Università Ca' Foscari Venezia Dipart. Di Scienze Amb., Informatica E Statistica Polo Scientifico Via Torino

Total Page:16

File Type:pdf, Size:1020Kb

Università Ca' Foscari Venezia Dipart. Di Scienze Amb., Informatica E Statistica Polo Scientifico Via Torino Loud < Università Ca' Foscari Venezia Dipart. di Scienze Amb., Informatica e Statistica Polo Scientifico via Torino << CONSTRUINDO UMA EXPERIÊNCIA IMERSIVA DE APRENDIZAGEM A DISTÂNCIA ALÉM DOS CURSOS ONLINE ABERTOS E MASSIVOS COM WEBCONFERÊNCIA, MÉTODO SOCRÁTICO, APRENDIZAGEM BASEADA EM PROBLEMAS E AS REDES SOCIAIS Building an Immersive Distance Learning Experience beyond Massive Open Online Courses with Web Conferencing, Socratic Method, Problem-Based Learning and Social Networks Rogério L. Roth, Ph.D. posdoctor at gmail.com rogerio.roth at unive.it RELATÓRIO FINAL DAS ATIVIDADES ESTÁGIO PÓS-DOUTORAL CSF 2 Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) Período: 01/03/2014 à 31/03/2016 BEX 11542/13-6 http://www.capes.gov.br Centro de Destino: Università Ca' Foscari Venezia (UNIVE), http://www.unive.it Dipartimento di Scienze Ambientali, Informatica e Statistica, http://www.unive.it/dais Polo Scientifico via Torino Via Torino 155, 30172, Mestre Venezia, Veneto, Italia Veneza, abril de 2016 Prefácio “Onde você está agora? Em algum lugar quente? Seguro? Próximo a alguém que você ama? E se tudo isso sumisse, e a única coisa a fazer fosse sobreviver? Você sobreviveria, não é? Você tentaria. Você faria coisas... Até perder a última coisa que te sobrou: você mesmo. Mas e se você pudesse voltar atrás? Recuperar tudo? Um botão de reiniciar. Você apertaria, não é? Você teria que apertar, mesmo se não quisesse. Porque, às vezes, a escolha nem é sua, é o destino.” (12 Monkeys, S01E13) A integração das tecnologias já passou por diversas fases, do otimismo exacerbado com excesso de promessas à decepção com as realidades, possibilidades e práticas cotidianas. Dessa forma, o processo intrinsecamente interdisciplinar da efetiva integração à prática docente universitária é cada vez menos frequente e distópico, representado por um retrocesso ou ausência destas práticas. A alternativa ao modelo vigente pode estar em uma volta ao passado, não ignorando as tecnologias, mas realizando uma releitura das boas práticas de ensino, estabelecendo conexões e adaptando-as às necessidades e realidades locais. A mesma tecnologia que massificou de forma virtual a universidade pode dar as respostas e indicar um caminho de volta à qualidade, mas a adoção e a efetiva utilização de modismos sem um contexto prévio de experimentação, testagem, proteção e lógica de utilização podem trazer resultados diversos dos esperados impactando negativamente o uso das tecnologias para apoiar a educação. Massificar, descentralizar e popularizar deveriam ser os objetivos do ensino superior, mas institucionalizar as práticas da educação mediada pelas diversas tecnologias em uma determinada universidade é muito mais do que instalar uma versão de um sistema de gestão da aprendizagem, que não atraem mais tanta atenção e viraram parte do cenário. A inclusão destas tecnologias nos processos educacionais nem sempre é tarefa fácil, sendo necessário que os professores estudem sua realidade e, se necessário, adotem algum modelo de integração. Alguns professores parecem saber como e por que usar a tecnologia, mas a integração eficaz ainda ilude muitos deles. O fundamental é que para trabalharmos determinado conteúdo necessitamos conhecê-lo bem, as tecnologias e a forma didática como utilizar as mesmas. Não necessitamos seguir um determinado modelo de integração tecnológica para utilizarmos as tecnologias, porque nem todos os professores se adaptam a elas e todos os modelos passam a impressão de uma prescrição que tenta definir o que deve ter mais ou menos importância no cenário. Considerando que a prática aleatória surgiu antes dos modelos propostos, estes tentam padronizar o que não deveria ser padronizado, ou seja, produzir uma receita de bolo a ser replicada. 2 Agradecimentos “Eu perdi alguém. E fiquei tão bravo que eu não queria ir a uma igreja e assistir ao show. Todas aquelas pessoas talvez elas se importassem, talvez não. Mas não há um dia em que eu não me arrependa por não ter dado adeus.” (Under the Dome, S02E02) Apesar das características diferenciadas deste tipo de trabalho, muitas pessoas me auxiliaram de alguma forma, em algum momento, desde o início até o final. Agradeço especialmente ao Prof. Flavio Sartoretto pelo apoio em todas as etapas... Ao Prof. Michele Bugliesi (como Diretor e posteriormente Reitor) e aos Professores, Alunos e Funcionários, principalmente aqueles vinculados ao Departamento de Ciências Ambientais, Informática e Estatística, do Polo Scientifico Via Torino. Ao Prof. Umberto Margiotta e ao Prof. Carlo Carraro (ex-Reitor), que me concedeu o título de Pesquisador Visitante. À Universidade Ca' Foscari de Veneza que se disponibilizou para o desenvolvimento da pesquisa. Correndo o risco de omissões cito aqueles que no momento me vem à lembrança, agrupados em ordem alfabética, sem nenhuma ordem de importância ou temporal. Muito obrigado a Adilson Passos da Costa Marques, Alberto Piotto, Alessandra Ori, André da Silva Castro, André de Oliveira Dornelles, Anita Mazurek, Claudia Grespi, Danielle Queiroz Castro, Domingos de Mello Aymone Filho, Enrico Sartor, Francesca Rosina, Ilaria Pistorello, Ivone Umar, João Figueira Martins, Laura Cappellesso, Luciano Peixoto Lopes, Mauro Nicola Póvoas, Nataliya & Misha Prylypko, Patrizia Resente, Valéria Brasil, Valeria Cristina Lima Carvalho, Victor Konrad Abraminko, Virginia Pafundi e Wilson Schuelter. Por último, mas não menos importante, agradeço pelo apoio às candidaturas CSF 2: Prof. John Hartley, Curtin University (Austrália); Prof. Olga Smolyaninova, Siberian Federal University (Rússia); Prof. Janni Nielsen, Copenhagen Business School (Dinamarca). No período entre março de 2014 e março de 2016, contamos com o apoio financeiro da CAPES através da bolsa de pesquisa BEX 11542/13-6. Em memória de Ernesto, Yedda, Beto e Babalú (nada será como antes). Em memória de Umberto Eco (perdi um ídolo da high-brow). 3 Resumo Esta pesquisa teve como objetivo estudar e descrever os diferentes modelos de integração de tecnologia (plataformas, ambientes, metodologias) no suporte às praticas educacionais à distância e/ou mediadas pelas tecnologias; e a prospecção e identificação de novas possibilidades que agreguem simultaneamente, soluções baseadas em vídeo (webconferência), aprendizagem baseada em problemas, redes sociais e método socrático. Se por um lado a ubiquidade da internet permitiu a invasão de nossas privacidades, também criou uma infinidade de oportunidades de aprendizado e trabalho. Foi desta forma que a Khan Academy começou, para proporcionar uma educação gratuita e de alta qualidade para todos, em qualquer lugar. No entanto, o envolvimento dos clientes poderia ser estimulado através de um método provocativo, conhecido como Socrático, que reflete como a cognição humana tem se desenvolvido. Com certeza é necessária uma releitura, uma renovação para adaptá-lo às necessidades e possibilidades tecnológicas atuais que, de modo inexorável, remete à onipresença dos vídeos e das videoconferências e sem os quais todos os sistemas relacionados à tecnologia digital educacional permanecem indiferentes aos stakeholders. Palavras-chave: e-recursos, estratégias, integração das tecnologias, método socrático, metodologias, modelos de referência, paradoxo, releitura. Abstract This research aimed to study and describe the different models of technology integration (platforms, environments, methodologies) in supporting distance educational practices and/or mediated by technologies; and the prospecting and identifying new opportunities that add simultaneously, video-based solutions (web conferencing), problem-based learning, social networking and Socratic method. If on one hand the ubiquity of the internet allowed the invasion of our privacy, also created a plethora of learning and work opportunities. This is how the Khan Academy got started, to provide a free, world-class education for anyone, anywhere. However, the involvement of customers could be stimulated through a provocative method, known as Socratic, which reflects how human cognition has been developed. Certainly is necessary a rereading, a recycling to adapt it to the needs and current technological possibilities that, so inexorable, refers to the omnipresence of videos and videoconferencing and without which all systems related to digital educational technology remain indifferent to stakeholders. Keywords: e-resources, methodologies, paradox, rereading, role models, socratic method, strategies, technology integration. 4 Índice Prefácio 2 Agradecimentos 3 Resumo / Abstract 4 A Integração da Tecnologia numa Encruzilhada: Beco sem Saída 6 ou Novos Horizontes? 1. De volta ao passado: aulas expositivas, quadro-negro e giz 2. Ambientes de Aprendizagem & Plataformas 3. Vídeo & Videoconferências 4. Ambientes presenciais 5. Modelos relevantes Os Impactos sobre o Panorama Educacional diante das Ofertas 31 Gratuitas da Internet, Armadilhas e Vigilância, que Ameaçam a Segurança e Privacidade na Web. 1. Olhando para o futuro: quebrando os laços com o passado recente 2. Cavalo de Tróia 3. Remando contra a maré 4. Efeito Streisand Estratégias Institucionais e Práticas para Integração de 54 Tecnologias de Aprendizagem nos Espaços Interior, Exterior e Virtual. 1. Sem saída 2. Resolver problemas vs. decorar respostas 3. Espaço Interior 4. Espaço Exterior 5. Espaço Virtual Metodologias para a Integração das Tecnologias Digitais na 70 Estrada: Modelos Inovadores, Tendências Atuais e Perspectivas Futuras. 1. Primeiros passos 2. Tecnologia educacional vs. educação tecnológica 3.
Recommended publications
  • 'Order Denying the Motion to Dismiss As to the Merits Of
    Case 5:15-cv-04062-LHK Document 49 Filed 08/12/16 Page 1 of 38 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 SAN JOSE DIVISION 11 12 DANIEL MATERA, Case No. 15-CV-04062-LHK 13 Plaintiff, ORDER DENYING MOTION TO DISMISS AS TO THE MERITS OF 14 v. PLAINTIFF’S CLAIMS 15 GOOGLE INC., Re: Dkt. No. 20 16 Defendant. 17 United States District Court District United States Northern District of California District Northern 18 Plaintiff Daniel Matera (“Plaintiff”), individually and on behalf of those similarly situated, 19 alleges that Defendant Google Inc. (“Google”) violated federal and state wiretapping laws in its 20 operation of Gmail, an email service. ECF No. 1 (“Compl.”).1 Before the Court is Google’s 21 motion to dismiss for failure to state a claim. ECF No. 20. Having considered the parties’ 22 submissions, the relevant law, and the record in this case, the Court DENIES Google’s motion to 23 dismiss as to the merits of Plaintiff’s claims. The Court will issue a separate order on standing 24 issues. 25 26 1 27 Unless otherwise noted, all ECF references are to the docket of 15-CV-04062 in the Northern District of California. 28 1 Case No. 15-CV-04062-LHK ORDER DENYING MOTION TO DISMISS AS TO THE MERITS OF PLAINTIFF’S CLAIMS Case 5:15-cv-04062-LHK Document 49 Filed 08/12/16 Page 2 of 38 I. BACKGROUND 1 A. Factual Background 2 1. In re Google Inc.
    [Show full text]
  • Tools to Trace Path Between Server and Web Applications Over Internet
    Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27th March 2015 Tools to Trace Path between Server and Web Applications over Internet P Veeralakshmi Department of Computer Science, Sourashtra College, Madurai-5 [email protected] A Dhavapandiammal Department of Computer Application, Sourashtra College, Madurai-5 [email protected] --------------------------------------------------------ABSTRACT------------------------------------------------------- The rise of the Internet and the worldwideweb had a wide revolution not only in network communications but also in application design and development. It is common to captured pieces of business functionality into distinct objects or components, and then made them available as self-contained Web services that can be accessed using Internet-based protocols and tools. Some tools Smartsniff, Httpnetworksniffer, Winwebcrawler, Wireshark, Network Manager and WebLogAnalyzer are discussed to trace the path between client request and server response, history report of path travelled. Keywords: network manager, protocols, report, webcrawler, wireshark ---------------------------------------------------------------------------------------------------------------- 1.Introduction the web server and displays them in a simple table. for The Internet is itself an enormous network, so whenever we every http request, the following information is displayed: access the Internet, we are using a network. The Web is host name, http method
    [Show full text]
  • Phenomenological, Postphenomenological, and Posthumanistic Explorations
    Email and Its Involvements in the Lives of K-12 Teachers: Phenomenological, Postphenomenological, and Posthumanistic Explorations by Joni McBeth Turville A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Secondary Education University of Alberta © Joni McBeth Turville, 2018 i ABSTRACT Web-connected devices are everywhere and can be used to send electronic messages, no matter the time or place. They are not merely tools or a means to an end; they also shape our everyday lives. In kindergarten to Grade 12 (K-12) schools, teachers are increasingly contacted by parents, students, colleagues, and others. They have reported that digital communication can be overwhelming when added to what teachers typically do outside regular work hours, such as planning, grading, and writing student reports. Using email as a critical example of a digital communications tool, this study examines the experiences of K-12 teachers in receiving email outside their regular work hours. Inspired by Max van Manen’s phenomenological approach entitled “Phenomenology of Practice”, this research explores experiences situated in this professional context. Interviews were conducted with 24 teachers in Alberta, Canada from Grades K to 12 to collect lived experience descriptions or examples of receiving email outside regular work hours as they were lived through. This research also uses postphenomenology in order to gain insight into the past, present, and future of email and proposes a model to describe the evolution of digital communications tools. The final chapter explores a posthumanistic approach related to both phenomenology and postphenomenology called “interviewing objects” to uncover what email may be producing.
    [Show full text]
  • A Survey of Current Research on Captcha
    International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.3, June 2016 A SURVEY OF CURRENT RESEARCH ON CAPTCHA Walid Khalifa Abdullah Hasan Aljabel AlGharbi University,Faculty of Eng-Jadu ,EE dept, Gharyan, Libya ABSTRACT The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types. KEYWORDS CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart), Bot programs, Hackers, spammer, Scrapers ,search engines. 1.INTRODUCTION The internet contributes profoundly to many aspects of human life such as communications, education, and online commercial activities etc. Some web services have online registration where the users provide information in order to connect and use services such as email in Yahoo, Gmail and Hotmail. However, many programs have been developed by hackers which automatically complete website registration pages with incorrect information which can cause traffic congestion, minimizing the performance of the system and in some cases, even causing it to fail, particularly where a website has a huge number of accounts.
    [Show full text]
  • Personal & Contextual Portability and Plasticity with Opensocial
    Widgets and Spaces: Personal & Contextual Portability and Plasticity with OpenSocial THÈSE NO 5804 (2013) PRÉSENTÉE LE 30 AOUT 2013 À LA FACULTÉ DES SCIENCES ET TECHNIQUES DE L'INGÉNIEUR INSTITUT DE GÉNIE ÉLECTRIQUE ET ÉLECTRONIQUE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Evgeny BOGDANOV acceptée sur proposition du jury: Dr A. Karimi, président du jury Dr D. Gillet, Dr C. Salzmann, directeurs de thèse Dr E. L.-C. Law, rapporteur Dr L. Moccozet, rapporteur Dr C. Ullrich, rapporteur Suisse 2013 A person who never made a mistake never tried anything new — Albert Einstein To my parents. Acknowledgments This thesis is only partially my work. It would not be possible without my friends, relatives, colleagues who were helping me (knowingly or unknowingly) during this PhD journey. I am hugely grateful to all of you! Denis Gillet and Christophe Salzmann. Thank you for accepting me into your research family, for giving me the freedom in choosing and shaping the research directions according to my interests, for being my mentors. After our discussions I was always leaving your office inspired and highly motivated. This is indeed something! I would like to thank my thesis committee members for reading my thesis and being my examinators: Alireza Karimi, Effie Lai-Chong Law, Carsten Ullrich, Laurent Moccozet. My research work was partially funded through the following projects: ROLE, PALETTE, SWITCH, GO-LAB. I am thankful to these projects and I did appreciate working in them. Stéphane Sire, I owe you a huge chunk of my thesis and my personal development.
    [Show full text]
  • Helienne Lindvall, David Lowery, Blake Morgan and the Songwriters Guild of America in Support of Respondent ______
    No. 18-956 In the Supreme Court of the United States __________________ GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. __________________ On Writ of Certiorari to the United States Court of Appeals for the Federal Circuit __________________ Brief of Amici Curiae Helienne Lindvall, David Lowery, Blake Morgan and the Songwriters Guild of America in Support of Respondent __________________ CHRISTIAN CASTLE CHARLES J. SANDERS CHRISTIAN L. CASTLE, Counsel of Record ATTORNEYS 29 KINGS GRANT WAY 9600 GREAT HILLS TRAIL BRIARCLIFF, NEW YORK 10510 SUITE 150W (914) 366-6642 AUSTIN, TEXAS 78759 [email protected] (512) 420-2200 [email protected] Counsel for Amici Curiae Becker Gallagher · Cincinnati, OH · Washington, D.C. · 800.890.5001 i TABLE OF CONTENTS TABLE OF AUTHORITIES . ii INTERESTS OF AMICI CURIAE. 1 SUMMARY OF ARGUMENT . 3 ARGUMENT . 5 I. INDEPENDENT ARTISTS AND SONGWRITERS RELY ON COPYRIGHT PROTECTION AND CLEAR FAIR USE STANDARDS TO DEFEND THEMSELVES IN THE MARKET. 5 II. GOOGLE’S U S E IS CLEARLY COMMERCIAL.. 17 A. Google’s Market Dominance Lowers the “Customary Price” of Copyrighted Works.. 18 B. Google Benefits Commercially from Weaker Copyright Protection. 25 III. GOOGLE’S PRIVATE INTERESTS ARE NOT THE PUBLIC INTEREST. 31 CONCLUSION. 33 ii TABLE OF AUTHORITIES CASES A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001). 19 Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994). 6, 7 Capitol Records, LLC v. ReDigi Inc., No. 16-2321 (2d Cir. Dec. 12, 2018) . 7 Elsmere Music, Inc. v. Nat’l Broad. Co., 482 F. Supp. 741 (S.D.N.Y.), aff’d, 632 F.2d 252 (2d Cir.
    [Show full text]
  • GMAIL What It Is, and What It Is NOT RIP Ray Tomlinson Every Program Attempts to Expand Until It Can Read Mail
    This Slide Intentionally Left Blank GMAIL What it is, and what it is NOT RIP Ray Tomlinson Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can. ~ Jamie Zawinski (JWZ) The Law of Software Envelopment THE GOOGLE SESSIONS: ACT ONE • My Greatest Flaw is that I am Slow • My organization, the School District of Escambia County (ECSD), is coming to The Cloud. • We want to understand it before we make it integral to our operations. • Thus, four sessions on Google Apps. • Each builds on the next. • Some observations might be trite or even inaccurate. • Call me out on those. • Our approach begins outside an older application, and moves inward. WHERE ECSD IS NOW • Management believes maintaining 3 separate e-mail systems (GroupWise, GMail, O365 Outlook) is silly. • Pick the simplest to maintain and go with that. • Gmail is required by GAPS which is required by ChromeBooks. • Most users will not notice missing features. • Management is generally trustworthy and intelligent. • Power users want us to move to Gmail. • Lots of “When are we moving?” commentary. • But quite a bit of the reverse as well, from other types of power users. • Especially calendar folks. • I have a natural suspicion of closed, vendor-locked systems (Thanks, Pearson!) • Google bristles and points to Vault when we say that. • Those of us maintaining e-mail system want to make an informed decision. • I’ve used Gmail for years, but what do I know about it? • Putting aside transition and licensing costs, what is the “Right” thing? INQUIRY GROUND RULES • The Internet is full of Guides to Gmail with helpful tips.
    [Show full text]
  • Google Índice De Contenido
    Google Índice de contenido 1- What is google?................................................................................................................................2 2-History...............................................................................................................................................3 2.1. Financing and initial public offering................................................................................4 2.2. Growth...................................................................................................................................5 2.3. Acquisitions and partnerships................................................................................................5 2.4. Google Data Centers..............................................................................................................7 3- Products and services.......................................................................................................................7 3.1. Advertising.............................................................................................................................7 3.2. Search engine.........................................................................................................................9 3.3. Productivity tools.................................................................................................................10 3.4. Enterprise products..............................................................................................................11
    [Show full text]
  • Community Software Buyer's Guide
    Community software buyer’s guide Community software buyer’s guide You’ve recently been tasked with finding a community platform, and we know it’s a tough decision. This multi-step process can take a tedious amount of time and effort. There’s great community software out there. But the key is to find the one that best fits your organization and end-users. This guide will speed up your decision-making process and help you evaluate community software with the right criteria. 2 open social buying guide First things first: what’s a community platform? Before diving into the nitty-gritty, what’s a community platform and how is it beneficial for your organization? Organizations are becoming more decentralized and client-centric. A successful community that encourages knowledge-sharing and customer connection can lead to a competitive advantage, which is why more organizations are committing internal resources to online communities. A community is a ‘homebase’ for your members to meet digitally, share content, and achieve common goals. Communities are the next best thing for organizations for three primary reasons: ● Cultivate innovation: when people are brought together, unexpected ideas and solutions are generated through co-creation and crowdsourcing. ● Members at the forefront: provide members with the space to collaborate and receive instantaneous feedback and insight into products, topics, or issues. ● Save time and money: Instead of using a variety of tools (Slack, Gmail, Google Docs, we can go on), use one space to achieve specific organizational goals. Software vendors, in response to a rise in demand, are generating and evolving more and more community solutions.
    [Show full text]
  • Personal & Contextual Portability and Plasticity with Opensocial
    Widgets and Spaces: Personal & Contextual Portability and Plasticity with OpenSocial Evgeny Bogdanov To cite this version: Evgeny Bogdanov. Widgets and Spaces: Personal & Contextual Portability and Plasticity with OpenSocial. Education. Ecole Polytechnique Fédérale de Lausanne (EPFL), 2013. English. tel- 00994409 HAL Id: tel-00994409 https://tel.archives-ouvertes.fr/tel-00994409 Submitted on 21 May 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Widgets and Spaces: Personal & Contextual Portability and Plasticity with OpenSocial THÈSE NO 5804 (2013) PRÉSENTÉE LE 30 AOUT 2013 À LA FACULTÉ DES SCIENCES ET TECHNIQUES DE L'INGÉNIEUR INSTITUT DE GÉNIE ÉLECTRIQUE ET ÉLECTRONIQUE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Evgeny BOGDANOV acceptée sur proposition du jury: Dr A. Karimi, président du jury Dr D. Gillet, Dr C. Salzmann, directeurs de thèse Dr E. L.-C. Law, rapporteur Dr L. Moccozet, rapporteur Dr C. Ullrich, rapporteur Suisse 2013 A person who never made a mistake never tried anything new — Albert Einstein To my parents. Acknowledgments This thesis is only partially my work. It would not be possible without my friends, relatives, colleagues who were helping me (knowingly or unknowingly) during this PhD journey.
    [Show full text]
  • Re: Captchas – Understanding CAPTCHA-Solving Services in an Economic Context
    Re: CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker and Stefan Savage University of California, San Diego fmmotoyam, klevchen, ckanich, dlmccoy, voelker, [email protected] Abstract alphanumeric characters that are distorted in such a way that available computer vision algorithms have difficulty Reverse Turing tests, or CAPTCHAs, have become an segmenting and recognizing the text. At the same time, ubiquitous defense used to protect open Web resources humans, with some effort, have the ability to decipher from being exploited at scale. An effective CAPTCHA the text and thus respond to the challenge correctly. To- resists existing mechanistic software solving, yet can day, CAPTCHAs of various kinds are ubiquitously de- be solved with high probability by a human being. In ployed for guarding account registration, comment post- response, a robust solving ecosystem has emerged, re- ing, and so on. selling both automated solving technology and real- This innovation has, in turn, attached value to the time human labor to bypass these protections. Thus, problem of solving CAPTCHAs and created an indus- CAPTCHAs can increasingly be understood and evaluated trial market. Such commercial CAPTCHA solving comes in purely economic terms; the market price of a solution in two varieties: automated solving and human labor. vs the monetizable value of the asset being protected. We The first approach defines a technical arms race between examine the market-side of this question in depth, ana- those developing solving algorithms and those who de- lyzing the behavior and dynamics of CAPTCHA-solving velop ever more obfuscated CAPTCHA challenges in re- service providers, their price performance, and the un- sponse.
    [Show full text]
  • Stop the Abuse of Gmail!
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Duke Law Scholarship Repository STOP THE ABUSE OF GMAIL! 1 GRANT YANG ABSTRACT Gmail, a highly anticipated webmail application made by Google, has been criticized by privacy advocates for breaching wiretapping laws, even before its release from beta testing. Gmail’s large storage space and automated processes developed to scan the content of incoming messages and create advertisements based on the scanned terms have enraged privacy groups on an international level. This iBrief will compare Gmail’s practices with its peers and conclude that its practices and procedures are consistent with the standards of the webmail industry. The iBrief will then propose additional measures Gmail could institute to further protect webmail users’ and alleviate the concerns of privacy advocates. INTRODUCTION ¶1 Louis Gerstner, former CEO of IBM, once stated that with new technology the “real issues are not technical;” rather, the benefit stemming from new technology “is always counterbalanced by an equally important list of societal concerns.”2 Though not officially released to the general public, Google’s webmail client, Gmail, illustrates Gerstner’s statement, as it has already generated not only praise and excitement, but also criticism and threats of legislative regulation. ¶2 Two components of Gmail that raise privacy concerns are its two- gigabyte storage capacity and its Adsense technology, which scans e-mail and places advertisements into the message related to its content.3 This iBrief will analyze Gmail’s conformity with privacy laws and compare Gmail to other webmail clients such as Yahoo! and MSN Hotmail (“Hotmail”).
    [Show full text]