uchicago-computation-workshop / Spring2020

Repository for the Spring 2020 Computational Social Science Workshop
6 stars 1 forks source link

05/14: Zheng #4

Open shevajia opened 4 years ago

shevajia commented 4 years ago

Comment below with questions or thoughts about the reading for this week's workshop.

Please make your comments by Wednesday 11:59 PM, and upvote at least five of your peers' comments on Thursday prior to the workshop. You need to use 'thumbs-up' for your reactions to count towards 'top comments,' but you can use other emojis on top of the thumbs up.

yongfeilu commented 4 years ago

Thank you for your presentation! I am really looking forward to your lecture!

Yiqing-Zh commented 4 years ago

Thank you for your presentation in advance! Exposure to smart devices really imposes threats on privacy issues, but the detection of personal information also makes a lot of research work possible which requires individual information. How can we strike a balance between these two things?

KenChenCompEcon commented 4 years ago

Thanks so much for your presentation. Indeed smart devices are installed everywhere nowadays, and they posed great threat on personal privacy and bring security issues in general. I am curious about the costs and applicability of the measures that you propose to protect against these potential risks? How big scale of an act do you reckon practicable? Thanks

PAHADRIANUS commented 4 years ago

Thank you for your sharing of your invaluable results. I found both of the readings provided of great interest and importance for the improvement of our both cyber and physical security as we march into an increasingly connected era. The article on wifi devices becoming motion sensors is particular fascinating as it uncovers one of the hidden hazards: the more obvious threats, from straightforward microphone devices or other forms of monitoring, as the other article suggests, are way more visible and thus easier to prevent and avert. However, hidden hazards originates from devices that were never meant for such tasks are much harder to discover, not to mention to guard against. Surely as the likes of Alexa become even more sophisticated and versatile, the number of loopholes would only grow. I wonder if there is a more fundamental way, taking the side of the producers of these devices, to help alleviate the problem. Indeed, many analyses in this field, as well as many comments above view the companies and corp-orates quite unfavorably. Still, I think the job of reducing cyber risks would only by much easier with their cooperation.

mingtao-gao commented 4 years ago

Thank you in advance for your presentation! As computers have become ubiquitous, there are many controversies over the user of technologies concerning the violation of privacy. The measures you proposed in the paper are very interesting to me. My question is how should we balance the sacrifice of personal privacy and the advancement in personalization in current technologies.

Panyw97 commented 4 years ago

Thank you for your presentation! I am wondering how do you distinguish between microphone jamming that might cause invasion to individual privacy and natural data collection process of the app?

ShanglunLi commented 4 years ago

Thank you for providing such an interesting paper to read! I like the discussion on privacy specifically. I want to ask that how can social science implement impact on privacy?

keertanavc commented 4 years ago

Thank you for presenting! As you might already know, the government is planning to implement contact tracing over the next couple of weeks. One possible plan to use mobile phone data has received a lot of media coverage lately. Could you please elaborate on the security challenges and your views about such a system?

bjcliang-uchi commented 4 years ago

Thanks for this quite technical presentation! I am wondering if you can go over the current available personal-level privacy protection technologies, as well as their advantages and disadvantages. Where do you plan to apply the technology of the ultrasonic jammers?

luxin-tian commented 4 years ago

Thank you for the presentation. Privacy is a big concern in this digital age. Beyond technical considerations, is it possible that the problem can be addressed by industrial standards or legislation so as to make it a transparent contract between the consumers and the service provider in terms of using digital usage or tracking information? On this basis, what technical measures can be employed for external supervision in detecting potential abuse of private information?

Anqi-Zhou commented 4 years ago

Thanks for your important work with significant realistic meaning. As privacy has become widespread concerns, it's so nice to have such good work for guidance. My question is: do you think your team's product can be put into scale production? If not in the short time, what limits the commercialization? Is there any other implication, such as devices for the government?

dhruvalb commented 4 years ago

Thank you for sharing your work! It is an interesting and important concern. The wearable microphone jamming is a neat concept! Could share your thoughts on why you chose to make this device wearable? While I agree that it makes it portable but I would think the place you'd want the most privacy is your home. Here they could be placed near the device or range of area needing privacy (on a nightstand for instance) to maximize performance and not have to worry about the aesthetics, comfort and possible loss of quality from a wearable version.

cytwill commented 4 years ago

Thank you for sharing this important work! Privacy is always a big concern for IoT or other technologies but at the same time. But firstly, I am curious about the definition of privacy in the scientific world. What kind of information do you think should not be gathered through those technologies ? Also, I think the protection of privacy should be a joint force from technology developers, users, and maybe the third-party supervisors, so what can each of these roles do to improve the protection of privacy (any theoretical frameworks) ? Thanks ~

rkcatipon commented 4 years ago

Dr. Zheng, it's great to have a fellow UMD alum, go terps! 🐢🐢

There have been many questions here about the nature of surveillance. The question I have is about the fine line researchers have to tread in exposing technology dangers and also highlighting the ease of these vulnerabilities to potential adversaries. How can we as researchers make sure we are exposing system cracks without making current technologies vulnerable to targeting?

Thanks and I look forward to your talk!

ziwnchen commented 4 years ago

Thanks a lot for the presentation! The security issue brought by the increasing ICTs is always concerned by users a lot--results in this research proves that such kind of concerns is totally valid. Users may also eager to know what to do to prevent their personal information like "motions" from being detected unwantedly. However, I am curious to know who should be responsible for and develop certain strategies to the security issue, is it users? or device manufacturers? government policies?

weijiexu-charlie commented 4 years ago

Thanks for your presentation. Looking forward to seeing you soon!

AllisonXiong commented 4 years ago

Thanks a lot for presenting your work! As mentioned by @lulululugagaga, it is now a somewhat common experience that the keywords we mentioned in a conversation soon get transfered into a targeted ad on social media platforms/web browsers. Though annoying from the perspective of privacy, this personalized recommendation based on behavoral data does, at least to some extent, brings convenience. And I believe that is the initial drive for corporations to collect these data. As a researcher in computer security, do you think there is a threshold for data collecting that is useful for better service while do not raise privacy concerns?

hanjiaxu commented 4 years ago

Thanks for the presentation! looking forward to hearing the research!

wu-yt commented 4 years ago

Thanks for presenting this important issue! My question is will business or companies have incentives to add privacy protection? They seem to have more incentives to do the exact opposite.

SixueLiu96 commented 4 years ago

Thanks for your presentation! This is pretty interesting topic. I really wonder how social policy implementation can affect people's privacy?

hesongrun commented 4 years ago

Thank you so much for your presentation! It is great to hear from you.

hihowme commented 4 years ago

Thank you so much for your presentation! It is great to hear from you.

yalingtsui commented 4 years ago

Thank you for your presenting.