Information Assurance Symposium - 2010 Presentations

Chutima Boonthum, Ph.D - Hampton University

The phrase six degrees of separation was introduced in 1967 by psychologist Stanley Milgram – an average length (or steps) to connect one person to another arbitrary person is about 6 separation steps. As Internet-based communication emerged, a small experiment at Columbia University also found that about 5 – 7 degrees of separation are sufficient to connect any two people through e-mail.  This evolves to the development of Social Network Graphs.  This talk will present the idea of six degrees of separation with the two studies: US mail vs. E-mail.  Procedure (steps) to construct a social network graph and examples of how it can be applied in real world situation will also be discussed.


Anne L. Pierce, Ph.D - Hampton University

Definitions of information assurance for the digital arts and humanities emphasize that it ensures:

  • Information is available when needed, ie. Copyright permissions have been obtainable quickly.
  • Integrity of the information, particularly images, is reliable; resolution is correct and format is usable.
  • Authenticity of information on web sites, particularly social networking sites, can be verified.

Artists must maintain control over their work. However museums, galleries and artists themselves post original work to the web to attract clients for sales and scholars to establish credentials.  Because no system is perfectly secure, artists and arts managers must participate in the development of a system of checks and quality controls that allows an organization to trace access where copyright may be violated. Inspections of all inbound and outbound network activity to identify suspicious patterns may indicate someone is attempting to break into or compromise the artist’s work. This presentation will address the promise and pitfalls of social networking for the Arts.


Claude Turner, Ph.D. - Bowie State University
Qing Yuan, Ed.D. - Garrett College

This article discusses the conflicting goals of satisfying the security and privacy of users personal data versus businesses desire to increase profits and the popularity of their business through liberal sharing of information among users. A social networking site typically consists of a variety of cloud computing applications. In cloud computing, data and applications do not reside on the user's machine, but are accessed remotely through a browser over the Internet. Thus, the user's information or data is controlled by the company that owns the social networking site. One of the main criteria that drives the popularity of a social network site is the ease at which information can be shared among users. Unfortunately, this sharing is not always intended, and sometimes information ends up in the heads of undesirable individuals some of whom could use additional techniques, such as data mining, to find even more sensitive information about a specific user. We explore these concerns, and discuss some of the protection measures.


Laquata Sumter, BS - Albany State College

With the rise of the era of “cloud computing”, concerns about “Internet Security” continue to increase. How will customers of the “cloud” know that their information will be available to them, as well as secure and safe from others? To address this problem we propose the design of a system that will capture the movement of information on the cloud. We will be identifying whether there is a need for some type of security capture device/measure on the cloud, which will allow users to know that their information is secure and safe from threats and attacks.


Chi Ben, - Florida State University

Social networking sites/services (SNS) have been rapidly growing in recent years. However the security problems regarding such services have not been properly handled. Proper awareness and countermeasures of potential dangers that are currently present on SNS are lacking. Recently a series of security issues have been emerging. In this presentation I will discuss the current situation of security issues of SNS and provide insights on possible solutions.


Bessie Willis, MBA - Hampton University
Ruby Mcmullen, President, Twoshuz, llc.

Social Networking sites have influenced the hiring of many across the US. This session will discuss how Social Networking sites are used and misused for recruiting and hiring. Information on how to use these sites is introduced along with reminders of the application of federal and state laws that regulate hiring practices while using these sites.


Click here if you would like to review 2009 presentations.

Contact Information

Dr. Lerone Banks
Department of
Computer Science

E-mail: lerone.banks@hamptonu

Telephone:
757.727.5552

Fax:
757.727.5390