Wednesday 30 April 2014

Lesson 9: Six ways to show your story (and how to print all about Heidi on the screen)

You might have had a look at the stats section of the dashboard and wondered why some stories of this blog have not been read more than a couple of times, although you are sure there are more readers.

The explanation is that the same stories appear on several pages of the blog. On this blog every post (story) is published on six pages (actually on more):

On the first page
http://eva-some2014.blogspot.fi/
as long until it is story #8 (This blog now shows seven newest stories on first page, but that can be changed) Then the story will be moved to page 2 which at the moment is:
http://eva-some2014.blogspot.fi/search?updated-max=2014-04-07T13:33:00%2B03:00&max-results=7

Blogger stats are informative, but the report of the page-views of each
individual story is misleading showing only views when only the post
in question was shown alone on its own page.

Every page has its own page. It is these exclusive visits on the page the statistics show. You can copy the link of the story page and put it on a web page or send by email. The page URL of my story: Lesson 4 - Using Google Groups is:
http://eva-some2014.blogspot.fi/2014/03/lesson-4-using-google-groups.html

On this blog the posts are archived month by month. Thus every story posted in March this year are to be found and read at:
http://eva-some2014.blogspot.fi/2014_03_01_archive.html

Actually a page of stories each year is also generated. The following link shows all 2014 stories in sets of seven posts:
http://eva-some2014.blogspot.fi/search?updated-min=2014-01-01T00:00:00%2B02:00&updated-max=2015-01-01T00:00:00%2B02:00&max-results=50

For every label a page is generated. If you want to see all the lessons of this blog on one single page, go to:
http://eva-some2014.blogspot.fi/search/label/Lesson

Our blog has a global audience ;-)

Every search typed in the search box upper left corner of the blog generates a page if stories including the search term are found. If you want to find all stories mentioning the noblest of all arts - football - you type football in the search box and generate this web page:
http://eva-some2014.blogspot.fi/search?q=football

If you appear often on a group blog, you can also generate a page with all the stories you have written or beem mentioned on. Here's our Heidi on the Art&Media blog:
http://tamk-artmedia.blogspot.fi/search?q=m%C3%A4enp%C3%A4%C3%A4

The pages also have their own URL:s  like:
http://eva-some2014.blogspot.fi/p/library.html

Tuesday 29 April 2014

Lesson 8: Rebelling software

How to restore order?

Sometimes you might get really frustrated with software not working properly. You do everything right but things are not happening the way they should, You double check everything, do everything right and no result.


One of the most popular annoying situations with Blogger is that pics don’t appear where they should. You put the cursor where you want the pic, use the add image function, and the photo pops up on top of the story. You start moving the pic and create a mess. You start everything again and no positive feedback to your effort.

The way to address this problem is to close the post, then open it again, and it works.

On every course I use Blogger there is at least one student who can’t access the dashboard in the beginning by accepting the invitation. The fix is in most cases that the user logs out from Google, then logs in again. Then everything works fine.


Logging out and in again is also the fix if you are not able to see the edit button of a page to add content. This happened to one of the students of this course last week. You can find more details about this in our Google Group.

A general rule for putting all rebelling cloud software to order is to shut down the situation and start again - exactly like restarting the PC is most often best way to manage the computer.


Sunday 27 April 2014

Lesson 7: The Password Problem

We humans have become pretty good at physical security. It’s not very easy to rob a money transfer vehicle or a bank and actually get away with it. It seems unlikely that even the boldest terrorist would attempt to physically break into high security locations like Pentagon or Fort Knox.

Digital security however is a whole different matter. During the last few years we have gotten used to news about many of the largest companies in the world like Yahoo, Adobe, Twitter, Facebook, Nintendo and Apple getting hacked [1]. A big part of the problem with digital security is that our systems still rely heavily on passwords for authentication. Passwords are challenging for several reasons.

The amount of passwords
First of all, we need so many of them. According to Techradar 25 to 34 year old web users actively use 40 different online accounts on average. [2] We are told that each one of our accounts should have a unique password, so that if and when one of them gets hacked, the hackers don’t get access to all of our accounts. Remembering 40 unique username-password combinations is not very easy to do for most of us.

The complexity of passwords 
The passwords we choose should be long, random and complex. This is because in a typical hack the attacker gets access to the databases in which usernames and passwords are stored. Luckily most (but not all) system administrators are wise enough to store passwords in encrypted formats, so that the attacker has to crack them first in a process called brute-forcing. This is where the length and complexity of your passwords really comes into play.

The very first thing the hacker will attempt is a so called dictionary attack, in which a dictionary of common words and passphrases is tested for the password. [3] If your password is included in the dictionary, it will be cracked in less than a second. Howsecureismypassword.net estimates the time it would take for a desktop PC to brute-force different passwords. [4] I started the test with with a very common word “Michael” which of course would be cracked instantly. Adding the number one after it (Michael1) still puts it in the top 1000 of most common passwords, which means it’s probably found in every password dictionary. Interestingly adding the number three (Michael3) makes brute-forcing it last 15 hours, which while still being quite weak, is already a significant improvement. Below is a chart of other variations and their brute-forcing times:














 
Image: Brute-force attack times for a desktop PC for different passwords based on Howsecureismypassword.net results.

The charts demonstrate how important password complexity and length is. By adding special characters like exclamation marks and asterisks to our password, we can improve its strength significantly. By simply adding the letter “d” a few times to the end the word “password” it changes from the worst password in the world to a password that takes days to crack.

What’s good enough?
What is a safe enough time estimation to aim for then? We should remember two things: many hackers have access to botnets that comprise of thousands of computers and secondly computers are improving at an exponential rate according to Moore’s law. [5] Considering this I wouldn’t recommend settling for anything less than hundreds of thousands of years, of course also depending on the importance of the account you are protecting.

Another challenge with passwords is that no matter how good your password is, it is still very vulnerable to two things: phishing and keylogging.

Phishing
Phishing is a process in which a malicious actor masquerades as a legitimate entity in order to have you send your private information to them [6]. To give you an example from my own experience, I once received a genuine looking email from Paypal telling me that I need to log-in to my Paypal account in order to confirm my address. I was suspicious but decided to see what happens if I click on the link. It took me to a website that had the exact same design as Paypal and it asked for my username and password. I entered a completely made up username and a random password and clicked on the login button. The website pretended that it accepted my login information and took me to a page that looked like the usual Paypal interface! You can probably guess what would have happened if I had entered my real Paypal login: this phishing website would have gathered my login information and used it to enter my Paypal account in an attempt to steal my funds.

Keylogging
Keylogging is even worse than phishing: a hacker is able to install a small program on your computer without you noticing which then captures every keystroke you type and sends the text to the hacker in a discreet manner. This way the attacker can learn all the usernames and passwords that you use while the keylogger is active. In a 2010 report, 48% of inspected 22 million computers were found to have malware in them [7] and according to Australian Computer Emergency Response Team (ausCert) 80 percent of all keyloggers are not detectable by antivirus software. In other words this threat is very real and makes relying on passwords for security quite scary.

What can we do?
What can be done to improve the situation? To fight phishing attempts, you should always double check the URLs of the websites you visit. I also recommend using tools like Web Of Trust (https://www.mywot.com/) that will show you community based scores for the websites you visit. If you are about to enter a shady website, you will get a warning. You should never ever click on links you receive in email, unless you are absolutely sure about the sender. Remember that changing the sender-address is a quite trivial thing to do. If a service that you are using asks you to visit their site, it’s better to manually type in the address or google it to make sure you are taken to the right website.

Defending against keylogging is much more difficult, because these type of infections can be hard to detect. Naturally you should have an up-to-date virus scanner and you should be performing scans regularly, but that doesn’t really guarantee anything. One of the most efficient defenses against keylogging attacks is two factor authentication. It means that you use not only your password to log in to a service but also a code sent to (or generated by) another device, typically your mobile phone. Many of the big web companies like Google and Yahoo offer two factor authentication these days and I really recommend it for greatly improved safety. To perform a successful attack, the hacker would need to have control of both your computer and your phone, which is quite unlikely.

Password managers
To help remember all your unique passwords you can use a password manager like Roboform or KeePass, but those are kind of double edged swords. On the other hand they make life quite convenient by keeping track of all your passwords, but they also create a single point of failure: If the attacker learns the master password that protects your password manager, then suddenly they have access to all your online accounts all at once. I personally have Roboform installed, but only on my workstation that I keep “sterile” which means it never touches the internet. At the moment I have 980 different user accounts saved in those files and I would never be able to remember all those logins without Roboform.

Coming up with a system
If you do not have an offline computer to store your passwords safely, I recommend creating a system that allows your passwords to be unique, long and yet easy to remember. Let me give you an example. You could create a single random password to memorize, let’s say “XyZ##!:):P” and make it unique by adding the letters two and three from the service you are using it for to the end of the password. So your Facebook password would be “XyZ##!:):Pac”. Even better, you could do something like adding the first letter from the top-level domain (like .com .org or .fi) in all caps at the end to hide your pattern a bit more. So Facebook password would become XyZ##!:):PacC and that one would take 111 million years to crack. In my view this would provide good enough security for you non-critical online accounts. Your main email account and other highly important accounts should probably still have completely unique passwords (and thus not use a system like this).

Speculation about the future
What might the future of online security have in store for us? Many used to believe in biometric identification methods such as fingerprint- and eye scanners. The problem with these solutions is that just like passwords, malicious actors can use clever ways to obtain copies of this information in order to falsely prove their identity. Fingerprints might in some cases be even easier to obtain than passwords, as we leave copies of them pretty much everywhere. Unlike your password, you can’t really change your fingerprints if you fear a hacker has managed to get a copy of them, which in my opinion makes it an awful system for security. My prediction is that in future we authenticate with combinations of something we have (perhaps a smart watch or a ring) and something we know (a simple password), but hopefully the systems also analyzes our typical behavior and adjusts the requirements based on our behavioral patterns. For example, the login-system should demand higher degrees of verification if the login attempt is made from an unknown computer at an unfamiliar location. Many two factor authentication systems already allow you to mark commonly used computers as safe, removing the need to do a full two factor sign-in on those. Of course I am hopeful that all the smart security engineers will come up with something even better than I’m able to predict.

Many companies are already working hard to solve this problem and there are big incentives for a solution. According to popularmechanics.com the National Institute of Standards and Technology is offering a 10 million dollar reward for coming up with an alternative to passwords. Even Ford is working on a system that would automatically log you in based on the proximity of your smart phone. [8] The ones who can finally solve the password problem by coming up with more convenient and secure authentication methods will surely be applauded by internet users around the world.





Sources:

[1]
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 

[2]
http://www.techradar.com/news/internet/online-fraud-too-many-accounts-too-few-passwords-1089283

[3]
http://searchsecurity.techtarget.com/definition/dictionary-attack[4]https://howsecureismypassword.net/ 

[5]
http://en.wikipedia.org/wiki/Moore's_law[6]http://en.wikipedia.org/wiki/Phishing 

[7]
http://www.zdnet.com/blog/security/report-48-of-22-million-scanned-computers-infected-with-malware/5365 

[8]
http://www.popularmechanics.com/technology/how-to/computer-security/solving-the-password-problem-14993917-2

Tuesday 15 April 2014

Team project #2 - research on social media usage in building fan communities

The second team team research project is about finding out how social media is used for community building and promotion.
The Eurovision song contest is used for research material - hundred millions of people will try to help their favourite to win using social media channels.

Example of a Twitter search helping to find the right
#hashtags to search and @usernames to follow.

The steps needed to complete the assignment are:

1. Organise your team Create the project wiki folder of you team in the EVA Social Media 2014 folder.

Make the schedule of team hangouts, chats and other meetings. The professors are available for meetings. Try Antti first, then Cai.

2. This course is a collaborative enterprise. You are not supposed to split the project in independent tasks and then merge the work of each student to a research report. Division of labor is allowed and necessary, but at least the research questions and the final report must be done in interaction, collaboratively.

3. Design your research questions. Some possible:
* what kind of campaign does the representative of country x have on Facebook and Twitter?
* what kind of campaign does the broadcasting company involved of country x have on Facebook and Twitter, if any?
* what kind of campaign does the record label of representative of country x have on Facebook and Twitter, if any?
* it is obvious that there is a lot of noise on Facebook and Twitter to support the artist in her/his country. But you can't get any votes from you own country. What is done to attract the audiences in other countries?
* Are there fan communities in other countries? If you are the Sweden team, can you find international fan communities to support your representative? How do these communities operate?
* Are there any differences in use of Facebook and Twitter for promotion and community building?
In short: How is social media and communities on social media used to win Eurovision? Or is it not only about Eurovision, but about something beyond? (Remember though that your research object is NOT the artist or the song BUT the functions and usage of social media).

    A lot of research material; 700 000+ fans in this Facebook community.
You'll 
find more relevant FB pages and groups to follow, also ones to
support the
candidate of your team.

4. Follow what happens:

the weeks before the event
first semifinal May 6
second semifinal May 8
Grand Final May 10.

5. Analyse what happened and write the research report with your team.
The research report is structured like this:
- Who we are
- our research questions were
- our results are
- how we did it
- questions for future research
(Some students need to know how long the report should be. Aim at 4000-6000 characters.)

Your complete research project is in your team folder, shared with anyone with the link.

On the blog you publish an abstract or executive summary
of your report - a maximum of 2600 characters + pics. Add label Research report #2. Add a link to the blog post to the complete report in your Google Drive folder.

6. Report deadline: Wednesday May 21  

Monday 14 April 2014

Lesson 6 Microblogging part 5: Teleportation machine and collaborative notebook

Twitter walls are very common on conferences and other events. It adds to the social experience of the event to see and share comments on the Twitter wall. But Twitter feed can have more ambitious functions:

  • The participants can make a silent or spoken agreement to share their notes on Twitter using a session or topic specific hash-tag
  • The participants can view the stream from parallel sessions in real time and have grounds for a decision of session switch
  • You can view the notes of the parallel sessions afterwards
  • You can follow the conference events in real-time even if you are thousands of kilometres away

MindTrek Conference 2013 Twitter wall.
Photo copied from Tweet by @lecklin (Tuomas Lecklin)
I have tested use of Twitter at conferences with my students at some occasions. Some students love it. Some students hate it. Some students enjoy following the stream, but find it very hard to follow the conference producing simultaneously notes for Twitter.

If you want to have a look on how hash-tags worked at last European Youth Award (EYA) festival check this.

And here's one example how to utilize Twitter feed: I have on many occasion composed blog posts using the Twitter feed of my students. Here is an example from EYA 2012.

Engage the experts
Apple founder Steve Wozniak interacting on-line with
MindTrek 2013 participants.
Many professonals are active Twitter users, and some of them like to interact and share. You loose nothing by giving a try asking the experts. The example here Woz replying to @Lecklin is from an arranged situation, where Stewe Wozniak had promised to answer questions, but I've seen other situations where my students have asked and the expert replied on Twitter.

TAMK Media student Tuomas Lecklin was very happy Steve Wozniak answered the question he made on Twitter on-line. You can see the six minute interaction on YouTube.

To collect data for our second research project
Our second research project studies the use of social media by #eurovision song contest fan communities, contestants, record labels and television broadcasters around Europe. Twitter is one of the main sources of research materials for the study.

The brief of the research project will be on this blog tomorrow.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google?
4. A massive database
5. Teleportation machine and collaborative notebook (This story)

Thursday 10 April 2014

Lesson 6 Microblogging part 4: A massive database

One of the very first social media services I used was del.icio.us (now delicious.com), the social bookmarking service, priceless in large research projects.
Twitter is similar but applied to tweets. By looking for the most popular hash-tags of the topics you are interested in you possess a data library without limits. And you can initiate valuable banks of information by creating and sharing your own hash-tags.

A very basic but illustrative example of Twitter data usage is Tweetping:
Screenshot (partial) of Tweetping. The application shows you world
tweets in real-time with lots of data. 
F-bomb is another simple example of how you can visualise Twitter data: it just shows in real-time all tweets on earth containing the F-word.

Here you can follow where and when "Happy New Year" was tweeted.

Twitter-data and your Eurovision research project
The examples above are amusing. But the Twitter feed can be used for very ambitious projects.
The links below give you an idea how Twitter data has been used to analyse Eurovision and it’s audiences. Twitter analysts knew in advance that Laureen would be the winner in 2012.

Measuring the popularity of the contestants in the Eurovision Song Contest using Twitter  (2012)
Forecasting of Events by Tweet Data Mining (2013)
Twitter as a Technology for Audiencing and Fandom: The #Eurovision Phenomenon 
Eurovision Song Contest 2011 – tweets visualized
Eurovision and Twitter - #Eurovision the ultimate in social TV? (2009)

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google?
4. A massive database (This story)
5. Teleportation machine and collaborative notebook (upcoming)


Wednesday 9 April 2014

Lesson 6 Microblogging part 3: Twitter better search engine than Google?

Would it be a good idea to use Twitter as your main search engine?
Not really. But if you want to follow the current discussion about some topic you find the Google search engine pretty useless. Twitter again brings you the most recent arguments and news on the floor.
You can see the difference on the screenshots below. Google is powerful if you want to know about Motion Graphics in general. But if you want to know what is happening right now around Motion Graphics, Twitter is the service to use.


Google (above) gives you 50M links - too many to find fresh discussions. Twitter (below) shows the jobs available, takes you to the conferences running right now and lists the most recent industry news.


So services like Google and Twitter are both better search tools the same way bikes and trains are both more useful in satisfying specific transportation needs. You just have to identify the right tool for the job.
|||
Also please note that the Twitter search offers two handy options not introduced in Part 2 of this lesson:
All people/People you follow The latter is very handy if you remember one of the persons you follow (or yourself) has tweeted something important on the topic but you don't remember who and/or when. (Maybe you have not faced this problem yet, but don't worry; you will start forgetting things sooner or later.)
Everywhere/Near you gives you the option of searching globally or in your neighbourhood.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google? (this story)
4. A massive database (upcoming)
5. Teleportation machine and collaborative notebook (upcoming)

Tuesday 8 April 2014

Lesson 6 Microblogging part 2: A specific news channel

To be honest, for many years I did not understand the value of Twitter. But in August 2010 I was in big trouble -  then Twitter came and helped me out showing what a useful service it can be.

I was in the deep woods of eastern Finland. Can you believe there are areas in Finland with no Internet? Not even with a mobile data modem? Yes, there are such areas, even entire villages without the Internet.

Normally I can survive some time without the Net, but now Hull City had a very important game, and I just had to be able to follow the match in real time. But no chance to listen to Radio BBC Humberside match commentary over the Net in Möhkö, Ilomantsi.

Möhkö is the most eastern spot of continental EU.
(Funny that Finland, the most eastern part of EU
is said to belong to Western Europe)
In my desperation I had to try any means, so I tested Twitter over SMS. The hashtag to follow Hull City news is #hcafc. I followed the Twitter stream created by a number of Hull City friends at the stadium and I could imagine I was there with them watching the game.

Amazing. Fantastic! Spectacular!! 
Now I understood the genius of a service like Twitter: from the magnitude of streams on the Net, from the babel of billion voices I could filter only the most valuable for me at the moment.

I could create my own news channel which focused on the one and only important news stream for the moment.

Searches with or without #, saving and choosing what to see


Above you can see results of a search I made with hash tag and the search term; #eurovision. The result is a list of entries where the user has printed the # before the search term thus highlighting the importance of Eurovision in her/his tweet.

Note that you can choose between seeing all tweets or only the most important ones, and that Twitter offers you the option of saving the search.


The search above is made without the #. You can see that the result shows all tweets containing the word "eurovision", with or without the hash tag. What do you think: can it be useful to know and utilize the difference?

Other search options

Below you can find the result of another topical search this morning:


On the left side of the picture please find advanced search options:

  • Everything is the basic search showing all tweets.
  • People restricts the search to entries made by users having "ebola" in their name or user name.
  • Photos show only a list of photos attached/linked to "ebola" tweets.
  • Videos show only a list of videos attached/linked to search term tweets.
  • News shows tweets about the topic by news services.
  • Advanced search enables more search options like countries, languages, time etc.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #) (this story)
3. A better search engine than Google? (upcoming)
4. A massive database (upcoming)
5. Teleportation machine and collaborative notebook (upcoming)

Monday 7 April 2014

Lesson 6 Microblogging part 1: General news channel

On this course we use micro-blogging to collect and share data, then process the data hoping to again learn something. The service we use is Twitter, which allows the user to share posts of length up to 140 characters.

Twitter is the Swiss army knife of Social Media and the net — you could use it to replace your email and all the social media services you use. You would not get all the special functions -  only the basic features. But then again Twitter is more.

Just to give some ideas about the ways to use Twitter I give five examples in this lesson which will be posted in five parts this week.

1. A general news channel
To be an active Twitter user you don't have to tweet at all. But you can use Twitter or similar services to keep yourself updated about whatever you are interested in. To have a general news service of what is happening you just choose some news media to follow.

For most of my life newspapers and television were my main source of news. For some years I learned most of the breaking news through Facebook. Now Twitter seems to have become my main source of news, followed by radio (the real radio!). Whatever media you follow, be sure to include many sources in your news feed, because there are no objective media, they all have an agenda to serve.

But is not a news story consisting of maximum 140 character too brief and shallow?* Yes, if the story is in that message. But news tweets are most often headlines followed by a link to a story, often with links to more in-depth background articles on the topic.

Twitter lets you create lists for different purposes.
This is my News-list which gives me an excellent
view of the news around the world.

On the picture you see a stream of news you can create on Twitter. (Go to Me/Lists/Create new list)
Here are some lists of mine you can view to get the idea:
News
Football
TAMK international media programme students

The best things about lists:
If you follow on Twitter all users you might be interested in you will find yourself in trouble; the feed is so intense you would not have time for anything else than reading your Twitter feed.

Designing lists solves this problem, here's an example: @ftransfers (footballtransfers) and @premierleague (English Premier League) are most relevant Twitter accounts for a football enthusiast like me, but they are so active they occupied a too dominant role in my Twitter feed.

My solution: I stopped being a follower of them but kept them on my Football list; and on Saturday afternoons when nothing else than football matters, I follow only my Twitter Football channel.


* And short stories are not necessarily shallow. It is told Ernest Hemingway considered this six word story one of his best works: “For sale: Baby shoes. Never worn.”

The lesson about Twitter, parts 1-5:
1. A general news channel (lists)
2. A specific news channel (hash tags)
3. A better search engine than Google?
4. A massive database
5. Teleportation machine and collaborative notebook