Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "IT" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
yuthraju

Your Online Reputation Doesn't Take the Holidays Off - 0 views

  •  
    Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
estrutt

From Technology-Driven Society to Socially Oriented Technology: The Future of Information Society-Alternatives to Surveillance - 2 views

  •  
    This is a PDF file of a chapter taken from a book that contains essays on many issues that arise from "big data." This chapter specifically pertains to our privacy versus security debate because it provides reasons as to why bulk data collection does not work as well as alternative options to mass surveillance.
rmusicant

Security Cameras In School: Protective Or Invasive? - 1 views

  •  
    More and more schools are installing security cameras in halls, classrooms and buses. Administrators say it helps protect students and staff, but some argue the practice is invasive. Guests discuss the use of surveillance cameras in schools and where to draw the line between safety and privacy.
saraatsai

Video surveillance in public schools - 2 views

shared by saraatsai on 21 Oct 15 - No Cached
  •  
    Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
  •  
    by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially wIth the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
chrisr22

Laptop-Spying School Accessed Webcams 42 Times; FBI Begins Investigation - 3 views

  •  
    High school student suing Philadelphia's Lower Merion School District for remotely accessing his webcam. And maybe you read the Superintendent's response and thought, "well, maybe this whole business is getting blown out of proportion." It isn't.
colleengill

Do governments need access to encrypted messages to thwart terrorism? | PBS NewsHour - 4 views

  •  
    PBS interview showing two sides of the security vs. privacy debate as it applies to the recent attacks in Paris, and all current issues of terrorism and a lack of information even with warrants. Gives a lot of good quotes from reputable sources that can be used to strengthen and support arguments.
ftiet21

After Paris, What We're Getting Wrong In 'Privacy vs. Security' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
saraatsai

Paris attacks should be 'wake up call' for more digital surveillance, CIA director says - 2 views

  •  
    This article talks about the want for greater government surveillance after the Paris attacks. It mentions that since Edward Snowden released information about the NSA's digItal surveillance power, a lot of measures have been taken to restrict government surveillance. However, since the Paris attacks, the US government is pushing to bring that power back.
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
saraatsai

Edward Snowden: The World Says No to Surveillance - 4 views

  •  
    Because Snowden wrote it
Abbey Roberts

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). it is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
Abbey Roberts

arphid / Boing Boing - 0 views

  •  
    Cory Doctorow's blog posts concerning RFID tags and arphid technology; especially several posts on its usage in schools
saraatsai

National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Cameras-Legal aspects of the use of video cameras in schools - 0 views

  •  
    "Signage can be an important legal component in the use of video cameras in schools. As mentioned in the previous section, it is important that the presence of video cameras not lead a person to believe he or she will be rescued if attacked."
j_olsen

Technology Turns to Tracking People Offline - 0 views

  •  
    Some retailers use Euclid Analytics, which uses the Wi-Fi antennas inside stores to see how many people are coming into a store, how long they stay and even which aisles they walk. It does this by using signals from each smartphone that comes near the store.
estrutt

Walk the Walk: Gait Recognition Technology Could Identify Humans at a Distance - 1 views

  •  
    Interesting how this article talks about the gait analysis being used for catching terrorists, while in Little Brother, it was used to keep track of the high school students. The technology is not quite ready to be used, but seems to be much more reliable than the gait trackers in the book.
  •  
    Georgia Tech Research Institute is making gait recognition technology a reality. "The ultimate goal is to detect, classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions. Such capabilities will enhance the protection of U.S. forces and facilities from terrorist attacks."
Adrian Florea

New Crypto Tool Makes Anonymous Surveys Truly Anonymous - 0 views

  •  
    Advice: Although some school surveys are said to be anonymous, it is there probably is some cryptographic way to retrieve a user's identify from a response and what you say could still be potentially traced back to you.
charlie_overton

What is cryptography? | TechRadar - 0 views

  •  
    This article, combined with the guide to staying completely anonymous on the internet linked at the end of it, suggest that one of the easiest ways to be anonymous online is to use a private browser like Ghostery, or a private search engine like DuckDuckGo. These services don't track your information the same way that Google does, making your online browsing experience more private and secure.
« First ‹ Previous 101 - 120 of 142 Next › Last »
Showing 20 items per page