Transcript.Pdf (401.82

Total Page:16

File Type:pdf, Size:1020Kb

Transcript.Pdf (401.82 1 2 3 4 FEDERAL TRADE COMMISSION 5 6 7 8 9 10 MONITORING SOFTWARE ON YOUR PC: 11 SPYWARE, ADWARE, AND OTHER SOFTWARE 12 13 14 15 16 17 Monday, April 19, 2004 18 9:00 a.m. 19 20 21 22 Federal Trade Commission 23 Sixth and Pennsylvania Avenue, N.W. 24 Washington, D.C. 25 26 For The Record, Inc. Waldorf, Maryland (301)870-8025 2 1 2 3 For The Record, Inc. Waldorf, Maryland (301)870-8025 3 1 I N D E X 2 3 Opening Remarks - J. Howard Beales, Director, Bureau of 4 Consumer Protection, FTC 10 5 6 PANEL ONE: DEFINING, UNDERSTANDING, AND 7 DISSEMINATING SPYWARE 8 Moderator: Thomas B. Pahl, Assistant 9 Director, FTC 13 10 Panelists: 11 Ari Schwartz, Associate Director, Center 12 for Democracy and Technology 16 13 Ed Black, President and CEO, Computer 14 and Communications Industry 15 Association 17 16 Mark Bohannon, General Counsel and 17 Senior Vice President for Public 18 Policy, Software and Information 19 Industry Association 18 20 Marty Lafferty, Chief Executive Officer, 21 Distributed Computing Industry 22 Association 19 23 Avi Naider, President and CEO, WhenU.com, 24 Inc. 20 25 For The Record, Inc. Waldorf, Maryland (301)870-8025 4 1 Remarks Concerning Risks of Spyware - 2 Orson Swindle, Commissioner, FTC 62 3 4 PANEL TWO: SECURITY RISKS AND PC FUNCTIONALITY 1 Moderator: David K. Koehler 67 2 Panelists: 3 Maureen Cushman, Legal Counsel, U.S. 4 Consumers, Dell 69 5 Bryson Gordon, Senior Manager, Product 6 Management Group, McAfee Security, 7 Consumer Division 71 8 Roger Thompson, Vice President, Product 9 Development, Pest Patrol 75 10 Michael Wood, Vice President of Sales, USA 11 and Canada, Lavasoft 75 12 John Gilroy, Technology Contributor for The 13 Washington Post and Co-Host, WAMU's 14 "The Computer Guys" program 77 15 Austin Hill, Co-Founder and Chief Privacy 16 Expert, Zero-Knowledge Systems 94 17 18 PANEL THREE: PRIVACY RISKS 19 Moderator: Dean C. Forbes 112 20 21 For The Record, Inc. Waldorf, Maryland (301)870-8025 5 1 Panelists: 2 Chris Jay Hoofnagle, Associate Director, 3 Electronic Privacy Information Center 116 4 Evan Hendricks, Editor-Publisher, "Privacy 5 Times" 117 6 Ray Everett-Church, Chief Privacy Officer, 7 Turn Tide, Inc. 119 8 Ronald Plesser, Piper Rudnick, LLP 123 9 James H. Koenig, Chief Practice Co-Leader, 10 Privacy Strategy and Compliance, 11 PricewaterhouseCoopers, LLP 125 12 13 Remarks Concerning Possible Responses to Spyware - 14 Commissioner Mozelle Thompson 152 15 16 PANEL FOUR: INDUSTRY RESPONSES TO SPYWARE - 17 INDUSTRY BEST PRACTICES AND WORKING WITH THE 18 GOVERNMENT 19 Moderator: Commissioner Mozelle Thompson 156 20 Panelists: 21 Brain Arbogast, Corporate Vice President, 22 Identity, Mobile and Partner Services 23 Group, MSN and Personal Services 24 Division, Microsoft Corp. 159 25 For The Record, Inc. Waldorf, Maryland (301)870-8025 6 1 Andrew McLaughlin, Senior Policy Counsel, 2 Google 161 3 Chris Kelly, Chief Privacy Officer and 4 General Counsel, Spoke Software 165 5 Jules Polonetsky, Vice President, Integrity 6 Assurance, AmericaOnline, Inc. 166 7 John Schwarz, President and CEO, Symantec 8 Corp. 169 9 Fran Maier, Executive Director and 10 President, TRUSTe 171 11 J. Trevor Hughes, Executive Director, 12 Network Advertising Initiative 172 13 14 PANEL FIVE: TECHNOLOGICAL RESPONSES TO SPYWARE 15 Moderator: Beverly J. Thomas 197 16 Panelists: 17 Jeffrey Friedberg, Director of Windows 18 Privacy, Microsoft 199 19 Steven Bellovin, AT&T Fellow with AT&T 20 Labs-Research 212 21 David Moll, President, WebRoot 213 22 Wayne Porter, Co-Founder and Primary 23 Editor, SpywareGuide.com 214 24 25 For The Record, Inc. Waldorf, Maryland (301)870-8025 7 1 Daniel Weitzner, Technology & Society 2 Doman Leader, World Wide Web 3 Consortium; Research at MIT 217 4 5 PANEL SIX: GOVERNMENT RESPONSES TO SPYWARE - 6 LAW ENFORCEMENT, CONSUMER EDUCATION, AND 7 COORDINATING WITH INDUSTRY 8 Moderator: Beth Delaney 251 9 Panelists: 10 Mary Engle, Associate Director, Division of 11 Advertising Practices, FTC 254 12 Mark Eckenwiler, Deputy Chief, Computer Crime 13 and Intellectual Property Section, 14 Department of Justice 257 15 Jennifer Baird, Legislative Counsel, Office 16 of Rep. Mary Bono 261 17 Stephen Urquhart, State Representative, 18 Utah House of Representataives 267 19 Elizabeth Prostic, Chief Privacy Officer, U.S. 20 Department of Commerce 274 21 Matthew Sarrel, Technical Director, PC 22 Magazine 276 23 24 Closing Remarks - J. Howard Beales, Director, 25 Bureau of Consumer Protection, FTC 291 For The Record, Inc. Waldorf, Maryland (301)870-8025 8 1 P R O C E E D I N G S 2 - - - - - 3 MR. PAHL: Good morning, and welcome to the 4 FTC's Spyware Workshop. My name is Thomas Pahl. I'm an 5 Assistant Director in the FTC's Division of Advertising 6 Practices here at the FTC. 7 Before we begin our discussions today, I wanted 8 to address some preliminary housekeeping items. First, I 9 want to emphasize a few logistical points. We have a lot 10 to cover at the workshop today. Our schedule is packed. 11 So we're going to do our very best to stay on time. I 12 would ask everyone to try to be back from breaks and from 13 the lunch on time so that we can continue to keep pace 14 with the schedule that we've set forth. 15 You each should have received a visitor's badge 16 today when you came into the building. Please retain 17 that throughout the day. If you take it off, you will 18 have to get a new one and go back through the security 19 procedures, and that will take some time. And also, wear 20 your badge throughout the day when you're wandering 21 around the building. It will help our security people 22 here at the FTC. 23 Please turn off cell phones and pagers, because 24 it may interrupt the discussions. Coffee is available 25 outside in the hallway, courtesy of the On-Line Privacy For The Record, Inc. Waldorf, Maryland (301)870-8025 9 1 Alliance and the law firm of Hogan & Hartson. I want to 2 thank them for providing us with coffee today. 3 You should have each received a folder when you 4 arrived here today. In the folder, there's a list of 5 local restaurants and lunch spots. The bathrooms are 6 located out in the main lobby behind the elevator banks. 7 And in case of an emergency, you can exit the building 8 either through the front door, where you came in, or from 9 the door on the north side of the building. 10 Second, I want to emphasize a few points about 11 public participation in the workshop today. We have 12 already received many public comments. And for those of 13 you who have submitted comments, thank you. We have 14 extended the deadline for submitting public comments 15 until May 21st. And so if you hear anything at the 16 workshop today that you'd like to comment on or would 17 like to supplement a comment you've submitted in the 18 past, we would appreciate it. You may submit comments to 19 our box at [email protected]. 20 There's a table in the lobby -- or actually, 21 there are two tables in the lobby with materials related 22 to Spyware. I would encourage you to pick up materials 23 and make use of them. 24 Finally, the moderators today will be posing 25 questions to panelists based on our review of the For The Record, Inc. Waldorf, Maryland (301)870-8025 10 1 comments that we've received and our review of other 2 information that's been publicly available. 3 We also will try to pose questions from the 4 audience to each of the panels. If you're interested in 5 having a question asked of a panel or panelist, please 6 write it down on one of the note cards that's included in 7 the folder you were given today. And the cards will be 8 collected by Shakeel Balroop. Shakeel is back dead 9 center in front of me, and he will be collecting the 10 cards during the panel presentation and throughout the 11 day. 12 So if you have any questions, please write them 13 down and give them to Shakeel, and we'll ask as many of 14 those questions as we can. Please understand that given 15 the tight timing of the workshops today, we probably will 16 only be able to ask a couple of questions to each of the 17 panels. But we will retain the questions, because they 18 will be helpful in guiding our future analysis of issues 19 related to Spyware. 20 Now, it's time to begin the workshop. The 21 agenda calls for opening remarks by FTC Chairman Timothy 22 Muris, but he's unable to be here today. Instead, we'll 23 have remarks from the FTC's Director, Bureau of Consumer 24 Protection, Howard Beales. 25 Prior to becoming Bureau Director in 2001, For The Record, Inc. Waldorf, Maryland (301)870-8025 11 1 Director Beales was an Associate Professor for Strategic 2 Management at the George Washington University. During 3 his tenure as Bureau Director at the FTC, the FTC has 4 been involved in a variety of issues related to privacy, 5 security and the Internet. We are fortunate that 6 Director Beales is here to give us some opening remarks 7 today. Director Beales? 8 (Applause.) 9 MR.
Recommended publications
  • Data-Driven Grasp Synthesis - a Survey Jeannette Bohg, Member, IEEE, Antonio Morales, Member, IEEE, Tamim Asfour, Member, IEEE, Danica Kragic Member, IEEE
    TRANSACTIONS ON ROBOTICS 1 Data-Driven Grasp Synthesis - A Survey Jeannette Bohg, Member, IEEE, Antonio Morales, Member, IEEE, Tamim Asfour, Member, IEEE, Danica Kragic Member, IEEE specific metric. This process is usually based on some existing Abstract—We review the work on data-driven grasp synthesis grasp experience that can be a heuristic or is generated in and the methodologies for sampling and ranking candidate simulation or on a real robot. Kamon et al. [5] refer to this grasps. We divide the approaches into three groups based on whether they synthesize grasps for known, familiar or unknown as the comparative and Shimoga [2] as the knowledge-based objects. This structure allows us to identify common object rep- approach. Here, a grasp is commonly parameterized by [6, 7]: resentations and perceptual processes that facilitate the employed • the grasping point on the object with which the tool center data-driven grasp synthesis technique. In the case of known point (TCP) should be aligned, objects, we concentrate on the approaches that are based on • the approach vector which describes the 3D angle that object recognition and pose estimation. In the case of familiar objects, the techniques use some form of a similarity matching the robot hand approaches the grasping point with, to a set of previously encountered objects. Finally, for the • the wrist orientation of the robotic hand and approaches dealing with unknown objects, the core part is the • an initial finger configuration extraction of specific features that are indicative of good grasps. Data-driven approaches differ in how the set of grasp candi- Our survey provides an overview of the different methodologies dates is sampled, how the grasp quality is estimated and how and discusses open problems in the area of robot grasping.
    [Show full text]
  • Compliance & Legal Sections Annual Virtual Meeting 2020
    Compliance & Legal Sections Annual Virtual Meeting 2020 Registration List Name Title Company City/State Kristin M. Abbott Director, Compliance & Regulatory Affairs ACLI Washington, DC Amber L. Adams VP, Chief Legal Counsel, Chief Compliance American-Amicable Life Insurance Company of Waco, TX Officer & Asst Corporate Secretary Texas Dwain A. Akins Senior Vice President, Chief Corporate American National Insurance Company Galveston, TX Compliance Officer Joseph Arite Director, Legislative Relations Guarantee Trust Life Insurance Company Glenview, IL Kate Austin Senior Counsel Allianz Minneapolis, MN Randi J. Bader Vice President & Associate General New York Life New York, NY Counsel Lauren A. Barbaruolo Corporate Counsel & Director, Compliance Oxford Life Insurance Company Phoenix, AZ Chad Batterson Vice President, Compliance Athene Annuity and Life Company West Des Moines, IA Erin Baum Consultant, Ethics & Compliance CUNA Mutual Group Madison, WI John Baumgardner Supervisor, Compliance Team Standard Insurance Company Portland, OR Simon Berry Senior Counsel Great American Life Insurance Company Cincinnati, OH Mona Bhalla Deputy Superintendent Life Insurance New York State Department of Financial Services New York, NY Division Laura Blahosky Compliance Counsel, Compliance & Federated Life Insurance Company Owatonna, MN Government Relations Lester L. Bohnert General Counsel Modern Woodmen of America Rock Island, IL Timothy H. Bolden Vice President, Chief Compliance Officer American Fidelity Assurance Company Oklahoma City, OK Patricia Diane Boyette Vice President, Chief Compliance Officer Southern Farm Bureau Life Jackson, MS Corinne L. Brand Counsel State Farm Bloomington, IL 12/14/2020 American Council of Life Insurers acli.com Page 1 Compliance & Legal Sections Annual Virtual Meeting 2020 Registration List Name Title Company City/State JoAnne Breese-Jaeck Chief Privacy Officer Northwestern Mutual Milwaukee, WI Kermitt J.
    [Show full text]
  • Automatic Classifying of Mac OS X Samples
    Automatic Classifying of Mac OS X Samples Spencer Hsieh, Pin Wu and Haoping Liu Trend Micro Inc., Taiwan TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing Introduction herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy 6 is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Mac OS X Samples Dataset the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 10 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Classification of Mach-O Files to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. 11 Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, Malware Families indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content 15 thereof.
    [Show full text]
  • Analyzing Android Adware
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2018 Analyzing Android Adware Supraja Suresh San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Suresh, Supraja, "Analyzing Android Adware" (2018). Master's Projects. 621. DOI: https://doi.org/10.31979/etd.7xqe-kdft https://scholarworks.sjsu.edu/etd_projects/621 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Analyzing Android Adware A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Supraja Suresh May 2018 ○c 2018 Supraja Suresh ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Analyzing Android Adware by Supraja Suresh APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY May 2018 Dr. Mark Stamp Department of Computer Science Dr. Katerina Potika Department of Computer Science Fabio Di Troia Department of Mathematics ABSTRACT Analyzing Android Adware by Supraja Suresh Most Android smartphone apps are free; in order to generate revenue, the app developers embed ad libraries so that advertisements are displayed when the app is being used. Billions of dollars are lost annually due to ad fraud. In this research, we propose a machine learning based scheme to detect Android adware based on static and dynamic features.
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • Binding Corporate Rules for Employees
    Employee Privacy Rules version April 2011 SHELL EMPLOYEE PRIVACY RULES Contents 1 Article 1 – Scope and Applicable Law ................................................ 2 2 Article 2 – Purposes for Processing Employee Data ............................... 3 3 Article 3 – Processing Sensitive Data ................................................ 5 4 Article 4 – Additional requirements for Processing Data of Dependants ....... 5 Article 5 – Employee Consent ......................................................... 7 6 Article 6 – Quantity and Quality of Data ............................................ 9 7 Article 7 – Information Requirements .............................................. 10 8 Article 8 – Employee Rights of Access and Rectification .......................... 9 Article 9 – Security and Confidentiality Requirements ......................... 12 10 Article 10 – Automated Decision Making ........................................... 12 11 Article 11 – Transfer of Employee Data to Third Parties ....................... 13 12 Article 12 – Overriding Interests ..................................................... 15 13 Article 13 – Supervision and Compliance .......................................... 17 14 Article 14 – Complaints procedure .................................................. 17 15 Article 15 – Remedies .................................................................. 18 16 Article 16 – Sanctions for non compliance ......................................... 20 17 Article 17 – Effective Date, Transition Periods and publication
    [Show full text]
  • 2020 Proxy Statement
    2020 Proxy Statement Dear Fellow Owner: Welcome to Truist! We are inviting you to attend the Annual Meeting of Shareholders of Truist Financial Corporation at 11:00 a.m. (EDT) on Tuesday, April 28, 2020. This year’s meeting will be held at the Belk Theater at the Blumenthal Performing Arts Center, 130 N. Tryon Street, Charlotte, North Carolina 28202. Shareholders as of the record date of February 21, 2020 are invited to attend. Last year, we made banking history by combining two forward-looking and like-minded companies – BB&T and SunTrust – to create Truist, a premier financial institution driven by a strong shared culture to accelerate our relentless pursuit of innovation. Now, we have an incredible opportunity to fulfill the Truist purpose to inspire and build better lives and communities. Our merger of equals created the nation’s sixth largest commercial bank, serving 10 million consumer households and a full range of business clients in many of the nation’s highest growth markets. Truist will chart a new course in our industry as we seamlessly blend a high level of personal touch with cutting-edge technology to build a higher level of trust with our clients. We are truly better together. We wanted to take this opportunity to thank President and Chief Operating Officer William H. Rogers, Jr. (“Bill”) for the extraordinary opportunity he has helped create for our shareholders, teammates and communities. As SunTrust’s CEO, Bill’s vision and leadership was essential to build the foundation for successfully bringing together the two great heritages of BB&T and SunTrust.
    [Show full text]
  • Common Threats to Cyber Security Part 1 of 2
    Common Threats to Cyber Security Part 1 of 2 Table of Contents Malware .......................................................................................................................................... 2 Viruses ............................................................................................................................................. 3 Worms ............................................................................................................................................. 4 Downloaders ................................................................................................................................... 6 Attack Scripts .................................................................................................................................. 8 Botnet ........................................................................................................................................... 10 IRCBotnet Example ....................................................................................................................... 12 Trojans (Backdoor) ........................................................................................................................ 14 Denial of Service ........................................................................................................................... 18 Rootkits ......................................................................................................................................... 20 Notices .........................................................................................................................................
    [Show full text]
  • Notice of Annual and Special Meeting of Shareholders of Information Services Corporation to Be Held on May 17, 2017 and Management Information Circular
    Notice of Annual and Special Meeting of Shareholders of Information Services Corporation to be held on May 17, 2017 and Management Information Circular April 12, 2017 isc.ca TSX:ISV 202106_CF_ISC_MIC_NEW | Black | 10-Apr-1712:27:31 Contents Page Letter to Shareholders 3 Notice of Annual and Special Meeting 4 Management Information Circular 5 About the Meeting 6 Who Can Vote 6 Appointment of Directors by Province of Saskatchewan 7 Principal Owners of Class A Shares 7 How to Vote 7 Electing Our Directors 11 Appointing Our Auditors 20 Approval of Amended and Restated Stock Option Plan 21 Corporate Governance and Board Committees 25 Director Compensation 29 Executive Officers 32 Compensation Discussion and Analysis 34 Employee Agreements, Termination and Change of Control Benefits 47 Securities Authorized for Issuance Under Equity Compensation Plans 48 Additional Information 49 Appendix A – Amended and Restated Stock Option Plan 50 2 ISC®MANAGEMENT INFORMATION CIRCULAR 2017 202106_CF_ISC_MIC_NEW | Black | 10-Apr-1712:27:31 April 12, 2017 Dear Shareholder: We are pleased to invite you to the annual and special meeting of shareholders of Information Services Corporation (“ISC”), which will be held at 9:00 a.m. (Saskatchewan time/MDT) on May 17, 2017, at Innovation Place, 6 Research Drive, Regina, Saskatchewan. The annual and special meeting is an opportunity to consider matters of importance to ISC and shareholders. We look forward to your participation in person or by proxy at the meeting. You are encouraged to read the accompanying Management Information Circular in advance of the meeting, which describes the business to be conducted at the meeting and provides information on ISC’s approach to executive compensation and governance practices.
    [Show full text]
  • Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking
    AC 2011-897: IDENTIFYING AND DEFINING RELATIONSHIPS: TECH- NIQUES FOR IMPROVING STUDENT SYSTEMIC THINKING Cecelia M. Wigal, University of Tennessee, Chattanooga Cecelia M. Wigal received her Ph.D. in 1998 from Northwestern University and is presently a Professor of Engineering and Assistant Dean of the College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC). Her primary areas of interest and expertise include complex process and system analysis, process improvement analysis, and information system analysis with respect to usability and effectiveness. Dr. Wigal is also interested in engineering education reform to address present and future student and national and international needs. c American Society for Engineering Education, 2011 Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking Abstract ABET, Inc. is looking for graduating undergraduate engineering students who are systems thinkers. However, genuine systems thinking is contrary to the traditional practice of using linear thinking to help solve design problems often used by students and many practitioners. Linear thinking has a tendency to compartmentalize solution options and minimize recognition of relationships between solutions and their elements. Systems thinking, however, has the ability to define the whole system, including its environment, objectives, and parts (subsystems), both static and dynamic, by their relationships. The work discussed here describes two means of introducing freshman engineering students to thinking systemically or holistically when understanding and defining problems. Specifically, the modeling techniques of Rich Pictures and an instructor generated modified IDEF0 model are discussed. These techniques have roles in many applications. In this case they are discussed in regards to their application to the design process.
    [Show full text]
  • Download the Microsoft Tag and We’Ll Consider Them for the Magazine
    Fall 2014 Magazine Giant Creative Strategy Output @ 100% x 10"h Live: 7.375"w 8.25”w x 10.75”h Trim: Bleed: 8.75"w x 11.25"h Colors: 4CP + AD WINTER HB PATIENT PRINT GILPT11284 Speak from the PRINT live/trim_DO NOT heart about your angina “Tell your cardiologist exactly how you’re feeling. Don’t hold anything back.” Donnette, angina patient If you have been limiting your work or your activities because of your chronic angina, be sure to talk about it with your cardiologist. Your cardiologist is listening www.SpeakFromTheHeart.com Tips, information, and more from real angina patients Donnette, Ralph, and Claudia. Claudia, angina patient Speak From the Heart is a trademark, and the Speak From the Heart logo Ralph, angina patient is a registered trademark, of Gilead Sciences, Inc. © 2011 Gilead Sciences, Inc. All rights reserved. UN7951 1/11 D19528_1a_Donette.indd 11.04.2013 A17041x01G_300ucr_RBlk.tif 133 linescreen B19528x01A_3u.tif jn B19528x02A_3u.tif Dedicated to inspiring hope in heart disease patients and their families. Mission: Inspiring hope and improving the quality of life for heart patients and their families through ongoing peer-to-peer support THE MENDED HEARTS, INC. BOARD OF DIRECTORS 2013-2015 President Gus Littlefield Executive Vice President Donnette Smith Vice President Lynn Berringer Treasurer Dale Briggs Mended Little Hearts Vice President Andrea Baer Fall 2014 Regional Directors Central Jana Stewart Mid-Atlantic Gerald Kemp Midwest Cathy Byington Northeast Margaret Elbert Rocky Mountain Randy Gay Southern Fredonia Williams
    [Show full text]
  • Commencement 1969 Michigan State University the Commencement Committee
    COMMENCEMENT 1969 MICHIGAN STATE UNIVERSITY THE COMMENCEMENT COMMITTEE HERMAN L. KING, Chairman MADISON KUHN LLOYD R. CHAMPION JOHN G. LAETZ JAMES H . DENISON REBECCA J. LAU Student Representative EVERETT R. EMINO EDWARD L. PETRINI Student Representative HORACE C. KING KERMIT H. SMITH Following the close of the 1969 Winter term, approximately seven weeks are required to complete the processing of academic records and the preparation of diplomas. Based on this schedule, diplomas will be mailed in May, 1969. COMMENCEMENT 1969 Sunday, March 9 University Auditorium, East-Lansing The pageantry and color at commencement exercises reveal a record of ACADEMIC academic achievement of the various individuals taking part in the exercises. The following brief description is given that the audience might more readily COSTUME interpret such achievement. In 1895, the Intercollegiate Commission, a group of leading American educators, met at Columbia University to draft a code which would serve to regulate the design of gowns and hoods indicating the various degrees as well as the colors to indicate the various faculties. This code has been adopted by most of the colleges and universities in America and its use has made identification of scholastic honors an immediate activity. Three types of gowns are indicated by the code. Those worn by the bachelors are made of black worsted material and have long, pointed sleeves. Those worn by masters may be made either of black silk or black wool and have long, closed sleeves with the arc of a circle near the bottom. The arm goes through a slit, giving the appearance of short sleeves for the master's gown.
    [Show full text]