CSCI E-2 Bits

0( 0 REVIEWS )
1 STUDENTS

This course focuses on information as quantity, resource, and property. We study the application of quantitative methods to understanding how information technologies inform issues of public policy, regulation, and law. How are music, images, and telephone conversations represented digitally, and how are they moved reliably from place to place through wires, glass fibers, and the air? Who owns information, who owns software, what forms of regulation and law restrict the communication and use of information, and does it matter? How can personal privacy be protected at the same time that society benefits from communicated or shared information.

Course Curriculum

Guest Chris Soghoian – 1 Details
Tracking and monitoring: RFID cards Details
Tracking and monitoring: device I Details
Introduction: history of encryption Details
Encryption: history as a military technology; legislative attempts to control encryption keys I Details
How to decrypt a cipher, an example of a substitution cipher Details
Cryptosystems Details
Vigenere’s cipher, frequency analysis Details
Secure encryption: an introduction Details
Public Key Cryptography: Diffie-Hellman key agreement and Details
Public Key Cryptography and computing big powers I Details
Diffie-Hellman Key Agreement Details
Additional thoughts re: cryptography Details
What a search engine does Details
Internet Archive Details
Building a search engine index Details
Storage and binary search Details
Google index and page rank algorithm Details
Google: ads and page ranking I Details
Content filtering Details
Google trends II Details
Searching the Web Details
Encryption II Details
Frequency Analysis Details
Why “security through obscurity” fails Details
DES and AES Details
Public key cryptography Details
Modular arithmetic Details
Diffie-Hellman continued Details
Modular arithmetic in cryptography Details
Verifying identity Details
Introduction: history of encryption Details
Encryption: history as a military technology; legislative attempts to control encryption keys Details
How to decrypt a cipher, an example of a substitution cipher Details
Cryptosystems Details
Vigenere’s cipher, frequency analysis Details
Secure encryption: an introduction Details
Public key cryptography: Diffie-Hellman key agreement Details
Public Key Cryptography and computing big powers Details
Diffie-Hellman Key Agreement Details
Additional thoughts re: cryptography Details
Copyright info Details
Proprietary formats Details
DVD protection – 1 Details
Privacy policies on the web Details
Guest: intellectual property lawyer Marshall Lerner: free speech and DVD copy protection Details
Books on the Internet Details
Copyright, Mickey Mouse and derivative works Details
Copyright: an introduction Details
RIAA, MPAA concerns re: piracy Details
Copyright and metaphor of theft Details
Copyright: an overview, continued Details
Copyright and derivative works Details
Copyright: fair use Details
Google Books search Details
Guest: Charles Nesson, on copyright Details
Censorship of the Internet Details
DVD protection – 2 Details
Guest Chris Soghoian – 2 Details
Guest: Professor Jonathan Zittrain, Harvard Law School, author of The Future of the Internet and How to Stop It Details
Defamation Details
The Communications Decency Act Details
The Case of Ken Zeran Details
Why the course is called Life, Liberty Details
Content filtering Details
Introduction: laws governing speech and the development of those laws Details
Speech and liability on the Web: two cases compared Details
Communications Decency Act and the Web Details
CDA Section 230, the Good Samaritan clause Details
CDA Section 230, continued I Details
The Good Samaritan provisions of the CDA … John Perry Barlow’s Declaration of Independence of Cyberspace, 1996 Details
DVD protection – 3 Details
Guest Chris Soghoian – 3 Details
Why is it called the Internet? Details
Comcast case and net neutrality Details
Anatomy of an Internet packet; TCP and UDP Details
Comcast and Bit Torrent protocol Details
Network neutrality: an introduction Details
How do you regulate the Internet? Details
How do you make rules for technologies yet unseen? Details
How do you regulate the Internet when the technologies keep evolving? Details
Net Neutrality: a historical context Details
Dave Reed: Early Internet pioneer Details
The Lori Drew case: the verdict, and further thoughts Details
Cooperation on the Web Details
Cooperation on the Web: Wikipedia part 2 Details
Collective Intelligence: tracking digital trails Details
Nothing goes away Details
DVD Protection – 4 Details
Unlikely events Details
Is information really deleted? Details
Guest Chris Soghoian – 4 Details
Reasonable network management practices Details
Redacted documents Details
Privacy policies on the Web Details
HTTP and cookies Details
Guest Latanya Sweeney: secret sharing Details
Tyler Moore talks about phishing scams Details
Why the course is called Life, Liberty … Details
Technology and data access Details

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

FreeVideoLectures.com All rights reserved.

Setup Menus in Admin Panel