Posted on December 4, 2013.
Posted on December 3, 2013.
Measuring Internet Activity: A (Selective) Review of Methods and Metrics
Source: Berkman Center for Internet & Society (via Social Science Research Network)
Two Decades after the birth of the World Wide Web, more than two billion people around the world are Internet users. The digital landscape is littered with hints that the affordances of digital communications are being leveraged to transform life in profound and important ways. The reach and influence of digitally mediated activity grow by the day and touch upon all aspects of life, from health, education, and commerce to religion and governance. This trend demands that we seek answers to the biggest questions about how digitally mediated communication changes society and the role of different policies in helping or hindering the beneficial aspects of these changes. Yet despite the profusion of data the digital age has brought upon us — we now have access to a flood of information about the movements, relationships, purchasing decisions, interests, and intimate thoughts of people around the world — the distance between the great questions of the digital age and our understanding of the impact of digital communications on society remains large. A number of ongoing policy questions have emerged that beg for better empirical data and analyses upon which to base wider and more insightful perspectives on the mechanics of social, economic, and political life online. This paper seeks to describe the conceptual and practical impediments to measuring and understanding digital activity and highlights a sample of the many efforts to fill the gap between our incomplete understanding of digital life and the formidable policy questions related to developing a vibrant and healthy Internet that serves the public interest and contributes to human wellbeing. Our primary focus is on efforts to measure Internet activity, as we believe obtaining robust, accurate data is a necessary and valuable first step that will lead us closer to answering the vitally important questions of the digital realm. Even this step is challenging: the Internet is difficult to measure and monitor, and there is no simple aggregate measure of Internet activity — no GDP, no HDI. In the following section we present a framework for assessing efforts to document digital activity. The next three sections offer a summary and description of many of the ongoing projects that document digital activity, with two final sections devoted to discussion and conclusions.
Posted on November 29, 2013.
|New tech helps feds do their jobs, and agencies are adapting.|
When you hear words like “digital,” “social” or “online community,” “government” should also come to mind. Agencies are adapting to developments in social media and digital technologies in some surprising ways.
Consider the Defense Department’s All Partners Access Network, formerly known as the Asia Pacific Area Network. Hosted by U.S. Pacific Command, APAN is a community of unclassified Web portals that facilitate information exchange and archiving in a collaborative planning environment. This allows Defense to build partnerships and improve security cooperation initiatives, humanitarian assistance, disaster relief and event planning. As a result, APAN provides a unique military operational capability necessary to support multi-agency operations as well as government and nongovernment organizations during complex operations and events.
Posted on November 29, 2013.
Volume 8, Issue 11
|Cyber Monday and Online Shopping Season: What You Need to Know to Protect Yourself|
|Online holiday shopping continues to grow in popularity. According to American Express, for the first time, more people are expected to shop online on Cyber Monday than visit brick and mortar stores on Black Friday. Shoppers are expected to spend nearly $62 billion online throughout the holiday season this year, up more than 15% from 2012. The use of mobile devices for online shopping (mcommerce) is projected to reach almost $10 billion for the 2013 holiday season, as more consumers are using these devices to compare prices, research products, locate stores, and make purchases to a larger degree than ever before.Whether you’ll be conducting transactions from your desktop, laptop or mobile device, keep these tips in mind to help protect yourself from identity theft and other malicious activity on Cyber Monday, and throughout the year: |
Contact the seller or the site operator directly to resolve any issues. You may also contact the following:
For More Information:
For additional information about safe online shopping, please visit the following sites:
The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.
Posted on November 15, 2013.
|In a landmark copyright case, a judge has ruled Google’s massive book scanning project for its search engine fair use.|
Posted on November 15, 2013.
U.S. Navy Employment Options for Unmanned Surface Vehicles (USVs)
Source: RAND Corporation
This report assesses in what ways and to what degree unmanned surface vehicles (USVs) are suitable for supporting U.S. Navy missions and functions. It briefly characterizes the current and emerging USV marketplaces to provide a baseline for near-term capabilities, describes USV concepts of employment to support diverse U.S. Navy missions and functions, and evaluates these concepts of employment to identify specific missions and functions for which they are highly suitable. USVs offer several particular strengths relative to other platforms, including the ability to interact both above and below the waterline, enabling them to serve as critical nodes for cross-domain networks. They also have potentially longer endurance, larger payloads, and higher power outputs than comparably sized unmanned air or undersea vehicles. Additionally, their greater risk tolerance compared with manned systems makes them desirable platforms for overcoming adversaries’ anti-access and area-denial measures. These strengths make USVs particularly suitable for missions such as characterizing the physical environment, observation and collection regarding adversaries, mine warfare, military deception/information operations/electronic warfare, defense against small boats, testing and training, search and rescue, and the support of other unmanned vehicles. However, USVs need advanced autonomy and assured communications to complete complex missions, as well as any missions in complex environments. Autonomous seakeeping and maritime traffic avoidance are USV-specific capabilities that likely need to be developed with U.S. Navy involvement. Also, optional manning and payload modularity can enhance the desirability of USV programs.
This looks like it will cut down on the number of unemployed USVs. I guess that is good news — Bill Drew
Posted on November 15, 2013.
|It’s not that hard to not be that employee that ruins it for the rest of us. Here’s how. By Siraj Datoo|
Posted on October 1, 2013.
Week one of National Cyber Security Awareness Month aims to raise online safety awareness among all citizens and reinforce the simple measures everyone can take to be more secure online.
Help create a safer cyber environment by taking the following steps:
– Set strong passwords, and don’t share them with anyone.
– Keep your operating system, browser, and other critical software optimized and secure by installing updates.
– Maintain an open dialogue with your family, friends, and community about Internet safety.
– Limit the amount of personal information you post online, and use privacy settings.
– Be cautious about what you receive or read online – if it sounds too good to be true, it probably is.
Actions you can take to promote cyber security awareness:
– Distribute Cyber Security Awareness Month materials (posters, calendars) available at http://www.dhses.ny.gov/ocs/
– NYS Cyber Awareness Toolkit
– Stop.Think.Connect. Toolkit
– MS-ISAC Cyber Security Awareness Toolkit
– Encourage employees and citizens to sign the Cyber Pledge at https://msisac.cisecurity.org/
– Brand and distribute the Cyber Tips Newsletter available at http://www.dhses.ny.gov/ocs/
– Include a Cyber Security Awareness article in your organization’s newsletter
– Hang Cyber Security Awareness posters in common areas
– Encourage cyber interested youths and individuals to sign up now for national competitions
o Cyber Aces begins 10/14 (www.cyberaces.org<http://www.
o CyberPatriot begins 10/10 (www.uscyberpatriot.org<http:/
– Ask your county, city, town or village executive to issue a Cyber Security Awareness Month Proclamation. A template is available on our website at http://www.dhses.ny.gov/ocs/
Posted on September 24, 2013.
The NYS Office of Information Technology Services, Enterprise Information Security Office (NYS ITS EISO) is pleased to provide you with the Cyber Security Tips Newsletter. The monthly newsletter, developed by the Multi-State Information Sharing and Analysis Center (MS-ISAC), provides helpful cyber security tips. The newsletter is available on the ITS EISO website. Please visit http://www.dhses.ny.gov/ocs/awareness-training-events/news/ for more information.
Monthly Security Tips
Volume 8, Issue 8
What is Java?
Java is a computer language that allows programmers and application developers to write software that can run on many different operating systems. Numerous applications and websites require end-users to have Java installed. Websites incorporate Java applets (small applications) to enhance the usability and functionality of a website. In general, when a user visits one of these websites, depending on their browser’s security settings, they may have no idea the Java applet is automatically running.
End-users typically have “Java Runtime Environment” (JRE) installed on their computer. In many instances, this software was pre-installed on their computer. More recently, this practice is becoming less common. If JRE is not installed on your computer, and you visit a website that requires JRE, generally, you will be prompted to install JRE.
What are the Risks with Java?
Java is designed to work on almost any computer. Java has been prone to numerous reports of vulnerabilities. According to the SecureList IT Threat Evolution Report released by Kaspersky Lab in May 2013, “The most widespread vulnerabilities are found in Java and [the vulnerabilities] were detected on 45% of all computers.” [ http://www.securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_20131]
Attacks are based, at least in part, on older versions of Java. When a newer version of Java is released and installed on a machine, the older version may not automatically be uninstalled. This was intended to provide an easy way to roll back to an older version in case of compatibility issues. Attacks can be used by hackers to leverage and to exploit the vulnerabilities that exist in those versions. This makes Java’s weaknesses an attractive target for hackers and cyber criminals.
How Can I Mitigate Java Exploits?
* Enable the automatic update feature, which will ensure you receive important security updates when they are released. Visit: http://www.java.com/en/download/help/java_update.xml for instructions on turning on the auto-update feature.
* Set the Java security level to “High” or “Very High.” The most recent versions of Java have the ability to manage when and how untrusted Java applications/applets will run. You can set the security level from within the Java Control Panel so that you are notified before any untrusted Java applications run. Visit: http://www.java.com/en/download/help/jcp_security.xml for instructions on setting the Java security level.
* Clear the Java cache periodically. This forces the browser to load the latest versions of web pages and programs. For more information visit: http://www.java.com/en/download/help/plugin_cache.xml
* Do not allow applications from unknown publishers to run.
* Remove older, unneeded Java versions. If a certain version of Java is needed, determine what Java release level is needed and remove all prior versions. For more information visit: http://www.java.com/en/download/faq/remove_olderversions.xml
For More Information:
For additional information, please visit:
Java Security Resources
Uninstalling Java on Windows
Uninstalling Java on Mac
Disabling Your Browser’s Java Plugin
Brought to you by the MS-ISAC and Stop.Think.Connect.
Posted on September 24, 2013.
“BIG DATA IS DATA THAT EXCEEDS THE PROCESSING CAPACITY OF CONVENTIONAL DATABASE SYSTEMS.”
Big data is data that exceeds the processing capacity of conventional database systems. The data is too big, moves too fast, or doesn’t fit the strictures of your database architectures. To gain value from this data, you must choose an alternative way to process it.
Edd Dumbill. Big Data. March 2013, 1(1): 1-2. doi:10.1089/big.2012.1503.
Posted in Web/TechComments Off