{"id":3436,"date":"2022-11-27T15:43:24","date_gmt":"2022-11-27T15:43:24","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=3436"},"modified":"2022-12-16T15:51:08","modified_gmt":"2022-12-16T15:51:08","slug":"kent-cyber-security-festival-kcsf-at-the-university-of-kent-youth-summit-2022","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/11\/27\/kent-cyber-security-festival-kcsf-at-the-university-of-kent-youth-summit-2022\/","title":{"rendered":"Kent Cyber Security Festival (KCSF) at the University of Kent Youth Summit 2022"},"content":{"rendered":"<p>iCSS held its Kent Cyber Security Festival (KCSF) 2022 at this year&#8217;s University of Kent Youth Summit. The Festival was an opportunity for school pupils in years 9, 10 and 11 to learn how they can stay safe online, as well as what cyber security might mean in a personal context and as a potential future career.<\/p>\n<p>One session, led by PhD student and iCSS Research Assistant <a href=\"https:\/\/www.kent.ac.uk\/social-policy-sociology-social-research\/people\/1687\/waldock-krysia\">Krysia Waldock<\/a>, was based on mis- and disinformation and the impact of fake news. <span class=\"s3\">D<\/span><span class=\"s3\">is<\/span><span class=\"s2\">information<\/span> is false information that <span class=\"s2\">deliberately <\/span><span class=\"s2\">causes damage <\/span><span class=\"s2\">or harm<\/span>, and <span class=\"s3\">mis<\/span><span class=\"s2\">information<\/span> is false information that <span class=\"s2\">does not intend to cause harm<\/span>. In the session, pupils took part in a \u2018telephone game\u2019 to show how fast information can change and be distorted. They were surprised at how fast the message changed at various points down the telephone line! We also compared photographs against deep fake images, including two pictures of cats that were both deep fake images in spite of how lifelike they looked. Pupils really enjoyed the sessions and were able to take some of the critical thinking about different sources away with them.<\/p>\n<p>Krysia said: <span class=\"s4\">\u2018<\/span><span class=\"s4\">Informing pupils about mis- and disinformation is vitally important given how much information we take from internet sources during our personal and professional lives. <\/span><span class=\"s4\">This is important knowledge irrelevant of the career path they take.<\/span><span class=\"s4\">\u2019<\/span><\/p>\n<p>PhD students <a href=\"https:\/\/www.kent.ac.uk\/computing\/people\/3158\/turner-sarah\">Sarah Turner<\/a>, <a href=\"https:\/\/www.kent.ac.uk\/computing\/people\/3133\/pattnaik-nandita\">Nandita Pattnaik<\/a> and <a href=\"http:\/\/www.kent.ac.uk:\/engineering\/people\/930\/boakes-mj\">Matthew Boakes<\/a> ran the second session focusing on how to <span class=\"s2\">keep personal data safe online<\/span>. This is a tricky topic to talk to teenagers about: they are often heavy users of social media and already know a lot about the types of data they might be providing to these services. The facilitators used this knowledge to introduce different ways that, and the different points at which, data could be compromised when provided to different types of online services. In order to try and get the participants to start to think about the different reasons people or groups may want to act in certain ways relating to personal data, they were asked to consider the pros and cons of using an encrypted messaging app: What are the benefits that a political activist might see in using such an app? Might the police view the same app as beneficial in the same way? And just how much of your information is protected through the encryption when you use such systems anyway?<\/p>\n<p>Sarah said: <span class=\"s4\">\u2018<\/span><span class=\"s4\">The provision of \u2013 sometimes quite extensive \u2013 amounts of personal data in exchange for access to online services is ubiquitous. Teenagers today have grown up with the understanding that such an exchange is fair and, usually, safe and secure. \u00a0It is important, then, to make sure that as today\u2019s teenagers become tomorrow\u2019s adults, they understand the positives and the negatives about how these services work, as they are the ones that will have to manage the use of and norms around digital technologies in the future.<\/span><span class=\"s4\">\u2019<\/span><\/p>\n<p>Visit YouTube to <a href=\"https:\/\/www.youtube.com\/watch?v=JG2qmtl-ms8&amp;t=1s\"><span class=\"s5\">w<\/span><span class=\"s5\">atch the <\/span><span class=\"s5\">festival <\/span><span class=\"s5\">highlights<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iCSS held its Kent Cyber Security Festival (KCSF) 2022 at this year&#8217;s University of Kent Youth Summit. The Festival was an opportunity for school pupils &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/11\/27\/kent-cyber-security-festival-kcsf-at-the-university-of-kent-youth-summit-2022\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":74034,"featured_media":3438,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6598,124,122,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3436"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/74034"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=3436"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3436\/revisions"}],"predecessor-version":[{"id":3439,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3436\/revisions\/3439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/3438"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=3436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=3436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=3436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}