1 / 4

VIDEO DISCUSSION 2

1DT052. VIDEO DISCUSSION 2. Oct 6 th , 2009. Short Article. Write 1-2 pages to express your own views on the subject matter. Write an essay, do not simply answer the questions. Write individually, discuss in groups.

Download Presentation

VIDEO DISCUSSION 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1DT052 VIDEO DISCUSSION 2 Oct 6th, 2009

  2. Short Article • Write 1-2 pages to express your own views on the subject matter. • Write an essay, do not simply answer the questions. • Write individually, discuss in groups. • Submit your article to the course collection box (#50, house 1, 4th floor) by October 13th, 2009 (next Tuesday) • You may also submit your article to the course email address it-datakom@listserv.uu.se, as long as you: • Submit the article as PLAIN TEXT inside the email • Do not use any attachments of any kind • I.e. don’t send us .PDF, .DOC, .DOCX, .RTF, .ODF, etc!

  3. Video • Source: http://www.researchchannel.org/prog/displayevent.aspx?fID=569&rID=27430

  4. Discussion questions • What other generative/civic technologies do you know of? What kind of defenses do those technologies have against abuse? • Does the internet need a formal defense institution, like the police? • Who should police the internet? ISPs? Private corporations? RIAA? Governments? You? • Should it be policed? • Can it be policed? • What are the pros and cons of “main menu”-style access to information, a la Compuserve or cable tv? • Several ways of abusing these technologies are mentioned. Which ones are the biggest problems? In what way are they problems, and to whom? Are there other ways and reasons for abusing/sabotaging generative technologies? • The video mentions DoS/DDoS attacks. Explain how these kinds of attacks work, and what you think could be done to hinder them. • Any other views and opinions on this topic… 

More Related