Author Archives: scuddeam

No, the Fact I Don’t Want You To Read My Texts Doesn’t Mean I’m Obviously Breaking The Law

They want the right to be ignored by the people who they see as being “in their business.” Teens are not particularly concerned about organizational actors; rather, they wish to avoid paternalistic adults who use safety and protection as an excuse to monitor their everyday sociality. (Boyd, 56) This chapter, and in particular this section, […] Continue reading

Posted in privacy, Student Posts, surveillance, technology | Comments Off on No, the Fact I Don’t Want You To Read My Texts Doesn’t Mean I’m Obviously Breaking The Law

Implications of the Information Age

When I began reading Singh Ch.7, I failed to realize, or remember, that the book was written 20 years ago. So, I was very surprised by some of the statements he made in the opening paragraph, such as the assertion that email would “soon” replace physical mail. In addition to email, text messages, instant messaging, […] Continue reading

Posted in Student Posts | Comments Off on Implications of the Information Age

Power of a Test

After the terrorist attack on San Francisco, the Department of Homeland Security ramps up security and surveillance in hopes of catching the people responsible, but instead only manage to inconvenience, detain, and even seriously harm innocent civilians. Marcus explains that the problem with the DHS system is that they’re looking for something too rare in […] Continue reading

Posted in little brother, security, Student Posts, surveillance | Comments Off on Power of a Test

Hindsight is 20/20

In his essay “Mining Student Data Could Save Lives”, Morris suggests that by analyzing students digital activities, we could catch the oft-ignored signs of a future attack and take action before any lives are lost. At first glance, this seems like a perfect method to deter violence on campus. Sure, the students privacy is somewhat […] Continue reading

Posted in data mining, privacy, Student Posts, surveillance | Comments Off on Hindsight is 20/20

Inviting Suspicion

We generally don’t bother to encrypt messages if we have nothing to hide. By using a code or cipher, it’s implied that the contents are sensitive or illicit in nature. In fact, as Singh points out, they’re likely to be more explicit because the encryption lulls the sender into a false sense of security and […] Continue reading

Posted in " communication, Mary Queen of Scots, Student Posts, weak encryption | Comments Off on Inviting Suspicion