Catalog Search Results
Pub. Date
2011.
Physical Desc
1 online resource (streaming video file) (79 minutes): digital, .flv file, sound
Description
What if you could harness the power of the free market to solve the problems of poverty, hunger, and inequality? To some, it sounds impossible. But Nobel Peace Prize winner Muhammad Yunus is doing exactly that.Bonsai People celebrates Yunus’ extraordinary humanitarian work, which started by lending [dollar sign]27 to 42 people out of his own pocket and has now grown to helping 1 out of every 1,000 people on earth. But he didn’t stop there - whenever...
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Description
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption—including biometric finger scans to unlock phones and access data. But without a "back door"for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together.
65) Love Hate Love
Pub. Date
2011.
Physical Desc
1 online resource (streaming video file) (83 minutes): digital, .flv file, sound
Description
Love Hate Love weaves together the stories of three families whose lives were torn apart by some of the most notorious terrorist attacks of the 21st century, yet refused to succumb to despair or hate.. Liz Alderman’s son Peter was murdered in the 9/11 attacks on the World Trade Center. Esther Hyman’s only sister and a gifted artist was killed in the 2005 bus bombings in London. Australian business owner Ben Tullipan lost both his legs when a one-ton...
66) From Poverty to Purpose, The Ben Carson Story: Role Model for Medicine & World-Renowned Neurosurgeon
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (19 minutes): digital, .flv file, sound
Description
How does an inner city African American kid with a self-proclaimed violent temper, become a world renowned brain surgeon, an inspiring role model for disadvantaged youth, a medical innovator and achieve success... against all odds? In 2001, CNN and Time Magazine named Ben Carson one of the nation's 20 foremost physicians and scientists. His mother was his most influential inspiration, changing Ben from worst to first. He gained respect as he soared...
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data—as well as the threat it poses to privacy and anonymity.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue.
69) Biometrics
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Description
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this technology, you’ll also see the darker side of this data unleashed in the world.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Description
Drones—unmanned aerial vehicles—are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (33 minutes): digital, .flv file, sound
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
73) Geolocation
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
You are where you go—at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given (such as a social media check-in) to the improperly acquired (such as cell phone spying). Then see what investigators can do with such data.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (32 minutes): digital, .flv file, sound
Description
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten"principle. Although Europe and America’s approach toward privacy is generally similar, here you’ll compare the legal state of data collection in both the public and private realms to find out where the differences lie.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (36 minutes): digital, .flv file, sound
Description
Look toward the future and examine the possibilities of quantum computing, human-computer interface, and artificial intelligence. These technological changes are going to require each of us to make decisions about privacy and security—for ourselves and for future generations. Recap what you’ve learned to determine your vision of the best way forward from here.
76) The Student Body
Pub. Date
2017.
Physical Desc
1 online resource (streaming video file) (87 minutes): digital, .flv file, sound
Description
This is a true underdog story of two brave girls who take a stand against bullying, government intrusion and hypocrisy while exploring the complex and controversial truths behind the childhood obesity debate.. Coined the "Fat Letters" by students, notification letters forced by lawmakers were sent to kids whose body mass did not fall within a narrowly acceptable range, essentially telling children -- even as young as kindergarteners -- that they're...
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (33 minutes): digital, .flv file, sound
Description
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security—as illustrated by a dramatic face-off over John Ashcroft’s hospital bed.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (29 minutes): digital, .flv file, sound
Description
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy—keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and think about the lessons it can teach us today.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (29 minutes): digital, .flv file, sound
Description
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses.
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Description
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data.
Didn't find it?
Can't find what you are looking for? Try our Item Request Service. Submit Request