Security and Sustainability
Before Class:
- Kieran Healy, “Using Metadata to Find Paul Revere,” June 9, 2013.
- “‘The Cyber:’ Everything You Need to Know About Computer Security Research and More,”Center for Democracy and Technology, March 27, 2017.
- Dan Goodin, “Why passwords have never been weaker,” Ars Technica, August 20, 2012.
- Mat Honan, “How Apple and Amazon Security Flaws Led to My Epic Hacking,” Wired, August 6, 2012.
- Mat Honan, “How I Resurrected My Digital Life After an Epic Hacking,” Wired, August 17, 2012.
- Jennifer Howard, “Born Digital, Projects Need Attention to Survive,” Chronicle of Higher Education, January 6, 2014.
- Dan Cohen and Roy Rosenzweig, “Preserving Digital History,” in Digital History (2006).
In Class:
After Class:
- Blog Post #6:
- Topic 1: How sustainable is the digital work that you have don’t in this course? What would it take to sustain the assignments you have completed? Which assignments can you export from the web services where you created them?
- Topic 2: How secure is your digital life? Who has access to your information? What kinds of things might hackers, corporations, political parties, or states be able to figure out about you from that information? What is the significance of government surveillance? What can you do to improve your digital security?
- Your blog posts should be at least 350-500 words and should be written in a semi-formal scholarly style (complete thoughts, correct spelling, grammar and syntax.) Please use the Chicago style guide to cite any sources. See the blog post criteria page for more details.