Alessandro Acquisti - Curriculum Vitae Heinz College, Carnegie Mellon University Acquisti @ Andrew.Cmu.Edu |
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Canvas Developer Guide
Canvas Developer Guide Version 53.0, Winter ’22 @salesforcedocs Last updated: August 5, 2021 © Copyright 2000–2021 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS GETTING STARTED . 1 Chapter 1: Introducing Canvas . 1 Canvas Scenarios . 3 Where Canvas Apps Appear . 3 Supported Browsers . 4 Supported Salesforce Editions . 4 User Permissions Required . 5 User Interface Considerations . 5 Canvas App Process . 6 Canvas Personal Apps . 8 Canvas Personal App Process . 8 Enabling Canvas Personal Apps within an Organization . 9 Making an App a Canvas Personal App . 10 Uninstalling a Canvas Personal App . 10 Chapter 2: Quick Start . 12 Prerequisites . 13 Create the App . 13 Set the App Location . 14 Chapter 3: Quick Start—Advanced . 16 Prerequisites . 17 Clone the Project from GitHub . 17 Run the Web App Locally . 18 Create the Canvas App . 19 Configure Who Can Access the Canvas App . 21 Deploy the Web App to Heroku . 22 Update the Canvas App . 23 Package the Canvas App . 24 Upload the Canvas App Package . 25 Install the Canvas App . 25 Configure Who Can Access the Installed Canvas App . 26 USING CANVAS . 27 Chapter 4: Canvas SDK . 27 Referencing the Canvas SDK . 28 Authentication . 28 Signed Request Authentication . 28 Contents OAuth Authorization . 36 SAML Single Sign-On for Canvas Apps . 40 Getting Context in Your Canvas App . 40 Cross-Domain XHR . 41 Getting a List of Chatter Users . 41 Posting to a Chatter Feed . 42 Alternatives to Cookies for User Tracking . -
White Paper Swire US EU Surveillance
December 17, 2015 US Surveillance Law, Safe Harbor, and Reforms Since 2013 Peter Swire1 Executive Summary: This White Paper is a submission to the Belgian Privacy Authority for its December 18, 2015 Forum on “The Consequences of the Judgment in the Schrems Case.”2 The Forum discusses the decision by the European Court of Justice in Schrems v. Data Protection Commissioner3 that the EU/US Safe Harbor was unlawful under the EU Data Protection Directive, particularly due to concerns about US surveillance law. For the Forum, I have been asked to comment on two issues: 1) Is US surveillance law fundamentally compatible with E.U. data protection law? 2) What actions and reforms has the US taken since the Snowden revelations began in June 2013? The White Paper draws on my background as a scholar of both EU data protection law and US surveillance law. It addresses serious misunderstandings of US national security law, reflected in official statements made in the Schrems case and elsewhere. It has three chapters: (1) The fundamental equivalence of the United States and EU member States as constitutional democracies under the rule of law. In the Schrems decision, the US was criticized for failing to ensure “a level of protection of fundamental rights essentially equivalent to that guaranteed in the EU legal order.” This chapter critiques that finding, instead showing that the United States has strict rule of law, separation of powers, and judicial oversight of law enforcement and national security 1 Peter Swire is the Huang Professor of Law and Ethics at the Georgia Tech Scheller College of Business and a Senior Fellow of the Future of Privacy Forum. -
Student Handbook 2020-2021
Student Handbook 2020-2021 Master of Science in Public Policy and Management Two Year Track Three Semester Track Data Analytics Track Global Track 1 Contents 1 INTRODUCTION .................................................................................................................................. 4 2 Mission statement ................................................................................................................................... 4 3 CURRICULUM ..................................................................................................................................... 4 3.1 MSPPM Requirements .............................................................................................................. 5 3.2 MSPPM Two-Year Track Requirements .................................................................................. 5 3.3 MSPPM Three-Semester Track Requirements ......................................................................... 6 3.4 MSPPM-Data Analytics Track Requirements .......................................................................... 7 3.5 MS-Global Track Requirements ............................................................................................... 9 3.6 Information Technology Core Requirement ........................................................................... 10 3.7 Advanced Coursework ............................................................................................................ 12 3.7.1 Advanced Policy Topics (12 units required) ...................................................................... -
Rg-Year201112.Pdf
+ = Rails Girls The year 2011-2012 at a glance railsgirls.com “I thought I was just going to a workshop where I would meet some people, score a SoundCloud shirt, and learn a few things about Rails. I had no idea I was stumbling right into a movement that was clearly set out to do something big! I think the entire attitude of the workshop is summed up with “Why the hell not!” Why shouldn’t I learn how to program? Why shouldn’t I make a career out of it? I think if any of us had doubts that we couldn’t do it, Rails Girls set us straight.” - Participant in Berlin Get excited and start things Rails Girls gives girls and women the first experience to building the Internet. We believe that coding is a craft much like any form of creation. Right now we have a lot more people using code than those who are influencing it. Technology is changing our society in profound ways and we don’t think these revolutions should be conducted by only the code- savvy. Introduction Rails Girls is a community that helps and encourages women to build their ideas by offering workshops all around the world. Founded originally in Finland in 2010 it quickly started spreading across the globe and to date we’ve conducted events in Shanghai, Singapore, Tallinn, Berlin, Krakow and Helsinki. A global volunteer community The two-day Rails Girls event is free and open to all enthusiastic girls and women. We are a fully non-profit operation with a small base-funding from Finnish Technology Industries Federation. -
Rishi.Narang (At) Thirdbrigade.Com +91 988.6982.678
END USER PRIVACY BREACHES Rishi Narang Vulnerability Research Analyst Third Brigade Security Labs rishi.narang (at) thirdbrigade.com +91 988.6982.678 OWASP 06th September, 2007 Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org HAWK‟S EYE Web Application Security - 10 Steps to Secure - IE vs. Firefox Competition Common User Behaviors - Warnings & Error Messages - SURVEY: What End Users Say About Warnings Security Products vs. Attacks - Current Security Architecture - Security Myths Ideal World vs. Real World - Security Awareness (Geographically) - Plans & Actions + Prime Focus Privacy Approach - Data Gathering - Privacy Policies & Drives OWASP 2 WEB APPLICATION SECURITY … lot many web apps, but are they secured ?? Can they live together ?? OWASP 3 10 STEPS TO SECURE WEB 2.0 brings Threat 2.0 STEP 01. Policy: Fair policy @ every Gateway STEP 02. Tuning the Policy: Tuning as per custom applications STEP 03. Dealing with Malwares: HOST level protection against Malwares STEP 04. Block Undesirable URLs: Block Black-Listed and undesirables STEP 05. File Format Scans: Protection against malicious file downloads STEP 06. Upload Scans: Upload scan log for malicious activities STEP 07. IM traffic scans: IM traffic scan for file sharing and scripts STEP 08. Web Activity Monitoring: Passive monitoring for Anomalies STEP 09. Policy Enforcements: User Education and simplified process STEP 10. Emerging Web Activities: Keep an Eye on it ! OWASP 4 BROWSER VULNERABILITIES Source: Internet Security Threat Report Volume XI, Symantec Corporation IE & FIREFOX reported high number of vulnerabilities as compared to other browsers. -
7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER
7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER: FACEBOOK’S END-TO-END SECURITY PLANS The organizations below write today to encourage you, in no uncertain terms, to continue increasing the end-to-end security across Facebook’s messaging services. We have seen requests from the United States, United Kingdom, and Australian governments asking you to suspend these plans “until [Facebook] can guarantee the added privacy does not reduce public safety”. We believe they have this entirely backwards: each day that platforms do not support strong end-to-end security is another day that this data can be breached, mishandled, or otherwise obtained by powerful entities or rogue actors to exploit it. Given the remarkable reach of Facebook’s messaging services, ensuring default end-to-end security will provide a substantial boon to worldwide communications freedom, to public safety, and to democratic values, and we urge you to proceed with your plans to encrypt messaging through Facebook products and services. We encourage you to resist calls to create so-called “backdoors” or “exceptional access” to the content of users’ messages, which will fundamentally weaken encryption and the privacy and security of all users. Sincerely, 1. 7amleh-The Arab Center for Social Media Advancement 2. Access Now 3. ACM US Technology Policy Committee 4. ACT | The App Association 5. AfroLeadership 6. Alternatives 7. American Civil Liberties Union 8. Americans for Prosperity 9. APADOR-CH 10. ARTICLE 19 11. Asociación Argentina de Usuarios de Internet - Internauta Argentina 12. Asociación Colombiana de Usuarios de Internet 13. Asociación por los Derechos Civiles (ADC), Argentina 14. -
Bibliography of Erik Wilde
dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992. -
CBS Corporation [email protected]
March 1, 2016 Kimberly D. Pittman CBS Corporation [email protected] Re: CBS Corporation Incoming letter dated January 26, 2016 Dear Ms. Pittman: This is in response to your letter dated January 26, 2016 concerning the shareholder proposal submitted to CBS by the Province of St. Joseph of the Capuchin Order. We also have received a letter on the proponent’s behalf dated February 25, 2016. Copies of all of the correspondence on which this response is based will be made available on our website at http://www.sec.gov/divisions/corpfin/cf-noaction/14a-8.shtml. For your reference, a brief discussion of the Division’s informal procedures regarding shareholder proposals is also available at the same website address. Sincerely, Matt S. McNair Senior Special Counsel Enclosure cc: Paul M. Neuhauser [email protected] March 1, 2016 Response of the Office of Chief Counsel Division of Corporation Finance Re: CBS Corporation Incoming letter dated January 26, 2016 The proposal requests that CBS adopt time-bound quantitative, company-wide goals, taking into consideration the most recent Intergovernmental Panel on Climate Change guidance for reducing total greenhouse gas emissions, and issue a report on its plans to achieve these goals. We are unable to concur in your view that CBS may exclude the proposal under rule 14a-8(i)(7). In our view, the proposal focuses on reducing greenhouse gas emissions and does not seek to micromanage the company to such a degree that exclusion of the proposal would be appropriate. Accordingly, we do not believe that CBS may omit the proposal from its proxy materials in reliance on rule 14a-8(i)(7). -
NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems
NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data ..................................................................................................................... -
January 11, 2015 President Barack Obama the White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont
January 11, 2015 President Barack Obama The White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont Avenue NW Suite 500 Washington, DC 20005 Dear President Obama, We urge you to protect the security of your citizens, your economy, and your government by supporting the development and use of secure communications tools and technologies, rejecting policies that would prevent or undermine the use of strong encryption, and urging other leaders to do the same. Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access. The ability to freely develop and use encryption provides the cornerstone for today’s global economy. Economic growth in the digital age is powered by the ability to trust and authenticate our interactions and communicate and conduct business securely, both within and across borders. Some of the most noted technologists and experts on encryption recently explained that laws or policies that undermine encryption would “force a U-turn from the best practices now being deployed to make the Internet more secure,” “would substantially increase system complexity” and raise associated costs, and “would create concentrated targets that could attract bad actors.”1 The absence of encryption facilitates easy access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used -
Plans Book 2012
DRIVEN TOGETHER OWNER’S MANUAL For success, read carefully and keep top of mind. DRAKE UNIVERSITY Blue, Inc. TABLE OF CONTENTS Navigating Your Vehicle GETTING TO KNOW YOUR VEHICLE Executive Summary 2 PRE-OPERATION CHECKS Research Overview 3 History & Methods 4 Insights 5 A Community of Forward Thinkers 6 Auto Trends 7 FEATURES & CONTROLS Media Overview 8 Consumer Profiles 9 Target Markets 10 Overall Strategy 12 2013–2014 Nissan Media Schedule 16 DRIVING YOUR VEHICLE Marketing Overview 17 SWOT Analysis & Share of Voice 18 Budget 19 Promotions 20 Experience 22 Designer Interiors 23 Social Media 24 APPEARANCE & CARE Creative Overview 25 Outdoor 26 Print 27 72 Hour Urban Action 28 Ambient Advertising 29 Internet Advertising 30 Television 31 Measures of Success 32 Table of Contents 1 Blue, Inc. Blue, Inc. EXECUTIVE SUMMARY PRE-OPERATION CHECKS The Problem & Our Solution Research Overview THE PROBLEM OUR INTERACTIVE SOLUTION: To build awareness and create lasting favorability for THE DRIVEN TOGETHER CAMPAIGN To best represent the target market, we explored their the Nissan brand among African American, Hispanic, Blue, Inc. will present Nissan with a fully integrated and Chinese Millennials, Nissan will challenge marketing campaign that represents the core values lifestyles and cultural values. The Driven Together consumers to take charge of their futures by engaging of our Multicultural Millennial target market. The campaign represents how the target market thinks and with their communities to create positive change. Driven Together campaign will demonstrate that Nissan Blue, Inc. will accomplish this by: understands and embraces the importance of family, acts, and seeks vehicle information. Through research, a community, and cultural expression. -
Chief Data Officer Certificate Program
CHIEF DATA OFFICER CERTIFICATE PROGRAM The success of a modern enterprise is increasingly dependent on its ability to maximize value from data and manage large, diverse, and rapidly changing data. Most executives admit that their organizations mismanage their information assets, leading to missed business opportunities and undue expense. To establish a data-driven culture change in an organization, management needs to engage with stakeholders across the enterprise to secure buy-in and ongoing support in treating data as an asset — not data as a byproduct. To cope with these challenges, many organizations are appointing data governance executives, or Chief Data Officers (CDO), whose responsibilities span the recognition of opportunities afforded by new data sources to ensuring compliance with emerging regulations around security, privacy, and bias. The CMU Heinz College Chief Data Officer Certificate Program provides current or future CDOs a thorough understanding of critical data management related responsibilities and the foundations for developing a robust enterprise data governance program. The 13-module CDataO certificate program will cover key areas – data engineering, data science, decision making, emerging technology, change management, CDO operations, communication/influencing/ leadership skills - to help data executives build important data analytical and decision-making capabilities to better support the strategic mission of their organizations. To meet the needs of these busy professionals, the six-month program will be delivered as a hybrid model, blending the benefits of focused in-person sessions at our CMU campus in Pittsburgh, PA with synchronous distance learning. Participants can expect to develop a tight-knit cohort of their peers. Distance teaching allows participants the flexibility to engage at their own pace to develop their skills to become an effective data executive.