SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: batsonhr
I have never needed much persuading when it came to believing in the privacy argument, as it actually makes a lot of sense. However, I can see how someone could be tempted to be in favor of surveillance if they did not understand the meaning of privacy. As Snowden has noted several times throughout his […] Continue reading
In Episode 62 of Leading Lines, I found the example of FaceApp extremely interesting. I remember using FaceApp this summer without a care in the world. At the time I was overseas looking for a bit of fun while waiting for food at a restaurant. My friends and I transformed our faces into ones of […] Continue reading
“Adults complain that teens are wasting their time publicizing trivia, whereas teens feel as though their audience can filter out anything that appears to be irrelevant.” (Boyd, 62). Yes. Adults are correct. As teens we tend to post things online that others may or may not find enticing. However when we post we hope that […] Continue reading
The question of internet responsibility is one that has been debated for an extraordinary amount of years. I remember first hearing about it on the news with the site yellow pages. At the time, the owner of the site was being sued for the illegal use of yellow pages for sex trafficing. The argument was […] Continue reading
In the least controversial way possible, I believe this can be related to arguments for and against the second amendment. In a sense, cryptography, similar to guns, can be easily weaponized. If a person encrypts a message it is because it contains something extreme that they do not want to get out to the public. […] Continue reading
Although women born in the twenties could enjoy the results of women’s suffrage, they were not treated as equals in society. During the time of WWII, many families were extremely broken down. The adults in the family had to live with PTSD from growing up in the Great Depression. The kids in the family had […] Continue reading
The Zodiac Killer episode produced by an old cryptography Vanderbilt student was surprisingly entertaining, and well made. Not that I was expecting it to be sub-par, I was just impressed with the podcast’s high quality. There were a few aspects in particular that I really enjoyed, and would like to incorporate into my podcast. The […] Continue reading
As explained in the podcast, the Panopticon is essentially the idea of a tower that looks over a prison. The tower is illuminated so that the guard in the tower can see the inmates, but the inmates cannot see the guard. Although this could used to exemplify today’s government surveillance, Walker disagrees, saying that it […] Continue reading
In the previous chapter of The Code Book, Singh discussed cryptography during the time of Mary Queen of Scotts. During her time, cryptographers needed to be highly skilled and educated people who spent time dedicating themselves to the art of code breaking. The average person could not decipher encrypted messages. As I mentioned in an […] Continue reading
One of the topics most widely discussed throughout Little Brother by Cory Doctorow is government surveillance. Was it justifiable for the DHS to track the citizens of San Francisco’s every move in the name of national security? An instance where this ethical dilemma came into question occurred on pages 136-138, when Marcus and his father […] Continue reading