Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "IT" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Your Online Reputation Doesn't Take the Holidays Off - 0 views

  •  
    Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
1More

From Technology-Driven Society to Socially Oriented Technology: The Future of Informati... - 2 views

  •  
    This is a PDF file of a chapter taken from a book that contains essays on many issues that arise from "big data." This chapter specifically pertains to our privacy versus security debate because it provides reasons as to why bulk data collection does not work as well as alternative options to mass surveillance.
1More

Security Cameras In School: Protective Or Invasive? - 1 views

  •  
    More and more schools are installing security cameras in halls, classrooms and buses. Administrators say it helps protect students and staff, but some argue the practice is invasive. Guests discuss the use of surveillance cameras in schools and where to draw the line between safety and privacy.
2More

Video surveillance in public schools - 2 views

shared by saraatsai on 21 Oct 15 - No Cached
  •  
    Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
  •  
    by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially wIth the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
1More

Laptop-Spying School Accessed Webcams 42 Times; FBI Begins Investigation - 3 views

  •  
    High school student suing Philadelphia's Lower Merion School District for remotely accessing his webcam. And maybe you read the Superintendent's response and thought, "well, maybe this whole business is getting blown out of proportion." It isn't.
1More

Do governments need access to encrypted messages to thwart terrorism? | PBS NewsHour - 4 views

  •  
    PBS interview showing two sides of the security vs. privacy debate as it applies to the recent attacks in Paris, and all current issues of terrorism and a lack of information even with warrants. Gives a lot of good quotes from reputable sources that can be used to strengthen and support arguments.
1More

After Paris, What We're Getting Wrong In 'Privacy vs. Security' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
1More

Paris attacks should be 'wake up call' for more digital surveillance, CIA director says - 2 views

  •  
    This article talks about the want for greater government surveillance after the Paris attacks. It mentions that since Edward Snowden released information about the NSA's digItal surveillance power, a lot of measures have been taken to restrict government surveillance. However, since the Paris attacks, the US government is pushing to bring that power back.
1More

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
1More

Edward Snowden: The World Says No to Surveillance - 4 views

  •  
    Because Snowden wrote it
1More

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). it is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
1More

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
1More

arphid / Boing Boing - 0 views

  •  
    Cory Doctorow's blog posts concerning RFID tags and arphid technology; especially several posts on its usage in schools
1More

National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Came... - 0 views

  •  
    "Signage can be an important legal component in the use of video cameras in schools. As mentioned in the previous section, it is important that the presence of video cameras not lead a person to believe he or she will be rescued if attacked."
1More

Technology Turns to Tracking People Offline - 0 views

  •  
    Some retailers use Euclid Analytics, which uses the Wi-Fi antennas inside stores to see how many people are coming into a store, how long they stay and even which aisles they walk. It does this by using signals from each smartphone that comes near the store.
2More

Walk the Walk: Gait Recognition Technology Could Identify Humans at a Distance - 1 views

  •  
    Interesting how this article talks about the gait analysis being used for catching terrorists, while in Little Brother, it was used to keep track of the high school students. The technology is not quite ready to be used, but seems to be much more reliable than the gait trackers in the book.
  •  
    Georgia Tech Research Institute is making gait recognition technology a reality. "The ultimate goal is to detect, classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions. Such capabilities will enhance the protection of U.S. forces and facilities from terrorist attacks."
1More

New Crypto Tool Makes Anonymous Surveys Truly Anonymous - 0 views

  •  
    Advice: Although some school surveys are said to be anonymous, it is there probably is some cryptographic way to retrieve a user's identify from a response and what you say could still be potentially traced back to you.
1More

What is cryptography? | TechRadar - 0 views

  •  
    This article, combined with the guide to staying completely anonymous on the internet linked at the end of it, suggest that one of the easiest ways to be anonymous online is to use a private browser like Ghostery, or a private search engine like DuckDuckGo. These services don't track your information the same way that Google does, making your online browsing experience more private and secure.
« First ‹ Previous 101 - 120 of 142 Next › Last »
Showing 20 items per page