Mtg 10/26: Thu-08-Feb-2024

Outline for Today

Intellectual Property

Administration

Response to Responses

Results from Last Meeting

These questions are still open until 3pm *Assignment details

Today

Summary

Summary

For Next Meeting

Media

Transcript

Audio Transcript

  • Okay okay How's everyone I'm good thanks for us
  • wondering how long winters back for my scores minus four Yes?
  • So we're continuing our discussion of last table
  • intellectual property and privacy
  • I didn't update the title or the theme for today with us
  • that's where we're at
  • so I wanted to say
  • formatting problem I didn't catch but I asked you two
  • questions and I posted them after I said I would lit it and
  • I said I would so I've made them open until three today so if you
  • want if you haven't contributed your response to these
  • questions, you can do it now
  • it's cold in here today
  • so we'll look at them a little bit later
  • so
  • So I wanted to talk a bit about the difficulty of material in
  • the podcast so I don't want to be insensitive
  • so I understand that some people can engage with that but if you
  • have an issue with it and you'd like to talk to me you can send
  • emails or horses
  • so
  • so do you think there are different populations of
  • journalists because the second one was like I don't know that
  • people are actually there's a big push to call it smart
  • listeners Alexa
  • the thoughts are that there is between deepfake and digital
  • forgery deep fakes even more innocuous?
  • Examples
  • I think that's the term that's being used also gas natural gas
  • the last one is Big
  • Data farming is
  • maybe a friendly term but data mining is necessarily an
  • unfriendly term.
  • So many people have an Alexa or similar
  • four or five ads I've saw so concerned that your personal
  • conversations are being transmitted Jeff Bezos
  • might do Google so not Jeff Bezos but i It's the minor
  • concern
  • so what are some concerns that are what concerns are relevant
  • or not practical in this era of easy digital forgeries so it's
  • not even that people have needed a great deal of skill to to
  • create digital forgeries. It's not necessarily about conceptual
  • imagery either to be exact where the podcast was the reporter who
  • was on stage and the people front and center technologies
  • reverse they got judged me say some nice things for the
  • journalist generate some attacks. ways that they might
  • impugn your character so what Andy said in spirit he had these
  • these in depth interviews with Mark Zuckerberg. But then we
  • have sidestepped well recently how to treat individual cancer
  • cancer relationships. And so it doesn't take much to find
  • images. Maybe some sound theories is the other person.
  • You get some audio, video and they
  • and then create some attack articles and tabloid style
  • headlines. Some images that will create the journalists
  • bloodhounds Mark Zuckerberg, and green Some argue that was taken
  • out of context. These are
  • So it's a burden on us security
  • so any thoughts about whether it's up to us to make sure that
  • we don't have material that's going to be used against us
  • Yes, I mean there's no way to really have any information back
  • against this like if you exist at all I mean, if you have to
  • speak that any syllable you say be turned into like basically
  • they can say whatever they want so
  • yeah, it's pretty difficult unless you want to stay stay in
  • your home and not be a public person
  • at all public then there's risk
  • so as computer professionals we can take that on to educate
  • people about the importance of a lot of reports so seeing as safe
  • as it has no contract with anyone but the risks that are
  • involved in this technology and it's important to leave some
  • these emerging threats any other comments.
  • This one is versus an all the questions that came up in
  • responses, but there was something about software
  • patents. So, here's the Wikipedia page about software
  • patents and it's highlighting a debate about software patents.
  • So it's not a settled question.
  • So they said they're not granted for code that does something
  • that people could do with paper and pen.
  • So it's not just about the code which is an expression of an
  • algorithm because recipes for example you might think software
  • is like recipes you can patent recipes so it's talking about
  • realization of the code in an environment with the hardware
  • and so forth
  • so, any feelings about whether software patents are a good
  • thing
  • anyone right hoped to write have get a patent on a piece of
  • software
  • anyone hoped to get have a startup with commercialize and
  • commercialize some intellectual property
  • called the junior college campus cultivated by Connexus that's a
  • startup incubator.
  • He's
  • just had a fifth birthday so we've had a number of companies
  • proceed through their programs
  • so include us blog post talks
  • a little bit about little more detail about software patents
  • so it's three o'clock now. So anyone here still good to
  • respond to the questions
  • okay so the questions were
  • okay, so, first question is two or three parts for the
  • professional skill assessment
  • so, let's 6040 for two parts compared to three parts so well
  • will keep it in two parts would you prefer to have the first
  • part due before the break or after the break so 80% went
  • after the break
  • and then the question was would you like the infographic
  • assignment broken into two or three parts the due date for the
  • last part is April 8 So 6040 again for two parts so we'll do
  • that
  • and higher desire to have it after the break
  • okay
  • so, that information on any discussion about that question
  • so, essentially having the second part due on
  • You Evening so how about
  • 2626
  • Right results are so many people have signed up for membership
  • doing that may concern some people rather than a yet an
  • objection to doing it just want to address the concerns about it
  • okay so this means that we'll have deliverables and 72 weeks
  • after the break okay
  • so given this I'll I'll have the details of the assignments and
  • the breakdown between the first and second arts sorted out and
  • we can review them if there any questions on Tuesday.
  • Okay
  • so I'd ask a question on encryption
  • so are you aware of available encryption tools available to
  • you for protecting your personal devices?
  • So 60% said yes. 40% said no. And somebody said, maybe you're
  • aware of some of them, but not all of them.
  • So what are some popular tools? Those of you who are using them,
  • but I didn't actually ask if you're using them
  • anyone likes to chime in with some tools that are being used
  • or that are well known
  • you anyone
  • okay
  • okay so regarding Password Manager 60% said yes three 4%
  • said no and few people selected what is the password manager so
  • what are some popular some password managers that are being
  • used?
  • Use LastPass
  • one password
  • this is the one recommended by Information Services yeah one
  • person anyone else so I've seen so it doesn't use the cloud
  • right it's just on your device
  • I was just gonna say I use the password manager a bit Warden
  • so are you I once used LastPass now he's one password and I got
  • a thumbs up from a colleague who's a security analyst for
  • using one password so I'm feeling better and
  • yes, I use em secure
  • so the advantage of using a password manager is you can have
  • difficult to guess passwords 20 characters long that you don't
  • have to remember
  • keep up with you all the time
  • anyway okay
  • he's encryption on any of these devices so 22% said yes for
  • desktop 60% for laptop 64% for phone and other was 24%
  • Do you use encryption on your electronic communications were
  • 340 3% said yes 33% said no and 22% are not sure because there
  • are different claims that can be made and if everyone else is
  • using something then it's
  • but it's fine to just go with the flow I guess our prime
  • concern and lots of other issues related to choose a
  • communication platforms.
  • So I thought this is a nice diagram to illustrate public key
  • encryption so that's so it's called asymmetric keys.
  • So, initially, encryption was done with symmetric keys, so any
  • comments so we had to have both the same keys to encrypt and
  • decrypt messages. So they might have been delivered by trusted
  • courier might have a book of thieves or glittery black dress
  • courier certain name
  • and occasional transparent security that you could operate.
  • And messaging secret
  • was a that was a big it's a big ask to be able to transmit the
  • key security. So these asymmetric keys involve
  • transmitting information on a public channel. So each other so
  • if we're talking between two people to communicate with you
  • two people, we have a secret each person can have a secret
  • but then they have a shared public key. So Alice and Bob
  • agree on a public shared key to us. And each have a secret so
  • their keys look different So they take this shared the public
  • key and combine it with their own secret key to come up with a
  • new key that they can share with each other
  • so the way the math works is that these are
  • the keys that result from the secret key and the public key
  • can be transmitted over the open channel and once transmitted key
  • combines with the secret key of the other person they get the
  • new secret so we don't have to
  • we can we don't have to worry about
  • keeping many things secret here you don't have to keep this
  • public key secret you just have to at least maintain our own
  • secrets we don't have to communicate these to the other
  • person
  • so it's important that it not be too easy to guess what the keys
  • with these capital A and capital B keys are at this stage so
  • the final shared secret key is not is not easily discovered
  • here's the same idea with paint colors.
  • So there's many licenses to choose from. So if we're going
  • back to the blood show property protection
  • one way to do this is a license to protect things in an open way
  • so they keep remain open
  • Mr choose a license
  • there's quite a long list of of licenses here.
  • A simpler list
  • You I was looking for a link there we'll look we'll I'll get
  • to it in a minute
  • so here are a number of choices for licensing so we can put
  • things into the public domain so it's not really a license so
  • much as its granting says that the work is part of the public
  • domain so Creative Commons zero is one of those things one of
  • the ways to do that
  • your permission license
  • so it just gives it lets people do what they want to do with the
  • software copy left is that
  • means that you you can make changes to the software but you
  • need to publish you need to share your changes as well so
  • it's protected against proprietary isation of the
  • software. So those three or three versions are options for
  • free software.
  • So you might have a non commercial license to grant
  • rights for non commercial use. So an option is Creative Commons
  • by and see the pie is refers to attribution seated saying who
  • wrote it and then C says you're not allowing any
  • commercialization of the results.
  • Who's heard of Creative Commons before?
  • So is a proprietary license traditionally used for copyright
  • no rights need to be granted. Something's a trade secret that
  • no information is made public.
  • So first software's Some examples are
  • public domain and CC zero
  • for a permissive license MIT and Apache
  • and for copyleft protection of GPL and a GPL versions of the
  • GNU public license
  • so, is anyone writing writing software and putting out an open
  • license on it?
  • So, the last line is for other creative works aside from
  • software so, we can say Creative Commons by Creative Commons BY
  • Shara lake or Creative Commons BY which means a attribution of
  • who created it and see is not commercial
  • So, now that we have group set up inside of your perception
  • so, here are the questions my soccer fans Vic Thank you prefer
  • direct Salford proprietary or open license license which
  • license we use sense
  • okay so no that doesn't make sense afterwards okay so once
  • you get into groups and having a professional battle
  • with as a surgeon
  • night last time we talked about this The
  • most efficient data structure
  • up following
  • connection
  • right Right evening right Right so moving
  • on morning you actually
  • actually asked
  • it are First
  • you gotta make sure the sponsor was
  • actually paid so as often as you want it leaders in the
  • organization so all like
  • the same can't say anything
  • at all there yeah so how are the discussions going anything you'd
  • like to share
  • yeah theoretically companies shouldn't own copyrights
  • a person we've recovered yet
  • so we saw Derek So your question is Which consequences
  • February 22
  • doesn't have to be
  • if they ask you to ask for it there's always going to be
  • yeah last there's going to be one soul search says the sorting
  • is going to be sorted
  • looking for groups for stalking to figure
  • out so say And when you submit the first part of the
  • infographic assignment March you have the urge to set up the
  • topic take some time to think about
  • the discussion
  • Okay, yes. My
  • question is are the assignments were a group of four people
  • what's the maximum IQ for the group as far as I can
  • so it's not Yeah, so that's for the infographic design
  • assignments this one's about two parts. So the professional self
  • assessments individual assignment
  • is there a layout of what we have done for like is there like
  • a real depth to it like like halfway done already just like
  • how the idea into graphics is was just
  • another graphic
  • so if you have never shut up the trading course
  • Okay, thanks for today have a good weekend. See you Tuesday
  • right.
  • Up morning
  • Up morning

Responses

What important concept or perspective did you encounter today?

  • I learnt about encryption today.
  • About open source software
  • the concept of software license
  • The status of software being kinda in the grey area of patent. Software is such a complex creation and that the extent to which software can be eligible for patent is difficult to determine.
  • Key Encryption
  • we learnt about free open software topic.
  • I encountered concept of software patents in today's class
  • Open source license, deep fakes, digital frogery
  • Different types of license
  • Digital forgery was one of the important concept I have encountered.
  • Software patent
  • Got to know about different kind of password managers such as 1 password and also about differences between the policies of each country that regulates software patents.
  • Best password encryption options
  • digital forger
  • Concerns of digital forgery
  • Comparison of free and open-source software licenses, etc..
  • A software patent gives inventors exclusive rights to their software-related creations, like computer programs or algorithms, usually for 20 years, in exchange for disclosing the details of their invention. However, the criteria for obtaining software patents differ across countries and regional offices, especially regarding computer-implemented innovations such as business methods.
  • I learned from the podcast that whenever we design/create something, we should always think that we are designing it for the most vulnerable person and how we could use our skills to aid those that are less fortunate.
  • Digital forgery
  • Today, I encountered the idea of copylefting, a concept I didn't even know existed. I find it interesting that people are allowed to make changes to another person's work so long as they publish it.
  • During discussions, we questioned why open source would ever be an option when everyone building their projects would want to retain their rights to it as well. However, I understand it as sharing. Giving people the base to contribute and create something of their own. However, why would anyone allow others to modify and claim something that originally came from them. The idea to retain ownership and taking in feedback to change things sounds lot better as a customer. I want something readymade.
  • open source licences
  • Software patents can be viewed as a positive result from an individuals perspective, or a negative result from society's perspective. I was not aware that software patents needed philosophical inquiry in this way.
  • The podcast of deepfakes
  • nothing
  • digital forgery and image-based sexual abuse with ai generated art involving people (ex deepfake porn)
  • Risks with Pornography
  • Software patents
  • Patents of software
  • Free software license, comparison of free and open source licenses
  • Digital Forgery
  • I learnt about free-software licenses and the different kinds. I also learnt about public key encryption
  • Today I encountered the concepts of deep fakes and image based sexual abuse, which I didn't realize how common they were.
  • An important perspective that I encountered today and yesterday in the podcast was the concept of digital forgery and how alarming it can be to all kinds of people espeically females who can have their image tarnished by something they did not even do. I believe that as computing professionals it is our responsibility to determine what people should be able to create online and ties into the debate of should everyone have access to AI (something that people don't know how it works).
  • Software patents
  • Software patent
  • the concepts were all interesting
  • foss licences
  • Free and open source license, software patent, public key encryption
  • deep fake and digital fogery
  • The most most important concept I learned was about public key encryption and how it is useful and good for world
  • Issues regarding software patents
  • An important idea that was talked about today was Software Licenses. In my opinion, I feel Copyright laws are a little bit over the top. Not just in the software world but an everyday life situation. For example: I wanted to make a custom sweater which Ive always wanted but there were a few rules that I had to follow. I could not but anything that was licensed: words, pictures, logos etc. I could not be as creative because of limitations of copyright. I feel this 100% can be transcribed in software industry
  • Free-software license
  • The dangers of deepfake technology is probably the biggest topic I encountered today, This is because of the future implications of people or governments abusing this technology to try and decieve the public. An example of this would to have a deepfake of a political rival doing something nefarious and using that to smear there image. Also, in a simpler way it could be used to damage popular stars image. A recent example of this would be Taylor Swift.
  • the idea that there are debates about changing the names of technologies in order to better represent what those technologies are capable of, good and bad.
  • I realized that I was more in favour of open-source software over proprietary software.
  • Intellectual Property, Software licences, patients.
  • the importance of word choice for a positive or negative affect, helps convey a perspective on the topic
  • We talked about the different kinds of patents and discussed which ones are better for certain situations.
  • Symmetric and Asymmetric Encryption
  • We saw topics about software license, encryption
  • An important concept I learnt today is about encryption
  • Everything
  • No
  • We went more in depth with encryption and the case studies
  • Encryption
  • I think there was nothing importanat I did encounter today.
  • The important part was podcast on deepFakes, concern of digital forgery etc.
  • About the computer software and patent
  • Today we learned about software patents.
  • The use of AI to create sexualy explicit images is a new way that sexual abuse can be taken place. This deep fake tech is how it is being used on famous celebrities.
  • Today in class we discussed about the podcast on deep fakes and talked about important assignments submission and parts
  • Today we discussed about the podcast on deepfakes, the concerns of digital forgery, the assignment dates and password managers
  • I learned about password managers today. I always thought you had to just memorize or write down your passwords in some sort of note format. Knowing this now, I will definitely start using one and use more secure passwords.
  • About software patents
  • nothing important concept today
  • i learned about patent.
  • I got to know more about encryption
  • Software patents
  • Today we were introduced to several important concepts. Firstly, we given a glimpse of digital forgery and the harm that it inflicts on people, but especially women. Then we went over the precautions we should take regarding passwords and password managers. We also had a discussion about software patents with our classwork groups which we posted about on our blog.
  • Software Patents are still an open issue
  • The concept of digital forgery
  • Comparison between free and open source file
  • software patents
  • About assigbment
  • No
  • Security
  • the use of ai for deception
  • I learned the important concept of deep fakes and concerns of digital forgery
  • I learned about encryption sites I haven’t heard of today.
  • Key encryption was the most interesting for me
  • Today I encountered the concept Diffie–Hellman key exchange and digital forgery. The key exchange is a mathematical method that lets 2 people securely exchange cryptographic keys over a public channel without doing it directly.
  • The concerns of digital forgery
  • The impact that deepfakes and digital forgery has on people, and also what some believe to be real or faje
  • I learned the existence of software licenses / copyright / patents.
  • Concerns on digital forgery and talked about password managers
  • Comparison of free and open-source licenses and Public key encryption
  • Software patent are still an open issue: Not grated just for automating a task otherwise done by people, Must have some new elements that is the invention, Not just the code, but the lager packages.
  • The heavy importance of encryption
  • learning about the podcast and its content
  • .
  • Today ,I discovered essential concepts such as software patent, types of patents,etc.
  • Encryption and the privatization of user data. Also Software patents and whether to consider the ethical and financial side of patenting software (i.e. proprietization or open source)
  • I got to know about different topics like comparison of free and open sources, public key encryption etc.
  • Today we discussed about Assignments and other stuff.
  • Today’s lecture was extraordinary.. we learned good things…
  • Administration
  • We learn about the concerns behind digital forgery and password manager.
  • the important concept was software patents
  • I learnt about digital forgery
  • the comaprison of free and open source software licences and their permissions
  • deepfakes and digital forgery
  • Free and open source license
  • An important concept that I learned today was the emphasis on making safety for deepfakes. In all honesty the thought of deepfakes and how common it is for it to be sexually abused scares me. I want to find out the progression of minimizing it if there is any significant progression on the software engineering side apart from the bills that are being raised in question for it.
  • Important concept of ethical values is the need for the future
  • today we learn about the softwares and their licensing
  • The use of deepfake ai being used to hurt/damage a person’s reputation.
  • Comparison between free and open source lisences`
  • Whats in a name
  • Public channel
  • encryption
  • Comparison of free and open source licences
  • Today we learned to free and open source software licence and also discussed about Diffie- Hellman key exchange method.
  • I learned about the concerns behind deepfakes (digital forgery), as well as software patents.
  • Concept about whether software patents are important or not .
  • One important concept I encountered today was the idea of software patents and how it still remains an open issue. They are not granted just for automating a task otherwise done by people, and they must have some new element that is the invention.
  • What I learned is that how dangerous digital forgery can be and how it impacts the victim of it. Digital forgery, which is deep fake, can bring so much harm to an individual. It can take someone's face without their permission and use it to make sexual contents.
  • The term "revenge porn", also referred to as "non-consensual pornography" or "image-based sexual abuse", was introduced to me today. The publication of sexually graphic images or films of someone without that person's consent is known as revenge porn. The phrase refers to a specific situation wherein private images are posted online with the intention of harassing and dehumanizing an ex-partner, but it is also frequently used incorrectly to refer to any kind of non-consensual pornography.
  • digital forgery concept is very intriguing.
  • Talked about the Podcast on Deepfakes, concerns of digital Forgery, password managers
  • about software license
  • SIFT

Was there anything today that was difficult to understand?

  • No, class was informative.
  • No
  • not really
  • Since software is already protected through copyright, would having softwares patents be an overkill? And patent could kill competitions since competitors can develop a different code that produces the same result and still be under the copyright law.
  • Everything was good
  • no
  • It was understandable
  • No
  • Little bit encryption
  • More clarification about freedom of speech issues and utility of software would be great
  • No
  • Comparison of free and open-source licenses
  • no
  • There were few things where I got lost during the podcast
  • No
  • no, The explanations and instructions provided were quite straightforward, and I didn't encounter any concepts or tasks that were overly complex or confusing.
  • No
  • No
  • nope
  • N/a
  • no
  • not particularly hard to understand per say but how it’s possible to coin a piece of code because if that’s the case then other pieces of code can be claimed and it’s a slippery slope
  • No
  • Infographic
  • No
  • Not really
  • No
  • No, not really
  • No.
  • No
  • Not at all
  • the concept were explanatory
  • no
  • No
  • none
  • AS far I I know I found comparison of free and open source licences bit difficult to understand but still I have to read more about it so that I get to learn more
  • it was difficult to understand if software patents are a good or bad thing
  • what is Public key
  • No not really.
  • What is patenting?
  • It was difficult to read the notes but I appretiate them being posted on the website later.
  • No
  • There was nothing difficult to understand today
  • No
  • Nothing
  • NO
  • None
  • About infographic
  • No
  • No
  • There was nothing difficult to understand.
  • No, everything was easy.
  • The topic of deep fake videos and images
  • Nope
  • Not much difficult
  • No
  • Nothing was difficult to understand today.
  • Why would it not be possible for us to be the ones to create what's available online?
  • no
  • nope there was nothing difficult today
  • no everything was clear
  • No really
  • No we just discussed
  • No, everything was clear.
  • NO
  • No there was nothing difficult
  • No
  • no
  • No
  • No
  • No
  • no not really
  • It was difficult to understand why some people needed password managers as I often keep a set of passwords written down on one of my notebooks.
  • Not today.
  • Not much
  • It was difficult to read the board today as the writting was a bit smaller than usual
  • No
  • Nothing really
  • Today's lecture was a little tough to follow along with because I did not know the significance of licences or patents.
  • No
  • nope
  • There was nothing to be difficult to understand
  • The lecture was clear and concise
  • no
  • No
  • Difference between deep fake and digital forgery was difficult to understand.
  • I don't think there was anything hard to understand.
  • No
  • NOT AT ALL
  • Not really
  • Yes, just about the public key encryption
  • nope, everything went good
  • No
  • Nothing at all
  • well your voice was bit low apart from that everything was good
  • no
  • Nope
  • N/A
  • Nothing was difficult to understand in today class
  • Nothing
  • No
  • Public key encription
  • No
  • No
  • no
  • No
  • No everything was good.
  • Nope, everything was clear in today's lecture.
  • No
  • Nope, I was able to understand everything that happened in class today.
  • Not really
  • Addition to the first question: It has been observed that those affected by this experience (image-based sexual abuse) feelings of public humiliation, helplessness, intimate connection difficulties, difficulty forming new relationships, and negative consequences on their mental health.
  • No. Everything was clear.
  • No
  • If we can get more information about the infographic assignment, that would help us start the assignment
  • no
  • No

Was there anything today about which you would like to know more?

  • I would like to know more about password manager.
  • I’d like to know more about how software companies can still be profitable and keep business operations going if their software is open source
  • i would like to know more about Public key encryption
  • Since there are different rules and decision based on jurisdiction for software patents, is there organizations or comunities that handles or address such issues? What are being done to generalize the patent rules and requirements so its consistent in every jurisdictions.
  • Open Source licenses
  • no
  • I will like to know more about software patents
  • No
  • Encryption
  • Free software licenses and open source software
  • I would like to know about device encryption and a better way securing myself from digital forgery.
  • Concerns on what is relevant and what is not in digital forgery
  • What ways should we as programmers be cautious when using different software patents. Its clear that patents can be exploited, but how in the tech world? I would be interested to see more examples of this.
  • Everything was understandable to me
  • digital forger
  • Is it bad to have a software patient?
  • No
  • Understanding encryption better. While I have a basic understanding of how it works to secure data, I'd like to delve deeper into the various encryption methods, their applications, and the latest advancements in encryption technology
  • Public key encryption
  • I'd like to learn more about open source software since I use it a lot when working on CTCH projects and I like contributing to the open source community
  • More about patents if we learn more about them
  • nope
  • What are the things that are gonna be coming in our midterm
  • no
  • code patents
  • No
  • Software patents
  • Yeah more about the error breach.
  • Public key encryption
  • I would like to know more about the digital forgery
  • I think I gained adequate information from today's class
  • I would like to know more about what happens to the abuser when and if they get caught.
  • I would like to know more about what is being done in the law around this new concept of digital forgery.
  • I would like to know more about the most common types of encryption that are available and what are more benefits of having a password manager.
  • Encryption
  • For now, no
  • I would love to know more about the concepts
  • I would like to talk more about copyright, especially to get more perspectives on it. While I am pretty anti-copyright in a lot of cases (long live the unlicense), I think it would be valuable to get some extra opinions! Finding the balance between collective good and reward for individual labour would be a very insightful experience.
  • no
  • No
  • none
  • I would really like to learn more about the encryption and get more detail regarding it
  • To understand more about software patents
  • More about Free-software license
  • We didnt really get to into detail on how to spot these deepfakes so further information would be piontless and beating a dead horse.
  • How apache works
  • More information on the pros and cons of open-source software.
  • No
  • I would like to know more about what needs to be completed in the assignments in part 1
  • Software patents, benefits and drawbacks, open-source vs proprietary
  • None
  • NO
  • None
  • No
  • About the class material
  • About software license
  • The thing I like to know more is about assignments.
  • About smart speaker and smart listener.
  • Concept of data farming and data mining
  • Nope
  • What concepts will be asked in midterms and from where to find the materials
  • NO
  • We talked about software patents and someone mentioned that ideally only individuals should be able to have patents not companies which I thought was a really interesting perspective and i would like to learn more about if that could ever be work in the real world.
  • I would like to know more about specific licenses and their value.
  • About the same
  • nope
  • not really
  • More related to encryption
  • Yes I would like to know more about security features
  • I am just excited for the content coming up in class!
  • NO
  • Digital forgery
  • NO
  • more about AI and work oppertunity
  • No i think not today
  • No
  • No
  • yes... revenge p*rn
  • I would like to know more about the impacts of deepfakes and their role in our evolving and everchanging technology
  • No, we learned enough today
  • I will make sure to research the difference as I found that interesting
  • I would like a summarization / recall of today's lecture in the next lecture if possible
  • Deep fakes
  • More information on what the midterm covers
  • After this lecture I am interested in learning more about patents, licences, and forming my decision of whether patenting for software is a good idea or not.
  • I had no idea that copyleft was an actual thing. I think that's so funny
  • No
  • nothing more, satisfied
  • I want to know more about the midterm
  • How to take what we've learned into other contexts of cybersecurity
  • intellectual property
  • No
  • I would like to know more about different types of patents of software in detail, digital foregery, how can we recognize deepfake.
  • Wondering about how deepfakes can be avoided. every technology will come with a pro's and cons
  • I would like to know more about public key encryption.
  • No
  • I don’t think so all things which prof taught was sufficient for us.
  • No I just need to look more into the concept
  • public key encryption and about the assignments for sure, how can we divide our professional skill assessment in two parts. I mean what to submit in part 1 and part 2??
  • I would like to know more about digital forgery
  • nope, i understood all the points correctly
  • No
  • I would like to know more about software patent
  • no everthing was fine and clear to me
  • no
  • Nope
  • I want to learn more about the development of deepfakes and how AI works to make it so realistic.
  • Everything about cs i
  • Not much
  • I would like to know if there are ways to identify deepfakes like in a court case where a deepfake could be used to fake evidence
  • Encryption
  • Intellectual property +privacy
  • About public channel
  • nothing particular
  • No
  • I would like to know more about digital forgery
  • No thank you!
  • I would like to know about other group's perspective on the group discussion question, and whether we have the same opinion or not.
  • I would like to know more about digital forgery
  • I would like to learn more about the risks/benefits of patents and continue the discussion of whether or not they should be implemented.
  • I would like to know how can we protect ourselves to not end up in these kind of situations
  • I am a bit confused about the pre-meeting quiz since Dr. Frank referred to "revenge porn" as both "non-consensual pornography" or "image-based sexual abuse". Would the answer non-consensual pornography be an acceptable answer?
  • open-source software licenses.
  • Want to know if the password managers that comes with browers are really safe or secure?
  • why we need to purchase website if we need to start a new brand.
  • Assignments

Wiki

Link to the UR Courses wiki page for this meeting