User log in
User registration
Registrations are open
Click here to register
Email: forgotten email?
Password: lost pass?
  Resend activation email
Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Protect your privacy! Use a VPN When Downloading Torrents
Your IP Address is . Location is .
Your Internet Provider is tracking your torrent activity! Hide your IP ADDRESS with a VPN!
We strongly recommend using Trust.Zone VPN to anonymize your torrenting. It's FREE!
Also, while you are using Trust.Zone VPN you get No Ads for Demonoid members Get VPN Now for FREE!
Details for Jennifer Golbeck - 2020 - Taking Control of Your Personal Data (Technology) [Audiobook] (miok)
Created by Ratio: 1.00miok 2 years ago
Audio Books : Nonfiction : MP3/64Kbps : English
Taking Control of Your Personal Data - Jennifer Golbeck, The Great Courses - 2020



By: Jennifer Golbeck, The Great Courses
Narrated by: Professor Jennifer Golbeck
Length: 5 hrs and 15 mins
Lecture
Release date: 01-31-20
Language: English
Genre: Science & Technology
Publisher: The Great Courses
Format: mp3 64/48 stereo

Includes accompanying reference material (pdf)

Publisher's Summary

We have never before in human history been able to share so much about ourselves so quickly. Neither have we ever been so exposed to forces that want to take advantage of that capability. Taking Control of Your Personal Data will open your eyes to the surprising extent of that exposure and will discuss your options for keeping your personal data as safe as possible. Your instructor, Professor Jennifer Golbeck of the College of Information Studies at University of Maryland, College Park, will show you what really goes on behind the scenes with the data you knowingly and unknowingly share all day long. You’ll be surprised to find out how much of your personal data is being manipulated perfectly legally - data you never intended for another person to see, data you didn’t even know was out there.

This course doesn’t offer a one-size-fits-all solution because no such solution exists. But this course will help you determine your personal privacy profile, decide whether or not to try the dark web and its Tor browser, and understand the current US laws and proposed state laws regarding privacy. Privacy issues are not going away; the technology that collects, analyzes, and derives insights from our data continues to grow at break-neck speed. As a society, we have not yet figured out how to apply appropriate ethics, values, and protections in parts of this domain. As individuals, we need exactly the type of information and direction provided by Taking Control of Your Personal Data.

Some uses of your data constitute a crime, of course—scams, extortion, fraud, data theft—and the FBI receives more than 900 cybercrime reports each day. But you’ll be surprised to find out how much of your personal data is being manipulated in ways that are perfectly legal—data you never intended for another person to see, even data you didn’t even know was out there. Consider:

• Manipulation of your Facebook world. Facebook wants you to have as many friends as possible, so it analyzes data you didn’t know existed to determine which “non-friends” might have attended the same event. Suddenly, you have a new friend suggestion!

• Targeted television commercials. If you use the same provider for both internet and television services, your browser history is used to determine not only online ad placement, but also which TV commercials you see.

• Broadcasts from your phone. If you have a smart phone, it’s busy collecting vast amounts of data about you and broadcasting it to a variety of receivers. In one experiment, a newspaper columnist working with a technology company discovered that over the course of just one week, 5,400 hidden apps and trackers received personal data from his phone.

It’s Scandalous

In this course, you’ll go behind the scenes to understand exactly what went wrong in some well-known cases of data misuse to learn how you can better protect your own data. You will take a closer look at cases like:

• Cambridge Analytica asked Facebook users to install an app for academic research. The app took all the individual’s data and all friends’ data, stored it, and then handed it over to political strategists who analyzed it to develop profiles for political messaging on Facebook and other platforms.

• Google Buzz was intended to be a Facebook competitor. Wanting to populate its network as quickly as possible, the service automatically gave each user friends—based on how often the two individuals had previously emailed each other. The results were devastating for those who would never have granted social media access to these “friends,” e.g., ex-spouses, therapy clients, lawyers, and others.

• Ashley Madison was, and is, a dating website for adulterers. Among its many ethical problems was the fact that when customers paid to have their data deleted, the company never removed it. When the site was hacked in 2015, all user data was downloaded to the dark web. What was never meant to be public was suddenly accessible to anyone, with dire consequences.

How to Protect Yourself

This course doesn’t offer a one-size-fits-all solution because no such solution exists. But this course will help you:

• Determine your personal privacy profile. Where do you fit in the spectrum of valuing your privacy vs. convenience? How do facial recognition software and genetic profiling affect your privacy decisions?

• Decide whether or not to try the dark web and its Tor browser. How important are speed and accessibility to you?

• Understand the current U.S. laws and proposed state laws regarding privacy. Are you willing to look into privacy advocacy groups?

12 lectures (Average 26 minutes each)

01. How Your Data Tells Secrets
02. The Mechanics of Data Harvesting
03. Privacy Preferences: It's All about You
04. The Upside of Personal Data Use
05. Online Tracking: Yes, You're Being Followed
06. Nowhere to Hide? Privacy under Surveillance
07. Consent: The Heart of Privacy Control
08. Data Scandals and the Lessons They Teach
09. The Dark Web: Where Privacy Rules
10. Algorithmic Bias: When Al Gets It Wrong
11. Privacy on the Global Stage
12. Navigating the Future of Personal Data

©2020 The Great Courses (P)2020 The Teaching Company, LLC






24/7 Seedbox Support
Facebook Twitter Digg Reddit LinkedIn StumbleUpon Email
Show Demonoid some love with BitCoin: 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk How to get BitCoins?
Peers: 0 seeders, 0 leechers, 0 total - Updated: 7 months ago [ Update now ]
Size: 155.83 MB  

Sponsored links
Related torrents
Torrents you may also like:
Download this torrent
Extra information
Tracker: udp://tracker.coppersurfer.tk:6969/announce
Torrent hash: ADA37558 8BDB5BC7 0FF729A7 C89695C6 E72221A8
Files described inside the torrent: 22 [ Click here to show the full list
Comments
No comments posted yet

Disclaimer: None of the files shown here are actually hosted or transmitted by this server. The links are provided solely by this site's users. The site moderation is also a service provided by the site's users. The administrator of this site (demonoid.is) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

By using this site you indicate your agreement to our terms and conditions
   
Link to us | Contact us | API | Commemoration | Feeds/RSS | DMCA
This site and the Demonoid logo are Copyright © Demonoid. All rights reserved.

Show Demonoid some love with 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk