Video games used to be an escape. Now not even they are safe from ads; John Leyden; In The Register; 2017-10-09.
Teaser: Devs seduced by the dark arts of data collection and product placement
tl;dr → Ads: always, everywhere and on every available surface.
Chris Boyd (Malwarebytes); Exploring the virtual worlds of advergaming, a talk; performed at the Virus Bulletin conference, in Madrid, Spain; 2017-10-05′ abstract.
tl;dr → The abstract appears as a tutorial on the trade: targeted advertising and on campaign management. No specific companies or practices are named in the abstract.
<quote>Mobile apps have embraced advergaming, trending against upfront payments in favour of free games financed through data collection, adverts and in-app purchases. Of the top 30 games on Google Play, 27 apps contained ads and the same number contained in-app purchases. All were free to download and targeted casual gamers.</quote>
Caitie McCaffrey (Microsoft); Resources for Getting Started with Distributed Systems; In Her Blog; 2017-09-07.
tl;dr → Distributed Sagas, within the .NET culture of Microsoft.
- A Canon (The Canon)
- Examplars (Bloggists)
- Post Mortems (After Action Reports)
Nadiya Kostyuk, Muzammil M. Hussain (CPD); The Spread of Mass Surveillance, 1995 to Present; In Their Blog at the Center for Political Studies (CPS), Institute for Social Research, University of Michigan; 2017-09-01.
Previously performed at the 2017 Annual Meeting of the American Political Science Association (APSA); the presentation, titled “Big Data Innovation Transfer and Governance in Emerging High Technology States” was a part of the session “The Role of Business in Information Technology and Politics” on Friday 2017-09-01.
tl;dr → an exercise in documentation; factoids are developed; a diversity is shown.
<quote>The observed cases in our study differ in scope and impact.</quote>
- Aadhaar, a national ID program, India.
- Social Credit System, China.
||Total Spend (USD)
||upper is 11X more
than “other regime type”
|high-spending dictatorships and democracies,
developing and emerging democracies
Jane McGonigal; ‘How to Think (and Learn) Like a Futurist; Keynote SXSWedu on YouTube; 2016-03-09; video: 1:08:59.
The Four Skills
- personal forecasts
- Play with the future (simulate it)
- Characteristics of creative individuals
- Some technqiues for creativity
- De Bono’s six thinking Hats.
state transition from mode X to mode Y.
- Amplification & diminution
what if it becomes more so.
- Is this what “we” want?
Jelly Bean (Analogy) Theory
- Primes (primitives)
- 3D Printing of Food
- Virtual Reality
- Behavioral persuasion (in VR); i.e. smell-o-ivision.
- Something about Environmental Impact of one’s food.
- Personal life mangement.
- Societal stewardship.
- Superstruct, a game
- Dilbert Blockchain
- Blockchain for Social Good;; a whitepaper; Media Lab, Massachusetts Institute of Technology (MIT); WHEN?
Jane McGonigal; The future is dark (and that is a good thing); At TEDxSkoll, on YouTube; 2017-04-21; video 18:58.
Laura Galante; How To Exploit Democracy; TED Talk; 2017-04; 09:33.
Am I Being Spied On?; Phil Polstra; at DEF CON 22; 2014-08-22; 0:42:03.
Ame Elliot (Simply Secure); Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers; Presented at the 25th USENIX Security Symposium; 2016-08-10→12; with video
- Design Director, Simply Secure, a charity
- ex-design research lead, IDEO, San Francisco, CA
- ex-research scientist, Xerox PARC
- ex-staff, Ricoh Innovations
- Ph.D. University of California, Berkeley (UCB)
something about <quote>creating hybrid physical-digital interactions to support the architectural design process.
- 8 patents
- a plurality of (peer reviewed & invited) publications
- Chapter in Oxford Handbook of Internet Psychology, Oxford University Press; 2007-05-17; 518 pages; Amazon:019956180X: Kindle: $52, paper: $22+SHT.
- Various awards
Is a theoretically-secure system any good if it doesn’t address users’ real-world threat models? Is the security community today meeting the needs of a mass, global audience, or simply building tools and features for itself? Do we know how to understand what people really need?
We asked a group of straight-talking New Yorkers about the data-security threats they face. Their answers indicate a significant gap between their lived experience and the way our community thinks about security. To bridge this gap and get privacy-preserving systems into the hands of real people, we need more foundational research to understand user needs, not only late-stage usability studies in a lab.
Through in-context interviews in homes, restaurants, and libraries, our study gained insights into a world of constant surveillance experienced by a group of low-income African-Americans. They shared specific examples of how their phone is threatened at home, work, and on the street. This talk shares our participants’ threat models. From shoulder-surfing, to catfishing, to how a “renter’s mindset” develops around handsets controlled by adversarial telecom providers, understanding privacy and threat in practice has far-reaching implications for the future of information security.