Torrent details for "Jennifer Golbeck - 2020 - Taking Control of Your Personal Data (Technology) [Audiobook] (miok)"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
155.83 MB
Info Hash:
ada375588bdb5bc70ff729a7c89695c6e72221a8
Added By:
miok:_super_admin:  
Added:  
11-02-2020 12:23
Views:
723
Health:
Seeds:
1
Leechers:
0
Completed:
34
wide




Description
wide
Taking Control of Your Personal Data - Jennifer Golbeck, The Great Courses - 2020

Image error

By: Jennifer Golbeck, The Great Courses
Narrated by: Professor Jennifer Golbeck
Length: 5 hrs and 15 mins
Lecture
Release date: 01-31-20
Language: English
Genre: Science & Technology
Publisher: The Great Courses
Format: mp3 64/48 stereo

Includes accompanying reference material (pdf)

Publisher's Summary

We have never before in human history been able to share so much about ourselves so quickly. Neither have we ever been so exposed to forces that want to take advantage of that capability. Taking Control of Your Personal Data will open your eyes to the surprising extent of that exposure and will discuss your options for keeping your personal data as safe as possible. Your instructor, Professor Jennifer Golbeck of the College of Information Studies at University of Maryland, College Park, will show you what really goes on behind the scenes with the data you knowingly and unknowingly share all day long. You’ll be surprised to find out how much of your personal data is being manipulated perfectly legally - data you never intended for another person to see, data you didn’t even know was out there.

This course doesn’t offer a one-size-fits-all solution because no such solution exists. But this course will help you determine your personal privacy profile, decide whether or not to try the dark web and its Tor browser, and understand the current US laws and proposed state laws regarding privacy. Privacy issues are not going away; the technology that collects, analyzes, and derives insights from our data continues to grow at break-neck speed. As a society, we have not yet figured out how to apply appropriate ethics, values, and protections in parts of this domain. As individuals, we need exactly the type of information and direction provided by Taking Control of Your Personal Data.

Some uses of your data constitute a crime, of course—scams, extortion, fraud, data theft—and the FBI receives more than 900 cybercrime reports each day. But you’ll be surprised to find out how much of your personal data is being manipulated in ways that are perfectly legal—data you never intended for another person to see, even data you didn’t even know was out there. Consider:

• Manipulation of your Facebook world. Facebook wants you to have as many friends as possible, so it analyzes data you didn’t know existed to determine which “non-friends” might have attended the same event. Suddenly, you have a new friend suggestion!

• Targeted television commercials. If you use the same provider for both internet and television services, your browser history is used to determine not only online ad placement, but also which TV commercials you see.

• Broadcasts from your phone. If you have a smart phone, it’s busy collecting vast amounts of data about you and broadcasting it to a variety of receivers. In one experiment, a newspaper columnist working with a technology company discovered that over the course of just one week, 5,400 hidden apps and trackers received personal data from his phone.

It’s Scandalous

In this course, you’ll go behind the scenes to understand exactly what went wrong in some well-known cases of data misuse to learn how you can better protect your own data. You will take a closer look at cases like:

• Cambridge Analytica asked Facebook users to install an app for academic research. The app took all the individual’s data and all friends’ data, stored it, and then handed it over to political strategists who analyzed it to develop profiles for political messaging on Facebook and other platforms.

• Google Buzz was intended to be a Facebook competitor. Wanting to populate its network as quickly as possible, the service automatically gave each user friends—based on how often the two individuals had previously emailed each other. The results were devastating for those who would never have granted social media access to these “friends,” e.g., ex-spouses, therapy clients, lawyers, and others.

• Ashley Madison was, and is, a dating website for adulterers. Among its many ethical problems was the fact that when customers paid to have their data deleted, the company never removed it. When the site was hacked in 2015, all user data was downloaded to the dark web. What was never meant to be public was suddenly accessible to anyone, with dire consequences.

How to Protect Yourself

This course doesn’t offer a one-size-fits-all solution because no such solution exists. But this course will help you:

• Determine your personal privacy profile. Where do you fit in the spectrum of valuing your privacy vs. convenience? How do facial recognition software and genetic profiling affect your privacy decisions?

• Decide whether or not to try the dark web and its Tor browser. How important are speed and accessibility to you?

• Understand the current U.S. laws and proposed state laws regarding privacy. Are you willing to look into privacy advocacy groups?

12 lectures (Average 26 minutes each)

01. How Your Data Tells Secrets
02. The Mechanics of Data Harvesting
03. Privacy Preferences: It's All about You
04. The Upside of Personal Data Use
05. Online Tracking: Yes, You're Being Followed
06. Nowhere to Hide? Privacy under Surveillance
07. Consent: The Heart of Privacy Control
08. Data Scandals and the Lessons They Teach
09. The Dark Web: Where Privacy Rules
10. Algorithmic Bias: When Al Gets It Wrong
11. Privacy on the Global Stage
12. Navigating the Future of Personal Data

©2020 The Great Courses (P)2020 The Teaching Company, LLC


Image error

Image error

24/7 Seedbox Support

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes