Looks like no one added any tags here yet for you.
IEEE
Institute of Electrical and Electronics Engineers
IEEE employs ______________ for in-text citations.
Bracketed Numbers
To reference multiple articles in IEE format it is written as:
[1], [2]
References are always number _____________
In Order of Citation
To cite an image begin the caption with ___________ then provide the word ________ and the reference list entry number in brackets.
Figure 1. Image Title
Source:
If an image is altered at all the citation should begin with:
Altered from
The numbers of ciations on your reference page should be _________ and seperated from the body of the reference by about ______.
Flush against the left margin
5 spaces
What is Research?
A combination of investigation of past work and effort in the present that will help others in the future.
Purpose of Quantitative Research:
Answer “How many/much?” question.
Data type used in Quantitative Research:
Numerical/Statistical Results
What is the approach to Quantitative Research?
Measure & Test (Example: Surveys and Experiments)
What are the sample sizes of Quantitative Research?
Large (typically over 100)
Purpose of Qualitative Research?
Answer “Why?” Question
Data type used in Qualitative Research?
Observation, Symbolic, Words
What is the approach to Qualitative Research?
Observe and Interpret (Example: conduct interviews, watch behavior)
What is the sample size of Qualitative Research?
Small (typically < 20)
What was the Therac-25?
A radiation treatment that resulted in overexposure to radiation due to software faults.
What is the purpose of using Computer Simulations?
To accommodate if something is too large scale, too expensive, or too risky to work with the real system.
Verification of Computer Simulations
The process of determining if the computer program correctly implements the model.
Validation of Computer Simulations
The process of determining if the model is an accurate representation of the real system.
What are the four steps to develop a software product?
Specification, Development, Validation, Evolution
What is specification in relation to Software Development?
Defining the functions to be performed by the software.
What is development in relation to Software Development?
Producing the software that meets the specifications.
What is validation in relation to Software Development?
Testing the software.
What is evolution in relation to Software Development?
Modifying the software to meet the changing needs of the customer.
What are good uses of simulations?
To see the dynamic responses of the system, ensure it does what it’s supposed to, and determine possible problems or errors.
Spam
Unsolicited Bulk Email
Spoofing
An identity theft where a person tries to use the identity of a legitimate user.
Phishing
Fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Spear Phishing
Fraudulent practice of sending emails seemingly froma known or trusted sender in order to induce targeted individuals to reveal confidential information.
Ransomware
A vicious malware that prevents users from entering their systems and required victims to pay a ransom to unlock files/systems.
Malware
Malicious Software or Files
Internet Trolls
Slang for a person who posts or makes inflammatory, insincere, digressive, extraneous, of off-topic messages online.
Cyberbullying
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
Cyberstalking
The use of the Internet or other electronic means to stalk or harass an individual, group, or organization
Cyber Predators
People who use the internet to exploit usually younger people for sexual and other purposes.
How do identity thieves find victims?
Fake online reviews/websites, looking for personal information in dumpsters, shoulder surfing, and phishing.
Child Internet Protection Act
Requires that libraries receiving federal funds to provide Internet access to its patrons must prevent children from getting access to visual depictions of obscenity and child pornography.
Censorship
The attempt to suppress or regulate public access to material considered offensive or harmful.
Three forms of Direct Censorship
Government Monopolization, Prepublication Review, Licensing and Registration
Self Censorship
Most common form of censorship and it is when a group decides for itself not to publish material.
Characteristics of the Internet that make censorship more difficult.
Internet supports many-to-many communications.
Internet is Dynamic.
Internet is huge.
Internet is global.
Hard to distinguish between children & adults on the internet.
Intellectual Property
Refers to creations of the mind, including inventions, literary/artistic works, and symbols used in commerce.
Trade Secret
A confidential piece of intellectual property that gives a company a competitive advantage.
Defend Trade Secrets Act of 2016
A significant legislation related to trade secrets in the United States.
Trademark
A way for a business to distinguish goods and services from others.
How long does a patent last?
The owner has exclusive rights to the invention for 20 years.
Copyright law grants authors rights to their original works, including the right to:
Reproduction; Distribution; Public Display; Public Performance; Produce Derivative Works.
Works created on or after January 1, 1978 have a copyright term of:
The life of the author plus 70 years after that author’s death
Copyright
Protects original works of authorship, including literature and music.
Patent
Protects inventions, granting exclusive rights to make and sell the invention.
Intellectual property does not include the ________ of property
Physical Formats
Employers usually need to sign a confidentiality agreement to _______________.
Protect Trade Secrets
True or False: Open source software can be sold for profit.
True
Besides for File Sharing what are Peer-to-Peer networks used for?
Data Backup and Storage
Distributed Computing
Online Gaming
What are the consequences for first time offenders of copyright infrengement?
Up to 5 years in prison and fines of up to $250,000 per offfense.
What are the differences between a patent and a trade secret?
Patent: Public domain and only last 20 years.
Trade Secret: Confidential and never have to be disclosed to the public.
What is the difference between open-source software and proprietary software?
Source code of proprietary Software is treated like a trade secret. There are no restrictions on modifying and reselling open-source software.
Fair use
The doctrine that allows copyrighted material to be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
Creative Commons
An international nonprofit organization that is devoted to educational access and expanding the range of creative works available for others to build upon and legally share.
Harms of Privacy
Illegal or immoral activities can occur under the cover of privacy.
Privacy in dysfunctional families can result in more harm.
An abundance of privacy may be a curse (ex: solitary confinement)
Benefits of Privacy
Allows people to focus their thoughts without interruption, be creative, grow spiritually.
Driver’s Privacy Protection Act (DPPA)
Protect the privacy of personal information assembly by State Department of Motor Vehicles by prohibiting the release or use by any state DMB of PI about an individual obtained by the department.
Fair Debt Collection Practices Act
A consumer protection amendment, establishing legal protection from abusive debt collection practices.
Fair & Accurate Credit Transactions Act (FACTA)
An amendment to the FCPA that allows consumers to request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies via AnnualCreditReport.com
Fair Credit Reporting Act (FCRA)
Enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies. It was intended to shield consumers from the willful and/or negligent inclusion of erroneous data in their credit reports.
Clarifying Lawful Overseas Use of Data Act (CLOUD Act)
Primarily amends the SCA of 1986 to allow federal law enforcement to force US Based technology companies via warrant or subpoena to provide requested data stored on servers regardless of whether the data is stored in the US or on foreign soil.
Privacy Act of 1974
Establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in system of records by federal agencies.
Children’s Online Privacy Protection Act (COPPA)
Designed to reduce the amount of information gathered from children using the internet.
Computer Fraud and Abuse Act (CFAA)
US cybersecurity bill that was enacted as an amendment to existing computer fraud law which has been included in the Comprehensive Crime Control Act of 1984
Family Educational Rights and Privacy Act (FERPA)
A law that governs the access to educational information and records by publicly funded educational institutions and foreign governments.
General Data Protection Regulation (GDPR)
The acts Primary aim is to enhance individual’s control and rights over their personal data and to simplify the regulatory environment for international business.
Right to Financial Privacy Act
Establishes specific procedures that federal government authorities must follow in order to obtain information from a financial institution about a customer’s financial records.
Information Technology Management Reform
The purpose is to improve the way the federal government acquires, uses, and disposes information technology (IT). IT with respect to an executive agency is defined in this act as any equipment or system that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency.
Communication Assistance for Law Enforcement Act
A US wiretapping law that requires phone companies to design or be able to modify networking equipment so that law enforcement agencies can trace calls, listen in on telephone calls, and intercept email messages.
Patriot Act
Was enacted following the 9/11 attacks and the 2001 anthrax attacks with the stated goal of dramatically tightening US national security, especially foreign terrorism.
Computer matching and Privacy Protection Act (CMPPA)
Requires Federal agencies to enter into written agreements with other agencies or non-Federal entities before disclosing records for use in computer matching programs.
Electronic Communications Privacy Act (ECPA)
Allows police to attach two kinds of surveillance devices to a suspect’s phone line. If the suspect gets a phone call, a trap-and-trace device displays the caller’s phone number.
Health Insurance Portability & Accountability Act (HIPPA)
A US federal statute that modernized the flow of healthcare information, stipulating how personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft.
Employee Polygraph Protection Act (EPPA)
Prohibits most private employers from using lie detector tests in most situations.
E-Government Act
United States statue with the purpose of improving the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer of the United States within the Office of Management and Budget and by establishing a framework of measures that require using internet-based information technology to improve citizen access to government information and services.
Telecommunications Act
Authorizes the Federal Communications Commission to impose restrictions on telecommunications carriers regarding the access, use, and disclosure of customer information.
RFID Tags
A tiny wireless transmitter that can be scanned to give additional information.
Cookies
A file placed on your computer’s hard drive by a web server that contains information about your visits to a Web site.
Implanted Microchip
An electronic device the size of a grain of rice that can be placed in animals to identify owner & residence.
Public Records
information about an incident or action reported to a government agency for the purpose of informing the public.
Automobile Black Boxes
A microprocessor attached to the car that records information about the speed of the car, the amount of pressure being put on the brake pedal, and whether the seat belts are connected.
Malware
Malicious Software
Trojan Horse
A malicious computer program designed to deceive users by concealing a sinister purpose behind a benign capability.
Bot
A particular kind of backdoor Trojan that responds to commands sent by a command-and-control program located on an external computer.
Drive-by downlaod
When a user visits a compromised website, and it results in unintentional downloading of software.
Virus
A piece of self-replicating code embedded within another program called the host
Cross-site scripting
Where an attacker injects a client-side script into a website and when a user visits the site, the user’s browser executes the script, which may steal cookies, track the user’s activity, or perform another malicious action.
Ransomware
Malware designed to extort money from the victim of the attack.
Spear phishing
When the attacker selects email addresses that target a particular group of recipients or even on particular person in an effort to gain sensitive information.
Worm
A self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
Spyware
A program that communicates over an internet connection without the user’s knowledge or consent.
BotNet
A colleciton o fbot-infected computers.
Bot Herder
A person who controls a botnet.
SQL Injection
A method of inserting an SQL query into a text string from a web client to the web application in order to trick the application into returning sensitive information.