SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: scuddeam
They want the right to be ignored by the people who they see as being “in their business.” Teens are not particularly concerned about organizational actors; rather, they wish to avoid paternalistic adults who use safety and protection as an excuse to monitor their everyday sociality. (Boyd, 56) This chapter, and in particular this section, […] Continue reading
When I began reading Singh Ch.7, I failed to realize, or remember, that the book was written 20 years ago. So, I was very surprised by some of the statements he made in the opening paragraph, such as the assertion that email would “soon” replace physical mail. In addition to email, text messages, instant messaging, […] Continue reading
After the terrorist attack on San Francisco, the Department of Homeland Security ramps up security and surveillance in hopes of catching the people responsible, but instead only manage to inconvenience, detain, and even seriously harm innocent civilians. Marcus explains that the problem with the DHS system is that they’re looking for something too rare in […] Continue reading
In his essay “Mining Student Data Could Save Lives”, Morris suggests that by analyzing students digital activities, we could catch the oft-ignored signs of a future attack and take action before any lives are lost. At first glance, this seems like a perfect method to deter violence on campus. Sure, the students privacy is somewhat […] Continue reading
We generally don’t bother to encrypt messages if we have nothing to hide. By using a code or cipher, it’s implied that the contents are sensitive or illicit in nature. In fact, as Singh points out, they’re likely to be more explicit because the encryption lulls the sender into a false sense of security and […] Continue reading