Search Results (25)
This course provides an introduction to the technology and policy context of public communications networks, through critical discussion of current issues in communications policy and their historical roots. The course focuses on underlying rationales and models for government involvement and the complex dynamics introduced by co-evolving technologies, industry structure, and public policy objectives. Cases drawn from cellular, fixed-line, and Internet applications include evolution of spectrum policy and current proposals for reform; the migration to broadband and implications for universal service policies; and property rights associated with digital content. The course lays a foundation for thesis research in this domain.
Welcome to the curriculum page for the Data Privacy Project. We are pleased to share a set of learning tools that was created with and for library professionals. The curriculum contains a facilitator’s guide, presentation slides, and handouts, and permits remix and reuse under a Share Alike 4.0 Creative Commons license.
The goal of our trainings is to learn the building blocks of privacy protection and digital security. Our teachings focus on activities patrons do every day at the library so that library staff can develop capacity.
Ethics and Information Technology focuses on the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments. Students explore the technological underpinnings of associated technology systems, experiment with individual and group interaction with technologies, and examine the mechanics of ethical and unethical behaviors.
This series uses the Socratic method to build analytical skills and examine ethical questions. The programs aim to sharpen moral reasoning without favoring a particular position by exploring ethical dilemmas in legal, political, medical, corporate, and military arenas. Panelists include Antonin Scalia, Faye Wattleton, and Peter Jennings. A video instructional series on ethics for college and high school classrooms and adult learners; 10 one-hour video programs, audiocassettes.
Ethics of Human Subject Research (2 credits) is offered by the Department of Health Policy and Management and the Distance Education Division, Johns Hopkins Bloomberg School of Public Health and The Phoebe R. Berman Bioethics Institute, Johns Hopkins University. The course introduces students to the ethics of human subject research. Ethical theory and principles are introduced, followed by a brief history of research ethics. Topics covered in lectures and moderated discussions include informed consent for research participation, role and function of institutional review boards, just selection of research subjects, ethical aspects of study design, and privacy and confidentiality. Student evaluation will be based on participation in moderated discussions, an informed consent exercise and written case analysis.
In the early 20th century, when the library profession was debating privacy and its relationship to free speech, information about patrons flowed in a relatively simple manner.
A patron communicated information about herself—her interests, beliefs, or values—in the process of borrowing a book. Book borrowing involved the library creating a paper record and storing it the library’s circulation records system.
Sexting, like anything that's fun, runs its risks — but a serious violation of privacy shouldn't be one of them. Amy Adele Hasinoff looks at problematic responses to sexting in mass media, law and education, offering practical solutions for how individuals and tech companies can protect sensitive (and, ahem, potentially scandalous) digital files.
This Problem-Based Learning Assignment addresses the following questions:
- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?
Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds
Introductory mini lesson is included
In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.
In this interactive lesson, students consider the issue of internet privacy, both in their own lives and in society, including government spying, parental monitoring, and corporate tracking of consumers. What is the connection and potential conflict between safety and privacy, both on a personal and institutional level?
Privacy presentation presented at the MSDE Inspired Designer OER Development workshop. Privides a general overview of federal student data privacy regulations as well as Maryland COMAR. Also includes activities and additional resources for a professional development session.
Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.
Edward Snowden's leak of classified information about the NSA's surveillance of American citizens has touched off a debate about the need for government secrecy versus the public's right to know. Two student readings and discussion questions probe the controversy.
Whilst this specifically covers the issue of privacy / moral rights / ethical rights with medical OERs, this guide is applicable for all learning and teaching subjects.
This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.
How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)
This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.
This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices
This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.