Search Results (21)

View
Selected filters:
  • Privacy
Communications and Information Policy, Spring 2006
Conditions of Use:
Remix and Share
Rating

This course provides an introduction to the technology and policy context of public communications networks, through critical discussion of current issues in communications policy and their historical roots. The course focuses on underlying rationales and models for government involvement and the complex dynamics introduced by co-evolving technologies, industry structure, and public policy objectives. Cases drawn from cellular, fixed-line, and Internet applications include evolution of spectrum policy and current proposals for reform; the migration to broadband and implications for universal service policies; and property rights associated with digital content. The course lays a foundation for thesis research in this domain.

Subject:
Information Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Field,Frank
Data Privacy Project: Curriculum
Conditions of Use:
No Strings Attached
Rating

Welcome to the curriculum page for the Data Privacy Project. We are pleased to share a set of learning tools that was created with and for library professionals. The curriculum contains a facilitator’s guide, presentation slides, and handouts, and permits remix and reuse under a Share Alike 4.0 Creative Commons license.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Data Privacy Project: Overview
Conditions of Use:
No Strings Attached
Rating

The goal of our trainings is to learn the building blocks of privacy protection and digital security. Our teachings focus on activities patrons do every day at the library so that library staff can develop capacity.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Ethics and Information Technology
Conditions of Use:
Remix and Share
Rating

Ethics and Information Technology focuses on the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments. Students explore the technological underpinnings of associated technology systems, experiment with individual and group interaction with technologies, and examine the mechanics of ethical and unethical behaviors.

Material Type:
Full Course
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
Paul Conway
Ethics in America
Conditions of Use:
Read the Fine Print
Rating

This series uses the Socratic method to build analytical skills and examine ethical questions. The programs aim to sharpen moral reasoning without favoring a particular position by exploring ethical dilemmas in legal, political, medical, corporate, and military arenas. Panelists include Antonin Scalia, Faye Wattleton, and Peter Jennings. A video instructional series on ethics for college and high school classrooms and adult learners; 10 one-hour video programs, audiocassettes.

Subject:
Philosophy
Material Type:
Lecture
Provider:
Annenberg Learner
Ethics of Human Subject Research
Conditions of Use:
Remix and Share
Rating

Ethics of Human Subject Research (2 credits) is offered by the Department of Health Policy and Management and the Distance Education Division, Johns Hopkins Bloomberg School of Public Health and The Phoebe R. Berman Bioethics Institute, Johns Hopkins University. The course introduces students to the ethics of human subject research. Ethical theory and principles are introduced, followed by a brief history of research ethics. Topics covered in lectures and moderated discussions include informed consent for research participation, role and function of institutional review boards, just selection of research subjects, ethical aspects of study design, and privacy and confidentiality. Student evaluation will be based on participation in moderated discussions, an informed consent exercise and written case analysis.

Subject:
Health, Medicine and Nursing
Material Type:
Case Study
Full Course
Lecture Notes
Syllabus
Provider:
Johns Hopkins Bloomberg School of Public Health
Provider Set:
JHSPH OpenCourseWare
Author:
Taylor, Holly
Historical Overview
Conditions of Use:
No Strings Attached
Rating

In the early 20th century, when the library profession was debating privacy and its relationship to free speech, information about patrons flowed in a relatively simple manner.
A patron communicated information about herself—her interests, beliefs, or values—in the process of borrowing a book. Book borrowing involved the library creating a paper record and storing it the library’s circulation records system.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
How to practice safe sexting
Rating

Sexting, like anything that's fun, runs its risks — but a serious violation of privacy shouldn't be one of them. Amy Adele Hasinoff looks at problematic responses to sexting in mass media, law and education, offering practical solutions for how individuals and tech companies can protect sensitive (and, ahem, potentially scandalous) digital files.

Subject:
Social Science
Material Type:
Lesson
Provider:
TED
Author:
Amy Adele Hasinoff
Internet Privacy: A Personal and Political Issue
Conditions of Use:
Read the Fine Print
Rating

In this interactive lesson, students consider the issue of internet privacy, both in their own lives and in society, including government spying, parental monitoring, and corporate tracking of consumers. What is the connection and potential conflict between safety and privacy, both on a personal and institutional level?

Subject:
Information Science
Arts and Humanities
Sociology
Material Type:
Activity/Lab
Reading
Provider:
Morningside Center for Teaching Social Responsibility
Provider Set:
Teachable Moment
NSA Surveillance: A Debate
Conditions of Use:
No Strings Attached
Rating

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
NSA Surveillance and the Politics of Whistleblowing
Conditions of Use:
Read the Fine Print
Rating

Edward Snowden's leak of classified information about the NSA's surveillance of American citizens has touched off a debate about the need for government secrecy versus the public's right to know. Two student readings and discussion questions probe the controversy.

Subject:
Political Science
Sociology
Material Type:
Activity/Lab
Reading
Provider:
Morningside Center for Teaching Social Responsibility
Provider Set:
Teachable Moment
OER Creation: Gaining Ethical Consent
Conditions of Use:
Remix and Share
Rating

Whilst this specifically covers the issue of privacy / moral rights / ethical rights with medical OERs, this guide is applicable for all learning and teaching subjects.

Subject:
Arts and Humanities
Higher Education
Material Type:
Teaching/Learning Strategy
Provider:
OER Africa
University College Falmouth
Provider Set:
UCF openSpace
Author:
OER Africa
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditions of Use:
Remix and Share
Rating

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Reading and Analyzing Text in the Context of a Societal Issue: Privacy
Conditions of Use:
Remix and Share
Rating

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Author:
Cheryl Clark
Reading and Analyzing Text in the Context of a Societal Issue: Privacy  - Remix
Conditions of Use:
Remix and Share
Rating

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Author:
Sammy Tanui
Regulating Healthcare
Conditions of Use:
Remix and Share
Rating

This unit provides an overview of the regulation of healthcare, including regulatory and professional organizations, the regulation of safety in medicine, and key legal aspects of medicine. This unit also covers compliance issues including privacy violations, reimbursement and fraud and abuse.

Subject:
Health, Medicine and Nursing
Law
General Law
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Risk Assessment
Conditions of Use:
No Strings Attached
Rating

Risks vary from person to person. For example, a Visa card data breach impacts anyone who uses these cards, but a person who does not have a credit card will not need to worry about this. Patrons that use social media need to consider their privacy settings on those sites, as well as the terms of service of those companies. Journalists may need to protect who they contact, in addition to the content of their conversations. Depending on your risk, you’ll need different privacy "armor" that's appropriate for your particular situation.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
WIL Module 1.3 - Reflective Practice in Work Integrated Learning
Conditions of Use:
Remix and Share
Rating

The WIL Open Module Initiative includes over 30 open access, learner-centred modules to support Work-Integrated Learning preparedness among post-secondary students. This module includes content and activities that will help participants to appreciate the value of reflection as a key component of their WIL experience. Participants will also identify personally relevant and meaningful strategies to integrate reflection into WIL.For more information and to access SCORM files,Articulate Storyline source files andFacilitator Guide for this module, visit https://www.niagaracollege.ca/cae/wil/

Subject:
Business and Communication
Career and Technical Education
Material Type:
Module
Provider:
Niagara College
Provider Set:
WIL Open Module Initiative
Author:
Algonquin College
Georgian College
Lambton College
Niagara College