens could soon find themselves joining Iranians and Chinese in being blocked from accessing broad chunks of the public Internet.


COICA creates two blacklists of Internet domain names. Courts could add sites to the first list; the Attorney General would have control over the second. Internet service providers and others (everyone from Comcast to PayPal to Google AdSense) would be required to block any domains on the first list. They would also receive immunity (and presumably the good favor of the government) if they block domains on the second list.


The lists are for sites "dedicated to infringing activity," but that's defined very broadly -- any domain name where counterfeit goods or copyrighted material are "central to the activity of the Internet site" could be blocked.


One example of what this means in practice: sites like YouTube could be censored in the US. Copyright holders like Viacom often argue copyrighted material is central to the activity of YouTube, but under current US law, YouTube is perfectly legal as long as they take down copyrighted material when they're informed about it -- which is why Viacom lost to YouTube in court.


But if COICA passes, Viacom wouldn't even need to prove YouTube is doing anything illegal to get it shut down -- as long as they can persuade the courts that enough other people are using it for copyright infringement, the whole site could be censored.


Perhaps even more disturbing: Even if Viacom couldn't get a court to compel censorship of a YouTube or a similar site, the DOJ could put it on the second blacklist and encourage ISPs to block it even without a court order. (ISPs have ample reason to abide the will of the powerful DOJ, even if the law doesn't formally require them to do so.)"


Read the full article:
http://www.huffingtonpost.com/david-segal/stop-the-internet-blackli_b_739836.html