Home | Siuuuu Project | Study Plan | Data Structures Project | Notes | Github Actions | Create Task |
5.1-5.6 Notes
Table of Contents
5.1 | 5.2 | 5.3 | 5.4 | 5.5 | 5.6
5.1 Notes Beneficial and Harmful Effects
Accelerometer:
- Automobile industry drove price down
- Used for airbag deployment and lateral movement detection
Quadcopter “brain”
Multirotor
- Benefit - deliveries, finding lost people, aerial photography
- Harmful - flying in unregulated zones is illegal and dangerous
Wii controller
- Benefit - gets people active with video games
- Harmful - Broken TV’s and injuries
3D Printers
- Open-source software for computer and printer
- Can make organs/prosthetics, houses, shoes
Internet
- People spend more time on internet than sleeping
- Sleep deprivation, depression, anxiety, impulsivity, dopamine feedback loops
Microtransactions
- “Free” Games/Apps
- Cosmetics, paywall to functionality, pay-to-win
5.2 Digital Divide
- Based on socioeconomic and geographic demographics
In some countries:
- Computers are not common in rural areas
- Only small number of websites
- Internet used to protect government
- High level of surveillance to protect government
5.3 Computing Bias
Netflix
- Explicit Data
- Name, address
Implicit Data:
- When you watch
- What you watch
- Style of show Bias:
- Exclusives featured ahead of most Software can be biased
- Casual vs Sweaty
- Youtube Kids
- Facebook vs Instagram vs Snapchat/Tik Tok
- WeChat/KakaoTalk
5.4 Crowdsourcing
Kaggle:
- Courses in visualizations, TensorFlow, AI, machine learning
- Competitions
- Notebooks
Distributed Computing:
- Donate spare computing power to help calculations
Spotify:
- Collaborative playlists
- Algorithm
- Metadata write in
Crowdfunding:
- Kickstarter
-
IndieGoGo
- BlockChain
5.5 Legal and Ethical Concerns
Intellectual property (IP)
- A work or invention that is the result of creativity to which one has rights
Copyright
- Protects IP and keeps anyone from using it - Plagiarism: Presenting material as your own
- Legal ways to use material
- Creative Commons
- Open source
- Open access
- Creative Commons
- Provides free licenses that tells others how you want your creations to be used
Open source
- Programs made freely available for anyone to use and may be redistributed and modified
Open Access
- Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions Digital Divide: Unequal distribution of access to technology
5.6 Safe Computing
Personally Identifiable information (PII): Information specific to individual
- Social security number
- Age
- Race
- Phone #
- Date of birth
- Email address
- Mailing address
- Can be used to steal someone’s data
- Search engines maintain our search history
- Used to enhance a user’s online experience
-
Can be exploited if protections are ignored
- Google, Facebook, and Twitter gather lots of information based on what you search and post
- Lots of risks to privacy as your activity is recorded and kept in data
- Information put on the internet does not go away
- Internet is an integral part of our lives
Phishing:
- An attempt to trick a user into providing personal information, like usernames and passwords
- Phising emails look like they are from a company that you know
- Bank
- Credit card company
- Social networking site
- Video streaming service
- Online Store
- Click on a link or opening an attachment Clicking on a link or opening an attachment can install a virus or a bad website
Keylogger:
- Records every keystroke made by a user in order to gain fraudulent access to passwords or other confidential information
Rogue Access Point: A wireless network that can give unauthorized access to secure networks
- Authentication measures are strong passwords and multi-factor authentication
- Protects devices and information from unauthorized access
- Create strong passwords have requirements to make them more complex/secure
- Multi-factor authentication: what you know, what you are, what you have
- Virus and malware can get access to systems and affect it
Asymmetric encryption:
- Public key for encrypting
- Private key for decrypting