Page 2,918«..1020..2,9172,9182,9192,920..2,9302,940..»

Governments and Organizations Can’t Ignore Threats Posed by Disinformation – Infosecurity Magazine

Disinformation is undoubtedly on more peoples radars. But just because we know more about it doesnt mean we are better prepared to face the challenge it is posing.

With normal cyber-attacks, governments and organizations are often targeted directly. Disinformation is different. Instead of attacking core infrastructure, bad actors or nation states attack the population by attempting to skew their beliefs.

Disinformation, a form of misinformation that is createdspecificallyto manipulate or mislead people, is becoming more prevalent mainly because its easy to create and disperse. The tools behind deepfakes and malicious botshave been democratized, creation can now be automated and disinformation-as-a-service has emerged.

The threat of disinformation has two key components. Nation states and bad actors use it to discredit governments and organizations, and target employees to infiltrate businesses from the inside.

In the UK, experts recently told a House of Lords inquiry that upcoming legislation should force internet companies to provide real-time information on disinformation. While CIOs cannot tackle this problem alone, they can take some steps to mitigate the risk.

Retaining Credibility

Nation states and bad actors can harm governments and organizations without targeting them directly utilizing a cyber-attack. For instance, they could impact the number of coronavirus vaccines administered by the National Health Service (NHS) by using disinformation to sow distrust about vaccine effectiveness or safety. Late last year, the media reported that hackers tried to break into the systems of researchers at AstraZeneca and the University of Oxford. In response, the National Cyber Security Centre (NCSC) stated that it was working to protect the UKs most critical assets, the health sector and crucial vaccine research and development against threats.

Its hard to control how disinformation spreads, but awareness campaigns can be run to counter the threat of disinformation, while also creating certified FAQs and resource pages.

In November 2020, the UK government and social media platforms agreed a package of measures to reduce vaccine disinformation. This includes ensuring a timely response to disinformation content flagged to platforms and joining new policy forums to prepare for future threats. In March 2021, the government also launched a social media campaign to tackle false vaccine information shared amongst ethnic minority communities.

While CIOs alone cannot regain control of information in the internet age, governments can consistently remind people that they represent a reputable source and can be diligent in only driving citizens tootherreputable sources. Governments and departments may even look to more traditional efforts, like marketing, in order to disseminate verified information.

Educating and Protecting Employees

But what does this have to do with a cybersecurity company? Some types of disinformation can lead to insider threats. Social media and other sources of inaccurate information can radicalize employees, who may feel compelled to steal sensitive data or IP. For example, activist group QAnon left breadcrumbs of secrets peppered with pledges and pro-Trump themes on message board 4chan.

Just as disinformation is now for sale, insider-threat-as-a-service also exists. While bad actors and nation states formerly attempted to bribe and extort their way to sensitive information, they can now either serve disinformation to existing employees, or ultimately become employees themselves.

To prepare for the former, organizations and governments need to implement more disinformation education and training programs. Employees should be required to take training to recognize disinformation and understand the techniques that can be used to skew the publics common belief system, the use of verifiable information fused with false information to alter narratives and how to discredit reliable sources. As this relates directly to insider threats, by helping employees validate sources, organizations are protecting their data in the long run.

Additionally, in order to combat both types of insider threat, organizations and governments must be adept at continuous monitoring of user behavior. By having a baseline of normal user behavior, IT teams can determine if a radicalized employee is attempting to hoard data or access restricted information. There is simply no way to completely eliminate the threat of disinformation and malicious insiders. Thus, IT teams must put behavioral analytics in place to quickly identify and respond to potentially dangerous user behavior.

The Bottom Line

The tough reality is that, in an age of social media, there is no silver bullet to combat this real and growing threat.Everyonemust be diligent about questioning what they see online, rather than simply taking it at face value and internalizing it as facts. IT professionals in governments and organizations should be most concerned about disinformation undermining their own credibility and potentially turning their own employees against them.

Awareness is crucial to combating disinformation, but it should be supplemented by behavioral analytics. CIOs should proceed as if disinformation is already impacting both their employees and citizens because it is. This is an all-hands-on-deck issue and its time to combat the threat of disinformation today.

Here is the original post:
Governments and Organizations Can't Ignore Threats Posed by Disinformation - Infosecurity Magazine

Read More..

Another COVID-19 side-effect: Booming business on dark web – WRAL.com

By Cullen Browder, WRAL anchor/reporter

Raleigh, N.C. The recent ransomware attack on the Colonial Pipeline has raised new concerns about cybersecurity.

Cyberattacks have grown during the coronavirus pandemic, and sites on the dark web are thriving with information and good obtained through those hacks, according to security experts.

"Theyve got everything from bank logins, credit cards, corporate intelligence," says Neal Bridges, a cybersecurity expert and chief content officer for Cary-based INE. "There are quite a few known dark net marketplace websites that sell anything from drugs, guns, fake IDs, passports, credit card numbers, personal identifiable information."

Most people surf the surface web, which accounts for only 4 percent of the internet. The deep web, which includes protected sites for medical and legal records, accounts for about 90 percent. The remainder is the dark web and its illicit activities.

Using a special browser to hide his identity and navigate the dark web, Bridges searched "Carolina" on one site and found plenty of hits:

"Theres a database leak from the NorthCarolina.gov website," he said,

The majority of the personal information on the dark net was stolen through hacking or email scams, he said.

Simon Migliano, who researches sales trends on the dark web, said regardless of how the information is obtained, business has been booming during the pandemic.

"Weve probably seen some of the most interesting movement over the past couple of years in the last 12 months," he said. "What I would say is since the pandemic theres been a lot more listings."

Migliano attributed the increase to lockdowns that had more people at home spending more time on the internet buying more services and goods to survive the isolation.

"Were seeing a lot more lifestyle brand accounts for sale on the dark web that weve never seen before," he said. "The users on many of these accounts you're finding on the dark web now, like Peloton, may not have had a lot of online accounts before but are being forced to use more online accounts because theyre stuck in their homes."

Among the pandemic-fueled items found by Migliano, Instacart account information going for more than $22, Peloton accounts at almost $18, Drizly, the alcohol delivery service, and Amazon Prime Video at just above $13 per account. None was on the hot list in 2019, he noted.

"Theyre fresh blood, so to speak," he said, adding that the new accounts contain the most recent email addresses and passwords used by consumers.

Debit and credit cards, as well as bank information, still garner top dollar on the dark web. But it takes only one username and password for a cyber criminal to hit the jackpot. They can take that combination and run it through programs that submit it to hundreds, if not thousands, of other businesses.

Making it a volume business lets criminals keep their prices low enough that law enforcement is less likely to get involved.

"The risk/reward factor for hackers is definitely in favor of the hackers," Bridges said.

Both Bridges and Migliano urged people to use password managers and two-factor authentication to protect their account and personal information and to limit the potential damage if any of it does end up in the wrong hands.

"You have to be more diligent than what youre used to right now in protecting your personal information, your financial information and just everything about your digital life," Bridges said.

Original post:
Another COVID-19 side-effect: Booming business on dark web - WRAL.com

Read More..

Department of Labors Cybersecurity Guidance for Benefit Plans Signals Increased Scrutiny – JD Supra

On April 14, 2021, the Department of Labor (DOL) issued its first set of guidance documents related to the cybersecurity of retirement benefit plans covered by the Employee Retirement Income Security Act (ERISA). The three-part guidance is aimed at various stakeholdersplan fiduciaries, service providers, plan participants and beneficiariesand provides cybersecurity expectations for plan fiduciaries and best practices for their service providers.

Cybersecurity has become an area of critical importance to plan sponsors and administrators of employee benefit plans, as well as their service providers, as they increasingly rely on the Internet and IT systems to administer those plans. In a February 2021 Government Accountability Office (GAO) Report, the GAO, an independent and non-partisan U.S. legislative agency that monitors and audits government spending and operations, highlighted the significant cybersecurity risks to benefit plans and called on the DOL to clarify responsibilities for fiduciaries and provide guidance related to minimum cybersecurity expectations. Although DOLs recent guidance is sub-regulatory guidance, which does not have the authority of federal agency regulations under the Administrative Procedure Act (APA), the guidance presents DOLs first official action focused on mitigating the significant cybersecurity risks to participant data and plan assets.

DOLs three pieces of cybersecurity guidance target different audiences and emphasize the importance of each stakeholders role in preventing fraud and loss. The following is a brief summary of each guidance document.

DOLs guidance makes clear the protection of participant data and plan assets from cybercriminals is a critical consideration for all benefit plan stakeholders. ERISA establishes minimum standards and requirements intended to protect plan participants and beneficiaries in private sector benefit plans and requires plan fiduciaries to act prudently when administering plans. But ERISA regulations are silent on how plan constituents should comply with these requirements. Prior to issuing its guidance, DOL had not clarified its view as to whether plan administrators were responsible for mitigating cybersecurity risks. The recent literature makes clear that in DOLs view, retirement plan fiduciaries are obligated to ensure the proper mitigation of cybersecurity risks, and the guidance provides helpful data points for plan record-keepers and service providers to protect plan data.

In light of DOLs guidance, plan sponsors and administrators that handle data management in-house that have yet to develop a formal cybersecurity program should do so now, and those with cybersecurity programs currently in effect should re-evaluate those programs to ensure they align with DOLs suggested best practices. Plan sponsors and administrators should also revisit their contractual engagements with service providers to ensure they have adopted a well-documented cybersecurity program that offers adequate protections in the event of a breach. Although the guidance is framed as tips and best practices and currently has no enforcement mechanism, it signals the DOLs heightened focus on cybersecurity in light of more frequent attacks and increasingly sophisticated breach techniques. The guidance specifically addresses retirement plans, but fiduciaries of health and welfare plans are subject to the same fiduciary responsibilities under ERISA. Stakeholders should evaluate their cybersecurity practices and policies and implement the DOLs best practices where possible to ensure their benefit plans do not fall victim to data compromise.

See original here:
Department of Labors Cybersecurity Guidance for Benefit Plans Signals Increased Scrutiny - JD Supra

Read More..

Cyber crime and hacking law to be formally reviewed, Priti Patel announces – iNews

The law designed to prevent malicious hackers from accessing personal information and other types of cyber crimes will be formally reviewed to ensure it is fit for purpose, Home Secretary Priti Patel has announced.

The Computer Misuse Act was first introduced in 1990 to prohibit unauthorised access to computer material and has been revised several times to account for technological developments, including making the supply or owning of hacking tools illegal and acts that could aid cyber warfare.

Academics, law enforcement agencies and cyber industry experts will be called to provide information to ensure the Act is fit for purpose and up to date, Ms Patel said in a speech made at the annual CyberUK conference.

The freshest exclusives and sharpest analysis, curated for your inbox

It is critical that government has all the right levers available to it to ensure that those who commit criminal acts in the cyberspace are effectively investigated by law enforcement and prosecuted by our criminal justice system, including those perpetrating the most heinous and appalling crimes against children and those committing serious fraud, she said.

As part of ensuring that we have the right tools and mechanisms to detect, disrupt, and deter our adversaries. I believe now is the right time to undertake a formal review of the Computer Misuse Act.

Cyber security experts have long criticised the Act as being out of touch, arguing that it was created when internet use was restricted to less than one per cent of the UK population and before the modern concept of cyber security existed.

CyberUp, a campaign group formed to push for reform of the Act, has called it in its current form hopelessly outdated and legally ambiguous, claiming it prevents security professionals from researching cyber threats for fear of prosecution.

Ollie Whitehouse, chief technical officer of IT security firm NCC Group and spokesperson for the CyberUp Campaign, said the group hoped the review would highlight the Acts current shortcomings and lead to sensible reforms that will keep protecting the UK from an evolving landscape of cyber threats.

This law written in 1990 didnt foresee the birth of the cyber security profession, and therefore leaves ethical cyber security researchers unclear as to whether or not they will be prosecuted simply for doing their jobs. The result is a chilling effect on the cyber security industry, leaving the UK less safe from cyber criminals, he said.

This is a long overdue step for a piece of legislation that simply hasnt kept pace with changes in technology.

The National Cyber Security Centre took down 700,595 malicious online campaignsduring 2020, 15 times more than in 2019 as criminals sought to take advantage of people during the pandemic.

The Centre also observed an increased in hacking and phishing attempts across the world, it announced in its fourth annual report.

View original post here:
Cyber crime and hacking law to be formally reviewed, Priti Patel announces - iNews

Read More..

How To Choose And Set Up A VPN – Forbes

A VPN, or virtual private network, allows you to safely browse the web by encrypting your data and hiding your IP address, making it seem as though you are browsing from another location entirely.

There are numerous reasons to use a VPN, including data privacy, security when working remotely and the ability to access geographically-restricted content. Dont let their reputation intimidate you. With a little know-how, you can choose and set up a VPN painlessly.

Not all VPNs are created equally. Heres how to pick one thats a good fit for you.

You want a VPN that accommodates the types of devices you want coveredyour phone, laptop and smart tvas well as the amount of devices you want covered.Most premium services offer about five simultaneously connected devices under a single plan. You should attempt to connect all devices within your network to a VPN, in particular those you plan on using on public Wi-Fi networks.

Ideally the VPN you choose will offer fast speeds, multi-level encryption and access to VPN servers in multiple locations. Your VPN provider shouldnt log or collect your data, either. The point of a VPN is privacy.

A full-coverage, pay-as-you-go plan with the features outlined above will cost approximately 5 to 10 a month. If you buy a full year or more in advance, those prices will go down. However, we suggest trying out a VPN before buying a full year plan, checking to make sure that the speeds and features of that particular service work for you.

While you may be tempted to use a free VPN service, you unfortunately get what you pay for. Free VPN services need to recoup their operating costs and often do so by selling user data, thereby removing privacy benefits. There are a few legitimate free services but most are trial versions of paid VPNs with less features or time-limited service. If you want to get serious about your internet security, a paid model is best.

While you may know your feature and pricing needs, you can still get lost in the numerous VPN offerings online. To figure out what each VPN offers and which services are recommended by security experts, lean on trusted advice. We offer a guide, The Best VPNs in 2021, that breaks down costs and features of different VPN apps and the pros and cons of each service. You can use guides like these to do the tough brand research for you, so you can start browsing securely quicker.

Weve compiled a list of what we think are the best VPNs for 2021

If youre setting up a VPN to browse the internet while at homea good step for protecting your data from your internet service provideryou can set-up through your Wi-Fi router and protect all devices that are on your home network at once. However, if youre hoping to get a VPN to protect your data during public browsing and on-the-go usage of your laptop or smartphone, youll need VPN software.

The simplest way to set up a VPN is to download an app of your choice via your internet browser or smart devices app store, then let it set up itself. Most VPN apps will automatically configure on your devices after downloading, making setup quick and easy for anyone.

However, weve also outlined the steps for manual setup for your MacOS, Windows, Android and iOS devices below.

Once youve chosen and installed your VPN, you may wonder when to use it. Ideally, you should try and connect to your VPN whenever possible.

On home networks, a VPN will protect your IP address and internet browsing activity by hiding your identity from your ISP; from the apps and sites you visit; and from the companies that your ISP is selling your data to. Your online activity wont be fully obscured but your identity (via your IP address) will be. A VPN at home isnt a full-proof measure for full anonymity, but it will provide a base level of data security.

On external Wi-Fi networks, a VPN will protect you from internet strangers, encrypting your data and your identity. Whether connecting to Wi-Fi at Starbucks or your airport, a VPN can help keep your data safe. This VPN usage is more critical than at home, as public Wi-Fi is less secure and can easily enable data theft and criminal activity.

That said, sometimes slow operating speeds and app connectivity issues make browsing on your VPN difficult. In cases such as these, its OK to continue browsing. However, you should recognize that your data and activities are less protected than they would be under a VPN.

In public, this means it would be best not to do any particularly sensitive online activities such as banking or dealing with confidential documents. At home, this means recognizing that your ISP can connect your online activity with your real IP address.

Weve compiled a list of what we think are the best VPNs for 2021

VPNs provide data security, obscuring your data and identity from ISPs, internet snoops, companies and government agencies alike. In a world where many activities are done online such as shopping or banking, a VPN provides peace of mind.

While you may be tempted to use a free service, few offer the full data-privacy and malware-protection of paid services. Many free services sell their user data thereby diminishing the greatest value of VPNs: security.

Not always. Most VPN apps offer easy installation processes that automatically add themselves to your phone or computer. Manual installation is easy, but automatic installation is even easier.

Yes, like any software, VPNs are susceptible to hacking. They arent foolproof security measures. VPN companies themselves have been the target of massive hacks. The more information the VPN company stores on you, the more susceptible you are to data breaches.

Read more:
How To Choose And Set Up A VPN - Forbes

Read More..

Why Nigerian small businesses aren’t using the full power of social media – The Conversation CA

Around the world, the use of social media continues to grow and to influence commerce. It offers great benefits for marketing businesses.

African businesses, too, could gain from the features and popularity of these platforms, though social media use varies widely between regions of the continent. The estimates for 2021 are that 45% of the population in northern Africa use social media, 8% in central Africa, 10% in eastern Africa, 16% in western Africa and 41% in southern Africa.

Facebook is the most popular platform in Africa, with 58.74% of social media users. Its followed by YouTube with 23.01% of users and Twitter with 11.75% of users.

The internet economy which refers to businesses performed through the worldwide web or internet markets is estimated to contribute close to $115 billion or about 4.5% of the continents total gross domestic product. It is projected to reach $180 billion or 5.2% of GDP by 2025 and $712 billion by 2050.

Some of the reasons for using social media in business relate to its low cost, higher level of communication efficiency and a shift towards a consumer driven environment. But the level of interest in Africa, especially among small scale business owners, is less well understood and evidence is relatively scarce.

Small and medium sized businesses play an important role in the economy of Africa. More than 90% of businesses are in this sector, which employs close to 60% of the continents workers.

In a study in southwest Nigeria, I explored the experiences of small scale craft workers using social media platforms for business. These business owners spoke about the benefits, risks and obstacles involved in using social media. They shed light on what gaps need to be filled before the full potential of social media in commerce can be achieved in Nigeria.

I chose 170 craft workers, including dressmakers, goldsmiths, interior decorators, caterers, hair dressers and barbers in the city of Ado Ekiti. Through questionnaires and interviews I sought to gauge their understanding and perception of social media. Over half (55.6%) of the respondents were women; 68% were between the ages of 20 and 29; and 54.1% had tertiary education.

Asked about which social media they were comfortable with, 46% named Facebook, 27.8% WhatsApp, 16.7% Twitter and 9.5% BlackBerry messenger.

Respondents said social media was relevant to business performance. They believed it had improved their business sales and enabled them to communicate with clients. But they felt that it would not improve their business performance on its own. And the number of respondents who actually used it for business purposes was small. They tended to use it for advertising but not for transacting business. While many of the respondents used the platforms when they first started their business, maintaining the tempo became difficult.

Recounting the benefits of using the platforms, most respondents claimed they had met new clients far away from their immediate environment and they had been able to showcase their products online, thus saving the cost of physical showrooms for marketing their wares.

Some of the participants did not see a use for the platforms beyond showing pictures of what they made or did. And there was a lack of consistency in the use of the platforms respondents stopped using them or used them only once in a while or when clients asked to transact that way.

One participant mentioned the risk of online fraud. Others said social media was expensive, unsafe and restrictive due to connectivity issues. Connectivity issues refer to the ability to get quality and fast internet for business purposes. In the localities of these entrepreneurs, internet speed and quality were bad. Transacting business through social media platforms thus become challenging. Many felt the policy makers and others had not done enough to create a conducive atmosphere for using social media in business transactions.

Small business owners in the study appeared to be getting little from what the digital economy has to offer. Connectivity issues and maintenance costs, limited understanding of the use of social media for business growth and internet security all restricted the use of platforms among the study participants. These issues put together show the gaps that government and others need to fill to provide the infrastructure for small scale entrepreneurs in Nigeria.

Training and skill acquisition programmes at all levels are essential to impart the full value of social media in business to users.

The issue of internet security needs proper attention.

Service providers may need to create cost effective and user friendly services for small business owners.

All hands must therefore be on deck to ensure that the right atmosphere is created for small business owners, who make up a great part of Africas business base.

See the rest here:
Why Nigerian small businesses aren't using the full power of social media - The Conversation CA

Read More..

Zenlayer Raises $50MM in Series C Financing to Boost Its Lead in Edge Cloud Services – Business Wire

LOS ANGELES--(BUSINESS WIRE)--Zenlayer, a leading global edge cloud service provider, announced the closing of its $50 million Series C financing today. The round was led by a group including Anatole Investment and Prospect Avenue Capital, and included existing investor Volcanics Venture. These investors join F&G Venture, NSFOCUS, and Forebright Capital to bring Zenlayers total financing to $90 million since inception.

Zenlayer will allocate the new financing toward enhancing its edge cloud technology and expanding global network coverage.

I am excited to announce that we have successfully raised $50 million in Series C, said Joe Zhu, Zenlayers Founder & CEO. We'll accelerate the development and adoption of our PaaS solutions, and continue to focus on emerging markets, helping our customers to capture the explosive growth of regions like Southeast Asia and South America. This capital will bring us one step closer to realizing our mission of improving digital experiences for every organization and person, anywhere in the world.

With its unique edge cloud offerings, Zenlayer enables organizations to instantly deploy compute closer to end users and accelerate their networks to deliver the best digital experience possible. Today, Zenlayer can help organizations reach over 85% of the worlds internet population in just 25 milliseconds or less. By using Zenlayer's PaaS solutions, organizations can achieve this without deploying any infrastructure.

Zenlayer Highlights include:

George Yang, Chief Investment Officer, Anatole Investment: Zenlayer is an edge cloud technologies leader uniquely positioned to accelerate digital transformation across the world. IT Infrastructure is a critical need for digital enterprises and Zenlayer has demonstrated the immense value companies gain by improving their users digital experience. Were excited to help Zenlayer accelerate their rapid growth and expansion, and continue to innovate edge cloud computing to new heights.

Ming Liao, Founding Partner, Prospect Avenue Capital: Zenlayer has a remarkable competitive edge. Its exponential growth has made Zenlayer an ideal investment target for Prospect Avenue Capital. Zenlayer is positioned to meet the demands of emerging markets in Southeast Asia, South America, and Northern Africa with its global coverage, low latency edge cloud solutions, and strong infrastructure.

Suyang Zhang, Managing Partner, Volcanics Venture: We began our relationship with Zenlayer in 2019 and have observed the strength and contributions of their team and growth potential first-hand. We are excited to participate in this latest round of financing to continue Zenlayers mission of improving digital experiences for everyone in the world through edge cloud services, instantly.

For more information about Zenlayer, please visit http://www.zenlayer.com.

About Zenlayer

Zenlayer (www.zenlayer.com) offers on-demand edge cloud services in over 180 PoPs around the world, with expertise in fast-growing emerging markets like Southeast Asia, India, China, and South America. Businesses utilize Zenlayers global edge cloud platform to instantly improve digital experiences for their users with ultra-low latency and worldwide connectivity on demand.

About Anatole Investment

Anatole Investment Management Limited is an international investment management firm that manages long-term capital for highly sophisticated professional investors and clients globally.

About Prospect Avenue Capital

Prospect Avenue Capital is a growth equity firm with a focus on IT, financial services, technology, and AI-related sectors.

About Volcanics Venture

Volcanics Venture (www.volcanics.com) is committed to identifying, investing in, and serving the most promising companies and outstanding entrepreneurs in internet innovation, intelligent technology, and healthcare industries. Volcanics Venture brings a powerful combination of global perspective and local experience to investment management, striving to provide sustainable value-added services to portfolio companies.

About F&G Venture

F&G Venture (www.fgventure.com/en/index.jsp) is a venture capital fund focused on companies with exponential growth in IT industries, such as IT infrastructure, cloud computing, IoT, SaaS, big data, etc. It also targets high-end manufacturing businesses, including intelligence devices, robots, and drones.

About Forebright Capital

Forebright Capital (www.forebrightcapital.com) is a differentiated institutional-quality multi-stage growth equity fund manager investing in selected sectors including advanced manufacturing, healthcare, and business services. It is committed to partnering with visionary business leaders, providing value added services, and contributing to the long-term growth of outstanding enterprises.

About NSFOCUS

NSFOCUS (www.nsfocus.com) is a network and cyber security provider for telecom carriers, BFSI, enterprises, healthcare, retail, as well as government agencies. It has a proven track record of protecting over 20% of the Fortune 500 companies, including four of the five largest banks, and six of the worlds top ten telecommunications companies.

View post:
Zenlayer Raises $50MM in Series C Financing to Boost Its Lead in Edge Cloud Services - Business Wire

Read More..

New Partnership Allows AACC Students to Earn BA and MS in Computer Science Within 5-Years | Eye On Annapolis – Eye On Annapolis

The 3+1+1 Computer Science Articulation Agreement provides for AACC computer science students to stay an extra year at the community college, take additional courses and transfer 81 credits to UMGC. By following the program pathway map, students can complete the UMGC bachelors degree in computer science in just over one year and, if they so choose, go on to complete one of two UMGC masters degrees in an additional year.

Content Continues Below

Our alliance with Anne Arundel Community College helps to increase access and affordability of a four-year college degree and it also speeds the path to a career in a high-demand field, said Blakely Pomietto, senior vice president and chief academic officer at UMGC. We are proud to work with Anne Arundel Community College to develop creative ways for students to save time and money while achieving their educational goals.

This articulation agreement is an excellent opportunity for our computer science students to continue their education, said Dr. Dawn Lindsay, AACC president. We are proud to work with UMGC to help our students reach their academic goals.

In addition to low in-state tuition rates, UMGC also offers cost savings through its use of digital resources, which have replaced costly publisher textbooks in most courses.

Related

Category: Local News, NEWS, Post To FB

Originally posted here:

New Partnership Allows AACC Students to Earn BA and MS in Computer Science Within 5-Years | Eye On Annapolis - Eye On Annapolis

Read More..

From insightful courses to traveling and teaching, reflecting on Penn’s ‘unending opportunities’ | Penn Today – Penn Today

Reflecting on her time at Penn, senior Hyacinthe Uwizera admits that she does have one regret: not heading downtown after the Eagles won the Super Bowl. I think it's the spirit of the people of Philadelphia, she says about the city shes called home for the past four years. I love that energy and that spirit.

Now, as the senior from Kigali, Rwanda, graduates from the School of Engineering and Applied Science, she is ready to take the skills shes gained from her major in computer science and minor in Africana studies to the next stage of her career. Shell also carry forward a number of memorable experiences gained from unending opportunities available at Penn.

Uwizera, who studied math, physics, and geography in high school, first became interested in engineering after working with Penn students on a solar-powered irrigation system in 2015. This project was part of the Rwanda Gashora program, a service learning initiative and collaborative program between her high school, the Gashora Girls Academy of Science and Technology, and Penn Engineering.After initially enrolling into Penns Electrical and Systems Engineering program, Uwizera later discovered a passion for computer science and decided to switch majors during her sophomore year. When I got here and got the taste of different majors, I took CIS 110, intro to computer science, and I realized that was what I was more interested in, she says. Math and critical thinking are few of the aspects of computer science that had me interested, and before you do a project you dont really have an idea of how to it. But as you start working on it, things start revealing themselves and you learn more as you work. Seeing the end product working is very rewarding.

While reflecting on her favorite computer science courses, Uwizera says that CIS 160 and CIS 121, taught by Rajiv Gandhi, were both memorable for her. CIS 160 is one of the hardest intro CIS classes, but I think its because of how he cared for every student that made me love the subject, stay focused, and do well, she says. Having someone that I looked up to believe in me and push me towards seeing that I can do it, that Im in the right place, helped me to know that I belonged in that field.

This past academic year, Uwizera was able to put all of her computer science skills to use as she completed her senior design project with a team of four students. Their app, Salon-IO, is designed to connect people who provide beauty services to new customers. Some students on campus know how to do braids, eyelashes, or nails, and others need those services, so we wanted something that connects people who dont have physical salons but provide services to people who are interested in those services, she says.

Outside of her computer science major, Uwizera also earned a minor in Africana studies. She initially took courses in this area because of her personal interest and says that completing a minor in this field has been nice to balance out her engineering coursework.

Uwizera says that shes thoroughly enjoyed all of her six Africana studies courses, from learning more about history through the War and Peace in Africa class to understanding the connections between different African language families. This spring, she took Music of Africa and enjoyed learning more about the music and artists she listened to while growing up. Its so interesting knowing where it comes from and how it influenced other places, she says.

In terms of favorites from Africana studies, she says the Fall 2018 Penn Global Seminar Seeing, Hearing, and Encountering South Africa was a highlight. This course looked at post-apartheid South Africa through the lens of history, politics, environment, art, and culture, and Uwizera got to travel to South Africa with her classmates during winter break. Its also the students in that class that made it an even better experience, she says.

Currently, Uwizera is working as a teaching assistant (TA) for CIS 550, one of the courses in the Master of Computer and Information Technology program. She says the experience rekindled her passion for teaching and tutoring and also helped her realize how much one can learn about a topic through teaching. You get to learn more, to see peoples different points of view, and theres the reward of knowing that you help someone, says Uwizera.

In addition to her academic coursework and time spent as a TA, Uwizera was also a member of the New Spirit of Penn gospel choir, the Society for African Internationals at Penn, a Penn World Scholar, and a Benjamin Franklin Scholar.

Before leaving for San Diego to start a new job at Intuit, Uwizera hopes to reconnect with other international friends while they are all still on campus, adding that its the people at Penn who have made these past four years memorable for her.

Another big takeaway from her Penn experience was the opportunity to travel before the pandemic, from working in Australia and Argentina during her freshman year to visiting South Africa her sophomore year. When I came to Penn it was my first time leaving my country, so in these past four years I realized how much I enjoy traveling and going to new places, she says.

Uwizera says that coming to Penn and getting a scholarship to study here completely turned my life 180 degrees from what she expected. And while there were certainly challenging parts of her University experience, theres one big positive that she will definitely take with her as she moves into the next stage of her career: the people, Philadelphia, and the unending opportunities that Ive gotten from Penn.

Read more here:

From insightful courses to traveling and teaching, reflecting on Penn's 'unending opportunities' | Penn Today - Penn Today

Read More..

Op-Ed | The 2020 ACM Turing Award is a step against diversity, equity and inclusion – The Stanford Daily

The Turing Award, dubbed the Nobel Prize of computing, is bestowed upon computer scientists who have demonstrated long-lasting impact and trend-setting technical achievements in computing, and is generally considered a lifetime achievement award. As such, the announcement of the award is a moment of celebration for the whole community. This was different for the 2020 award, announced in March 2021 by the Association for Computing Machinery (ACM) to be shared between Alfred Aho of Columbia University and Jeffrey Ullman of Stanford University.

Within hours of the awards announcement, social media was flooded with concerns by members of the computer science community over the selection. They recognized Jeffrey Ullman as an outspoken opponent of diversity, equity and inclusion over the past decades, arguing that the selection violates ACMs own commitment to diversity and inclusion, listed as one of the four core values of the organization, as well as its declared mission of promoting the highest professional and ethical standards.

The significance of the social and ethical implications of the Turing Award is heightened by the fact that it commemorates the legacy of Alan Turing, who pioneered modern computer science, helped end World War II and faced a great deal of discrimination in his tragic life before dying by suicide. Posthumously, he received an apology from the British Prime Minister and a royal pardon by Queen Elizabeth II.

Soon, many congratulatory notes to Ullman were taken back. Some of the leading figures in the community, including Shafi Goldwasser (past Turing Award laureate and member of the Turing Award committee) expressed concerns in solidarity with the victims of Ullmans discriminatory behavior, joined by others including the Turing Award committee Chair Olga Sorkine-Hornung and Yann LeCun, a recent laureate of the award. Within days, an open letter condemning the selection emerged that quickly amassed over a thousand signatures, including by such influential scientists as fellows of ACM, MacArthur fellows and laureates of the Nevanlinna Prize, Abel Prize and Turing Award itself.

Like many of my peers, I learned much of computer science from Aho and Ullmans excellent textbooks. In fact, the educational contributions of the duo in the form of their textbooks has been included in their award citation. Senior undergraduates at Sharif University in Iran, where I studied, often apply to graduate programs abroad. For us, the leaders in computing were the names on our textbooks, such as Knuth, Sipser, Hopcroft, Aho and Ullman. We thought of them as influential educators, people to look up to and people to seek advice from. Some of us contacted Ullman, and he actually did respond. His words were, however, nothing about graduate school or computer science. They were rants of hate and bigotry against Iranians.

In the mid 2000s, tired of having to respond to emails from Iranians every few weeks, Ullman set up his infamous Answers to All Questions Iranian webpage, which he maintained until late 2020. In this page, he records his views against Iranians and other groups, such as Native Americans. Despite this, he continued to correspond with Iranian students. One such correspondence (as detailed in the above-mentioned open letter) was made public in 2011, causing public outrage and a complaint to Stanford by the National Iranian American Council. In response, according to The Stanford Daily, Stanford dismissed the allegations, saying that there is no plan to discipline Ullman for his statements. In contrast, in 2003, the University of Oxford suspended a professor for sending one email of such nature to a student.

Ullman maintains that Iranian students who are in Iran or have grown up in Iran past the 1979 revolution should not be educated in the US and calls for a blanket ban on admitting them to US schools. He has set a personal policy of wanting nothing to do with them: He wont work with them and he wont advise them, solely based on their national origin. He has also expressed a similar assertion regarding Chinese students, in a Google+ post in 2015 as well as in private correspondence as recently as 2020, though it is unclear if he has gone as far as declaring a ban on that group.

There is no question that Ullman is entitled to his opinions. However, when he turns those opinions to actions and policies against students, a red line has been crossed. At Stanford, national or ethnic origin is an explicitly stated protected category in the universitys non-discrimination policy. Moreover, Stanfords commitment to diversity and inclusion, as stated in 2019, asserts to support all members of the community independent of cultural background, ethnicity, gender identity, or political affiliation. Stanfords Core Policy Statements (Section 4.2.2) considers exclusions for facultys conduct directly related to academic values in reference to the extent of their academic freedom.

Ullman and Stanford argue that he has no involvement in admissions. However, an outspoken and influential senior faculty (who has also chaired the department) can affect a departments climate as a whole. Moreover, in graduate admissions in nearly every US school, despite the existence of an admissions committee, selection is directly influenced by individual faculty members. As a crude heuristic, I looked over the list of 1,074 Ph.D. theses, as of this writing, done at Stanford Computer Science. Among the authors, I notice only 6 Iranian names, only one of whom has done an undergraduate degree in Iran. In contrast, Stanford Electrical Engineering lists 4,731 theses, and among those, I can identify about 176 Iranian names (the contrast gets sharper in recent decades). Of course, that might not prove anything for such a complex issue, but at least signifies a telling gap.

Regardless, for a faculty member to set a unilateral policy of discriminating against a group of students is already an action, one that goes against academic values that they have the duty to uphold. Furthermore, just being subject to Ullmans behavior could have been enough to deter young students from graduate studies altogether. Several computer scientists from Iran are now on the faculty at Stanford. The late Maryam Mirzakhani, a Stanford professor and the only woman so far to be awarded the Fields medal, completed her undergraduate studies in Iran. In Ullmans view, she should have been excluded.

Ullmans controversy is not about freedom of speech, nor politics. It is a purely academic one. It is not about separating the artist from the art. It is about the art itself. At a time when the computing community is struggling to broaden participation, Ullmans egregious actions are a disservice that goes against his own educational contributions for which he received a Turing Award. Factoring this into his overall academic impact, ACMs selection does not seem clear-cut anymore.

ACM first reacted to the controversy by tweeting that Ullmans statements do not reflect the views of ACM. In response to the open letter, ACM released a statement providing answers to precisely the two questions asked on the letter. Fourteen ACM Special Interest Groups released a separate statement expressing commitments to diversity and inclusivity. In summary, ACMs response is that the issue was missed since no complaint against Ullman had been on file with ACM, and that in future ACM will require nomination letters to indicate whether they are aware of any behavior inconsistent with ACM values. This is while ACM could have easily discovered the behavior by a simple web search, and of course nominators would have a conflict of interest to disclose any red flags.

While ACMs response is a positive step and promises long overdue reforms, it is far from sufficient. As time is now judging Stanfords dismissive reaction in 2011, which is partly responsible for todays controversy, it will judge any action ACM takes today. Ullman has had ample opportunity over the years to acknowledge harm and correct his behavior. Unfortunately, his April 2021 interview with San Jose Inside suggests otherwise, concluding that the conversation thus far hasnt swayed the professor.

I hope that, at the very least, ACM takes genuine and measurable steps to prove commitment to its stated values by impactful action and not just words. ACM should, foremost, recognize the damage done to the computing community and directly empathize with the victims of Ullmans actions, rather than strategizing to minimize the impact on the organization. Since Ullmans behavior is directly entangled with the educational impacts that contributed to the award, if ACM does not indeed share his views, the award citation and its public record should at least be amended with a disclaimer to reflect that. ACM should think of more effective reforms such as publicly announcing the nominees in advance and establishing clear mechanisms for rescinding awards in rare cases when relevant misconduct is discovered after the fact.

It is important to ensure that a clear precedent is set today by ACM that would not give a free pass to any future abusers of academic freedom. The computing community, which ACM aims to represent globally (as an international organization), needs to establish equal opportunity for everyone and ACMs selection this year has diminished much of the hard-earned progress. ACM needs to do better and bring back trust and hope to the community.

Mahdi Cheraghchi is a theoretical computer scientist and an Assistant Professor of Computer Science and Engineering at the University of MichiganAnn Arbor. He is a senior member of ACM and IEEE.

The Daily is committed to publishing a diversity of op-eds and letters to the editor. Wed love to hear your thoughts. Email letters to the editor to eic at stanforddaily.com and op-ed submissions to opinions at stanforddaily.com.

Follow The Daily on Facebook, Twitter and Instagram.

Go here to see the original:

Op-Ed | The 2020 ACM Turing Award is a step against diversity, equity and inclusion - The Stanford Daily

Read More..