Services Learning Practicum Andrew Charles Swanson Regis University

Total Page:16

File Type:pdf, Size:1020Kb

Services Learning Practicum Andrew Charles Swanson Regis University Regis University ePublications at Regis University All Regis University Theses Summer 2005 Services Learning Practicum Andrew Charles Swanson Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Computer Sciences Commons Recommended Citation Swanson, Andrew Charles, "Services Learning Practicum" (2005). All Regis University Theses. 769. https://epublications.regis.edu/theses/769 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University School for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes. The materials may not be downloaded in whole or in part without permission of the copyright holder or as otherwise authorized in the “fair use” standards of the U.S. copyright laws and regulations. Services Learning Practicum 5 Acknowledgements Thanks to Hal Friskey for reviewing this paper. Thanks to Trisha Litz for her contribution to this whole project. She provided the business requirements and organized the project as faculty advisor. Trisha Litz and Wolf Thompson provided good advice and feedback on the original design and architecture. Julie Thomas contributed early on in the project, providing feedback on the database design. Thanks to the Director of Testing and Quality Assurance, Teri Lane and my fellow employees of GuideWorks, LLC, who supported me and provided me access to Professional Office 2003 and Microsoft .Net software development tools as part of the ongoing efforts at GuideWorks to help their employees pursue their academic goals. Most of all, I would like to thank my family for the support they have shown over the past few years while I have been studying. They have tolerated my attention to academic and professional goals when I was also needed as husband, father, and grandfather. My wife, Kathleen, has been the greatest support to me and I could not have done any of this without her. Services Learning Practicum 6 Abstract The Service Learning Practicum is a document driven knowledge management system. The purpose of the Practicum is to involve MSCIT students in IT projects that support and provide solutions to non-profit organizations or non-governmental organizations (NGOs). The main documents that drive the practicum are the student application; the NGO needs statement; and the student’s thesis, design, and research documents. The practicum unites graduate students with NGOs. Both benefit from this union because the student is able to reach academic goals and the NGOs are able to implement low-cost or no-cost solutions for their IT needs. This project implements a graphic user interface for the collection, storage, and access of these documents. Services Learning Practicum 7 Table of Contents Revision History............................................... 4 Acknowledgements............................................... 5 Abstract....................................................... 6 Table of Contents.............................................. 7 List of Tables................................................. 9 List of Figures / Exhibits / Addenda.......................... 10 Chapter One: Introduction / Executive Summary................. 11 Statement of the problem and goal to be achieved ............ 11 Needs ....................................................... 11 Barriers .................................................... 12 XML solutions to be discussed ............................... 12 Project Scope ............................................... 14 Definition of terms ......................................... 14 Summary ..................................................... 16 Chapter Two: Review of Literature / Research.................. 17 Overview of literature and research on XML .................. 17 Project research ............................................ 18 Summary: what is known and unknown about XML ................ 21 Contributing aspects of this project ........................ 23 Chapter Three: Methodology.................................... 25 Research methods to be used ................................. 25 Life-cycle models to be followed ............................ 26 Specific procedures ......................................... 28 Formats for presenting results/deliverables ................. 30 Review of the deliverables .................................. 30 Resource requirements ....................................... 30 Outcomes .................................................... 31 Summary ..................................................... 32 Chapter Four: Project History................................. 35 Project Origin .............................................. 35 Project Management .......................................... 35 Project Milestones .......................................... 36 Changes to the project plan ................................. 36 Evaluation of project goals ................................. 37 Discussion: Project achievement and frustrations ............ 38 Discussion: Impact of project variables ..................... 38 Findings/analysis ........................................... 39 Chapter Five: Lessons Learned / Next Evolution............... 40 The project experience ...................................... 40 What could have been done differently ....................... 40 Discussion: achievement of initial project expectations ..... 41 Next stage of project evolution ............................. 42 Conclusions/recommendations ................................. 43 Summary ..................................................... 44 Works Cited................................................... 47 Services Learning Practicum 8 Addendum A: Business Implementation........................... 49 Addendum B: XML Schema........................................ 56 Addendum C: Project Schedule.................................. 64 Services Learning Practicum 9 List of Tables Table 1 Revision History....................................... 4 Table 2 XML Product Solutions................................. 13 Table 3 XML Engine selection.................................. 18 Table 4 Project Schedule...................................... 64 Services Learning Practicum 10 List of Figures / Exhibits / Addenda Figure 1 Rapid Prototype Diagram (Schach 71).................. 27 Figure 2 Amaya................................................ 29 Figure 3 InfoPath............................................. 32 Figure 4 Business Use Case Diagram............................ 49 Figure 5 MVC Architecture..................................... 54 Figure 6 Workbook, workflow ERD............................... 56 Figure 7 SLP Schema........................................... 62 Figure 8 Schema converted with MS .NET........................ 63 Addendum A: Business Implementation........................... 49 Addendum B: XML Schema........................................ 56 Addendum C: Project Schedule.................................. 64 Services Learning Practicum 11 Chapter One: Introduction / Executive Summary Statement of the problem and goal to be achieved Research thesis: A knowledge management system can be designed and implemented, using little or no cost Extensible Markup Language (XML) technology, to unite Regis University graduate students seeking research projects with non-profit organizations seeking engineers to implement computer and information technology projects. Needs Each year, non-profit organizations or non-governmental organizations (NGO) are faced with technology hurdles. Some wish to create databases to retain valuable information about their services and their organization. Some wish to create Web sites on the Internet in order to provide information about their services. Still others wish to get newly acquired hardware or software up and running. And finally some leaders in these organizations are so busy with day to day work that they cannot find the resources to even consider how technology can help them. On the other hand, Regis University students in Computer Science need real and practical problems to study. Most academic problems in computer science involve fictional Services Learning Practicum 12 companies or organizations with fictional problems. The Services Learning Practicum suggests a means to provide problems posed by NGO needs and students who can work to find computer science solutions. Faculty members need a way to track project
Recommended publications
  • Canvas Developer Guide
    Canvas Developer Guide Version 53.0, Winter ’22 @salesforcedocs Last updated: August 5, 2021 © Copyright 2000–2021 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS GETTING STARTED . 1 Chapter 1: Introducing Canvas . 1 Canvas Scenarios . 3 Where Canvas Apps Appear . 3 Supported Browsers . 4 Supported Salesforce Editions . 4 User Permissions Required . 5 User Interface Considerations . 5 Canvas App Process . 6 Canvas Personal Apps . 8 Canvas Personal App Process . 8 Enabling Canvas Personal Apps within an Organization . 9 Making an App a Canvas Personal App . 10 Uninstalling a Canvas Personal App . 10 Chapter 2: Quick Start . 12 Prerequisites . 13 Create the App . 13 Set the App Location . 14 Chapter 3: Quick Start—Advanced . 16 Prerequisites . 17 Clone the Project from GitHub . 17 Run the Web App Locally . 18 Create the Canvas App . 19 Configure Who Can Access the Canvas App . 21 Deploy the Web App to Heroku . 22 Update the Canvas App . 23 Package the Canvas App . 24 Upload the Canvas App Package . 25 Install the Canvas App . 25 Configure Who Can Access the Installed Canvas App . 26 USING CANVAS . 27 Chapter 4: Canvas SDK . 27 Referencing the Canvas SDK . 28 Authentication . 28 Signed Request Authentication . 28 Contents OAuth Authorization . 36 SAML Single Sign-On for Canvas Apps . 40 Getting Context in Your Canvas App . 40 Cross-Domain XHR . 41 Getting a List of Chatter Users . 41 Posting to a Chatter Feed . 42 Alternatives to Cookies for User Tracking .
    [Show full text]
  • Rishi.Narang (At) Thirdbrigade.Com +91 988.6982.678
    END USER PRIVACY BREACHES Rishi Narang Vulnerability Research Analyst Third Brigade Security Labs rishi.narang (at) thirdbrigade.com +91 988.6982.678 OWASP 06th September, 2007 Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org HAWK‟S EYE Web Application Security - 10 Steps to Secure - IE vs. Firefox Competition Common User Behaviors - Warnings & Error Messages - SURVEY: What End Users Say About Warnings Security Products vs. Attacks - Current Security Architecture - Security Myths Ideal World vs. Real World - Security Awareness (Geographically) - Plans & Actions + Prime Focus Privacy Approach - Data Gathering - Privacy Policies & Drives OWASP 2 WEB APPLICATION SECURITY … lot many web apps, but are they secured ?? Can they live together ?? OWASP 3 10 STEPS TO SECURE WEB 2.0 brings Threat 2.0 STEP 01. Policy: Fair policy @ every Gateway STEP 02. Tuning the Policy: Tuning as per custom applications STEP 03. Dealing with Malwares: HOST level protection against Malwares STEP 04. Block Undesirable URLs: Block Black-Listed and undesirables STEP 05. File Format Scans: Protection against malicious file downloads STEP 06. Upload Scans: Upload scan log for malicious activities STEP 07. IM traffic scans: IM traffic scan for file sharing and scripts STEP 08. Web Activity Monitoring: Passive monitoring for Anomalies STEP 09. Policy Enforcements: User Education and simplified process STEP 10. Emerging Web Activities: Keep an Eye on it ! OWASP 4 BROWSER VULNERABILITIES Source: Internet Security Threat Report Volume XI, Symantec Corporation IE & FIREFOX reported high number of vulnerabilities as compared to other browsers.
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • Downloading of Movies, Television Shows and Other Video Programming, Some of Which Charge a Nominal Or No Fee for Access
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED DECEMBER 31, 2011 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO Commission file number 001-32871 COMCAST CORPORATION (Exact name of registrant as specified in its charter) PENNSYLVANIA 27-0000798 (State or other jurisdiction of (I.R.S. Employer Identification No.) incorporation or organization) One Comcast Center, Philadelphia, PA 19103-2838 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (215) 286-1700 SECURITIES REGISTERED PURSUANT TO SECTION 12(b) OF THE ACT: Title of Each Class Name of Each Exchange on which Registered Class A Common Stock, $0.01 par value NASDAQ Global Select Market Class A Special Common Stock, $0.01 par value NASDAQ Global Select Market 2.0% Exchangeable Subordinated Debentures due 2029 New York Stock Exchange 5.50% Notes due 2029 New York Stock Exchange 6.625% Notes due 2056 New York Stock Exchange 7.00% Notes due 2055 New York Stock Exchange 8.375% Guaranteed Notes due 2013 New York Stock Exchange 9.455% Guaranteed Notes due 2022 New York Stock Exchange SECURITIES REGISTERED PURSUANT TO SECTION 12(g) OF THE ACT: NONE Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
    [Show full text]
  • Privacy Knowledge Modelling for Internet of Things
    Privacy Knowledge Modelling for Internet of Things: A Look Back Charith Perera (Open University), Chang Liu (CSIRO), Rajiv Ranjan (Newcastle University), Lizhe Wang (China University of Geosciences), Albert Y. Zomaya (University of Sydney) Abstract Internet of Things (IoT) and cloud computing together give us the ability to sense, collect, process, and analyse data so we can use them to better understand behaviours, habits, preferences and life patterns of users and lead them to consume resources more efficiently. In such knowledge discovery activities, privacy becomes a significant challenge due to the extremely personal nature of the knowledge that can be derived from the data and the potential risks involved. Therefore, understanding the privacy expectations and preferences of stakeholders is an important task in the IoT domain. In this paper, we review how privacy knowledge has been modelled and used in the past in different domains. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT. Finally, we discuss major research challenges and opportunities. Keywords: Internet of Things, Privacy Preferences, Knowledge Modelling Introduction The Internet of Things allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path, any network and any service [1]. Over the last few years, a large number of Internet of Things (IoT) solutions have come to the IoT marketplace [2]. These IoT solutions together collect a large amount of data that can be used to derive useful but extremely personal knowledge about users [3]. On the other hand, cloud computing provides ubiquitous, convenient, on- demand access to a shared pool of configurable computing resources.
    [Show full text]
  • Case 2:16-Cv-00321-JRG-RSP Document 68 Filed 04/25/16 Page 1 of 178 Pageid #: 733
    Case 2:16-cv-00321-JRG-RSP Document 68 Filed 04/25/16 Page 1 of 178 PageID #: 733 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION ROVI GUIDES, INC.; ROVI Case No. 2:16-CV-321 TECHNOLOGIES CORP.; and VEVEO, INC., DEMAND FOR JURY TRIAL Plaintiffs, FIRST AMENDED COMPLAINT v. FOR PATENT INFRINGEMENT COMCAST CORPORATION; COMCAST CABLE COMMUNICATIONS, LLC; COMCAST CABLE COMMUNICATIONS MANAGEMENT, LLC; COMCAST OF HOUSTON, LLC; COMCAST BUSINESS COMMUNICATIONS, LLC; COMCAST HOLDINGS CORPORATION; COMCAST SHARED SERVICES, LLC; ARRIS INTERNATIONAL PLC; ARRIS GROUP INC.; ARRIS TECHNOLOGY, INC.; ARRIS ENTERPRISES LLC; ARRIS SOLUTIONS, INC.; PACE LTD.; PACE AMERICAS HOLDINGS, INC.; PACE AMERICAS INVESTMENTS, LLC; PACE AMERICAS, LLC; TECHNICOLOR SA; TECHNICOLOR USA, INC.; and TECHNICOLOR CONNECTED HOME USA LLC, Defendants. Plaintiffs Rovi Guides, Inc. (“Rovi Guides”), Rovi Technologies Corp. (“Rovi Technologies”), and Veveo, Inc. (“Veveo”) (collectively “Rovi” or “Plaintiffs”) hereby bring this First Amended Complaint for patent infringement (“Complaint”) against Comcast Corporation; Comcast Cable Communications, LLC; Comcast Cable Communications Management, LLC; Comcast of Houston, LLC; Comcast Business Communications, LLC; Comcast Holdings Corporation; Comcast Shared Services, LLC (all Comcast entities, collectively, “Comcast” or Case 2:16-cv-00321-JRG-RSP Document 68 Filed 04/25/16 Page 2 of 178 PageID #: 734 “Comcast Defendants”); Arris Group Inc.; Arris Technology, Inc.; Arris Enterprises LLC; Arris Solutions, Inc.; Arris International plc; Pace Ltd.; Pace Americas Holdings, Inc.; Pace Americas Investments, LLC; Pace Americas, LLC (all Arris and Pace entities, collectively, “Arris” or “Arris Defendants”); Technicolor SA; Technicolor USA, Inc.; Technicolor Connected Home USA LLC (all Technicolor entities, collectively, “Technicolor” or “Technicolor Defendants”) (Arris and Technicolor, collectively, “Manufacturer Defendants”) (all defendant entities, collectively, “Defendants”) for infringement of U.S.
    [Show full text]
  • Recommendations for Businesses and Policymakers Ftc Report March 2012
    RECOMMENDATIONS FOR BUSINESSES AND POLICYMAKERS FTC REPORT FEDERAL TRADE COMMISSION | MARCH 2012 RECOMMENDATIONS FOR BUSINESSES AND POLICYMAKERS FTC REPORT MARCH 2012 CONTENTS Executive Summary . i Final FTC Privacy Framework and Implementation Recommendations . vii I . Introduction . 1 II . Background . 2 A. FTC Roundtables and Preliminary Staff Report .......................................2 B. Department of Commerce Privacy Initiatives .........................................3 C. Legislative Proposals and Efforts by Stakeholders ......................................4 1. Do Not Track ..............................................................4 2. Other Privacy Initiatives ......................................................5 III . Main Themes From Commenters . 7 A. Articulation of Privacy Harms ....................................................7 B. Global Interoperability ..........................................................9 C. Legislation to Augment Self-Regulatory Efforts ......................................11 IV . Privacy Framework . 15 A. Scope ......................................................................15 1. Companies Should Comply with the Framework Unless They Handle Only Limited Amounts of Non-Sensitive Data that is Not Shared with Third Parties. .................15 2. The Framework Sets Forth Best Practices and Can Work in Tandem with Existing Privacy and Security Statutes. .................................................16 3. The Framework Applies to Offline As Well As Online Data. .........................17
    [Show full text]
  • Florian Schaub Riva Cur P Ity Le L B a a B S O U R a B T a March 17, 2015 O L
    17 – Usability of privacy policies and CyLab the dimensions of privacy notice Engineering & Public Policy Lorrie Cranor, Blase Ur, and Rich Shay cy & Se w/ special guest Florian Schaub riva cur P ity le L b a a b s o U r a b t a March 17, 2015 o L r y y C H 05-436 / 05-836 / 08-534 / 08-734 ! T U T D P .E Usable Privacy and Security" :// U CUPS.CS.CM 1 Notice and choice Protect privacy by giving people control over their information Choices about allowing their Notice about data data to be collected and used collection and use in that way 2 Nobody wants to read privacy policies “the notice-and-choice model, as implemented, has led to long, incomprehensible privacy policies that consumers typically do not read, let alone understand” # "Protecting Consumer Privacy in an Era of Rapid Change. Preliminary FTC Staff Report. December 2010. 3 Towards a privacy “nutrition label” • Standardized format – People learn where to find answers – Facilitates policy comparisons • Standardized language – People learn terminology • Brief – People find info quickly • Linked to extended view – Get more details if needed 4 Iterative design process • Series of studies – Focus groups – Lab studies – Online studies • Metrics – Reading-comprehension (accuracy) – Time to find information – Ease of policy comparison – Subjective opinions, ease, fun, trust P.G. Kelley, J. Bresee, L.F. Cranor, and R.W. Reeder. A “Nutrition Label” for Privacy. SOUPS 2009. P.G. Kelley, L.J. Cesca, J. Bresee, and L.F. Cranor. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach.
    [Show full text]
  • @Omcast Organizational Chart Technology & Product Development Updated: 4/1612010
    @omcast Organizational Chart Technology & Product Development Updated: 4/1612010 Tony Werner EVP & eTa I I I I I I I I I .::.am .;x;nwartz _A~" t-ran~~uy~ ~fnlas Sree Kotay Steve Reynolds JOy Gary Koerper sv~a:;:~ed Sam Chernak Pres~t SVP Strategy & SVP IP SVP & Chief SVP CPE 8. Home SVP Video Product SVP Nelwork Comcas1 Converged Comm. Product Communications & 8lJsiness & Tech Softwatl! Architect Network Development Architecture Products DeveloDment Services Develoomerrt I I I Rich Woundy See Corneast Eric Budin Richard Hounsell Douglas Jones Ma~ Francisco See Tech & Prod SVP Tech Converged VP Business VP Search & VP Access ngmeenng Fello Devel- Hess Research & Devel. Products Development Discovery NotwoOO Michael Cook Michael Connelly Todd Walker Marti Vic.kers vp Tech Research VP Product 08'191 SVP Comcast VP Engineering & Development & Mng1 VidEKI Softward Dan Wang Melanie Means Edward Grauch P Tech Research VP Video VP Video Devices & Dell'el Production Jan Palmatier John Radloff KeVin Taylor VP Slra.tegy & VP Prodlc1 Fello~ nglneenng Oevelopmenl Managemem Anthony Fox Bruce Brodley VP Product VP Video Management Plo.tforms RogerFoK Ryan Cumer VP Producl P Product Ovlpm Management & Management Gerard Kunkel SVP User Exp, & Prod. De5ign 01-COM-00000008 @omcast Organizational Chari National Engineering & Technology Operations Updated: 411612010 John Schanz EVP National Eng Ineenng & I I Technology Operatioos I I Myma bOlO Greg Boles Ric\( Gasloli LyZiJ. Dilhhn Chief Information anc VP SVP Product VP HR & Org Intraslructure Flnarx;e Engineering Effecllveness Securil Officer I I I I I I ~a'Y raver Charlotte Field Raymond Celona Marl( Muehl PaLll Struhsaker KeVIn Mc;Elearnev SVP & COO SVP Dps, Tesling & SVP Planning & SVP Produd SVP Software Acting SVP Networ1o:.
    [Show full text]
  • Alessandro Acquisti - Curriculum Vitae Heinz College, Carnegie Mellon University Acquisti @ Andrew.Cmu.Edu |
    Alessandro Acquisti - Curriculum Vitae Heinz College, Carnegie Mellon University acquisti @ andrew.cmu.edu | www.heinz.cmu.edu/~acquisti Trustees Professor of Information Technology and Public Policy Director, Privacy Economics Experiments Lab (PeeX) Faculty Chair, Master of Science in Information Security Policy & Management Steering Committee, CMU Center for Behavioral Decision Research (CBDR) Positions Trustees Professor of Information Technology and Public Policy, 2020 - present Heinz College, Carnegie Mellon University Faculty Director, CMU Digital Transformation and Innovation Center Sponsored by PwC, 2017 - 2020 Carnegie Mellon University PwC William W. Cooper Professor of Risk and Regulatory Innovation, 2017 - 2020 Heinz College, Carnegie Mellon University Professor of Information Technology and Public Policy, 2014 - 2020 Heinz College, Carnegie Mellon University Tenured Associate Professor of Information Technology and Public Policy, 2012 - 2014 Heinz College, Carnegie Mellon University Associate Professor of Information Technology and Public Policy, 2009 - 2012 Heinz College, Carnegie Mellon University Assistant Professor of Information Technology and Public Policy, 2003 - 2009 Heinz College, Carnegie Mellon University Visiting Scientist, Spring 2012 Google, Mountain View Visiting Fellow, Spring 2012 Becker/Friedman Institute for Research in Economics, University of Chicago Visiting Scholar, Fall 2011 Institute for Quantitative Social Science, Harvard University Visiting Researcher, Fall 2011 Microsoft Research, New England Visiting
    [Show full text]
  • Privacy Negotiations with P3P Sören Preibusch German Institute for Economic Research (DIW) Königin-Luise-Str
    Privacy Negotiations with P3P Sören Preibusch German Institute for Economic Research (DIW) Königin-Luise-Str. 5, 14195 Berlin, Germany [email protected] ABSTRACT preferences. A privacy-focused “meta-personalization” does This paper examines how negotiation techniques can not take place.1 resolve the trade-off between service providers’ persona- lization efforts and users’ individual privacy concerns and Posting “privacy policies” on websites is a rigid approach demonstrates how they can be integrated into existing and hampers users providing an informed consent as the technologies to overcome the shortcomings of static privacy compensation for data disclosure is not apparent. The policies. The analysis includes the identification of relevant empirical proof of users’ stated privacy preferences and negotiable privacy dimensions. An extension to P3P is diverging from their actual behaviour is a symptom of this proposed that allows a simple expression and implemen- burden [14]. tation of negotiation processes. Support for this extension Our contribution is to depict how negotiation techniques has been developed for the Mozilla Web browser. can overcome current drawbacks of static privacy policies, and reconcile privacy and personalization. We investigate INTRODUCTION how negotiations can be implemented using existing The Web’s complexity both in size and diversity has led technologies, namely P3P. online retailers to offer their customers individually targeted products and services. Personalization efforts have been The implementation of PRINT by extending W3C’s implemented in the vast majority of popular sites. Their Platform for Privacy Preferences (P3P) is soundly explained inherent need for personal information and the long-time and detailed information is provided how language support storage of these data drew attention to the induced privacy for PRINT can be integrated in P3P in a straightforward issues.
    [Show full text]