Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(149 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Intelligence Analysis ==
+
== Privacy for Mobile Apps ==
  
'''DATE:'''  16 June 2017
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
+
|-
'''LOCATION:'''  Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
+
| '''TIME:'''&nbsp; 29 April 2020, 14:00h<br />'''Place:'''&nbsp; Virtual seminar room: email josang@mn.uio.no to get the address, <br /><br />'''AGENDA:'''<br />
 
+
14:00h Welcome to AF''Security'''s virtual seminar room<br />14:05h Invited talk:
'''AGENDA:'''
+
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center>
 +
|}
 +
* '''TITLE:''' &nbsp;''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' &nbsp;''Nurul Momen''&nbsp; (Karlstad University) <br />'''ABSTRACT:''' What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
  
13:00h Welcome at IFI
+
14:45h Discussion<br />
  
13:15h Talk: ''Intelligence Analysis: Reflections on the Human – Machine Analytic Enterprise from a Behavioral Computer Science Perspective.''
+
'''BIO:''' &nbsp; Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.<br />
  
14:00h Discussion
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
 
 
 
'''SPEAKER:''' Tore Pedersen (Norwegian Defence Intelligence School)
 
 
 
'''ABSTRACT:'''
 
Making judgments automatically, without conscious awareness, also termed ‘heuristic processing’, is particularly adaptive and appropriate in situations where people have extensive previous (tacit) knowledge and experience. However, people tend to employ the same heuristic processing mode also in situations where they have less previous experience. In such situations heuristic processing is likely to lead to a biased judgment, whereas analytic processing with conscious awareness would more likely lead to an unbiased judgment.
 
This phenomenon may extend also to the machine-based automated knowledge-generation of today and tomorrow: Human biases may unintentionally be imposed on machines through programming of initial algorithms and the biases may sustain in the machines’ automated decision processes. Additionally, machines’ self-adjustment of algorithms in learning processes may, as a result of learning from non-representative data, lead to equally biased output.
 
Moreover, in the process of making inference-leaps from data to knowledge, such as when claiming causal relation between present events or when predicting what the future might look like, validity in analytic products relies on the ability to apply sound scientific reasoning: Knowledge is bounded by the quality and representativeness of collected data, as well as on the limitations of research designs and the assumptions and restrictions inherent in various (statistical) tests. With today’s increased access to data sources and increased data volumes, adherence to the same (traditional) rigorous scientific standards must nevertheless still be applied, both in collection and analysis.
 
Thus, in the human – machine analytic enterprise of today and tomorrow, it is important to be aware of the potential threat from bias, as well as the potential threat from non-adherence to scientific reasoning, because both of these phenomena may have implications for the validity of output from human – machine analytic processes.
 
 
 
'''SPEAKER BIO:'''
 
Tore Pedersen is Associate Professor and Director of Center for Intelligence Studies at the Norwegian Defence Intelligence School (NORDIS). He is also visiting researcher at the Department of Informatics, University of Oslo, and affiliated Associate Professor at the Department of Psychology, Bjørknes University College. He is currently engaged in empirical research on cognitive aspects of the National Intelligence and Security domain.
 
 
 
 
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
 +
| [[File:Sec-light-360.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 16:02, 24 April 2020

Privacy for Mobile Apps

TIME:  29 April 2020, 14:00h
Place:  Virtual seminar room: email josang@mn.uio.no to get the address,

AGENDA:

14:00h Welcome to AFSecurity's virtual seminar room
14:05h Invited talk:

Logo-Karlstad.png
  • TITLE:  Privacy for mobile apps: Technical, regulatory and human challenges
    SPEAKER:  Nurul Momen  (Karlstad University)
    ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?

14:45h Discussion

BIO:   Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.

AFSecurity-small.png AFSecurity is organised by the UiO Research Group on Digital Security Sec-light-360.png