Transcript: Poster board template Poster Board conclusion Hypothesis Simple diagrams of experiment results All pictures shown should be available on google images Materials Data/graphs colorful title approximately two pictures names, hour etc... Shape representation of how procedure was done Background procedure Background slides straightforward large print results Pictures of DNA Pictures of E.Coli cell Pictures representing types of radiation Materials results Procedure Pictures of the materials or some sort of representation Effect of radiation on E.Coli by: Anthony Sinicrope and Sam Dietterich background Data and Graphs Simple graph of the result of the experiment Title page Conclusion
Transcript: Aya Kambouche, Maxime Wichart & Kaylee Sleeuwits 04/12/2019 Introduction Sweetie 2.0 SWEETIE 1.0 AND 2.0 Who we are NGO Terre des Hommes Sweetie 1.0 - 2013 Sweetie 2.0 - 2016 Artificial intelligence 3D-imagery Does not show nudity Can search chatrooms and store information Your opinion Your opinion Do you think it should be possible to use the Sweetie software for detecting and investigating online grooming in the Netherlands? Legal framework Article 248e DCC He, who by means of an automated work or using a communication service, to a person who has not yet reached the age of sixteen or someone who pretends to have not yet reached the age of sixteen (whether or not with a technical tool, including a virtual creation of a person who has not yet reached the age of sixteen), proposes a meeting with the intention of committing abusive acts with a person who has not yet reached the age of sixteen or to create an image of sexual conduct involving a person who has not yet reached the age of sixteen, is punished with imprisonment of up to two years or a fine of the fourth category, if he takes any action to achieve that encounter Including someone who pretends to be under 16 (can be with a technical tool, including a virtual creation Lanzarote Convention Article 23 Computer Crime Act III Attempted grooming 'Attempt of preparation' 'Completed' offense Preparation of an attempt? Preparation acts Article 46 DCC Attempt Article 45 DCC Criminalisation of sexual communication with minors online: a different offense Prohibition of instigation 'Tallon-criterium' - Objective approach - Subjective approach ‘The public prosecution has so far made no use of the virtual child creations in detection of online sexual offenses, as practical experience has shown that incitement is inevitable in this regard.’ Possible violation of privacy rights When allowed? Privacy infringement is allowed when: Provided for by law For a legitimate purpose Necessary in democratic society Concept of subsidiarity What do you think now? ?
Transcript: By: Kyhdri Evans-Jones Criminal Justice and Cyberspace Cybercrime Cybercrime What is it? When there a crime committed using technology. Specifics Cybercrime (specific crime) An example of a cybercrime would be cyber stalking. That is when a person using thinkgs such as soical media to create what people call a burner profile to stalk a person and constantly dm or intant message them. A burner profile is a fake profile that a person creates so that they don't have to use their profile. Perp and risks Characteristics Perps are usually people you know and not strangers like most people would think. Most of the time vitvims are women. Their motivation for their actions are to seize some type of control over their victim. Victims who are victims of domestic violence are also usually victims of cyberstalking Risks can consist of a rise in anxiety and depression. The more forms of cyberstalking or stalking that a victim experieces the more risks arise and the higher the percenatage that they will experience more emotional troubles. Sleep disorder Weight change other physical symptoms Risks Risks https://us.norton.com/internetsecurity-privacy-straight-talk-about-cyberstalking.html http://www.crime-research.org/library/Cyberstalking.htm file:///Users/lejandraevans-turner/Downloads/futureinternet-11-00120-v2.pdf Works Cited Works Cited Tips Tips (Adults) Make sure that you don't give your password out to people. Change passwords fequently (do if you have a list of passwords that you won't forget). Make sure you phone and computers have a password to unlock them. Be careful posting personal information (i.e. where you are going) Always use updated security software. If you have children tell them not to provide their school, address, real name or phone number. If they are contacted by a tsranger they are to let you know immediately Also engourage them to come to you as their parent if they are being cyberstalked or harassed. Tips (children) More Tips https://us.norton.com/internetsecurity-privacy-straight-talk-about-cyberstalking.html Works Cited Works Cited Cyberstalking is a federal offense under American anti-stalking, slander, and harassment laws. Some of the pentalies that come with being convicted are a restraining order, probation, and criminal penalties including jail. The US Federal Anti-Cyber-Stalking law can be found at 47 U.S.C 223 Policing Law enforcement If you are a victim contact your local law enforcement first If your local law enforcemnt is not equipped to handle your issue the contact the FBI Internet crime complaint center. Contact info Contacts https://en.wikipedia.org/wiki/Cyberstalking https://www.fightcyberstalking.org/report-cyberstalking-case/ Work Cited Work Cited
Transcript: Identity Theft – Some hackers can gain access to sensitive information which could be used to fuel identity theft. This identity theft can cause damages to credit ratings from consumer agencies, run-ins with the law because the person who stole the identity committed a crime, or other damages which may not be repairable at all. Computer hackers in the USA go to jail for 10 years for a first offence, and a recidivist gets up to 20 years in prison. In addition, any attempt to cause damage to computers will result in serious problems. Even if there is no explicit damage, the attempt to cause damage to computer would be punished by the legislative provisions. The scale of damage is estimated by the sum of the overall damage in one year. In particular, defense or national security cases can be punished without proof. Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users. Hacking use a computer to gain unauthorized access to data in a system. Example"they hacked into a bank's computer" Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code. Originally, "hacker" did not carry the negative connotations now associated with the term. In the late 1950s and early 1960s, computers were much different than the desktop or laptop systems most people are familiar with. In those days, most companies and universities used mainframe computers: giant, slow-moving hunks of metal locked away in temperature-controlled glass cages. It cost thousands of dollars to maintain and operate those machines, and programmers had to fight for access time. Ways to protect yourself! Computer hackers have existed almost as long as computers In fact, "hackers" have been in existence for more than a century. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in New York. *THE END* Links to sites for further exploration, to report problems,etc. “It’s easy to forget that mobile devices are essentially small computers that just happen to fit in your pocket and can be used as a phone,” says Jean-Philippe Taggart, Senior Security Researcher at Malwarebytes. “Your mobile device contains a veritable treasure trove of personal information and, once unlocked, can lead to devastating consequences.” Where and when did it start? Other things that are a problem The issues with hacking! Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection. Just remember... E-mail Access – Hackers have the ability to gain access to personal e-mail accounts. These can have a variety of information and other private files which most people would regard as important. This information could also hold sensitive data which could be used against someone or simply cause ruin for those who are involved in the breach of privacy. THANKS FOR WATCHING MYSELF AND NICHOLAS FAHEYS PRESENTATION!...love u Cybercrime Presentation Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection. Present penalties & punishments
Transcript: Infant Death Rate By Taylor Nygren -The number of infant deaths did decrease between 1900 to 1960 due to the introduction of modern medicine starting primarily in the 1940's. Procedure Background Data Table Experimental Design The title should describe the work to the reader. Include the independent and dependent variables. -Research death dates in cemetery's using interment.net -Create a rate graph the rates of deaths in infants and toddlers in the 1900's to the 1960's. -Put information onto a prezi.com using the Mini-Poster Template. Prezi.com Google.docs Interment.com -interment.net -prezi.com -The number of infant deaths did decrease between 1900 to 1960 due to the introduction of modern medicine starting primarily in the 1940's. -The point of this lab was to show the rates of infant deaths before and after the introduction of penicillin. - The Biological importance is that the use of common medicine helps babies sent to the ICU generally live longer. Results Introduction Methods Research Question Did the number of infant deaths drop from the years 1900 to 1960. -The point of this lab was to show the rates of infant deaths before and after the introduction of penicillin. - The Biological importance is that the use of common medicine helps babies sent to the ICU generally live longer. References Graph Discussion The introduction has two parts: 1) The question asked, 2) Background context—where does this question fit with what is known.
Transcript: By:Joshua Lee University poster presentation University Poster project University Poster Project Program:Biomedical Engineering University of Waterloo What you would learn learn to model and design complex biomedical systems design bionic limbs and laser-guided surgical devices apply engineering principles to create designs to improve medical treatments and procedures What is Biomedical engineering? program length:4 years 2 years co-op Students earn $17,800 on average per co-op term tuition:$47, 970 Program info Program info entry level salary for a biomedical engineer:$85,620 work at manufacturing facilities, universities, hospitals, and research facilities of companies and educational and medical institutions Salary and Workplace Salary and Workplace University of Toronto Program:Computer Science What you would learn the study of computation and applications of computing;use technology to solve problems development has been stimulated by collaborations with many areas including engineering, the physical and life sciences, mathematics and statistics and commerce. write software to make computers do new things or accomplish tasks more efficiently What is computer science? Education Required:Secondary School Credentials Awarded:Bachelor of Science Program Length:4 year(s) Co-op Option:No Part Time Study Option:Yes Tuition(in province)-$6,780 for 1 year(s) Tuition(international-$29,500 - $68,900 for 1 year(s) Residence cost-$8,300 Meal plan cost-$3,700 - $4,800 Program Info Program Info Possible Careers include Software application Developer IT help desk support Database specialist entry level salary for Software application Developer-$64,111 per year Salary and workplace info Salary and Workplace vs Comparison Comparison Pros and cons Waterloo Offers 2 years of c0-op co-op salary of $17,800 on average per co-op term tuition:$47, 970 Higher salary Pros and cons Toronto no co-op Tuition(in province)-$6,780 for 1 year(s) Tuition(international-$29,500 - $68,900 wider range of careers to choose from I would choose University of Waterloo's Biomedical engineering program because of the fact they have co-op and the subject just appeals to me more. Furthermore, a Biomedical Engineer has the highest salary out of all of the career options from both universities. Personal Choice-University of Waterloo Personal Choice
Transcript: Ubisoft Data Breach By: John Paul Balon, Mika Ameling For those of you who don't know, Ubisoft is a french Entertainment company.They are known for their, "world-renowned" brands. They publish several games that we know and play such as "Assasins Creed", the "Tom Clancy's" Franchise, "Just Dance", and many more. What Is Ubisoft? Ubisoft The Data Breach The Data Breach On the day of the attack (July 2, 2013) Ubisoft accounts got hacked and accessed. Ubisoft states that, "[Their] web site was exploited to gain unauthorized access to some of our online systems." They used the online systems to find the emails, usernames, and encrypted passwords and accessed online user accounts. The attackers had also decrypted all the passwords. The reason this is bad is that players' account details were compromised or in other words, accessed by the wrong people. The account details that were illegally accessed are the player's username, email, and their encrypted passwords. This made matters worse because the hackers could've tried stolen account information in other important or useful websites. Ubisoft encouraged U-Play users, which is a system for Ubisoft users, to change their account details and information. Information Leaked Why is This Bad? To prevent another data breach such as this one, some security changes should be made. Ubisoft could change their encryption code to a stronger code. They could also add Two-Factor Authentication so that people's accounts have a double security. They will get an email with a code to login. Data Breach Security Solutions & Prevention 1. https://www.bbc.com/news/technology-23159997 2.https://it.slashdot.org/story/13/07/02/1739220/ubisoft-hacked-account-data-compromised 3.https://www.firstpost.com/tech/news-analysis/ubisoft-website-hacked-hackers-get-access-to-email-addresses-and-passwords-3630625.html 4.https://www.washingtonpost.com/business/technology/ubisoft-reports-data-breach-asks-users-to-change-passwords/2013/07/02/6b79357a-e349-11e2-a11e-c2ea876a8f30_story.html 5.http://www.nbcnews.com/id/52399634/ns/technology_and_science-tech_and_gadgets/t/security-experts-blast-ubisoft-data-breach/#.XbY-OyMwgwQ Sources of Our Information Sources
Transcript: Social Media and Online Child Sex Abuse The Big Picture Social media companies should refrain from implementing end to end encryption across their services to ensure efforts to combat online child sex abuse are not hampered. Overview What is End to End Encryption? End to End Encryption Defining Online Child Sex Abuse Online Child Sex Abuse Encryption and combating abuse How are they linked? NEWSFLASH But why?... Title Title Title
Description: For grant requests, program proposals, or any other nonprofit or education presentation, this globe-themed creative Prezi template is the way to generate interest and momentum. Like all Prezi education templates and Prezi nonprofit templates, it’s easy to customize.
Description: Stand far above the stacks and stacks of flat, boring resumes on any hiring manager’s desk with a Prezi resume template. Just customize this Prezi presentation template to create your very own “Prezume” and impress them with your dynamism, coolness, and originality.
Description: A well-organized training presentation template is a critical tool for education professionals. From roadmaps to reviews, this training template will help you take your next EDU training presentation to the top of the class.
Description: For grant requests, program proposals, or any other kind of nonprofit or education presentation, this graphite drawing-inspired creative Prezi template is the way to generate interest. Like all Prezi education templates and Prezi nonprofit templates, it’s easy to customize.
Now you can make any subject more engaging and memorable