|
Date
|
Topics
|
Readings
|
Assignments
|
Week 1
|
January
31
|
Introductions
Syllabus
Questionnaire
Topics: Internet Architecture - Protocols - Internet History - Key
Moments
|
|
- Create your blog
- Email your blog address to professor (shereen@pacificu.edu)
by 8pm on Sunday 2/5
- Post your blog post by 8pm on Sunday 2/5
- Write about one of your early encounters with the
internet. Was it at school, at home, or at a friend's house? What
machine did you use? Was it fascinating or frustrating? Was it using a
dial-up modem on AOL? In short, tell me a little about your early,
formative history with the internet. Be as specific, concrete, detailed
and engaging as possible.
- Use links and images in your blog post as appropriate.
- Comment on at least one of your classmate's blogs by 8pm on
Monday 2/6
- Watch digital_nation
from PBS
|
February 2
|
CLASS
CANCELLED - Professor at a conference |
|
|
Week 2
|
February 7
|
Digital Nation:
- Real world vs. virtual/digital world
- Digital native
- Multitasking
- Distraction
- Internet addiction
- PC Bangs
- Technology in the military
|
Blown
to Bits - Chapter 1: Digital Explosion: Why is it Happening and What is
at Stake?
Lecture Notes
|
- Read chapter 1 of Blown
to Bits
- Find one article related to the Internet that was published
this week, and link to it in your blog by 8pm on Wednesday 2/8
- Write a one paragraph comment on one of your classmate's
links by 4:30pm on Thursday 2/9:
|
February 9
|
It's all just bits!
- Bits
- Bytes
- Moore's Law
- Claude Shannon
- Copying bits
- Parity
|
Lecture Notes
Bits
and hoaxes
|
Read chapter
2 of Blown to Bits.
Write about the following and post it to your blog by 8pm on Sunday,
2/12
- You just woke up with a case of acute amnesia and you don't
remember anything about yourself except your name and nationality.
However, your assignment demands that you write an autobiographical
essay. What are you going to do?
Use the Internet to find out information about yourself. Use any sites
you like. Examples include Google, Facebook, MySpace, and ixquick.
Think about all of the data that might be available about: medical,
financial, personal, and so on.
- Add a concluding paragraph reflecting on what you found,
how easy or difficult it was to find, and how this has influenced your
perspective on issues such as privacy.
Create
your avatar in Second Life and Personalize it. Spend about half an hour
familiarizing yourself with the environment. We'll do more with it on
Tuesday.
|
Week 3
|
February 14
|
Privacy:
- Surveillance
- Online privacy
- Anonymity
- Targeted advertising
- GPS
- RFID
- Privacy Documents
|
Lecture Notes
Camera
Surveillance
Online
Privacy
Targeted Advertising
Google's
Privacy Policy
Pacific
University's Appropriate Use Policy
Google
Cookies
|
Read chapter 3 of Blown to Bits.
Find one news article related to online privacy and/or anonymity that
was published within the last year. This article should not cover some
of the same stories that we discussed in class.
- Link to the article in your blog by 8pm on Wednesday 2/15.
- Write a one paragraph comment on your classmate's link by
4:30pm on Thursday 2/16.
|
February 16
|
Secrets in Electronic Documents
- Redacted PDFs
- Tracking changes
- Forging Metadata
- Raster images
- ASCII
- Binary Numbers
- Image compression
- Sanitizing hard disks
|
Lecture Notes
How to
Sanitize a Hard Disk
Embarrasements
of Tracked Changes
TSA and Redacted Documents
Khan
Academy explains binary numbers
|
Answer
the following three questions in a Microsoft Word document and email
the answers to me (shereen@pacificu.edu) by 4:30pm on Tuesday, 2/21:
- You'd like to donate your old laptop computer to a charity
or school,
and have some sensitive information on the laptop such as your social
security number, banking information or personal photos, that need to
be removed. What should you do to prepare your laptop before giving it
away?
- JPEG and PDF are two common file formats. Which is better
for representing (1) a picture of your family (2) your favorite stories
about your family? Briefly explain your answers.
- Consider the following sequence of bits (which has been
split into 12 8-bit bytes to aid readability):
01000011 01010011 00110001 00110001 00110000 00100000
01110010 01101111 01100011 01101011 01110011 00101110
- Suppose you interpret this sequence of bits as 12
decimal numbers in the range 0—255. What are the 12 numbers?
- Suppose you interpret this sequence of bits as a string
consisting of 12 ASCII characters. What are the 12 characters?
|
Week
4
|
February 21
|
Web 2.0
Net Neutrality
Create survey
|
Final Project
Prezi
Lecture Notes
|
For next time:
|
February 23
|
Review
Copyright
SOPA, PIPA, & OPEN
|
Lecture Notes
Sample midtem exam questions
|
Write about the following and post it to your blog by 8pm on Sunday,
2/26
- Research the Stop Online Piracy Act (SOPA) and write a short essay about it. Here are some things to include:
- The purpose of the bill.
- What proponants of the act have to say.
- What apponants have to say.
- What happened to the bill.
- Description of PIPA and OPEN and how they compare to SOPA.
- Your stance on the issues and why.
|
Week 5
|
February 28
|
Midterm |
|
|
March 1
|
CLASS CANCELLED - Professor at a
conference
|
|
Read Chapter 7 of Blown to Bits
As you are reading, consider these questions:
- Why is DOPA controversial?
- As a teen, did you face monitoring or censorship by your
parents? Did they let you watch R-rated movies? Listen to music with
explicit lyrics? Did they let you have a cell phone? A car? Did you
have your own computer, or use a shared family computer? Did they
monitor your internet usage, and/or run a site blocker to stop you or
siblings from viewing inappropriate materials online?
- Should sites like MySpace, Facebook, etc. be totally
uncensored, or should they allow any content whatsoever to be posted
and transmitted? What content (if any) should be forbidden? (hate
speech, defamation, profanity, pornography, child pornography, drug
trafficking?)
- What, if anything, should sites like MySpace, Facebook,
Twitter, etc. do about the problem of sexual predators and other crime
that may be facilitated by their services? Are they at all liable for
such events if they occur? (Are they more like a distributor/truck, a
newspaper/publisher, or a library?)
|
Week
6
|
March 6
|
Safety, Censorship, and Free Speech on the Internet
|
Lecture Notes
Let's take the Internet back
Cry Wolf
How the Internet Enables Intimicy
|
Read Chapter 5 of Blown to Bits
|
March 8
|
Encryption
|
Lecture Notes
Public Key Cryptography Notes
Wikipedia
|
Watch Digital
Humanitarianism
|
Week 7
|
March 13
|
Digital Revolutions
Digital Collaboration
Digital Divide
|
Lecture Notes
|
While
discussing RSA encryption, we looked at some simpler encryption
algorithms that lasted for many years. For each of these problems, show
your work for maximum credit.
- Encode the message PACKETSWITCHING using a Caesar cipher with a shift of 8.
- Encode the message INTERNETPROTOCOL using a Vigenere cipher with a key of EMAIL.
- Decode the message RNXXNXXNUUNWNAJW that was encoded using a Caesar cipher. What is the shift that was used?
- Decode the message CIABIRWIQCEEO that was encoded using a Vigenere cipher. HINT: The key is in this sentence.
Email your solution to me by 5pm on Sunday, March 18.
|
March 15
|
Work on final project and presentation
|
|
|
Week
8
|
Monday, March 19
|
Final presentations - 6-8:30pm
|
|
|