----------------------------------------------------------------------
Capstone Mentors: Protocols and Communication
Guidelines For Internal and External Mentors
HOW TO FIND POSSIBLE MENTORS
The best approach is to cast a very wide net and tap all of your resources at once rather than
exploring one possible lead at a time. Here are some ideas about where to look:
● Ask family members, teachers, classmates, and friends if they know anyone who might
help you.
○ If you can get a referral or introduction to someone through a mutual friend or
acquaintance, it’s often much easier to “get your foot in the door” than if you cold
call or “cold email” them.
○ You sometimes need to follow a “bread crumb trail”, in which one possible
contact leads you to another and then to another.
● Reach out to professionals and experts whose work has inspired you.
● Post what you’re looking for on social media, Reddit, web boards devoted to the topic,
local Meetup groups, etc.
● Visit local businesses and organizations related to your topic.
EMAIL PROTOCOLS AND TEMPLATE
● First a student must share who they want to connect with and the goals and purpose of
the connection with Capstone Teacher and in turn Capstone Coordinator
○ This information will go into a spreadsheet for updating and ensuring that mentor
burnout does not occur
○ The purpose is to determine if the student has done enough research, project
management, and understanding of the area they are working in. This can be a
mentor specific, meaning different mentors could be brought in at different
stages.
● After receiving a go-ahead from the teacher the student crafts an email to the mentor
ccing Capstone teacher and Capstone Coordinator. Student responds within two
business days of return email clarifying next steps (ccing Capstone teacher and
Capstone Coordinator).
○ Intro Email format:
■ Subject: Captures the what and who of the Capstone and student
■ First section: Purpose
● A sentence or two (max) on who the student is and what they are
working on in the context of their senior Capstone, and most
importantly their why behind the Capstone (Heart, Head, Hustle)
■ Second section: Clear Ask
● A sentence that asks the mentor for a meeting or further email
exchange,
○ Set possible times, length, and reinforce the purpose of the
conversation
■ Closing Sentence
● Thanking the mentor for their time and consideration and ending
with a sign off (Mahalo; Warm regards; Cheers; etc.
■ Example:
● [Subject] Insight Around Retail Fashion In Hawai’i For an HPA
High School Senior
● First section:
Aloha e Ane,
My name is Aaron Schorn and for my high school senior Capstone
at HPA I am creating a line of handbags inspired by youth art
[hyperlink to slide deck, website, and/or social media]. As an artist
and budding entrepreneur who is passionate about my home in
Hawai'i, storytelling through fashion and the evolution of Kealopiko
has been a major inspiration for my own Capstone work this year.
● It would be wonderful to connect over the phone in the upcoming
weeks and discuss how you created your brand and design
library. I am free Mondays’ at 8:30 am, Tuesdays’ between 1-3
pm, and Fridays’ between 9-11 am.
● Closing Sentence:
Mahalo for inspiring me and others around the world, and for your
possible time.
Warm regards,
Aaron Schorn
HPA Student
LIABILITY AND PARENT WAIVER FORMS
● Had been working with Erin Morgan, but have now transitioned into working with Mark
Noetzel on a few blanket forms for work with mentors and off campus Capstone work.
Should have documents by February 15.
°Snap chat, facebook, instagram, we chat
Focus on 4 age groups, older people, middle age, millennials, gen x and younger
Explain beginning of capstone, shocking examples, explain how organizations use this info, personal info and demographic, then illegal
Look for quote “If CIA asked for the same information from people that volunteered information to facebook, there would be a mass revolt”
PSA, Video, Articles
To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.
Article
I will combine all my work into an easy to understand article.
I could add selectable sections in my article to that are straightforward and to the point
Revise my draft and polish it
Sharing my project
I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:
Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)
Advertise my PSA on local media platforms (HPA assembly, local programing)
At the end of my PSA and Skit video, I could link my article/blog for extra information.
Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
PSA should be professional, and should have a clean presentation. A serious mindset, tell people the problem, address the effects of the cause, and where to start looking towards for improvement.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Situation -
Recording and finalizing my PSA.
Script - *open to
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.
Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.
CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.
https://www.amazon.com/50-4GB-Flash-Drive-Swivel/dp/B00H7IXA3C 50 usb 90$ + shipping
11/14/19
Capstone: Cyber Security
Dr. Bill
Data Security
Intro/Briefing
Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy. My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online.
Phases
My project will have 4 phases, the first phase would be to gather information of data collection and the effects of data sharing, My second phase would be to clean up my notes and compile them into general areas. Thirdly, I will compile my notes and create 3 formats that I could share my information(PSA, Video, and Articles.) The final step is to find a reliable platforms to distribute my information.
Phases & Milestones
Gathering Information
My information will revolve around types of data being gathered and how, what companies do with your data, effects/risks of data sharing, cold hard facts, and methods to protect your data. The links below are where I gathered my information.
What type of data is gathered
https://www.forbes.com/sites/forbestechcouncil/2019/05/20/15-things-consumer-data-can-do-for-a-company/#496425a54943 Explains the uses for consumer data.
Data gathering methods
https://www.businessnewsdaily.com/10625-businesses-collecting-data.html Data gathering methods
Effects/risks of data sharing
https://www.forbes.com/sites/quora/2017/03/21/why-data-collecting-can-be-dangerous-for-personal-freedom/#514ce5b27ecc A brief article talking about how our private data can be used against us.
Facts
https://www.beautiful.ai/player/-Ltg14mWlXAAeuf_fmW7 My slideshow for examples and facts
Methods of protection
https://en.wikipedia.org/wiki/Information_privacy Explains challenges and solutions to data protection.
Organized notes
These are general information of each group that are easy to understand and provide the most impact to my goal(scare people with the dangers of the internet).
Why gather and What type of data is gathered?
Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. The most crucial information big corporations look for are data that can:
•1. Develop and Uncover Relationships
•2. Explain And Improve Your NPS
•3. Be Invaluable For Customer Service
•4. Generate New Ideas
•5. Predict Consumer Behaviors
•6. Be Currency
•7. Improve Physical Spaces
•8. Help You Infer What You Don’t Know
•9. Be A Great Predictor
•10.Help Consumers
•11. Highlight Consumer Pain
•12. Be A Reflection Of The Company
•13. Be The True Voice Of The Customer
•14. Know Customers Better Than They Know Themselves
Data gathering methods
companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Almost every action you take online will be logged and stored somewhere. Every click, keyboard press, and website you visit is logged somewhere.
Effects/risks of data sharing
Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ active sharing in data allows for many more third-party organizations to access to your personal information, and can result in consumers getting unwanted attention, marketing, scams, and even getting their identity stolen. Some companies have faulty security and can lead to consumer data leaks
Facts and examples
https://rb.gy/49da76 Twitter thread by Dylan Curran showing the data google has collected about you.
A tiny piece of personal data could be used to identify who you are.
About 73% admitted to not reading terms and conditions before downloading a mobile application (K SHARP, internal study 2017 https://www.ksharp.co.uk/personal-impacts-data-sharing )
Methods of protection
Learn information extraction methods (Phishing links, Public Wi-Fi, Surveys, Signing up)
Corporations will also use sneaky ways to gathering data without your knowledge such as cookies that track the websites you visit, even after closing their page; email tracking, which tells them when you opened it, where, and what device you used; tracking your mouse movements, typing, clicks, and social media likes/retweets/shares.
Some actions you can take to stop your information being gathered are: Using temporary emails, filling as little as you can during sign ups, refusing to share your personal info(credit card, social security #,) use a premium vpn that states “no log,” and keeping your passwords/antimalware up to date.
PSA, Video, Articles
To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.
Article
I will combine all my work into an easy to understand article.
I could add selectable sections in my article to that are straightforward and to the point
Revise my draft and polish it
Sharing my project
I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:
Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)
Advertise my PSA on local media platforms (HPA assembly, local programing)
At the end of my PSA and Skit video, I could link my article/blog for extra information.
Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.
PSA, Video, Articles
To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.
Article
I will combine all my work into an easy to understand article.
I could add selectable sections in my article to that are straightforward and to the point
Revise my draft and polish it
Sharing my project
I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:
Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)
Advertise my PSA on local media platforms (HPA assembly, local programing)
At the end of my PSA and Skit video, I could link my article/blog for extra information.
Anson Huang
11/14/19
Capstone: Cyber Security
Dr. Bill
Data Security
Intro/Briefing
Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy. My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online.
Phases
My project will have 4 phases, the first phase would be to gather information of data collection and the effects of data sharing, My second phase would be to clean up my notes and compile them into general areas. Thirdly, I will compile my notes and create 3 formats that I could share my information(PSA, Video, and Articles.) The final step is to find a reliable platforms to distribute my information.
Phases & Milestones
Gathering Information
My information will revolve around types of data being gathered and how, what companies do with your data, effects/risks of data sharing, cold hard facts, and methods to protect your data. The links below are where I gathered my information.
What type of data is gathered
https://www.forbes.com/sites/forbestechcouncil/2019/05/20/15-things-consumer-data-can-do-for-a-company/#496425a54943 Explains the uses for consumer data.
Data gathering methods
https://www.businessnewsdaily.com/10625-businesses-collecting-data.html Data gathering methods
Effects/risks of data sharing
https://www.forbes.com/sites/quora/2017/03/21/why-data-collecting-can-be-dangerous-for-personal-freedom/#514ce5b27ecc A brief article talking about how our private data can be used against us.
Facts
https://www.beautiful.ai/player/-Ltg14mWlXAAeuf_fmW7 My slideshow for examples and facts
Methods of protection
https://en.wikipedia.org/wiki/Information_privacy Explains challenges and solutions to data protection.
Organized notes
These are general information of each group that are easy to understand and provide the most impact to my goal(scare people with the dangers of the internet).
Why gather and What type of data is gathered?
Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. The most crucial information big corporations look for are data that can:
•1. Develop and Uncover Relationships
•2. Explain And Improve Your NPS
•3. Be Invaluable For Customer Service
•4. Generate New Ideas
•5. Predict Consumer Behaviors
•6. Be Currency
•7. Improve Physical Spaces
•8. Help You Infer What You Don’t Know
•9. Be A Great Predictor
•10.Help Consumers
•11. Highlight Consumer Pain
•12. Be A Reflection Of The Company
•13. Be The True Voice Of The Customer
•14. Know Customers Better Than They Know Themselves
Data gathering methods
companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Almost every action you take online will be logged and stored somewhere. Every click, keyboard press, and website you visit is logged somewhere.
Effects/risks of data sharing
Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ active sharing in data allows for many more third-party organizations to access to your personal information, and can result in consumers getting unwanted attention, marketing, scams, and even getting their identity stolen. Some companies have faulty security and can lead to consumer data leaks
Facts and examples
https://rb.gy/49da76 Twitter thread by Dylan Curran showing the data google has collected about you.
A tiny piece of personal data could be used to identify who you are.
About 73% admitted to not reading terms and conditions before downloading a mobile application (K SHARP, internal study 2017 https://www.ksharp.co.uk/personal-impacts-data-sharing )
Methods of protection
Learn information extraction methods (Phishing links, Public Wi-Fi, Surveys, Signing up)
Corporations will also use sneaky ways to gathering data without your knowledge such as cookies that track the websites you visit, even after closing their page; email tracking, which tells them when you opened it, where, and what device you used; tracking your mouse movements, typing, clicks, and social media likes/retweets/shares.
Some actions you can take to stop your information being gathered are: Using temporary emails, filling as little as you can during sign ups, refusing to share your personal info(credit card, social security #,) use a premium vpn that states “no log,” and keeping your passwords/antimalware up to date.
PSA, Video, Articles
To share awareness of this modern age problem, I decided to create 3 informative media that will be easily understood with easy to follow course of actions.
PSA
To create a PSA, I will need to
Study PSA requirements, what to include in my PSAs, and how to persuade my audience to take a favorable action.
Share a relatable situation to my audience, include rational claims and evidence, and create a proper setting/atmosphere.
Recording and finalizing my PSA.
Video
The norm of our modern population is always busy and lacking in free time. To face this challenge, I’ve came up with an idea of an eye catching short skit that will be convenient for viewing during worker’s breaks, lifestyle routine, etc.
I came up with an Idea of a short skit of an exaggerated way companies take your data.
My skit will also need some credibility, so I will turn my evidence and facts to a look-alike professional’s word of advice.
I will record my skit.
Article
I will combine all my work into an easy to understand article.
I could add selectable sections in my article to that are straightforward and to the point
Revise my draft and polish it
Sharing my project
I think sharing my project will be the easiest part. Since my goal is to make an impact at HPA, I could:
Ask to share my video skit on widely used platforms(myHPA, Youtube, Instagram, Facebook, Twitter)
Advertise my PSA on local media platforms (HPA assembly, local programing)
At the end of my PSA and Skit video, I could link my article/blog for extra information.
Misc.
An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
I have already completed most of my note collection/organization and able to start working on my media immediately.
Abstract: I hope to study about how companies gather and use data.
Title: Data exchange.
Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.
Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).
What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online
How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.
Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks
What you used/need?: I will use news websites
Why is it credible or needed?
How are you going to use it/was it used?
Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.
-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.
why do companies want data?
•1. Data Can Develop and Uncover Relationships
•2. Data Can Explain And Improve Your NPS
•3. Data Can Be Invaluable For Customer Service
•4. Data Can Generate New Ideas
•5. Data Can Predict Consumer Behaviors
•6. Data Can Be Currency
•7. Data Can Improve Physical Spaces
•8. Data Can Help You Infer What You Don’t Know
•9. Data Can Be A Great Predictor
•10. Data Can Help Consumers
•11. Data Can Highlight Consumer Pain
•12. Data Can Be A Reflection Of The Company
•13. Data Can Be The True Voice Of The Customer
•14. Data Can Know Customers Better Than They Know Themselves
•15. Data Can Be Overwhelming—Collect Carefully
-cookies.
Cookies are created when you visit a website. They are used to store bits of information about your interactions with the website, which the web server can use later when processing your sessions. They can also be used to track websites you visit, even after closing the original website.
Email tracking is another method. With this, companies don’t just learn that a recipient has opened an email, but also where it was opened and on what device. Over 40% of emails sent around the world are tracked,
Logging in sites using your email may alow them to see your persoanl data, like your email, name, dob, etc.
Another way data companies obtain your data is through website registrations. More and more websites now expect you to register to access the website’s content. Some websites appear to have been created largely for the purposes of obtaining data.
Another major source of data for data companies are surveys – this was at the heart of the 2018 Cambridge Analytica scandal. This includes things such as personality quizzes, online games and tests, and more. When a company asks you to rate a product, your opinion may benefit many other companies.
-data mining
data mining - the practice of examining large databases in order to generate new information.
•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.
•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.
•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.
•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes
Introduction & Goals
Many companies are collecting large amounts of consumer data, but the majority of us don’t even know what they do with it. To start off, let me ask you a question: What is consumer data, and what do companies do with it? Consumer data is personal, behavioral, and/or demographic information collected by marketing/department companies from their customer base. A few examples of consumer data, companies are trying to collect may be your credit card number, your phone number, email address, where you live, where you shop, what websites you visit, and how you act. To some extent, data collection from customers intrudes into customer privacy. Companies gather this type of data in order to improve customer service, refine/polish their marketing strategy, buy/sell data, and to secure their data with your data. My goals are to show what these consumers are giving to companies, how companies share/sell/trade data, and ways we can protect our privacy.
Implementation & Challenge
How do companies gather data? What do they do with the data? How does it affect the consumers? What are some ways I can protect our privacy? So far in my project, I’ve learned that companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ actions allow many more companies access to our information and can lead to consumers getting unwanted attention, marketing, and scams. Some companies have faulty security and can lead to consumer data leaks. Some challenges I face are researching topics, as informative articles do not go in too deep about data gathering/usage.
HOW TO AVOID THEM
Impact & Legacy
The opportunity to go research into something that I’ve been wondering about for a long time is a blessing. I’ve learned many things about privacy and what people can view in our personal lives. A few things I’ve learned so far are the consumers are viewed as the product, and the data buying parties are the consumers. I have also learned that everything you put or type online will be saved by a company or another. I wish to educate many people that many of their actions on the web will be permanently saved and stored somewhere, unknowingly without their knowledge. A logical backup project would be about the dangers of information leaks. It could affect you online and irl. People can sell your information to insurance companies to charge you more for health insurance or to robbers, telling them wear you hide your valuables.
Extreme measures -
Always use a premium vpn service with no-track (does not track your websites nor collect your data) when connecting to the internet. Examples of great non-track vpns are ExpressVPN, NordVPN, and CyberGhost. Use Tor Browser. Tor browser is a web proxy. It hides your IP address by redirecting your ip through over seven-thousand relays to protect your location and internet usage from anyone.
Use anonymous search engines like “DuckDuckGo.”
Use a Virtual-Machine. A program that acts like a computer, inside your pre-existing computer.
Before opening any browsers, you should close everything app and unnecessary programs running in your computer background. This reduces the opportunities people can pinpoint you. They can match the running programs of your “protected” computer to your “unprotected” computer whenever you turn your protection programs off.
Use “The Amnesiac Incognito Live System (TAILS)” as a vm operating system. TAILS eaves no trace of any user activity nor the operating system itself on your computer. TAILS cannot save cookies or file to your hard-drive without directly asking it to do so. If the operating system detects any non-anonymous connections, it will automatically block them. TAILS can be loaded and accessed on a usb drive.
Keep all your personal information securely offline, either on a different computer offline or on hardcopy.
Typing “$ sudo apt-get remove zeitgeist zeitgeist-core zeitgeist-datahub python-zeitgeist rhythmbox-plugin-zeitgeist geoclue geoclue-ubuntu-geoip geoip-database whoopsie” into the command prompt will stop all geolocation services.
You can force change your ip by unplugging your modem and replugging it.
Finally, don’t talk to anyone online, change your speech pattern, and never give any information to anyone.
If all else fails, cut off electronics from your life.
--------
Project Implementation Guideline
The purpose of the Project Plan is to take your proposed idea and build out a plan for how you will make that idea a reality. Whereas the Formal Proposal serves to introduce and describe your project to an uninformed reader (an external audience), the Project Plan is an internal document that lays out the major phases and milestones for how you will achieve your goals.
Write your Plan of Implementation first, then on paper or digitally (you can use Google sheets or Doc, or use free project management software like Trello, Basecamp, or Asana) to build your sections and copy the milestones into those sections as tasks. Copy the descriptions written in the plan (into a document or project management software) as the descriptions for the sections and tasks as you create them.
Rubric and Guideline
Basic Expectations & Formatting
? Turned in digitally as a PDF through the Haiku dropbox and posted to your ISR blog (also as a PDF)
? File name should follow the format: “Project Plan - Your Last Name” For example: “Project Plan - Schorn”
? Written component is 300 - 800 words in length
? Text should be single-spaced, 11 pt font (Choose a clean, professional font such as Times New Roman, Arial, Helvetica, or Georgia)
? Consistent font and text formatting throughout document
? Include your name, course name, instructor name, and project/product title at the top of the document
Plan of Implementation
? In 2-3 sentences describe the different phases of your project and how they relate to one another. You must break down your project into at least four phases. These phases can be chronological, or tied to distinct elements of your product.
? In a bulleted scaffold, lay out your project phases and the major milestones of each phase. You must have at least three milestones for each phase. Each phase and milestone should have a short (1-2 sentence) description.
? This is a formal/professional document. Your writing should meet the basic standards of clean english prose: no spelling errors, no major grammatical issues, correct punctuation, etc.
Project Management Build-out
? Create sections in the style of the model project. You should have a section for each phase described in your Plan of Implementation, as well as Deliverables, Research, and Miscellaneous sections.
? Create tasks for all known deliverables and milestones, with deadlines and descriptions per your teachers Guidelines (approximate deadlines are acceptable for this initial build-out)
Abstract: I hope to study about how companies gather and use data.
Title: Data exchange.
Background: Consumer data refers to all personal, behavioral, and demographic data that is collected by marketing companies and departments from their customer base. To some extent, data collection from customers intrudes into customer privacy.
Purpose: My goal of this project is to study and understand how companies gather data, use data, and how to protect ourselves online(stay anonymous).
What will you measure, research or learn? I will research how companies gather data, use data, and how to protect ourselves online
How will you measure it, what will success look like?: Success will look like a paper teaching us about the dangers of online data collection, how it affects us, how it affects our self freedom, and how we can stay protected online.
Tools/resources needed: people, stuff, places to work, local resources, collaboration resources: google, internet, my room, laptop, power source, snacks
What you used/need?: I will use news websites
Why is it credible or needed?
How are you going to use it/was it used?
Impact and legacy (HPA, local, global): what legacy will this leave? how will this impact HPA, our community and the world?: This research will teach all our generations how to stay safe, protect our privacy, and stay anonymous online.
-Research what/how data, is being collected by companies.
•customer data on metrics, from demographic data to behavioral data
•"Customer data can be collected in three ways – by directly asking customers, by indirectly tracking customers, and by appending other sources of customer data to your own,"
•Companies will also dig deep into their own customer service records to see how customers have interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale.
•In addition to collecting data, companies can also purchase it from or sell it to third-party sources.
-Research what companies are doing to collect our information
•Data is turned into knowledge for those companies. they run the data through an algorithm or ai which sorts out personalized profiles of consumers, observing what their interests and behaviors are.
•Companies use data to:
Improve constumer service
refine/polish their marketing strategy
buy/sell data
secure their data with your data
-Research ways we can protect our data and selves online
•The European Union's General Data Protection Requirements (GDPR) lays out the rules of data capture, storage, usage, and sharing for companies, and stiff penalties for those that fail to comply. Companies that fail to abide by the rules set out within the GDPR face 20 million Euro fines or up to 4 percent of annual revenue, whichever is higher.
why do companies want data?
•1. Data Can Develop and Uncover Relationships
•2. Data Can Explain And Improve Your NPS
•3. Data Can Be Invaluable For Customer Service
•4. Data Can Generate New Ideas
•5. Data Can Predict Consumer Behaviors
•6. Data Can Be Currency
•7. Data Can Improve Physical Spaces
•8. Data Can Help You Infer What You Don’t Know
•9. Data Can Be A Great Predictor
•10. Data Can Help Consumers
•11. Data Can Highlight Consumer Pain
•12. Data Can Be A Reflection Of The Company
•13. Data Can Be The True Voice Of The Customer
•14. Data Can Know Customers Better Than They Know Themselves
•15. Data Can Be Overwhelming—Collect Carefully
-cookies.
Cookies are created when you visit a website. They are used to store bits of information about your interactions with the website, which the web server can use later when processing your sessions. They can also be used to track websites you visit, even after closing the original website.
Email tracking is another method. With this, companies don’t just learn that a recipient has opened an email, but also where it was opened and on what device. Over 40% of emails sent around the world are tracked,
Logging in sites using your email may alow them to see your persoanl data, like your email, name, dob, etc.
Another way data companies obtain your data is through website registrations. More and more websites now expect you to register to access the website’s content. Some websites appear to have been created largely for the purposes of obtaining data.
Another major source of data for data companies are surveys – this was at the heart of the 2018 Cambridge Analytica scandal. This includes things such as personality quizzes, online games and tests, and more. When a company asks you to rate a product, your opinion may benefit many other companies.
-data mining
data mining - the practice of examining large databases in order to generate new information.
•Data mining is a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs. Data mining depends on effective data collection, warehousing, and computer processing.
•Data mining involves exploring and analyzing large blocks of information to glean meaningful patterns and trends. It can be used in a variety of ways, such as database marketing, credit risk management, fraud detection, spam Email filtering, or even to discern the sentiment or opinion of users.
•Warehousing is an important aspect of data mining. Warehousing is when companies centralize their data into one database or program. With a data warehouse, an organization may spin off segments of the data for specific users to analyze and use.
•However, in other cases, analysts may start with the data they want and create a data warehouse based on those specs. Regardless of how businesses and other entities organize their data, they use it to support management's decision-making processes
Introduction & Goals
Many companies are collecting large amounts of consumer data, but the majority of us don’t even know what they do with it. To start off, let me ask you a question: What is consumer data, and what do companies do with it? Consumer data is personal, behavioral, and/or demographic information collected by marketing/department companies from their customer base. A few examples of consumer data, companies are trying to collect may be your credit card number, your phone number, email address, where you live, where you shop, what websites you visit, and how you act. To some extent, data collection from customers intrudes into customer privacy. Companies gather this type of data in order to improve customer service, refine/polish their marketing strategy, buy/sell data, and to secure their data with your data. My goals are to show what these consumers are giving to companies, how companies share/sell/trade data, and ways we can protect our privacy.
Implementation & Challenge
How do companies gather data? What do they do with the data? How does it affect the consumers? What are some ways I can protect our privacy? So far in my project, I’ve learned that companies use gathering techniques such as data mining, phishing, emails, website cookies, signing up, surveys, and plain out just asking. Some companies will even dig further into their own customer service records to see how customers interacted with their sales and support departments in the past to see what the consumer liked and disliked on a grand scale. Once companies gained enough information, they can then turn that information into knowledge, self data protection, or into cash flow by selling/trading data to third parties. The companies’ actions allow many more companies access to our information and can lead to consumers getting unwanted attention, marketing, and scams. Some companies have faulty security and can lead to consumer data leaks. Some challenges I face are researching topics, as informative articles do not go in too deep about data gathering/usage.
HOW TO AVOID THEM
Impact & Legacy
The opportunity to go research into something that I’ve been wondering about for a long time is a blessing. I’ve learned many things about privacy and what people can view in our personal lives. A few things I’ve learned so far are the consumers are viewed as the product, and the data buying parties are the consumers. I have also learned that everything you put or type online will be saved by a company or another. I wish to educate many people that many of their actions on the web will be permanently saved and stored somewhere, unknowingly without their knowledge. A logical backup project would be about the dangers of information leaks. It could affect you online and irl. People can sell your information to insurance companies to charge you more for health insurance or to robbers, telling them wear you hide your valuables.
Extreme measures -
Always use a premium vpn service with no-track (does not track your websites nor collect your data) when connecting to the internet. Examples of great non-track vpns are ExpressVPN, NordVPN, and CyberGhost. Use Tor Browser. Tor browser is a web proxy. It hides your IP address by redirecting your ip through over seven-thousand relays to protect your location and internet usage from anyone.
Use anonymous search engines like “DuckDuckGo.”
Use a Virtual-Machine. A program that acts like a computer, inside your pre-existing computer.
Before opening any browsers, you should close everything app and unnecessary programs running in your computer background. This reduces the opportunities people can pinpoint you. They can match the running programs of your “protected” computer to your “unprotected” computer whenever you turn your protection programs off.
Use “The Amnesiac Incognito Live System (TAILS)” as a vm operating system. TAILS eaves no trace of any user activity nor the operating system itself on your computer. TAILS cannot save cookies or file to your hard-drive without directly asking it to do so. If the operating system detects any non-anonymous connections, it will automatically block them. TAILS can be loaded and accessed on a usb drive.
Keep all your personal information securely offline, either on a different computer offline or on hardcopy.
Typing “$ sudo apt-get remove zeitgeist zeitgeist-core zeitgeist-datahub python-zeitgeist rhythmbox-plugin-zeitgeist geoclue geoclue-ubuntu-geoip geoip-database whoopsie” into the command prompt will stop all geolocation services.
You can force change your ip by unplugging your modem and replugging it.
Finally, don’t talk to anyone online, change your speech pattern, and never give any information to anyone.
If all else fails, cut off electronics from your life.