Information Security | Today at 黑料不打烊 | 黑料不打烊 /u/news Thu, 16 Apr 2026 20:03:42 -0400 en-US hourly 1 New identity management system improves information security and digital access at 黑料不打烊 /u/news/2025/02/14/new-identity-management-system-improves-information-security-and-digital-access-at-elon/ Fri, 14 Feb 2025 17:21:06 +0000 /u/news/?p=1007178 Managing accounts and accessing campus systems is about to get easier. This spring, 黑料不打烊 is introducing a new Digital Identity and Access Management (DIAM) system designed to enhance security, streamline logins and simplify access to essential services for faculty, staff and students. The rollout begins this month in select departments, who have been notified, with broader campus implementation to follow.

A Seamless, Secure Experience

The new DIAM system gives faculty, staff, and students a single, secure way to access university services聽by centralizing account management across digital platforms.

This upgrade makes managing accounts easier while enhancing security to protect personal information and prevent unauthorized access.聽By consolidating identity management, users will have faster, more secure access to the tools and resources they need.

“We don鈥檛 expect anyone to notice any major changes at launch, but this sets the foundation for significant improvements over the next year,” said Alan Allred, information security engineer. “This is just the beginning. We鈥檙e laying the groundwork for a digital experience that鈥檚 smoother and more secure than ever.鈥

Improved Campus Services

This system makes onboarding easier for new students and employees while improving digital access at every stage鈥攚hether you’re a student, employee, retiree or alum. With behind-the-scenes improvements, this upgrade minimizes tech-related issues, making it easier for everyone to work, teach and learn without disruptions.

Additionally, the system strengthens security during transitions, such as when someone moves from student to employee or employee to retiree, ensuring that access is updated appropriately to protect university data. These updates keep 黑料不打烊 aligned with higher education industry standards and best practices for digital security while making everyday interactions with campus technology more seamless.

A Collaborative Effort

The successful launch of the new Identity and Access Management is the result of years of planning and collaboration across multiple departments. 黑料不打烊鈥檚 IT experts, campus administrators and information security specialists worked together to design a system that prioritizes both digital security and ease of access, ensuring a consistent frictionless process for faculty, staff and students.

Looking Ahead

As 黑料不打烊 continues to evolve, the new Identity and Access Management system will be a foundation for future innovations in security, efficiency and ease of access. Soon, new self-service features will make it easier than ever to reset passwords, request guest accounts and manage access independently鈥攑utting more control in the hands of campus users.

In the coming months, more updates will be shared about the specific services being enhanced and how they will improve everyday workflows for faculty, staff and students. After rollout, this system will keep evolving, introducing new tools that strengthen security and make digital access more efficient across the campus.

鈥淭his system is an exciting step forward in our mission to create a more secure, efficient, and user-friendly campus environment,鈥 said Allred. 鈥淚t will empower our community to focus on what matters most鈥攍earning, teaching and research鈥攚hile we handle the technical details behind the scenes.鈥

Departments will receive communication ahead of their transition to ensure faculty and staff are fully prepared for the change. Additional details on timelines, features and improvements will continue to be shared as the project moves forward.

]]>
Information Technology extends聽mandatory聽multi-factor authentication聽initiative to聽all 黑料不打烊聽students聽 /u/news/2021/03/10/information-technology-extends-mandatory-multi-factor-authentication-initiative-to-all-elon-students/ Wed, 10 Mar 2021 13:43:27 +0000 /u/news/?p=852646 This month,聽聽will聽expand聽the聽mandatory multi-factor authentication聽(MFA) enrollment initiative to include students, which follows a successful campus-wide rollout for faculty and staff聽last fall.聽Graduate聽students must enroll in MFA using Duo Security by聽Tuesday, March 23,聽undergraduate students by Monday, April 12 and law students by Wednesday, April 21.

Higher education institutions are often prime targets for cybercriminals. Sophisticated phishing attacks and other hacking innovations constantly look for ways to infiltrate critical systems and steal sensitive information through an organization鈥檚 most vulnerable areas.聽To counter these threats,聽a聽聽showed聽92 percent of U.S.聽institutions聽were聽tracking, planning,聽had聽partially聽or fully聽deployed聽institution-wide MFA on their campuses.

person with a laptop and mobile phone
All 黑料不打烊 undergraduate, graduate and law students must enroll in MFA using Duo Security, which follows the successful campus wide rollout for faculty and staff聽last fall.

At 黑料不打烊, MFA is among a growing list of security聽and awareness measures happening behind the scenes to聽educate the community about increasing threats and聽enhance online safety for all users, on and off campus.聽Adding students to the enrollment initiative is a critical next step, according to Gary Sheehan, 黑料不打烊鈥檚 director of information security.聽Opening enrollment now allows聽students ample time聽to acclimate to the new authentication process before the new school term in the fall, he said.

鈥淓ven for student accounts, password theft is constantly evolving as hackers聽use聽methods like keylogging, phishing and email spoofing聽to gain access,鈥澛燬heehan聽said.聽鈥淢FA enables us to deploy a security strategy that protects our platforms and community, reduces our risk for cyber threats聽and further聽provide protections in such a way that access remains easy for authorized users.鈥

Also聽referred to as two-factor authentication,聽MFA聽adds聽layers of password security to critical university systems聽and聽reduces聽the number of compromised accounts聽by making it difficult聽for unauthorized individuals to log in聽with stolen passwords.

Though you may not realize it, you likely already use MFA when accessing online accounts for banking, credit cards and other services, Sheehan said.

鈥淲hen you access an ATM or use a debit card for purchases you typically need the card (something you have) and a pin number (something you know),鈥 he said. 鈥淲henever a merchant, bank, medical provider or retailer requires you to provide a password or pin, along with something you have to complete a transaction, you are using multi-factor authentication.鈥

At 黑料不打烊, the MFA process involves the use of聽the Duo Security app and聽two or more devices to deliver security tokens that allow聽users to聽access single sign-on services like email, Moodle, LinkedIn Learning and other applications. With Duo Security, tokens are typically communicated聽through聽a聽push to a聽mobile聽device聽or聽call to a landline phone.

鈥淪ince passwords can be compromised and are vulnerable to sharing, adding multi-factor authentication to the login process requires the user to know something (the password) and have something (the token), in order to gain access,鈥 Sheehan said.

All 黑料不打烊 students are encouraged to enroll in MFA before聽the deadlines noted above.聽After聽those dates,聽email, Moodle and other single sign-on services will be inaccessible until MFA enrollment is complete. For help getting started, visit the聽聽in the IT Self-Service Portal Knowledge Base聽or聽.聽If you have questions or need to report an issue, please contact the Technology Service Desk at 336-278-5200.

For additional online safety resources and to sign up for alerts, .聽To stay aware of active cyber-attacks and other threats on campus, Sheehan encourages users to聽sign up for information security alerts.

鈥淵ou are the shield,鈥 he said. 鈥淲e all play an important role in keeping our community safe.鈥

How does Duo Security work?

Watch Duo Security’s video, the Student鈥檚 Guide to Two-Factor/Multi-Factor Authentication (2FA/MFA).
]]>
Information Technology launches multi-factor authentication initiative to enhance password security for 黑料不打烊 faculty, staff /u/news/2020/11/18/information-technology-launches-multi-factor-authentication-initiative-to-enhance-password-security-for-elon-faculty-staff/ Wed, 18 Nov 2020 20:15:40 +0000 /u/news/?p=837047 Today鈥檚 cybersecurity landscape is聽ever-changing.聽Sophisticated phishing attacks and other hacking innovations constantly look for ways to聽infiltrate聽critical聽systems聽and聽steal sensitive聽information聽through an organization鈥檚 most vulnerable areas.

To聽enhance聽online safety聽measures at 黑料不打烊, is implementing a mandatory multi-factor authentication (MFA) initiative. All faculty and staff must enroll in MFA using Duo Security by Dec. 31.

Also referred to as two-factor authentication, MFA will聽add layers of password security to critical university systems and reduce the number of compromised accounts that impact the 黑料不打烊 community. This makes it harder for unauthorized individuals to log in as if they were you.

鈥淧assword theft is constantly evolving as hackers employ methods like keylogging, phishing and email spoofing,鈥 said Gary Sheehan, director of information security. 鈥淥ur goal is to provide protections in such a way that access remains easy for authorized users. MFA enables us to deploy a security strategy that protects our platforms and community, reduces our risk for cyber threats and boosts the flexibility and productivity of our entire workforce.鈥

With this initiative, 黑料不打烊 joins a growing list of campuses nationwide that mandated MFA for faculty and staff. A showed that 92 percent of U.S.-based institutions were either tracking, planning, have partially deployed or deployed institution-wide MFA on their campuses.

Though you may not realize it, you likely already use聽MFA聽when聽accessing聽online accounts for聽banking,聽credit cards聽and other聽services, Sheehan said.

鈥淲hen you access an ATM or use a debit card for purchases you typically need the card (something you have) and a pin number (something you know),鈥 he said. 鈥淲henever a merchant, bank, medical provider or retailer requires you to provide a password or pin, along with something you have to complete a transaction, you are using multi-factor authentication.鈥

At 黑料不打烊, the MFA process involves the use of two or more devices to deliver security tokens that allow access to single sign on services like email, Moodle, LinkedIn Learning and other applications. With Duo Security, tokens are typically communicated to the user via a mobile or landline phone.

鈥淵our information is safer because thieves would need to steal both your password and your MFA token,鈥 Sheehan said. 鈥淪ince passwords can be compromised and are vulnerable to sharing, adding multi-factor authentication to the login process requires the user to know something (the password) and have something (the token).鈥

MFA is only one facet of a broader security strategy to protect data, campus technology resources and the existence of a safe computing environment at 黑料不打烊. Security and compliance are best achieved when they are not implemented using a single point of failure, Sheehan said.

鈥淭hink about how you protect your valuable assets 鈥 by locking doors and windows, adding an alarm system or outdoor motion lights to detect intruders,鈥 he said. 鈥淚n addition to MFA, we have implemented a security awareness program to share safety tips on how to protect data and personal information. We use anti-virus, anti-malware and other controls to protect against harmful email links and websites, and we monitor the environment to ensure sensitive data and information is not accidentally shared with unauthorized users.鈥

To stay aware of active cyber-attacks and other threats on campus, Sheehan encourages users to sign up for information security alerts.

鈥淵ou are the shield,鈥 he said. 鈥淲e all play an important role in keeping our community safe.鈥

As the fall semester draws to a close, faculty and staff are encouraged to聽enroll聽in聽MFA聽ahead of the upcoming holiday break and Dec. 31 deadline. For help getting started, visit the in the IT Self-Service Portal Knowledge Base.

After Dec. 31, email, Moodle and other single sign on services will be inaccessible until MFA enrollment is complete. Please contact the Technology Service Desk at 336-278-5200 if you have questions or need to report an issue. For additional online safety resources and to sign up for alerts, visit the .

]]>
Information Technology goes behind the scenes to introduce staff, decode campus technology /u/news/2019/02/19/information-technology-goes-behind-the-scenes-to-introduce-staff-decode-campus-technology/ Tue, 19 Feb 2019 15:50:00 +0000 /u/news/2019/02/19/information-technology-goes-behind-the-scenes-to-introduce-staff-decode-campus-technology/ Ever wonder what it takes to develop and maintain enterprise software for thousands of 黑料不打烊 users? Ever curious about who leads those efforts?

黑料不打烊’s Office of Information Technology (IT) looks to answer those questions and offer additional insight with the launch of a new video series, 黑料不打烊 IT Decoded, on Feb. 19.

Information Technology launched a new video series, 黑料不打烊 IT Decoded, Feb. 19 on its 黑料不打烊 Technology Blog.
The idea for the series evolved from the desire to introduce IT staff to the 黑料不打烊 community, while also educating users about services, tools and partnerships. Each video features an IT staff member sharing details about themselves, defining their role within the department, and offering insight and tips about technology services, support and security.

黑料不打烊 IT will introduce new episodes monthly on its 黑料不打烊 Technology Blog through April, then again in the fall, with monthly episodes September through November. The online series also will be promoted on social media.

The features Systems Administrator and Acorn Accolade recipient Cassie Lott. 

黑料不打烊’s IT department works collaboratively with the 黑料不打烊 community to provide technology, leadership and support on campus. As the university’s central technology provider, IT supports teaching and learning, administration and research through secure, robust computing.

The office is made up of six departments, which includes the Office of Assistant Vice President for Technology and Chief Information Officer Christopher Waters, Campus Technology Support, Enterprise Solutions, Information Security, Infrastructure, and Teaching and Learning Technologies.

View the series on the , and follow 黑料不打烊 Technology on and for updates.

]]>
Cathy Hubbs, 'What Makes Us Vulnerable to Data Breaches?' – Oct. 4  /u/news/2018/07/17/cathy-hubbs-what-makes-us-vulnerable-to-data-breaches-oct-4/ Tue, 17 Jul 2018 19:55:00 +0000 /u/news/2018/07/17/cathy-hubbs-what-makes-us-vulnerable-to-data-breaches-oct-4/ Thursday, Oct. 4
Cathy Hubbs, “What Makes Us Vulnerable to Data Breaches?”
McKinnon Hall, Moseley Center, 4 p.m.

Cathy Hubbs, chief information security officer at American University, will be a featured speaker as part of National Cyber Security Awareness Month. Her talk will focus on the human behavior side of cyber security data breaches and our role in the age of the Internet of Things (IoT). What makes us vulnerable? How do attackers use the art of persuasion to manipulate us to gain access to our computers and networks?

Hubbs works in the Office of Information Technology at American University, identifying risk sources, planning, developing, implementing and maintaining the University’s information technology security program to safeguard new and existing technologies and services. She contributes to university-wide information security awareness and education programs and is responsible for the development of information security policies, procedures and security standards.

Sponsored by 黑料不打烊 Office of Information Technology

]]>
Finding solutions: Can society conquer the growing scourge of online misinformation? /u/news/2017/10/16/finding-solutions-can-society-conquer-the-growing-scourge-of-online-misinformation/ Mon, 16 Oct 2017 23:05:00 +0000 /u/news/2017/10/16/finding-solutions-can-society-conquer-the-growing-scourge-of-online-misinformation/ The proliferation of misinformation and false narratives online leaves experts uniformly concerned but deeply divided about the future, according to a new study released by Pew Research Center and 黑料不打烊鈥檚 Imagining the Internet Center.

More than 1,100 internet and technology experts responded in the summer of 2017 to a series of questions tied to the following theme: Will trusted methods emerge over the next 10 years to block false narratives and allow the most accurate information to prevail in the overall information ecosystem?

Those responding to the survey were evenly split: 51 percent said the information environment will not improve, while 49 percent expect things to get better. The experts were asked to elaborate on their answers, yielding a wide range of opinions about the threat of misinformation, the prospect for solutions and the most promising strategies to pursue.

鈥淏oth camps of experts share the view that the current environment allows 鈥榝ake news鈥 and weaponized narratives to flourish, but there is nothing resembling consensus about whether this problem can be successfully addressed in the coming decade,鈥 said Lee Rainie, Pew Research Center鈥檚 director of internet and technology research. 鈥淭hey disagree about which side comes out on top in the escalating arms race: those who exploit human vulnerabilities with internet-speed manipulation tactics or those who create accurate information and reliable delivery systems for it.鈥

Report co-author Janna Anderson, director of 黑料不打烊鈥檚 Imagining the Internet Center, noted: 鈥淢any of these experts said that while the digital age has created countless information sources and magnified their potential influence globally, it has simultaneously reduced the influence of traditional news organizations that deliver objective, verified information. They said the information environment can鈥檛 be improved without more well-staffed, financially stable, independent news organizations whose signals are able to rise above the noise of misinformation to create a base of 鈥榗ommon knowledge鈥 for the public. They also urged far more literacy efforts to help people differentiate fact from falsehood.鈥

An analysis of nearly 500 pages of written responses by these experts revealed two optimistic and two pessimistic themes:

  • The information environment will not improve and human nature is to blame.
    • Respondents supporting this theme say humans tend to be selfish, tribal, gullible, convenience seekers. They worry that today鈥檚 powerful information actors have an incentive to keep the status quo. And they think the future will be organized around social divisions, with a segment of population finding high-quality information, while 鈥渃haos will reign鈥 for those who cannot afford or discern reliable information or show no interest in getting it.
  • The information environment will not improve because technology will create new challenges that can鈥檛 or won鈥檛 be countered effectively and at scale.
    • These responses often described the bad actors as having a leg up on those seeking to combat misinformation. They expect that weaponized narratives and false information will be magnified by social media, online filter bubbles, bots and artificial intelligence.
  • The information environment will improve because technology will help label, filter or ban misinformation and thus upgrade the public鈥檚 ability to judge the quality and veracity of content.
    • Those who think there will be improvements predict that algorithmic filters, browsers, apps and plug-ins will diminish the potency and availability of misinformation. They think movements toward fact-checking 聽and 鈥渢rust ratings鈥 will help, too. Some say regulation will also play a part in curbing misinformation.
  • The information environment will improve because people will adjust and make things better.
    • Some of these experts argue that misinformation is nothing new and society has always found ways to lessen its impact. They say as people become more skilled in sorting fact from fiction, the information environment will improve. Some expect crowdsourcing will play a prominent role in verifying facts by blocking those who propagate lies and propaganda. Some also showed support for distributed ledgers (blockchain).

A fifth theme: Experts in both camps who said technology alone can鈥檛 overcome the influence of misinformation urged two strategies to combat it:

  • The public must fund and support the production of objective, accurate information.
  • Efforts must be made to elevate information literacy as a primary goal of education.

Below is a sample of responses from tech experts in this survey:

Tom Rosenstiel, author, director of the American Press Institute and senior fellow at the Brookings Institution: 鈥淲hatever changes platform companies make, and whatever innovations fact checkers and other journalists put in place, those who want to deceive will adapt to them. Misinformation is not like a plumbing problem you fix. It is a social condition, like crime, that you must constantly monitor and adjust to. Since as far back as the era of radio and before, as Winston Churchill said, 鈥楢 lie can go around the world before the truth gets its pants on.鈥欌

Starr Roxanne Hiltz, distinguished professor of information systems and co-author of the visionary 1970s book 鈥溾: 鈥淧eople on systems like Facebook are increasingly forming into 鈥榚cho chambers鈥 of those who think alike. They will keep unfriending those who don鈥檛, and passing on rumors and fake news that agrees with their point of view. When the president of the U.S. frequently attacks the traditional media and anybody who does not agree with his 鈥榓lternative facts,鈥 it is not good news for an uptick in reliable and trustworthy facts circulating in social media.鈥

Jerry Michalski, futurist and founder of REX: 鈥淭he trustworthiness of our information environment will decrease over the next decade because: 1) It is inexpensive and easy for bad actors to act badly; 2) Potential technical solutions based on strong ID and public voting (for example) won鈥檛 quite solve the problem; and 3) real solutions based on actual trusted relationships will take time to evolve 鈥 likely more than a decade.鈥

Nigel Cameron, a technology and futures editor and president of the Center for Policy on Emerging Technologies: 鈥淗uman nature is not EVER going to change (though it may, of course, be manipulated). And the political environment is bad.鈥

Jamais Cascio, distinguished fellow at the Institute for the Future: 鈥淭he power and diversity of very low-cost technologies allowing unsophisticated users to create believable 鈥榓lternative facts鈥 is increasing rapidly. It鈥檚 important to note that the goal of these tools is not necessarily to create consistent and believable alternative facts, but to create plausible levels of doubt in actual facts. The crisis we face about 鈥榯ruth鈥 and reliable facts is predicated less on the ability to get people to believe the *wrong* thing as it is on the ability to get people to *doubt* the right thing.鈥

Richard Lachmann, professor of sociology at the State University of New York at Albany: 鈥淓ven though systems [that] flag unreliable information can and will be developed, internet users have to be willing to take advantage of those warnings. Too many Americans will live in political and social subcultures that will champion false information and encourage use of sites that present such false information.鈥

Scott Spangler, principal data scientist at IBM Watson Health, said technologies now exist to make fake information almost impossible to discern and flag, filter or block: 鈥淢achine learning and sophisticated statistical techniques will be used to accurately simulate real information content and make fake information almost indistinguishable from the real thing.鈥

danah boyd, principal researcher at Microsoft Research and founder of Data & Society: 鈥淲hat鈥檚 at stake right now around information is epistemological in nature. Furthermore, information is a source of power and thus a source of contemporary warfare.鈥

Charlie Firestone, executive director of the Aspen Institute Communications and Society Program: 鈥淚n the future, tagging, labeling, peer recommendations, new literacies (media, digital) and similar methods will enable people to sift through information better to find and rely on factual information. In addition, there will be a reaction to the prevalence of false information so that people are more willing to act to assure their information will be accurate.鈥

Jonathan Grudin, principal design researcher at Microsoft: 鈥淲e were in this position before, when printing presses broke the existing system of information management. A new system emerged and I believe we have the motivation and capability to do it again. It will again involve information channeling more than misinformation suppression; contradictory claims have always existed in print, but have been manageable and often healthy.鈥

John Markoff, retired journalist and former technology reporter at The New York Times: 鈥淚 am extremely skeptical about improvements related to verification without a solution to the challenge of anonymity on the internet. I also don鈥檛 believe there will be a solution to the anonymity problem in the near future.鈥

Alf Rehn, chair of management and organization studies at 脜bo Akademi University: 鈥淏etter algorithms will sort out some of the chaff [and may improve the overall information environment], but at the same time the weaponization of fake news will develop. As strange as it seems, we may enter a time of less, but 鈥榖etter鈥 [more effective] fake news.鈥

Justin Reich, assistant professor of comparative media studies at the Massachusetts Institute of Technology: 鈥淪trategies to label fake news will require algorithmic or crowd-sourced approaches. Purveyors of fake news are quite savvy at reverse engineering and gaming algorithms, and equally adept at mobilizing crowds to apply 鈥榝ake鈥 labels to their positions and 鈥榯rusted鈥 labels to their opponents.鈥

James Schlaffer, an assistant professor of economics at Westfield State University: 鈥淚nformation is curated by people who have taken a step away from the objectivity that was the watchword of journalism. Conflict sells, especially to the opposition party, therefore the opposition news agency will be incentivized to push a narrative and agenda. Any safeguards will appear as a way to further control narrative and propagandize the population.鈥

Paul N. Edwards, Perry Fellow in International Security at Stanford University: 鈥淢any excellent methods will be developed to improve the information environment, but the history of online systems shows that bad actors can and will always find ways around them.鈥

Larry Diamond, senior fellow at the Hoover Institution and the Freeman Spogli Institute (FSI) at Stanford University: 鈥淚 am hopeful that the principal digital information platforms will take creative initiatives to privilege more authoritative and credible sources and to call out and demote information sources that appear to be propaganda and manipulation engines, whether human or robotic. In fact, the companies are already beginning to take steps in this direction.鈥

Irene Wu, adjunct professor of communications, culture and technology at Georgetown University: 鈥淚nformation will improve because people will learn better how to deal with masses of digital information. Right now, many people naively believe what they read on social media. When the television became popular, people also believed everything on TV was true. It鈥檚 how people choose to react and access to information and news that鈥檚 important, not the mechanisms that distribute them.鈥

Mike Roberts, pioneer leader of ICANN and Internet Hall of Fame member: 鈥淭he average man or woman in America today has less knowledge of the underpinnings of his or her daily life than they did 50 or a hundred years ago. There has been a tremendous insertion of complex systems into many aspects of how we live in the decades since World War II, fueled by a tremendous growth in knowledge in general. Even among highly intelligent people, there is a significant growth in personal specialization in order to trim the boundaries of expected expertise to manageable levels. Among educated people, we have learned mechanisms for coping with complexity. We use what we know of statistics and probability to compartment uncertainty. We adopt 鈥榤ost likely鈥 scenarios for events of which we do not have detailed knowledge, and so on. A growing fraction of the population has neither the skills nor the native intelligence to master growing complexity, and in a competitive social environment, obligations to help our fellow humans go unmet.鈥

Susan Etlinger, industry analyst at Altimeter Research: 鈥淭here are two main dynamics at play: One is the increasing sophistication and availability of machine learning algorithms, and the other is human nature. We鈥檝e known since the ancient Greeks and Romans that people are easily persuaded by rhetoric; that hasn鈥檛 changed much in two thousand years. Algorithms weaponize rhetoric, making it easier and faster to influence people on a mass scale. There are many people working on ways to protect the integrity and reliability of information, just as there are cyber security experts who are in a constant arms race with cybercriminals, but to put as much emphasis on 鈥榠nformation鈥 (a public good) as 鈥榙ata鈥 (a personal asset) will require a pretty big cultural shift. I suspect this will play out differently in different parts of the world.鈥

Jim Hendler, professor of computing sciences at the Rensselaer Polytechnic Institute: 鈥淭he information environment will continue to change but the pressures of politics, advertising and stock-return-based capitalism rewards those who find ways to manipulate the system, so it will be a constant battle between those aiming for 鈥榦bjectiveness鈥 and those trying to manipulate the system.鈥

Peter Lunenfeld, a professor of design|media arts at UCLA: 鈥淔or the foreseeable future, the economics of networks and the networks of economics are going to privilege the dissemination of unvetted, unverified and often weaponized information. Where there is a capitalistic incentive to provide content to consumers, and those networks of distribution originate in a huge variety of transnational and even extra-national economies and political systems, the ability to 鈥榗ontrol鈥 veracity will be far outstripped by the capability and willingness to supply any kind of content to any kind of user.鈥

Bill Woodcock, executive director of the Packet Clearing House: 鈥淭here鈥檚 a fundamental conflict between anonymity and control of public speech, and the countries that don鈥檛 value anonymous speech domestically are still free to weaponize it internationally, whereas the countries that do value anonymous speech must make it available to all, [or] else fail to uphold their own principle.鈥

Amber Case, research fellow at Harvard University鈥檚 Berkman Klein Center for Internet & Society, suggested withholding ad revenue until veracity has been established: 鈥淚n order to reduce the spread of fake news, we must deincentivize it financially. If an article bursts into collective consciousness and is later proven to be fake, the sites that control or host that content could refuse to distribute advertising revenue to the entity that created or published it. This would require a system of delayed advertising revenue distribution where ad funds are held until the article is proven as accurate or not. A lot of fake news is created by a few people, and removing their incentive could stop much of the news postings.鈥

Andrea Matwyshyn, a professor of law at Northeastern University who researches innovation and law, particularly information security: 鈥淪oftware liability law will finally begin to evolve. Market makers will increasingly incorporate security quality as a factor relevant to corporate valuation.鈥

is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions.

罢丑别听聽is an initiative of the 黑料不打烊 School of Communications.聽Imagining the Internet explores and provides insights into the impact of Internet evolution. Students, faculty, staff and alumni have surveyed thousands of experts and traveled to cover Internet Governance Forums and Internet Hall of Fame events in Egypt, Greece, Kenya, Switzerland, Germany, Brazil, Lithuania and Mexico.

Major themes on the future of the online information environment

Theme 1: The information environment will not improve: The problem is human nature

  • More people = more problems. The internet鈥檚 continuous growth and accelerating innovation allow more people and artificial intelligence (AI) to create and instantly spread manipulative narratives
  • Humans are by nature selfish, tribal, gullible convenience seekers who put the most trust in that which seems familiar
  • In existing economic, political and social systems, the powerful corporate and government leaders most able to improve the information environment profit most when it is in turmoil
  • Human tendencies and infoglut drive people apart and make it harder for them to agree on 鈥渃ommon knowledge.鈥 That makes healthy debate difficult and destabilizes trust. The fading of news media contributes to the problem
  • A small segment of society will find, use and perhaps pay a premium for information from reliable sources. Outside of this group 鈥渃haos will reign鈥 and a worsening digital divide will develop

Theme 2:聽The information environment will not improve because technology will create new challenges that can鈥檛 or won鈥檛 be countered effectively and at scale

  • Those generally acting for themselves and not the public good have the advantage, and they are likely to stay ahead in the information wars
  • Weaponized narratives and other false content will be magnified by social media, online filter bubbles and AI
  • The most effective tech solutions to misinformation will endanger people鈥檚 dwindling privacy options, and they are likely to limit free speech and remove the ability for people to be anonymous online聽

鈥婽heme 3:聽The information environment will improve because technology will help label, filter or ban misinformation and thus upgrade the public鈥檚 ability to judge the quality and veracity of content

  • Likely tech-based solutions include adjustments to algorithmic filters, browsers, apps and plug-ins and the implementation of 鈥渢rust ratings鈥澛
  • Regulatory remedies could include software liability law, required identities and the unbundling of social networks like Facebook

鈥婽heme 4: The information environment will improve because society will adjust

  • Misinformation has always been with us and people have found ways to lessen its impact. The problems will become more manageable as people become more adept at sorting through material
  • Crowdsourcing will work to highlight verified facts and block those who propagate lies and propaganda. Some also have hopes for distributed ledgers (blockchain)

Theme 5:聽Tech can鈥檛 win the battle. The public must fund and support the production of objective, accurate information. It must also elevate information literacy to be a primary goal of education.

  • Funding and support must be directed to the restoration of a well-fortified, ethical and trusted public press
  • Elevate information literacy: It must become a primary goal at all levels of education
]]>
黑料不打烊 named a 2016 Champion for National Cyber Security Awareness Month /u/news/2016/09/29/elon-named-a-2016-champion-for-national-cyber-security-awareness-month/ Thu, 29 Sep 2016 10:00:00 +0000 /u/news/2016/09/29/elon-named-a-2016-champion-for-national-cyber-security-awareness-month/ National Cyber Security Awareness Month (NCSAM) is a national public awareness campaign that runs throughout the month of October and encourages individuals, businesses, organizations, colleges, universities and government to share the responsibility for protecting their computers and our nation’s critical cybersecurity infrastructure.

黑料不打烊 became a NCSAM champion this year to show its commitment to information security because so much of our information is now online.  Cybersecurity is a global issue that affects all of us and it is our shared responsibility to promote a safe and secure digital world.

Christina Bonds, application developer, led the effort of 黑料不打烊 becoming an NCSAM champion this year with the support of the director of information security, Keith Schoenefeld.  “Participating in and supporting the educational mission of the National Cyber Security Alliance by becoming an NCSAM Champion is just one way Technology at 黑料不打烊 can contribute to 黑料不打烊’s mission.  By helping our faculty, staff, and students understand how to safely navigate an increasingly connected world, we are better able to prepare ‘students to be global citizens and informed leaders motivated by concern for the common good'”, said Schoenefeld.

Valuable tips and information will be shared on 黑料不打烊 Technology’s , on Twitter, and in to promote online safety awareness.  You can also follow the #CyberAware hashtag throughout October. 

What is NCSAM?

Recognized every October, National Cyber Security Awareness Month (NCSAM) was created as a collaborative effort between industries and government to provide digital citizens the resources needed to stay safe and secure online and protect their personal information. 

Coordinated and led by the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS), NCSAM reaches consumers, businesses, corporations, educational institutions and individuals across the globe with information and educational programs centered on practical approaches to cybersecurity. 2016 marks the 13th year of NCSAM.

View the entire list of 2016 NCSAM champions

]]>
Application developer Christina Bonds awarded Acorn Accolade /u/news/2016/05/05/application-developer-christina-bonds-awarded-acorn-accolade-2/ Thu, 05 May 2016 15:30:00 +0000 /u/news/2016/05/05/application-developer-christina-bonds-awarded-acorn-accolade-2/
Christina Bonds accepting the Acorn Accolade award in April. 
Christina Bonds, an application developer in web technology, was selected as the recipient of April’s Acorn Accolade. An instructional and campus technology (I&CT) employee each month receives this award as recognition of his or her exemplary service to 黑料不打烊. In order to be considered for the award, I&CT employees must be recommended by the directors to the assistant vice president for technology.

The Acorn Accolade recognizes Bonds for her pivotal role in developing the 黑料不打烊 Payment Gateway, as well as her continued efforts to promote cybersecurity awareness at 黑料不打烊. See , and the .  

 

]]>