Курс із самостійним навчанням

Social Media - What No One has Told You about Privacy

Запропоновано Dr. Anne Kayem

An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.

In this 2 week workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms. Everyone knows the odd feeling of discomfort when having added someone you actually don't know very well to yours friends' list or to the wrong category within your contacts. The participants will learn in this openHPI course that privacy is still a concern also for users who do not actively use the Internet.

Самостійне навчання з Листопада 6, 2017
Мова: English

Інформація про курс

In this workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms.
Have you ever accepted a friendship request from the guy or girl you met at the corner store only to regret it the minute you clicked on “ACCEPT”? Or have you ever mistakenly allocated a “friend” to the wrong category and spent endless hours going through your list of 75,000 friends in order to find and reallocate your friend to the correct category? If you have, then you probably know about the nagging feeling of discomfort that you try to ignore or comfort yourself by telling yourself that it does not matter. We discuss examples of cyber-attackers to illustrate to you that this feeling should be taken seriously. If you feel concerned that something is not quite right, it most likely is the case.
Finally, we consider users like your Great Grandma who probably don’t use the Internet. If you have drifted away envying that peaceful time when social media did not exist, you could not be more mistaken. Privacy is still a concern for users who do not actively use the Internet!

Join openHPI's official Twitter Feed: @openHPI
You'll find additional video lecturing material on www.tele-task.de.

Зміст курсу

  • Week 1

  • Week 2

  • I like, I wish:

    Please, help us to improve. What did you like about the course, what can we do better next time.
  • Course End Survey

Повторно активувати цей курс

Ви можете отримати доступ до всіх оцінюваних завдань і отримати відомість досягнень, скориставшись опцією повторної активації курсу. Детальніше або

Зарахувати мене на цей курс

Курс є безкоштовним. Просто зареєструйте обліковий запис на openHPI Staging та пройдіть курс!
Зарахувати мене зараз

Слухачі

Поточний
Сьогодні
3 169
Кінець курсу
лист. 06, 2017
3 158
Початок курсу
жовт. 23, 2017
3 158

Вимоги до сертифіката

  • Отримайте Відомість досягнень, набравши не менше 50% від максимальної кількості балів за всі оцінювані завдання.
  • Отримайте Підтвердження участі, виконавши не менше 50% матеріалу курсу.

Для отримання додаткової інформації див. інструкцію з отримання сертифіката.

Цей курс запропонований

Dr. Anne Kayem

Dr. Anne Kayem is a researcher working in the field of Information Security. She holds a PhD degree obtained from Queen’s University in Canada. Her research interests range from designing and analysing secure and privacy preserving data sharing algorithms, to evaluating their usability. Dr. Kayem has served on several international conference and workshop program committees, and is the Program Chair for INTRICATE-SEC 2018. She has also served as a reviewer for journals in the field of Information Security such as IEEE Transactions on Mobile Computing, Elsevier Computers and Security, and ACM Surveys. She is on the Parallel Processing Letters editorial board, and has published more than 30 conference and journal papers in addition to two books on Information Security.