Author Archives: Elton

Judging criteria for the debate

As a jury of a debate, I would like to consider several issues as the judging criteria for the debate on Monday. First of all, the basic points for pro team and con team must be explicit and reasonable. In their first round, they must build at least one solid point of view, which should […] Continue reading

Posted in debate, privacy, security, Student Posts | Comments Off on Judging criteria for the debate

Advices for college students

After stepping into college, the internet becomes more and more popular in our daily life. Nowadays we purchase things through the internet, we upload our assignments through the internet, we book our session through the internet. Meanwhile, internet privacy gradually becomes a problem. The first advice I would give a college student is that do […] Continue reading

Posted in college student, internet, privacy, Student Posts | Comments Off on Advices for college students

A Good Podcast By Using Excellent Introductions and Voices

After listening to the podcast “Something Out of Nothing” by Maria Sellers, I found many interest points about this podcast, both the content and the structure. Also, I learned several useful ideas about the production of a podcast. First of all, The title of the show notes of the podcast,  “Something Out of Nothing”, would […] Continue reading

Posted in podcast, something or nothing, Student Posts, voices | Comments Off on A Good Podcast By Using Excellent Introductions and Voices

Social Media provides more gaps between parents and teens

“Social media has introduced a new dimension to the well-worn fights over private space and personal expression.” Have you ever hide part of your school life as secrets from your parents through social media? Shared with your friends that you played a trick with your teacher in high school but hide it from your parents? Well, […] Continue reading

Posted in "social media, privacy, Student Posts, teens | Comments Off on Social Media provides more gaps between parents and teens

Breaking Codes Is Much More Difficult In Practice

In Chapter 3, Singh provides an example of breaking codes with keywords and makes everything seems quite easy. However, in practice, breaking such a code is definitely difficult and needs a lot of time and work. Say you have a message which is enciphered by using a keyword as long as the plaintext. The first thing is […] Continue reading

Posted in Chapter 3, cryptography, Student Posts, The Code Book | Comments Off on Breaking Codes Is Much More Difficult In Practice

What Would I Give Up To Feel Safer

To be honest, I am not good with the USA Patriot Act, because it means I have no right to hide any secrets. If somebody could look over all my private staffs without my approvement or even without my acknowledgment, I will feel invaded. However, I have to admit that there is terrorism in this world […] Continue reading

Posted in privacy, security, security vs. privacy, Student Posts | Comments Off on What Would I Give Up To Feel Safer

Why People Start to Concern Their Encrypted Message to be Deciphered

In the time of the Mary Queen of Scots, people were confident with their encrypted messages and did not concern the privacy of their messages. However, for some time after that, people started to find a way to create more and more complicated ciphers, for the reason that they realized there are experts who could […] Continue reading

Posted in Chapter 2, privacy, Student Posts, The Code Book | Comments Off on Why People Start to Concern Their Encrypted Message to be Deciphered

School or Prison – We are naked under monitoring

The most impressive passage for me is chapter 6. The author uses the dialogue between the Turk and Marcus to indicate the situation that citizens are under monitoring, through ways such as tracking their expense record. Marcus’s thinking afterward during school strengthen this point. “You think it’s no big deal maybe? What is the problem with the government […] Continue reading

Posted in little brother, privacy, security, Student Posts | Comments Off on School or Prison – We are naked under monitoring

Mining Student Data – To protect students or invade students’ life

In his essay, Michael Morris states that through mining student data, threat-assessment teams of universities have a great chance and plausible accuracy to predict possible violent behaviors with mining algorithms. As a result, it is responsible for every university to monitor students’ academic record and prevent every possible tragedy. Undoubtedly, in no way are we supposed to […] Continue reading

Posted in cryptography, datamining, privacy, Student Posts, threat assessment | Comments Off on Mining Student Data – To protect students or invade students’ life