Updating search results...

Search Resources

19 Results

View
Selected filters:
  • Surveillance
Balloons
Read the Fine Print
Educational Use
Rating
0.0 stars

Students follow the steps of the engineering design process as they design and construct balloons for aerial surveillance. After their first attempts to create balloons, they are given the associated Estimating Buoyancy lesson to learn about volume, buoyancy and density to help them iterate more successful balloon designs.Applying their newfound knowledge, the young engineers build and test balloons that fly carrying small flip cameras that capture aerial images of their school. Students use the aerial footage to draw maps and estimate areas.

Subject:
Engineering
Mathematics
Physics
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Marissa H. Forbes
Mike Soltys
Date Added:
09/18/2014
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.

This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.

Subject:
Computer Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
07/27/2021
Deleting Dystopia: Re-Asserting Human Priorities in the Age of Surveillance Capitalism
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Subject:
Social Science
Material Type:
Textbook
Provider:
University of Southern Queensland
Author:
Richard A. Slaughter
Date Added:
11/18/2021
Inquiry Based Project: Privacy v. Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Author:
Molly Miner
Date Added:
12/17/2018
Inquiry Project: Surveillance vs Rights
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This a inquiry based project about the topic of government surveillance. This includes the driving question, grabber and culminating activity. This also includes a number of different resources that the students can use to do research.

Subject:
Social Science
Material Type:
Homework/Assignment
Author:
Myles Garrett
Date Added:
12/17/2018
Measuring Health and Disease I: Introduction to Epidemiology Module Guide
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This module was developed at the School of Public Health, University for the Western Cape for the Postgraduate Certificate in Public Health which was offered as a distance learning module between 2001 and 2008. It was designed to meet the growing need for an applied course in the measurement of a variety of health indicators and outcomes. Whether you manage a health programme, a health facility, or simply have to interpret health data in the course of your work, this module sets out to increase your capacity to deal with health and disease information. It aims to assist you in applying epidemiological knowledge and skills to a variety of Public Health problems such as: Is your DOTS programme succeeding? What does it mean if a TB prevalence is 850/100 000? Is this a Public Health problem or not? What is the burden of disease in different communities?

Subject:
Health, Medicine and Nursing
Material Type:
Textbook
Provider:
OER Africa
Author:
Neil Myburgh, Debra Jackson
Date Added:
02/27/2012
Measuring Health and Disease I: Introduction to Epidemiology Module Guide
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This module was designed to meet the growing need for an applied course in the measurement of a variety of health indicators and outcomes. Whether you manage a health programme, a health facility, or simply have to interpret health data in the course of your work, this module sets out to increase your capacity to deal with health and disease information. It aims to assist you in applying epidemiological knowledge and skills to a variety of Public Health problems such as:Is your DOTS programme succeeding?What does it mean if a TB prevalence is 850/100 000?Is this a Public Health problem or not?What is the Ňburden of diseaseÓ in different communities?

Subject:
Health, Medicine and Nursing
Material Type:
Assessment
Diagram/Illustration
Lecture
Lesson Plan
Unit of Study
Provider:
OER Africa
Author:
Debra Jackson
Neil Myburgh
Date Added:
11/05/2010
NSA Surveillance: A Debate
Unrestricted Use
CC BY
Rating
0.0 stars

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
5.0 stars

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
11/14/2017
Remix
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/14/2018
Remix
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/10/2018
StoryWorks: Beautiful Agitators
Unrestricted Use
CC BY
Rating
0.0 stars

StoryWorks develops inclusive and transformative educational theater experiences that provide students with the opportunity to examine our country’s civil rights history. Through content consistent with school curriculum standards, the program engages students in experiential learning and inspires them to ask deeper questions about the historical underpinnings behind contemporary issues. The process creates pathways to civic engagement, creates lasting memories and instills a tangible sense of social belonging. This StoryWorks educational project is built around Beautiful Agitators, a theatrical play about Vera Mae Pigee, a hair stylist and business owner in Clarksdale, Mississippi, and one of the unsung heroes of the civil rights era. Using her beauty parlor as a hub for Delta-based organizing and resistance, Pigee operated her salon by day and then transformed it into a clandestine center for civil rights organization and education in the evenings. Known for her big hats and larger than life personality, Mrs. Pigee led the direct action that registered nearly 6,000 African Americans to vote in the region. Although Pigee was largely left out of the history books, along with many women of the movement, our play Beautiful Agitators and accompanying curriculum revives her legacy, highlighting her methods and tactics. Inspired by the innovative K-12 civil rights education standards developed by the Mississippi Civil Rights Commission. Our commitment is to expand upon the standards by further developing content related to social justice, power relations, environmental justice, diversity, equity, mutual respect, and civic engagement. Beautiful Agitators combines inquiry with higher-order thinking skills of analysis, evaluation and synthesis. Set in a beauty parlor owned and operated by a Black woman in the Mississippi Delta, our curriculum is based on our investigation into primary sources and their relationship to critical moments in the national movement. This foundation of historical context allows for students and educators to find contemporary parallels which further engage learners to reflect upon the legacy of the civil rights movement and the struggles that we, as citizens, continue to grapple with today.View the complete play Beautiful Agitators on the StoryWorks Theater site.Implementation1. Beautiful Agitators Performance Classroom watches a prerecorded, staged reading of the play Beautiful Agitators, which was created and performed by artists from the Mississippi Delta, home of Vera Mae Pigee.2. Lesson Plan Activities Following the eight-lesson plan structure, students will read aloud or act out scenes from the play. This participatory interaction with the text and the historical events promotes a high level of engagement from the students and encourages experiential learning. These activities directly correspond to scenes in the play and to specific content area standards. Teacher leads guided discussions and helps to explain the historical context and theme of each scene. Students/actors have the opportunity to share their experiences having portrayed these historical figures. 

Subject:
Arts and Humanities
Literature
Performing Arts
English Language Arts
Composition and Rhetoric
U.S. History
Social Science
Political Science
Material Type:
Full Course
Date Added:
07/12/2021
StoryWorks: Beautiful Agitators, StoryWorks: Beautiful Agitators Curriculum, 5. Mississippi Sovereignty Commission: Surveillance, Corruption and Violence
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Through the play Beautiful Agitators and accompanying curriculum, students will eplore the life of Vera Mae Pigee and the power and influence of the Mississippi Sovereignty Commission.

Subject:
Performing Arts
Social Science
Material Type:
Unit of Study
Author:
Jennifer Welch
Rebecca Welch Weigel
Date Added:
07/12/2021
Surveillance and monitoring of disease
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Monitoring of the epidemiological patterns (animal, place, time) of diseases and pathogens within populations provides a vital system for the identification of changes in disease status within this population (whether this relates to all animals worldwide, or those within a single country, region, village or farm). For this reason, most countries have systems in place for the intermittent collection and collation of data relating to disease. Monitoring of production levels also provides a method of informing farmers about the productivity of their animals. These processes can be described as monitoring systems.

Subject:
Life Science
Material Type:
Diagram/Illustration
Reading
Provider:
WikiVet
Provider Set:
Veterinary Epidemiology
Date Added:
02/27/2015
Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational.

Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure.

The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

Subject:
Engineering
Material Type:
Textbook
Provider:
New Prairie Press
Author:
Candice Carter
Hans C. Mumm
Julie J.C.H. Ryan
Randall K. Nichols
Wayne D. Lonstein
Date Added:
09/14/2018
Unmanned Aircraft Systems in the Cyber Domain - Second Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

Subject:
Career and Technical Education
Material Type:
Textbook
Provider:
New Prairie Press
Author:
Hans C. Mumm
Randall K. Nichols
Wayne D. Lonstein
Date Added:
11/12/2021
A la defensa del disenso: Represión digital y defensa criptográfica de movimientos sociales
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

A la defensa del disenso es una introducción a la criptografía que atiende los efectos sociales de la vigilancia, así como el potencial de protección que brinda el cifrado, con un enfoque en los movimientos sociales nacidos en Estados Unidos. Cada capítulo termina con una historia que aporta un contexto social al material: desde la vigilancia contra protestas contemporáneas en Estados Unidos, hasta la forma en que el Congreso Nacional Africano usó cifrado parcialmente manual para luchar contra el Apartheid en la Sudáfrica de los años 80 del siglo pasado.

Subject:
Computer Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
05/27/2022