SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: internet privacy
Michael Morris’ piece Mining Student Data Could Save Lives presents the argument that universities in the United States have the technological capabilities to monitor their student bodies and act upon any suspect behaviors they may detect. Such a breach of privacy would better enable these institutions to facilitate the safety of their students, but at the trade-off […] Continue reading
It is said that history is written by the winners, but many forget the second part of of that statement, that history is also written about only the powerful and important. The examples of cryptography that survived throughout the ages were those that caused great uproar, such as the beheading of Mary Queen of Scots. […] Continue reading
One of the most surprising aspects of the radiolab episodes was the concept of the Botnet. Essentially these botnets are pieces of software that connect and can control groups of hacked or infected computers. Smaller botnets would control over 1000 computers, while larger ones could dominate over millions of computers. It’s hard to imagine that […] Continue reading
The first part of the RadioLab episode “Darkode” is probably the most interesting episode I’ve ever heard. Though it’s probably not very ethical of me, the story, the tone, and the voice just kept me laughing all the time. On the other hand, it does tell us something about internet privacy protecting. First of all, […] Continue reading
In my opinion, strong encryption should be available to the public, even terrorists and criminals, for two primary reasons, one theoretical and the other more practical. The theoretical reason is the one that Singh identified as the primary argument in favor of strong encryption: privacy rights. As Singh notes, the Declaration of Human Rights protects […] Continue reading
In the essay, “Mining Student Data Could Save Lives,” author Michael Morris claims that universities should use data mining to monitor the online activity of students as a safety precaution. Access to information about students’ online behavior could theoretically be used to identify individuals at risk of committing acts of violence and allow university officials […] Continue reading
In his essay, “Mining Student Data Could Save Lives”, Michael Morris argues that universities should implement data mining algorithms to detect patterns in student activities on their networks (e.g. any activity occurring on the WiFi network, school computers, or communications through university email accounts). According to Morris, the implementation of these algorithms could potentially prevent […] Continue reading
“Kids today. They have no sense of shame. They have no sense of privacy. They are show-offs, fame whores, pornographic little loons who post their diaries, their phone numbers, their stupid poetry—for privacy God’s sake, their dirty photos!—online.” – Emily Nussbaum I strongly disagree with this statement, as it makes a lot of assumptions about today’s […] Continue reading