|Instructor Info:||Jaime Davila|
Office Extension x5687
|TA Info:||Charles Teese|
Inspired by the Edward Snowden and National Security Agency events of the summer of 2013, this course will examine the ways in which current technology facilitates and even encourages the collection of information on individuals, the ways in which that information can be used, pros and cons of such tendencies, and a variety of techniques to either expand or restrict the sharing and collection of data. The course will both deal with the mathematical foundations of these techniques and its social implications. While students might opt to write programming code or delve into very technical matters as part of the course, this will be only one of several ways to engage with the course, and will not be required. No previous computer experience is required for the course.
By the end of the semester, successful students will have gain exposure to the narratives around the "summer of 2013 Edward Snowden NSA revelations," as well as exposure to opinions about those narratives. Successful students will also gain knowledge on how data is collected during online activities, what that data can be used for, and how that data collection can be made easier or harder. Successful students will be exposed to cryptography theory, secure network, issues around big data, and recent advanced in computing a they relate to these issues (such as quantum computing, for example).
Students will be evaluated based on short response papers demonstrating their understanding and exposure of the following key sections of the course:
All students will be required to write a response paper for each of these topics.
Everyone, read our academic honesty policy! It's important! Information is available here: https://handbook.hampshire.edu/node/88 , here: https://handbook.hampshire.edu/node/89 , and here: https://handbook.hampshire.edu/node/87 .
Skip Course Information