Catalog Search Results
Technology resources and online guides are provided alongside the Library’s Learning Lab class materials.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Drones—unmanned aerial vehicles—are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall"between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after 9/11.
45) Metadata
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Dig deeper into the government’s electronic surveillance programs. Here, you’ll learn about "metadata”—or data about data. After reviewing what metadata is and how it works, you’ll examine the thorny legal issues surrounding metadata gathering in the years after 9/11, and whether collecting it violates the 4th Amendment protection against search and seizure.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you’ll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our smart phones.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption—including biometric finger scans to unlock phones and access data. But without a "back door"for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance—physical, electronic and data—and see how each type works. Case studies of the Osama Bin Laden raid and U.S. airport screening show the tension between security and transparency.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data—as well as the threat it poses to privacy and anonymity.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
A man shoots down a drone that is flying over his private property. A retail store uses predictive data analytics to send pregnancy-related advertising to a teenager who has not told her parents about her condition. A police officer places a GPS device on a suspected criminal's car to follow him and build a case against him..The news is full of such stories, in which new technologies lead to dilemmas that could not have been imagined just a few decades...
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Look toward the future and examine the possibilities of quantum computing, human-computer interface, and artificial intelligence. These technological changes are going to require each of us to make decisions about privacy and security—for ourselves and for future generations. Recap what you’ve learned to determine your vision of the best way forward from here.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data.
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security—as illustrated by a dramatic face-off over John Ashcroft’s hospital bed.
Publisher
Gravitas
Pub. Date
2017.
Language
English
Description
Bitcoin is the most disruptive invention since the internet, and now an ideological battle is underway between fringe utopists and mainstream capitalism. Bitcoin's early pioneers sought to blur the lines of sovereignty and the financial status quo. After years of underground development Bitcoin grabbed the attention of a curious public, and the ire of the regulators the technology had subverted. After landmark arrests of prominent cyber criminals...
Publisher
Documentary Educational Resources
Pub. Date
2006.
Language
English
Description
This documentary focuses on a small 'startup' company in Bangalore that designs and produces software products for cellular service providers in Europe and the U.S. Turning the tables on the usual outsourcing story, July Systems has leveraged U.S.-based venture capital and Indian technical expertise to break into the latest high-tech markets.. The film explores the creation of a Silicon Valley-style work culture within this 'cross-border' company...
60) Killswitch
Publisher
Random Media
Pub. Date
2015.
Language
English
Description
The Internet is under attack. Free speech, innovation, and democracy are all up for grabs. KILLSWITCH is about the battle for control over the Internet.. This is the story of two young hactivists, Aaron Swartz & Edward Snowden, who symbolize the disruptive and dynamic nature of the Internet. Their lives parallel one another as they free information to millions on the Internet, putting them directly in the cross-hairs of the most powerful interests...
Interlibrary Loans
Didn't find what you need? Items not owned by Arcadia Public Library can be requested from other libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request