Group 2 seminar schedule (Wednesdays): Difference between revisions
From ICO wiki
Jump to navigationJump to search
No edit summary |
mNo edit summary |
||
(35 intermediate revisions by 17 users not shown) | |||
Line 1: | Line 1: | ||
[https://echo360.org.uk/section/887223b1-1073-410d-a37b-ac8e9934e48f/public Recordings at Echo360] | |||
# Nov 1: | # Nov 1: | ||
#* Andrei Romar - Ethical aspects of piracy | #* Andrei Romar - Ethical aspects of piracy | ||
Line 6: | Line 8: | ||
#* your_name_here | #* your_name_here | ||
# Nov 8: | # Nov 8: | ||
#* | #* *2nd* Andrei Mironov - "From failure to genius" - Innovative thinking | ||
#* Mattias Timm Rast - Exploiting children online. Case study: Roblox | |||
#* | #* *2nd* Andrei Romar - MFA with respect to privacy (last moment addition due to vacant slot) | ||
#* | #* *2nd* Ringo-Lehari Purge - Non-repudiation (last moment addition due to vacant slot) | ||
#* your_name_here | #* your_name_here | ||
# Nov 15: | # Nov 15: | ||
Line 18: | Line 20: | ||
#* Ringo-Lehari Purge - Misinformation spread through Social Media | #* Ringo-Lehari Purge - Misinformation spread through Social Media | ||
# Nov 22: | # Nov 22: | ||
#* | #* *2nd* Angelica Daisi Stewart - The Dark Web | ||
#* David Ayson - The Ethical Issues on Social Media's Addictive Algorithm | #* David Ayson - The Ethical Issues on Social Media's Addictive Algorithm | ||
#* Oleh Rohachov - Software piracy | #* Oleh Rohachov - Software piracy | ||
#* Andrei Šutkov - AI influence on the job market. | #* Andrei Šutkov - AI and its influence on the job market. | ||
#* | #* Diana Anastassija Turks - Random Number Generation in Cryptography | ||
# Nov 29: | # Nov 29: | ||
#* Tanel Maasik | #* Tanel Maasik - Enigma code the first modern encryption | ||
#* Gabriel Jääger | #* Gabriel Jääger - The paradox of piracy prevention | ||
#* Vusal Sayadov - Phishing: Behind the Screens of Digital Deception | #* Vusal Sayadov - Phishing: Behind the Screens of Digital Deception | ||
#* Vasile Radu - Cybercrime | #* Vasile Radu - Cybercrime | ||
Line 33: | Line 35: | ||
#* Simone Marie Pärn | #* Simone Marie Pärn | ||
#* Kirill Ševtsov - The Role of Ethical Hacking in Cyber Security. | #* Kirill Ševtsov - The Role of Ethical Hacking in Cyber Security. | ||
#* your_name_here | #* your_name_here | ||
#* Manana Bebia - Social Media risks and impacts in everyday life | |||
# Dec 13: | # Dec 13: | ||
#* Andrii Korol - QA engineers and why are they so beneficial | #* Andrii Korol - QA engineers and why are they so beneficial | ||
#* Madis Randmäe The Juku computer | #* Madis Randmäe The Juku computer | ||
#* Marcus Veer - Overview of advanced persistent threats in the example of Lazarus Group | #* Marcus Veer - Overview of advanced persistent threats in the example of Lazarus Group | ||
#* Sibul - The Gradual Increase of Monetization in Destiny and Destiny 2 | |||
#* *2nd* Jan Polách - Ethical Implications of Steganography in Digital Communication | |||
# Dec 18 8:15-9:45 ONLINE ([https://teams.microsoft.com/l/meetup-join/19%3ameeting_YmUzNTc1YWYtOGY4Ny00YTgyLWFiYjAtMjk1MmFhNWUwZmNj%40thread.v2/0?context=%7b%22Tid%22%3a%223efd4d88-9b88-4fc9-b6c0-c7ca50f1db57%22%2c%22Oid%22%3a%226a0e717c-e2d8-4577-8d0d-7215e50fede2%22%7d Join the meeting]): | |||
#* your_name_here | |||
#* Fjodor Bondar - Social Media Phishing | |||
#* Nikita Kofman - Cyberbullying | |||
#* your_name_here | #* your_name_here | ||
#* your_name_here | #* your_name_here | ||
# Dec 20: | # Dec 20: | ||
#* Daniel de Heras Zorita | #* Daniel de Heras Zorita - Evolution of free speech on the internet | ||
#* Leo Goršić - Checkmate in Code: How Chess Engines Outplay Humanity | #* Leo Goršić - Checkmate in Code: How Chess Engines Outplay Humanity | ||
#* | #* Oleh Rohachov- Social Engineering | ||
#* | #* Andrei Timoshin - Unethical Use of Disruptive Technologies in Modern World | ||
#* | #* Pavel Shemetov - Artificial music and its problems | ||
[[SPEAIT|Back to the main course page]] | [[SPEAIT|Back to the main course page]] |
Revision as of 12:06, 4 March 2024
- Nov 1:
- Andrei Romar - Ethical aspects of piracy
- Sigrid Latt - Social Media and Mental Health
- Andrei Mironov - "Double-edged sword" - Missing chapters in History of IT
- your_name_here
- your_name_here
- Nov 8:
- *2nd* Andrei Mironov - "From failure to genius" - Innovative thinking
- Mattias Timm Rast - Exploiting children online. Case study: Roblox
- *2nd* Andrei Romar - MFA with respect to privacy (last moment addition due to vacant slot)
- *2nd* Ringo-Lehari Purge - Non-repudiation (last moment addition due to vacant slot)
- your_name_here
- Nov 15:
- Stiven Lille - The ethics in the WordPress community
- Angelica Daisi Stewart - Moral and surveillance dilemmas of smart homes
- Jan Polách - Analyzing Cross-Cultural Variations in Moral Preferences in Autonomous Vehicle Decision-Making
- Innar Viinamäe - The internet as a channel for whistleblowing
- Ringo-Lehari Purge - Misinformation spread through Social Media
- Nov 22:
- *2nd* Angelica Daisi Stewart - The Dark Web
- David Ayson - The Ethical Issues on Social Media's Addictive Algorithm
- Oleh Rohachov - Software piracy
- Andrei Šutkov - AI and its influence on the job market.
- Diana Anastassija Turks - Random Number Generation in Cryptography
- Nov 29:
- Tanel Maasik - Enigma code the first modern encryption
- Gabriel Jääger - The paradox of piracy prevention
- Vusal Sayadov - Phishing: Behind the Screens of Digital Deception
- Vasile Radu - Cybercrime
- Tekla Berozashvili - World war 3: The Ethical Dimensions of Information Warfare in the Digital Age
- Dec 6:
- Pavel Shemetov - Implementation of AI in learning guitar
- Simone Marie Pärn
- Kirill Ševtsov - The Role of Ethical Hacking in Cyber Security.
- your_name_here
- Manana Bebia - Social Media risks and impacts in everyday life
- Dec 13:
- Andrii Korol - QA engineers and why are they so beneficial
- Madis Randmäe The Juku computer
- Marcus Veer - Overview of advanced persistent threats in the example of Lazarus Group
- Sibul - The Gradual Increase of Monetization in Destiny and Destiny 2
- *2nd* Jan Polách - Ethical Implications of Steganography in Digital Communication
- Dec 18 8:15-9:45 ONLINE (Join the meeting):
- your_name_here
- Fjodor Bondar - Social Media Phishing
- Nikita Kofman - Cyberbullying
- your_name_here
- your_name_here
- Dec 20:
- Daniel de Heras Zorita - Evolution of free speech on the internet
- Leo Goršić - Checkmate in Code: How Chess Engines Outplay Humanity
- Oleh Rohachov- Social Engineering
- Andrei Timoshin - Unethical Use of Disruptive Technologies in Modern World
- Pavel Shemetov - Artificial music and its problems