CS 121


Date
Topics
Readings
Assignments
Week 1
January 31
Introductions

Syllabus

Questionnaire

Topics: Internet Architecture - Protocols - Internet History - Key Moments

  • Create your blog
  • Email your blog address to professor (shereen@pacificu.edu) by 8pm on Sunday 2/5
  • Post your blog post by 8pm on Sunday 2/5
    • Write about one of your early encounters with the internet. Was it at school, at home, or at a friend's house? What machine did you use? Was it fascinating or frustrating? Was it using a dial-up modem on AOL? In short, tell me a little about your early, formative history with the internet. Be as specific, concrete, detailed and engaging as possible.
    • Use links and images in your blog post as appropriate.
  • Comment on at least one of your classmate's blogs by 8pm on Monday 2/6
  • Watch digital_nation from PBS
February 2
CLASS CANCELLED - Professor at a conference

Week 2
February 7
Digital Nation:
  • Real world vs. virtual/digital world
  • Digital native
  • Multitasking
  • Distraction
  • Internet addiction
  • PC Bangs
  • Technology in the military
Blown to Bits - Chapter 1: Digital Explosion: Why is it Happening and What is at Stake?

Lecture Notes
  • Read chapter 1 of Blown to Bits
  • Find one article related to the Internet that was published this week, and link to it in your blog by 8pm on Wednesday 2/8
  • Write a one paragraph comment on one of your classmate's links by 4:30pm on Thursday 2/9:
February 9
It's all just bits!
  • Bits
  • Bytes
  • Moore's Law
  • Claude Shannon
  • Copying bits
  • Parity
Lecture Notes

Bits and hoaxes
Read chapter 2 of Blown to Bits.

Write about the following and post it to your blog by 8pm on Sunday, 2/12
  • You just woke up with a case of acute amnesia and you don't remember anything about yourself except your name and nationality. However, your assignment demands that you write an autobiographical essay. What are you going to do?

    Use the Internet to find out information about yourself. Use any sites you like. Examples include Google, Facebook, MySpace, and ixquick. Think about all of the data that might be available about: medical, financial, personal, and so on.

  • Add a concluding paragraph reflecting on what you found, how easy or difficult it was to find, and how this has influenced your perspective on issues such as privacy.
Create your avatar in Second Life and Personalize it. Spend about half an hour familiarizing yourself with the environment. We'll do more with it on Tuesday.

Week 3
February 14
Privacy:
  • Surveillance
  • Online privacy
  • Anonymity
  • Targeted advertising
  • GPS
  • RFID
  • Privacy Documents
Lecture Notes

Camera Surveillance

Online Privacy

Targeted Advertising


Google's Privacy Policy

Pacific University's Appropriate Use Policy

Google Cookies
Read chapter 3 of Blown to Bits.

Find one news article related to online privacy and/or anonymity that was published within the last year. This article should not cover some of the same stories that we discussed in class.
  • Link to the article in your blog by 8pm on Wednesday 2/15.
  • Write a one paragraph comment on your classmate's link by 4:30pm on Thursday 2/16.
February 16
Secrets in Electronic Documents
  • Redacted PDFs
  • Tracking changes
  • Forging Metadata
  • Raster images
  • ASCII
  • Binary Numbers
  • Image compression
  • Sanitizing hard disks
Lecture Notes

How to Sanitize a Hard Disk

Embarrasements of Tracked Changes

TSA and Redacted Documents


Khan Academy explains binary numbers
Answer the following three questions in a Microsoft Word document and email the answers to me (shereen@pacificu.edu) by 4:30pm on Tuesday, 2/21:
  • You'd like to donate your old laptop computer to a charity or school, and have some sensitive information on the laptop such as your social security number, banking information or personal photos, that need to be removed. What should you do to prepare your laptop before giving it away?
  • JPEG and PDF are two common file formats. Which is better for representing (1) a picture of your family (2) your favorite stories about your family? Briefly explain your answers.
  • Consider the following sequence of bits (which has been split into 12 8-bit bytes to aid readability):
    01000011 01010011 00110001 00110001 00110000 00100000
    01110010 01101111 01100011 01101011 01110011 00101110
    • Suppose you interpret this sequence of bits as 12 decimal numbers in the range 0—255. What are the 12 numbers?
    • Suppose you interpret this sequence of bits as a string consisting of 12 ASCII characters. What are the 12 characters?
Week 4
February 21
Web 2.0

Net Neutrality

Create survey
Final Project

Prezi

Lecture Notes
For next time:
February 23
Review

Copyright

SOPA, PIPA, & OPEN
Lecture Notes

Sample midtem exam questions
Write about the following and post it to your blog by 8pm on Sunday, 2/26
  • Research the Stop Online Piracy Act (SOPA) and write a short essay about it. Here are some things to include:
    • The purpose of the bill.
    • What proponants of the act have to say.
    • What apponants have to say.
    • What happened to the bill.
    • Description of PIPA and OPEN and how they compare to SOPA.
    • Your stance on the issues and why.

Week 5
February 28
Midterm

March 1
CLASS CANCELLED - Professor at a conference

Read Chapter 7 of Blown to Bits
As you are reading, consider these questions:
  • Why is DOPA controversial?
  • As a teen, did you face monitoring or censorship by your parents? Did they let you watch R-rated movies? Listen to music with explicit lyrics? Did they let you have a cell phone? A car? Did you have your own computer, or use a shared family computer? Did they monitor your internet usage, and/or run a site blocker to stop you or siblings from viewing inappropriate materials online?
  • Should sites like MySpace, Facebook, etc. be totally uncensored, or should they allow any content whatsoever to be posted and transmitted? What content (if any) should be forbidden? (hate speech, defamation, profanity, pornography, child pornography, drug trafficking?)
  • What, if anything, should sites like MySpace, Facebook, Twitter, etc. do about the problem of sexual predators and other crime that may be facilitated by their services? Are they at all liable for such events if they occur? (Are they more like a distributor/truck, a newspaper/publisher, or a library?)
Week 6
March 6
Safety, Censorship, and Free Speech on the Internet
Lecture Notes

Let's take the Internet back


Cry Wolf

How the Internet Enables Intimicy
Read Chapter 5 of Blown to Bits
March 8
Encryption Lecture Notes

Public Key Cryptography Notes


Wikipedia
Watch  Digital Humanitarianism
Week 7
March 13
Digital Revolutions
Digital Collaboration
Digital Divide
Lecture Notes
While discussing RSA encryption, we looked at some simpler encryption algorithms that lasted for many years. For each of these problems, show your work for maximum credit.
  • Encode the message PACKETSWITCHING using a Caesar cipher with a shift of 8.
  • Encode the message INTERNETPROTOCOL using a Vigenere cipher with a key of EMAIL.
  • Decode the message RNXXNXXNUUNWNAJW that was encoded using a Caesar cipher. What is the shift that was used?
  • Decode the message CIABIRWIQCEEO that was encoded using a Vigenere cipher. HINT: The key is in this sentence.
Email your solution to me by 5pm on Sunday, March 18.
March 15
Work on final project and presentation


Week 8
Monday, March 19
Final presentations - 6-8:30pm