5.3 - 5.6 blog
Blogging on the topics crowdsourcing, computing bias, safe computing, and legal and ethical concerns
5.3 Blog
Intentional or Purposeful bias
Google “What age groups use Facebook” vs “… TikTok”? What does the data say? Is there purposeful exclusion in these platforms? Is it harmful? Should it be corrected? Is it good business?
- 60% of tiktok users are 16-24
- 23.7% of facebook users in the us aged between 25-34
- Tiktok is much faster pased than Facebook therefore teenagers and young adults are more addicted to it / enjoy it more.
- Facebook mainly targets their audience towards the older portion
- Tiktok content creators are mostly teenagers to very young adults.
- Tiktok could potentially be harmful because it stimulates your brain to a unhealthy extent. People become addicted and therefore can't stop because it is their source of dopamine.
- It is good business because tiktok is one of the most popular social media apps in the world right now.
Why do virtual assistants have female voices? Amazon, Alexa Google, Apple Siri. Was this purposeful? Is it harmful? Should it be corrected? Is it good business?
- Virtual assistants may have female voices because it's soothing to many.
- This is purpoesful because people prefer a women's voice over a mans.
- It could be harmful to masculinity
Talk about an algorithm that influences your decisions, think about these companies (ie FAANG - Facebook, Amazon, Apple,Netflix, Google)
- One algorithm that influences my decisions is ESPN because I do sportsbetting and ESPN stats convince me to make my decisions.
5.4 Blog
Crowdsourcing
CompSci has 150 ish principles students. Describe a crowdsource idea and how you might initiate it in our environment?
- To implement a crowdsource idea in our environment, I could organize activities that involve selecting one member from each group and forming a new group with participants from different groups. The new group members would then discuss ways to improve each other's projects and share at least one idea with everyone else.
What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?
- Yes our project could potentially be way better with crowdsourcing because I am sure many other people I know or my group members know have similar projects that inlude the overall subject of stocks. Sharing ideas / implementation techniques could help us both benefit.
5.5 Blog
Legal and ethical concerns
-
If you create a GitHub repository, you will be prompted to choose a license type for your software. The MIT License and GPL License are two popular options. The MIT License permits the use, modification, and distribution of the software with minimal restrictions on commercial and non-commercial use, as long as the original copyright and license notices are included. On the other hand, the GPL License allows for similar freedoms, but requires the source code to be made available to anyone who receives a copy and derivative works to be licensed under the same terms as the original software.
-
In the context of software development, it is important to consider software licenses, digital rights, and legal and ethical considerations to protect intellectual property and ensure ethical practices. For instance, licensing can prevent software from being pirated and protect creators' rights. These complex and interrelated topics impact the development, distribution, and use of software.
-
If you were to create a license for personal use, the MIT License might be a good option as it allows for greater flexibility in the use and distribution of the software.
5.6 Blog
Safe Computing
Describe PII you have seen on project in CompSci Principles.
- I have seen many instances where peoples usernames, DOB's, and emails are used as part of a project. My project could potentially use dates to track when people bought and sold different types of stocks.
What are your feelings about PII and your personal exposure?
- Sharing PII is risky because you never know if the website you are sharing it to will use that information fraudulantly. Always make sure to confirm / check that your PII will not be used without your permission.
Describe good and bad passwords? What is another step that is used to assist in authentication.
- The difference between a good and bad factor is the guessing portion of it. Making it your birthday or your initial followed by your birthday simply just isn't smart because its easily guessable which is why face ID in my opinion is a better authentication route.
Try to describe Symmetric and Asymmetric encryption.
-
Symmetric encryption is like using the same key to lock and unlock a door. The key is kept secret between the sender and receiver, and both use it to encrypt and decrypt the message.
-
symmetric encryption is like having two keys, one to lock and one to unlock a door. One key is kept secret by the owner, while the other key is publicly available. The owner uses their secret key to encrypt the message, and anyone with the public key can decrypt it. This means that the message can be sent securely without the need for the sender and receiver to share a secret key beforehand.
Provide an example of encryption we used in AWS deployment.
- In AWS, they use secret codes to lock up important stuff so that nobody can peek at it. For example, they put secret codes on their storage service called S3, and only people who have the right codes can see what's inside. AWS has a special tool called Key Management Service that helps them make these secret codes. It's like putting a lock on your diary so nobody else can read it!
Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
- One example of a phishing scheme I have learned about is the scam ads that pop up on popular websites like crunchyroll. Other techniques may include fake security notices or fake scenarios that make it seem like your in trouble or got hacked and you need to click the link to resolve it.
Mort's Lesson
-
DHCP - Dynamic Host Configuration Protocol: A client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
-
When you type domain in browser an IP address will be returned
- When you go to github.io you get returned HTML
- You also get HTTP
- TCP - Trransmission Control Protocol, one of the main protocols in TCP/IP networks.