2007

2007 Buchtipps

Buchtipps: Bücher zum freien runterladen

Broschüre Die Broschüre "Einsteins Kolleginnen - Physikerinnen gestern & heute" kann jetzt von den Seiten des Kompetenzzentrums Technik -Diversity - Chancengleichheit (TeDiC) e.V. kostenlos als PDF-Dokument heruntergeladen werden.

Proceedings vom 21C3 (2004), 25 MB

Proceedings vom 22C3 (2005), 17 MB

 

Buchtipps: Bücher zum kaufen oder ausleihen

"Wir", ein Roman von Jewgeni Iwanowitsch Samjatin. Eine gute Beschreibung gibt es in der Wikipedia

Illumninatus [1]

Die Triologie von Willima Gibson: Neuromancer/Biochips/Mona Lisa Overdrive

Die Bannsaenger Serie (Spellsinger)

 

Tipps

http://www.bookcrossing.com/ (shared books are happy books :)

Congress07de

Dieses Jahr findet der Congress statt

Motto: Volldampf voraus

Um dieses Jahr den Congress zu rocken brauchen wir noch Programm.

Was fuer Programm wollen die Haecksen

Wollt ihr auch Maenner als Vortragende

Wir haetten gerne viele Frauen als Vortragende. Das heisst nicht, dass ein interessanter Vortrag von einem Mann abgelehnt wird, nur weil er ein Mann ist. Vllt wenn er eine Peruecke anzieht...? ;)

Alles ist so unorganisiert

Ja, das stimmt. Aber am Ende wird alles gut :)

Ich will mitmachen

Ja, super, melde dich bei anna(at)jabber.ccc.de oder trag dich ins Wiki ein und warte bis ich dir ein weisses Kaninchen vorbeischicke.

Wer macht mit?

Name Thema Sprache Woman-only

InteressanteFrauenOrganisationen

(Notiz: letztes Update dieser Seite war 2007)

Participate

Linuxchix wie der Name schon sagt, viele persönliche Vorstellung der Mitfrauen, verschiedene Onlinekurse (z.B. Kernel Hacking) und ein Haufen Mailinglisten gemischt und Woman-only

Interessante Organisationen

http://www.frauen-informatik-geschichte.de ...wie der name schon sagt: Frauen Informatik Geschichte

Genderchanger Akademie in Amsterdam. Eine Gruppe von Frauen die Hardware Workshops machen und einge HowTos zu Linux geschrieben haben

OBN Old Boys Network, eine Gruppe von Künstlerinnen die sich u.a. mit Cyperfeminismus beschäfitgen

GLOW (Heinrich-Böll-Stiftung) GLOW dokumentiert wissenschaftliche feministische und Gender Theorie und versucht sie in die Politik einzubringen, sehr ausführliche Webseite

Webgrrls Businessnetzwerk für Frauen in den neuen Medien

MacUserGroup für Frauen in Schwabach/Nürnberg

The Eclectic Tech Carnival A carnival of exchanging computer-related skills, ideas and art. By women and for women.

Women's Information Technogloy Transfer Regional Initiative of Women's Groups for Promoting ICT as a Strategic Tool for Social Transformation LinuxChix

Interessante Frauen

Nicola Doering Full Professor at Ilmenau University of Technology, Department of Media and Communication Research: Media Design/Media Psychology. Sie schreibt u.a. über Frauen und Cybersex

The linguistic fingerprint

(Notiz: letztes Update dieser Seite war 2007)

Referentin: Daniela Berger

The linguistic fingerprint -- Silver bullet or mere myth?

Abstract

In the wake of crime science shows like CSI and high profile criminal cases like the JonBenet Ramsey murder, the field of forensic linguistics has come to the attention of the general public. Today many laypersons know the term "linguistic fingerprint" and they have certain expectations about what it implies.

But these expectations are largely unfounded.

The lack of real knowledge about this technique are largely due to its ill-chosen "nickname". The term "linguistic fingerprint" puts it into the neighborhood of the "actual", i.e. dactyloscopic fingerprint and the "genetic fingerprint". But this is misleading.
Both in fingerprinting and in DNA analysis there are procedures for collecting samples, for analysing them, for comparing them to samples taken from the suspect(s) and for interpreting the results. These procedures are known for their reliability today, but it took years of research to get to this point. Still, today we are at a point where a fingerprint left at a crime scene can safely be used to to confirm the guilt of a suspect.

The use of the fingerprint metaphor in the context of forensic linguistics and authorship attribution implies that research in this field has reached the same maturity. In reality, some promising results have been found, but so far the linguistic community was not able to prove that a certain set of markers can be reliably used to confirm a person's authorship of a text. Many questions are still left to be answered.

Overview

In this talk I will give definitions of the relevant terms and concepts.

Then I will give an overview over the different fields of interest that are subsumed under "forensic linguistics". From these I chose authorship attribution as the target of a state-of-the-art report.

I will present several interesting approaches, demonstrate their application with the help of real life examples where possible, and discuss their merits and limitations. The main focus here will be

I will show that forensic linguistics procedures are far from having the same accuracy as fingerprinting procedures, but that - at best - they can be used to prove that the same person did or did not write a set of texts. And if that is not possible they can still be used to gather other, more general clues about the author, perhaps about his gender or his education.

For the time being this does not make the linguistic fingerprint the proverbial silver bullet, but rather it makes forensic linguistics one valuable tool in the criminological toolbox.

Web Application Security

(Notiz: letztes Update dieser Seite war 2007)

Web Application Security - Find the Flaw, or Someone Else Will Do

by Victoria Polzer

Short description:

Extensive information on web application security mistakes (and how to avoid them) has been available for quite a while. Yet many web applications still come with flaws that are often easy to find and exploit. The currently hyped AJAX will probably increase the number of buggy applications, since it invites programmers to entrust critical tasks like input validation and access control to the browser - thereby making it easy for malicious users to bypass these checks.

This talk will provide a short overview of how web applications work and then discuss the most common security flaws and attacks (e.g. SQL Injection and Cross Site Scripting). It also presents methods and tools that can be used to test for these issues.