SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: security
I take issue with the way this debate is often framed: privacy versus security. It’s misleading to suggest that privacy is directly opposed to security. A more apt name would be privacy versus surveillance. My point in these semantics is that, even given a wide latitude to monitor the people of this country, government surveillance […] Continue reading
To start off, I’ll be taking notes on every argument that is made. Good or bad, sensible or not, I’ll write it down. It will be up to the jurors to pick through this information, deciding which arguments are the strongest, most factual, and most convincing. That being said, there are some aspects of this […] Continue reading
In chapter 7, The Code Book joins the likes of George Orwell’s 1984 and the Hollywood hit Back to the Future series in making predictions about the years to come. The concept of the narrative’s future being our “past” is a little mind-boggling, but it is incredibly interesting to read the forecasts of a book […] Continue reading
The idea of perfect security is a tantalizing one on the surface. It guarantees anonymity and protection from unwanted attention; it facilitates and protects a bedrock of democracy, that being freedom of speech. Altogether, it’s no surprise that, in the interest of preserving the core values of democracy, people would want perfect security implemented for […] Continue reading
In the least controversial way possible, I believe this can be related to arguments for and against the second amendment. In a sense, cryptography, similar to guns, can be easily weaponized. If a person encrypts a message it is because it contains something extreme that they do not want to get out to the public. […] Continue reading
Before the telegraph was invented and introduced to society, the only way of sending messages was through written means. If you wanted to send a message to a receiver that lived far away, you needed a middleman – someone to transport the message. The telegraph effectively removed the worry that your message would be intercepted […] Continue reading
After the terrorist attack on San Francisco, the Department of Homeland Security ramps up security and surveillance in hopes of catching the people responsible, but instead only manage to inconvenience, detain, and even seriously harm innocent civilians. Marcus explains that the problem with the DHS system is that they’re looking for something too rare in […] Continue reading
In the essay “Mining Student Data Could Save Lives,” by Michael Morris, the central argument is essentially that a variety of online platforms already use data mining to see what they should advertise to users; since this is the case, why not allow colleges and universities to use the same technology to see if they […] Continue reading
After recently watching Citizenfour, I feel myself being much more cautious about what I search on the web. I do not do this because I have anything to hide, but because people do not act the same when they believe, or in this case know, they are being surveilled. These podcast episodes did not exactly put […] Continue reading
As a jury of a debate, I would like to consider several issues as the judging criteria for the debate on Monday. First of all, the basic points for pro team and con team must be explicit and reasonable. In their first round, they must build at least one solid point of view, which should […] Continue reading