Excellent Eighth Week
This week, we started working on the qualitative coding for the phishing data.
The qualitative coding team members individually looked at the data and did first order codes. Then, we discussed what we thought the second order codes should be. Next week, we will categorize the data using these codes.
For the Wednesday seminar, we discussed how to give a speech. As a 4-H alumnus, I have 12 years of experience in giving speeches. The presentation was well put-together, although I was surprised at how many students had no idea how to give a presentation. Next week, we are expected to give a three-minute summary of our research. Most of the students in the class are concerned about how long three minutes is. I, on the other hand, have no idea how I am going to present my research in only three minutes.
This week, it was my turn to put together a discussion for the Friday reading group. I chose to discuss Dr. L Jean Camp's paper "Mental models of privacy and security."
This discussion was interesting because we had to understand different peoples' views of computer security. Some people view computer security through medical eyes. Viruses spread from computer to computer because of "poor hygiene." Others view computer security through the warfare method. People are targeting computers to attack them. We protect the computers by using certain methodologies and standards based on what works best. The ideas presented in the paper are very important because how we view computer security impacts how we react to it.
The qualitative coding team members individually looked at the data and did first order codes. Then, we discussed what we thought the second order codes should be. Next week, we will categorize the data using these codes.
For the Wednesday seminar, we discussed how to give a speech. As a 4-H alumnus, I have 12 years of experience in giving speeches. The presentation was well put-together, although I was surprised at how many students had no idea how to give a presentation. Next week, we are expected to give a three-minute summary of our research. Most of the students in the class are concerned about how long three minutes is. I, on the other hand, have no idea how I am going to present my research in only three minutes.
This week, it was my turn to put together a discussion for the Friday reading group. I chose to discuss Dr. L Jean Camp's paper "Mental models of privacy and security."
This discussion was interesting because we had to understand different peoples' views of computer security. Some people view computer security through medical eyes. Viruses spread from computer to computer because of "poor hygiene." Others view computer security through the warfare method. People are targeting computers to attack them. We protect the computers by using certain methodologies and standards based on what works best. The ideas presented in the paper are very important because how we view computer security impacts how we react to it.