Cybersecurity and Cyberwarfare: Difference between revisions

From Technologies of Politics and Control
Jump to navigation Jump to search
(UTurn to 1336694399)
 
(7 intermediate revisions by 3 users not shown)
Line 1: Line 1:
<div class="editsection noprint editlink plainlinksneverexpand" align="right" style="float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;">
{{ClassCalendar}}
<big>'''Syllabus'''</big>
 
{| border="0" cellspacing="4" cellpadding="4" style="background:#eeeeff; text-align: left;"
|
* [[Politics and Technology of Control: Introduction|Jan 24]]
* [[Paradigms for Studying the Internet|Jan 31]]
* [[New Economic Models|Feb 7]]
* [[Peer Production and Collaboration|Feb 14]]
* [[Collective Action and Decision-making|Feb 21]]
* [[New and Old Media, Participation, and Information|Feb 28]]
* [[Law's Role in Regulating Online Conduct and Speech|Mar 6]]
* Mar 13 - ''No class''
|
* [[Regulating Speech Online|Mar 20]]
* [[Internet Infrastructure and Regulation|Mar 22]]
* [[Copyright in Cyberspace|Apr 3]]
* [[Control and Code: Privacy Online|Apr 10]]
* [[Internet and Democracy|Apr 17]]
* [[Internet and Democracy: The Sequel|Apr 24]]
* [[Cybersecurity and Cyberwarfare|May 1]]
* [[Final Project|May 8]] - ''No class''
|}
<br clear="right" />
</div>
'''May 1'''
'''May 1'''


Line 45: Line 23:


== Class Discussion ==
== Class Discussion ==
May 1: Cybersecurity and Cyberwarfare
[[User:Just Johnny|Just Johnny]] 17:14, 15 February 2012 (UTC)


== Links ==
== Links ==
If you'd like to help us with the collection of data regarding online dating sites please take our survey, it's anonymous.
Online Dating site Survey: https://www.surveymonkey.com/s/28VMJWX
--[[User:Adavies01|Adavies01]] 17:03, 4 May 2011 (UTC)

Latest revision as of 17:50, 17 January 2013

May 1

Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?


Readings

Optional Readings


Class Discussion

May 1: Cybersecurity and Cyberwarfare Just Johnny 17:14, 15 February 2012 (UTC)

Links