Showing 5 posts tagged research
Showing 5 posts tagged research
The lack of teaching skills means we are supporting institutions that not only don’t do what we idealize them to do, they don’t value and professionalize the things that we expect them to do well. In fact, we have gone to extremes to prevent the job of university teaching from becoming a profession. The most obvious example is hiring adjunct professors. These are people who are hired for about the same wage as a fast food server, and are expected to teach physics or philosophy to 18 year olds. They don’t get benefits or even long-term contracts. So, in effect, they never get the chance to develop into highly skilled teaching professionals. Instead, they spend most of their time worrying about heating bills and whether they can afford to go to the doctor.
Now, of course, universities will argue that they are research organizations. And that is true. Universities do value research over teaching. Meaning that tenured and tenure-track professors, even if they love teaching, cannot prioritize it, because their administration requires them to be good researchers. Indeed, if you admit that you are a middling to average researcher and want to focus on teaching, you become viewed a burden by your department.
Yet, for the great majority of people, their only interaction with a university is through the people doing the teaching. It’s as if a major corporation, say General Motors, decided that their public face would not be their most visible product—hello Chevy Volt—and instead decides to place the janitorial service front and center. Then, just to top it off, decided not to train the janitors."
On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.
The most recent posting about our ongoing research into how, why, and how often Canadian ISPs disclose information to state agencies.
While such research is done in a number of countries, Canada seems to be a hotbed of boredom studies. James Danckert, an associate professor of psychology at the University of Waterloo, in Canada, recently conducted a study to compare the physiological effects of boredom and sadness.
To induce sadness in the lab, he used video clips from the 1979 tear-jerker, “The Champ,” a widely accepted practice among psychologists.
But finding a clip to induce boredom was a trickier task. Dr. Danckert first tried a YouTube video of a man mowing a lawn, but subjects found it funny, not boring. A clip of parliamentary proceedings was too risky. “There’s always the off chance you get someone who is interested in that,” he says."
– Rachel Emma Silverman, “Interesting Fact: There’s a Yawning Need for Boring Professors” I found the third paragraph particularly amusing as someone who often finds watching parliament interesting. I guess I’d be one of the ‘problem’ participants!
Rachel Emma Silverman, “Interesting Fact: There’s a Yawning Need for Boring Professors”
I found the third paragraph particularly amusing as someone who often finds watching parliament interesting. I guess I’d be one of the ‘problem’ participants!
In today’s era of hyperbolic security warnings one of the easiest things that people can do to ‘protect’ themselves online is select super hard passwords to crack, stuff them in a centralized password manager, and then only have to remember a single password to access the rest in the manager. I’ve used a password manager for some time and there are real security benefits: specifically, if a single service that I’ve registered with is hacked then my entire online life isn’t compromised, just that one service.
Password manager companies recognize the first concern that most people have surrounding their services: how do the managers protect the sensitive information they’re entrusted with? The standard response from vendors tends to reference ‘strong security models and usage of cryptography. Perhaps unsurprisingly, it is now quite apparent that the standard responses really can’t be trusted.
In a recent paper (.pdf), researchers interrogated the security status of password managers. What they found is, quite frankly, shocking and shameful. They also demonstrate the incredible need for third-party vetting of stated security capabilities.
The abstract for the paper is below but you should really just go read the whole paper (.pdf). It’s worth your time and if you’re not a math person you can largely skim over the hard math: the authors have provided a convenient series of tables and special notes that indicate the core deficiencies in various managers’ security stance. Don’t use a password manager that is clearly incompetently designed and, perhaps in the future, you will be more skeptical of the claims companies make around security.
In this paper we will analyze applications designed to facilitate storing and management of passwords on mobile platforms, such as Apple iOS and BlackBerry. We will specifically focus our attention on the security of data at rest. We will show that many password keeper apps fail to provide claimed level of protection