Outline for Today
Intellectual Property
Administration
Response to Responses
Results from Last Meeting
These questions are still open until 3pm
*Assignment details
Today
Summary
Summary
For Next Meeting
Wiki
Link to the UR Courses wiki page for this meeting
Media
Transcript
Audio Transcript
-
Okay okay How's
everyone I'm good thanks for us
-
wondering how long winters back
for my scores minus four Yes?
-
So we're continuing our
discussion of last table
-
intellectual property and
privacy
-
I didn't update the title or the
theme for today with us
-
that's where we're at
-
so I wanted to say
-
formatting problem I didn't
catch but I asked you two
-
questions and I posted them
after I said I would lit it and
-
I said I would so I've made them
open until three today so if you
-
want if you haven't contributed
your response to these
-
questions, you can do it now
-
it's cold in here today
-
so we'll look at them a little
bit later
-
so
-
So I wanted to talk a bit about
the difficulty of material in
-
the podcast so I don't want to
be insensitive
-
so I understand that some people
can engage with that but if you
-
have an issue with it and you'd
like to talk to me you can send
-
emails or horses
-
so
-
so do you think there are
different populations of
-
journalists because the second
one was like I don't know that
-
people are actually there's a
big push to call it smart
-
listeners Alexa
-
the thoughts are that there is
between deepfake and digital
-
forgery deep fakes even more
innocuous?
-
Examples
-
I think that's the term that's
being used also gas natural gas
-
the last one is Big
-
Data farming is
-
maybe a friendly term but data
mining is necessarily an
-
unfriendly term.
-
So many people have an Alexa or
similar
-
four or five ads I've saw so
concerned that your personal
-
conversations are being
transmitted Jeff Bezos
-
might do Google so not Jeff
Bezos but i It's the minor
-
concern
-
so what are some concerns that
are what concerns are relevant
-
or not practical in this era of
easy digital forgeries so it's
-
not even that people have needed
a great deal of skill to to
-
create digital forgeries. It's
not necessarily about conceptual
-
imagery either to be exact where
the podcast was the reporter who
-
was on stage and the people
front and center technologies
-
reverse they got judged me say
some nice things for the
-
journalist generate some
attacks. ways that they might
-
impugn your character so what
Andy said in spirit he had these
-
these in depth interviews with
Mark Zuckerberg. But then we
-
have sidestepped well recently
how to treat individual cancer
-
cancer relationships. And so it
doesn't take much to find
-
images. Maybe some sound
theories is the other person.
-
You get some audio, video and
they
-
and then create some attack
articles and tabloid style
-
headlines. Some images that will
create the journalists
-
bloodhounds Mark Zuckerberg, and
green Some argue that was taken
-
out of context. These are
-
So it's a burden on us security
-
so any thoughts about whether
it's up to us to make sure that
-
we don't have material that's
going to be used against us
-
Yes, I mean there's no way to
really have any information back
-
against this like if you exist
at all I mean, if you have to
-
speak that any syllable you say
be turned into like basically
-
they can say whatever they want
so
-
yeah, it's pretty difficult
unless you want to stay stay in
-
your home and not be a public
person
-
at all public then there's risk
-
so as computer professionals we
can take that on to educate
-
people about the importance of a
lot of reports so seeing as safe
-
as it has no contract with
anyone but the risks that are
-
involved in this technology and
it's important to leave some
-
these emerging threats any other
comments.
-
This one is versus an all the
questions that came up in
-
responses, but there was
something about software
-
patents. So, here's the
Wikipedia page about software
-
patents and it's highlighting a
debate about software patents.
-
So it's not a settled question.
-
So they said they're not granted
for code that does something
-
that people could do with paper
and pen.
-
So it's not just about the code
which is an expression of an
-
algorithm because recipes for
example you might think software
-
is like recipes you can patent
recipes so it's talking about
-
realization of the code in an
environment with the hardware
-
and so forth
-
so, any feelings about whether
software patents are a good
-
thing
-
anyone right hoped to write have
get a patent on a piece of
-
software
-
anyone hoped to get have a
startup with commercialize and
-
commercialize some intellectual
property
-
called the junior college campus
cultivated by Connexus that's a
-
startup incubator.
-
He's
-
just had a fifth birthday so
we've had a number of companies
-
proceed through their programs
-
so include us blog post talks
-
a little bit about little more
detail about software patents
-
so it's three o'clock now. So
anyone here still good to
-
respond to the questions
-
okay so the questions were
-
okay, so, first question is two
or three parts for the
-
professional skill assessment
-
so, let's 6040 for two parts
compared to three parts so well
-
will keep it in two parts would
you prefer to have the first
-
part due before the break or
after the break so 80% went
-
after the break
-
and then the question was would
you like the infographic
-
assignment broken into two or
three parts the due date for the
-
last part is April 8 So 6040
again for two parts so we'll do
-
that
-
and higher desire to have it
after the break
-
okay
-
so, that information on any
discussion about that question
-
so, essentially having the
second part due on
-
You Evening so how about
-
2626
-
Right results are so many people
have signed up for membership
-
doing that may concern some
people rather than a yet an
-
objection to doing it just want
to address the concerns about it
-
okay so this means that we'll
have deliverables and 72 weeks
-
after the break okay
-
so given this I'll I'll have the
details of the assignments and
-
the breakdown between the first
and second arts sorted out and
-
we can review them if there any
questions on Tuesday.
-
Okay
-
so I'd ask a question on
encryption
-
so are you aware of available
encryption tools available to
-
you for protecting your personal
devices?
-
So 60% said yes. 40% said no.
And somebody said, maybe you're
-
aware of some of them, but not
all of them.
-
So what are some popular tools?
Those of you who are using them,
-
but I didn't actually ask if
you're using them
-
anyone likes to chime in with
some tools that are being used
-
or that are well known
-
you anyone
-
okay
-
okay so regarding Password
Manager 60% said yes three 4%
-
said no and few people selected
what is the password manager so
-
what are some popular some
password managers that are being
-
used?
-
Use LastPass
-
one password
-
this is the one recommended by
Information Services yeah one
-
person anyone else so I've seen
so it doesn't use the cloud
-
right it's just on your device
-
I was just gonna say I use the
password manager a bit Warden
-
so are you I once used LastPass
now he's one password and I got
-
a thumbs up from a colleague
who's a security analyst for
-
using one password so I'm
feeling better and
-
yes, I use em secure
-
so the advantage of using a
password manager is you can have
-
difficult to guess passwords 20
characters long that you don't
-
have to remember
-
keep up with you all the time
-
anyway okay
-
he's encryption on any of these
devices so 22% said yes for
-
desktop 60% for laptop 64% for
phone and other was 24%
-
Do you use encryption on your
electronic communications were
-
340 3% said yes 33% said no and
22% are not sure because there
-
are different claims that can be
made and if everyone else is
-
using something then it's
-
but it's fine to just go with
the flow I guess our prime
-
concern and lots of other issues
related to choose a
-
communication platforms.
-
So I thought this is a nice
diagram to illustrate public key
-
encryption so that's so it's
called asymmetric keys.
-
So, initially, encryption was
done with symmetric keys, so any
-
comments so we had to have both
the same keys to encrypt and
-
decrypt messages. So they might
have been delivered by trusted
-
courier might have a book of
thieves or glittery black dress
-
courier certain name
-
and occasional transparent
security that you could operate.
-
And messaging secret
-
was a that was a big it's a big
ask to be able to transmit the
-
key security. So these
asymmetric keys involve
-
transmitting information on a
public channel. So each other so
-
if we're talking between two
people to communicate with you
-
two people, we have a secret
each person can have a secret
-
but then they have a shared
public key. So Alice and Bob
-
agree on a public shared key to
us. And each have a secret so
-
their keys look different So
they take this shared the public
-
key and combine it with their
own secret key to come up with a
-
new key that they can share with
each other
-
so the way the math works is
that these are
-
the keys that result from the
secret key and the public key
-
can be transmitted over the open
channel and once transmitted key
-
combines with the secret key of
the other person they get the
-
new secret so we don't have to
-
we can we don't have to worry
about
-
keeping many things secret here
you don't have to keep this
-
public key secret you just have
to at least maintain our own
-
secrets we don't have to
communicate these to the other
-
person
-
so it's important that it not be
too easy to guess what the keys
-
with these capital A and capital
B keys are at this stage so
-
the final shared secret key is
not is not easily discovered
-
here's the same idea with paint
colors.
-
So there's many licenses to
choose from. So if we're going
-
back to the blood show property
protection
-
one way to do this is a license
to protect things in an open way
-
so they keep remain open
-
Mr choose a license
-
there's quite a long list of of
licenses here.
-
A simpler list
-
You I was looking for a link
there we'll look we'll I'll get
-
to it in a minute
-
so here are a number of choices
for licensing so we can put
-
things into the public domain so
it's not really a license so
-
much as its granting says that
the work is part of the public
-
domain so Creative Commons zero
is one of those things one of
-
the ways to do that
-
your permission license
-
so it just gives it lets people
do what they want to do with the
-
software copy left is that
-
means that you you can make
changes to the software but you
-
need to publish you need to
share your changes as well so
-
it's protected against
proprietary isation of the
-
software. So those three or
three versions are options for
-
free software.
-
So you might have a non
commercial license to grant
-
rights for non commercial use.
So an option is Creative Commons
-
by and see the pie is refers to
attribution seated saying who
-
wrote it and then C says you're
not allowing any
-
commercialization of the
results.
-
Who's heard of Creative Commons
before?
-
So is a proprietary license
traditionally used for copyright
-
no rights need to be granted.
Something's a trade secret that
-
no information is made public.
-
So first software's Some
examples are
-
public domain and CC zero
-
for a permissive license MIT and
Apache
-
and for copyleft protection of
GPL and a GPL versions of the
-
GNU public license
-
so, is anyone writing writing
software and putting out an open
-
license on it?
-
So, the last line is for other
creative works aside from
-
software so, we can say Creative
Commons by Creative Commons BY
-
Shara lake or Creative Commons
BY which means a attribution of
-
who created it and see is not
commercial
-
So, now that we have group set
up inside of your perception
-
so, here are the questions my
soccer fans Vic Thank you prefer
-
direct Salford proprietary or
open license license which
-
license we use sense
-
okay so no that doesn't make
sense afterwards okay so once
-
you get into groups and having a
professional battle
-
with as a surgeon
-
night last time we talked about
this The
-
most efficient data structure
-
up following
-
connection
-
right Right evening right Right
so moving
-
on morning you actually
-
actually asked
-
it are First
-
you gotta make sure the sponsor
was
-
actually paid so as often as you
want it leaders in the
-
organization so all like
-
the same can't say anything
-
at all there yeah so how are the
discussions going anything you'd
-
like to share
-
yeah theoretically companies
shouldn't own copyrights
-
a person we've recovered yet
-
so we saw Derek So your question
is Which consequences
-
February 22
-
doesn't have to be
-
if they ask you to ask for it
there's always going to be
-
yeah last there's going to be
one soul search says the sorting
-
is going to be sorted
-
looking for groups for stalking
to figure
-
out so say And when you submit
the first part of the
-
infographic assignment March you
have the urge to set up the
-
topic take some time to think
about
-
the discussion
-
Okay, yes. My
-
question is are the assignments
were a group of four people
-
what's the maximum IQ for the
group as far as I can
-
so it's not Yeah, so that's for
the infographic design
-
assignments this one's about two
parts. So the professional self
-
assessments individual
assignment
-
is there a layout of what we
have done for like is there like
-
a real depth to it like like
halfway done already just like
-
how the idea into graphics is
was just
-
another graphic
-
so if you have never shut up the
trading course
-
Okay, thanks for today have a
good weekend. See you Tuesday
-
right.
-
Up morning
-
Up morning
Responses
What important concept or perspective did you encounter today?
- I learnt about encryption today.
- About open source software
- the concept of software license
- The status of software being kinda in the grey area of patent. Software is such a complex creation and that the extent to which software can be eligible for patent is difficult to determine.
- Key Encryption
- we learnt about free open software topic.
- I encountered concept of software patents in today's class
- Open source license, deep fakes, digital frogery
- Different types of license
- Digital forgery was one of the important concept I have encountered.
- Software patent
- Got to know about different kind of password managers such as 1 password and also about differences between the policies of each country that regulates software patents.
- Best password encryption options
- digital forger
- Concerns of digital forgery
- Comparison of free and open-source software licenses, etc..
- A software patent gives inventors exclusive rights to their software-related creations, like computer programs or algorithms, usually for 20 years, in exchange for disclosing the details of their invention. However, the criteria for obtaining software patents differ across countries and regional offices, especially regarding computer-implemented innovations such as business methods.
- I learned from the podcast that whenever we design/create something, we should always think that we are designing it for the most vulnerable person and how we could use our skills to aid those that are less fortunate.
- Digital forgery
- Today, I encountered the idea of copylefting, a concept I didn't even know existed. I find it interesting that people are allowed to make changes to another person's work so long as they publish it.
- During discussions, we questioned why open source would ever be an option when everyone building their projects would want to retain their rights to it as well. However, I understand it as sharing. Giving people the base to contribute and create something of their own. However, why would anyone allow others to modify and claim something that originally came from them. The idea to retain ownership and taking in feedback to change things sounds lot better as a customer. I want something readymade.
- open source licences
- Software patents can be viewed as a positive result from an individuals perspective, or a negative result from society's perspective. I was not aware that software patents needed philosophical inquiry in this way.
- The podcast of deepfakes
- nothing
- digital forgery and image-based sexual abuse with ai generated art involving people (ex deepfake porn)
- Risks with Pornography
- Software patents
- Patents of software
- Free software license, comparison of free and open source licenses
- Digital Forgery
- I learnt about free-software licenses and the different kinds. I also learnt about public key encryption
- Today I encountered the concepts of deep fakes and image based sexual abuse, which I didn't realize how common they were.
- An important perspective that I encountered today and yesterday in the podcast was the concept of digital forgery and how alarming it can be to all kinds of people espeically females who can have their image tarnished by something they did not even do. I believe that as computing professionals it is our responsibility to determine what people should be able to create online and ties into the debate of should everyone have access to AI (something that people don't know how it works).
- Software patents
- Software patent
- the concepts were all interesting
- foss licences
- Free and open source license, software patent, public key encryption
- deep fake and digital fogery
- The most most important concept I learned was about public key encryption and how it is useful and good for world
- Issues regarding software patents
- An important idea that was talked about today was Software Licenses. In my opinion, I feel Copyright laws are a little bit over the top. Not just in the software world but an everyday life situation. For example: I wanted to make a custom sweater which Ive always wanted but there were a few rules that I had to follow. I could not but anything that was licensed: words, pictures, logos etc. I could not be as creative because of limitations of copyright. I feel this 100% can be transcribed in software industry
- Free-software license
- The dangers of deepfake technology is probably the biggest topic I encountered today, This is because of the future implications of people or governments abusing this technology to try and decieve the public. An example of this would to have a deepfake of a political rival doing something nefarious and using that to smear there image. Also, in a simpler way it could be used to damage popular stars image. A recent example of this would be Taylor Swift.
- the idea that there are debates about changing the names of technologies in order to better represent what those technologies are capable of, good and bad.
- I realized that I was more in favour of open-source software over proprietary software.
- Intellectual Property, Software licences, patients.
- the importance of word choice for a positive or negative affect, helps convey a perspective on the topic
- We talked about the different kinds of patents and discussed which ones are better for certain situations.
- Symmetric and Asymmetric Encryption
- We saw topics about software license, encryption
- An important concept I learnt today is about encryption
- Everything
- No
- We went more in depth with encryption and the case studies
- Encryption
- I think there was nothing importanat I did encounter today.
- The important part was podcast on deepFakes, concern of digital forgery etc.
- About the computer software and patent
- Today we learned about software patents.
- The use of AI to create sexualy explicit images is a new way that sexual abuse can be taken place. This deep fake tech is how it is being used on famous celebrities.
- Today in class we discussed about the podcast on deep fakes and talked about important assignments submission and parts
- Today we discussed about the podcast on deepfakes, the concerns of digital forgery, the assignment dates and password managers
- I learned about password managers today. I always thought you had to just memorize or write down your passwords in some sort of note format. Knowing this now, I will definitely start using one and use more secure passwords.
- About software patents
- nothing important concept today
- i learned about patent.
- I got to know more about encryption
- Software patents
- Today we were introduced to several important concepts. Firstly, we given a glimpse of digital forgery and the harm that it inflicts on people, but especially women. Then we went over the precautions we should take regarding passwords and password managers. We also had a discussion about software patents with our classwork groups which we posted about on our blog.
- Software Patents are still an open issue
- The concept of digital forgery
- Comparison between free and open source file
- software patents
- About assigbment
- No
- Security
- the use of ai for deception
- I learned the important concept of deep fakes and concerns of digital forgery
- I learned about encryption sites I haven’t heard of today.
- Key encryption was the most interesting for me
- Today I encountered the concept Diffie–Hellman key exchange and digital forgery. The key exchange is a mathematical method that lets 2 people securely exchange cryptographic keys over a public channel without doing it directly.
- The concerns of digital forgery
- The impact that deepfakes and digital forgery has on people, and also what some believe to be real or faje
- I learned the existence of software licenses / copyright / patents.
- Concerns on digital forgery and talked about password managers
- Comparison of free and open-source licenses and Public key encryption
- Software patent are still an open issue: Not grated just for automating a task otherwise done by people, Must have some new elements that is the invention, Not just the code, but the lager packages.
- The heavy importance of encryption
- learning about the podcast and its content
- .
- Today ,I discovered essential concepts such as software patent, types of patents,etc.
- Encryption and the privatization of user data. Also Software patents and whether to consider the ethical and financial side of patenting software (i.e. proprietization or open source)
- I got to know about different topics like comparison of free and open sources, public key encryption etc.
- Today we discussed about Assignments and other stuff.
- Today’s lecture was extraordinary.. we learned good things…
- Administration
- We learn about the concerns behind digital forgery and password manager.
- the important concept was software patents
- I learnt about digital forgery
- the comaprison of free and open source software licences and their permissions
- deepfakes and digital forgery
- Free and open source license
- An important concept that I learned today was the emphasis on making safety for deepfakes. In all honesty the thought of deepfakes and how common it is for it to be sexually abused scares me. I want to find out the progression of minimizing it if there is any significant progression on the software engineering side apart from the bills that are being raised in question for it.
- Important concept of ethical values is the need for the future
- today we learn about the softwares and their licensing
- The use of deepfake ai being used to hurt/damage a person’s reputation.
- Comparison between free and open source lisences`
- Whats in a name
- Public channel
- encryption
- Comparison of free and open source licences
- Today we learned to free and open source software licence and also discussed about Diffie- Hellman key exchange method.
- I learned about the concerns behind deepfakes (digital forgery), as well as software patents.
- Concept about whether software patents are important or not .
- One important concept I encountered today was the idea of software patents and how it still remains an open issue. They are not granted just for automating a task otherwise done by people, and they must have some new element that is the invention.
- What I learned is that how dangerous digital forgery can be and how it impacts the victim of it. Digital forgery, which is deep fake, can bring so much harm to an individual. It can take someone's face without their permission and use it to make sexual contents.
- The term "revenge porn", also referred to as "non-consensual pornography" or "image-based sexual abuse", was introduced to me today. The publication of sexually graphic images or films of someone without that person's consent is known as revenge porn. The phrase refers to a specific situation wherein private images are posted online with the intention of harassing and dehumanizing an ex-partner, but it is also frequently used incorrectly to refer to any kind of non-consensual pornography.
- digital forgery concept is very intriguing.
- Talked about the Podcast on Deepfakes, concerns of digital Forgery, password managers
- about software license
- SIFT
Was there anything today that was difficult to understand?
- No, class was informative.
- No
- not really
- Since software is already protected through copyright, would having softwares patents be an overkill? And patent could kill competitions since competitors can develop a different code that produces the same result and still be under the copyright law.
- Everything was good
- no
- It was understandable
- No
- Little bit encryption
- More clarification about freedom of speech issues and utility of software would be great
- No
- Comparison of free and open-source licenses
- no
- There were few things where I got lost during the podcast
- No
- no, The explanations and instructions provided were quite straightforward, and I didn't encounter any concepts or tasks that were overly complex or confusing.
- No
- No
- nope
- N/a
- no
- not particularly hard to understand per say but how it’s possible to coin a piece of code because if that’s the case then other pieces of code can be claimed and it’s a slippery slope
- No
- Infographic
- No
- Not really
- No
- No, not really
- No.
- No
- Not at all
- the concept were explanatory
- no
- No
- none
- AS far I I know I found comparison of free and open source licences bit difficult to understand but still I have to read more about it so that I get to learn more
- it was difficult to understand if software patents are a good or bad thing
- what is Public key
- No not really.
- What is patenting?
- It was difficult to read the notes but I appretiate them being posted on the website later.
- No
- There was nothing difficult to understand today
- No
- Nothing
- NO
- None
- About infographic
- No
- No
- There was nothing difficult to understand.
- No, everything was easy.
- The topic of deep fake videos and images
- Nope
- Not much difficult
- No
- Nothing was difficult to understand today.
- Why would it not be possible for us to be the ones to create what's available online?
- no
- nope there was nothing difficult today
- no everything was clear
- No really
- No we just discussed
- No, everything was clear.
- NO
- No there was nothing difficult
- No
- no
- No
- No
- No
- no not really
- It was difficult to understand why some people needed password managers as I often keep a set of passwords written down on one of my notebooks.
- Not today.
- Not much
- It was difficult to read the board today as the writting was a bit smaller than usual
- No
- Nothing really
- Today's lecture was a little tough to follow along with because I did not know the significance of licences or patents.
- No
- nope
- There was nothing to be difficult to understand
- The lecture was clear and concise
- no
- No
- Difference between deep fake and digital forgery was difficult to understand.
- I don't think there was anything hard to understand.
- No
- NOT AT ALL
- Not really
- Yes, just about the public key encryption
- nope, everything went good
- No
- Nothing at all
- well your voice was bit low apart from that everything was good
- no
- Nope
- N/A
- Nothing was difficult to understand in today class
- Nothing
- No
- Public key encription
- No
- No
- no
- No
- No everything was good.
- Nope, everything was clear in today's lecture.
- No
- Nope, I was able to understand everything that happened in class today.
- Not really
- Addition to the first question: It has been observed that those affected by this experience (image-based sexual abuse) feelings of public humiliation, helplessness, intimate connection difficulties, difficulty forming new relationships, and negative consequences on their mental health.
- No. Everything was clear.
- No
- If we can get more information about the infographic assignment, that would help us start the assignment
- no
- No
Was there anything today about which you would like to know more?
- I would like to know more about password manager.
- I’d like to know more about how software companies can still be profitable and keep business operations going if their software is open source
- i would like to know more about Public key encryption
- Since there are different rules and decision based on jurisdiction for software patents, is there organizations or comunities that handles or address such issues? What are being done to generalize the patent rules and requirements so its consistent in every jurisdictions.
- Open Source licenses
- no
- I will like to know more about software patents
- No
- Encryption
- Free software licenses and open source software
- I would like to know about device encryption and a better way securing myself from digital forgery.
- Concerns on what is relevant and what is not in digital forgery
- What ways should we as programmers be cautious when using different software patents. Its clear that patents can be exploited, but how in the tech world? I would be interested to see more examples of this.
- Everything was understandable to me
- digital forger
- Is it bad to have a software patient?
- No
- Understanding encryption better. While I have a basic understanding of how it works to secure data, I'd like to delve deeper into the various encryption methods, their applications, and the latest advancements in encryption technology
- Public key encryption
- I'd like to learn more about open source software since I use it a lot when working on CTCH projects and I like contributing to the open source community
- More about patents if we learn more about them
- nope
- What are the things that are gonna be coming in our midterm
- no
- code patents
- No
- Software patents
- Yeah more about the error breach.
- Public key encryption
- I would like to know more about the digital forgery
- I think I gained adequate information from today's class
- I would like to know more about what happens to the abuser when and if they get caught.
- I would like to know more about what is being done in the law around this new concept of digital forgery.
- I would like to know more about the most common types of encryption that are available and what are more benefits of having a password manager.
- Encryption
- For now, no
- I would love to know more about the concepts
- I would like to talk more about copyright, especially to get more perspectives on it. While I am pretty anti-copyright in a lot of cases (long live the unlicense), I think it would be valuable to get some extra opinions! Finding the balance between collective good and reward for individual labour would be a very insightful experience.
- no
- No
- none
- I would really like to learn more about the encryption and get more detail regarding it
- To understand more about software patents
- More about Free-software license
- We didnt really get to into detail on how to spot these deepfakes so further information would be piontless and beating a dead horse.
- How apache works
- More information on the pros and cons of open-source software.
- No
- I would like to know more about what needs to be completed in the assignments in part 1
- Software patents, benefits and drawbacks, open-source vs proprietary
- None
- NO
- None
- No
- About the class material
- About software license
- The thing I like to know more is about assignments.
- About smart speaker and smart listener.
- Concept of data farming and data mining
- Nope
- What concepts will be asked in midterms and from where to find the materials
- NO
- We talked about software patents and someone mentioned that ideally only individuals should be able to have patents not companies which I thought was a really interesting perspective and i would like to learn more about if that could ever be work in the real world.
- I would like to know more about specific licenses and their value.
- About the same
- nope
- not really
- More related to encryption
- Yes I would like to know more about security features
- I am just excited for the content coming up in class!
- NO
- Digital forgery
- NO
- more about AI and work oppertunity
- No i think not today
- No
- No
- yes... revenge p*rn
- I would like to know more about the impacts of deepfakes and their role in our evolving and everchanging technology
- No, we learned enough today
- I will make sure to research the difference as I found that interesting
- I would like a summarization / recall of today's lecture in the next lecture if possible
- Deep fakes
- More information on what the midterm covers
- After this lecture I am interested in learning more about patents, licences, and forming my decision of whether patenting for software is a good idea or not.
- I had no idea that copyleft was an actual thing. I think that's so funny
- No
- nothing more, satisfied
- I want to know more about the midterm
- How to take what we've learned into other contexts of cybersecurity
- intellectual property
- No
- I would like to know more about different types of patents of software in detail, digital foregery, how can we recognize deepfake.
- Wondering about how deepfakes can be avoided. every technology will come with a pro's and cons
- I would like to know more about public key encryption.
- No
- I don’t think so all things which prof taught was sufficient for us.
- No I just need to look more into the concept
- public key encryption and about the assignments for sure, how can we divide our professional skill assessment in two parts. I mean what to submit in part 1 and part 2??
- I would like to know more about digital forgery
- nope, i understood all the points correctly
- No
- I would like to know more about software patent
- no everthing was fine and clear to me
- no
- Nope
- I want to learn more about the development of deepfakes and how AI works to make it so realistic.
- Everything about cs i
- Not much
- I would like to know if there are ways to identify deepfakes like in a court case where a deepfake could be used to fake evidence
- Encryption
- Intellectual property +privacy
- About public channel
- nothing particular
- No
- I would like to know more about digital forgery
- No thank you!
- I would like to know about other group's perspective on the group discussion question, and whether we have the same opinion or not.
- I would like to know more about digital forgery
- I would like to learn more about the risks/benefits of patents and continue the discussion of whether or not they should be implemented.
- I would like to know how can we protect ourselves to not end up in these kind of situations
- I am a bit confused about the pre-meeting quiz since Dr. Frank referred to "revenge porn" as both "non-consensual pornography" or "image-based sexual abuse". Would the answer non-consensual pornography be an acceptable answer?
- open-source software licenses.
- Want to know if the password managers that comes with browers are really safe or secure?
- why we need to purchase website if we need to start a new brand.
- Assignments