Search
Type
Format
Sort
Location
Audience

Summary: Most people learn traditional standards of behavior and respect for others by the time they are teenagers-but many don't realize that those rules are just as valid in cyberspace. This program helps students take the high road on the information superhighway and avoid the temptations of the fast lane, pointing the way toward an ethically sound Internet presence and lifestyle. Guidelines for the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Digital technology plays an increasingly significant-and, many believe, unethical and intrusive-role in the lives of Americans. This CNBC program examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light. Case studies include a man whose cell phone records were acquired by his former employer, a woman whose...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: In this Fred Friendly Seminar moderated by Harvard Law School's Arthur Miller, panelists such as U.S. Supreme Court Justice Stephen Breyer; Nadine Strossen, president of the ACLU; Jamie Gorelick, of the U.S. Department of Justice; Professor Stephen Carter, of Yale Law School; and others examine the fine balance between the power of the government and the rights of the individual in a fictional...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Civil liberties advocates have warned against government surveillance for decades. Today, corporations use technology to monitor employees and customers. Is big business the new big brother? This program addresses the growing debate about our "surveillance society" and its erosion of privacy and anonymity-which could become casualties of the war for market supremacy as well as the war on...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy....

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Nanotechnology will likely transform the security and surveillance industries in the near future. Governments, corporations, and even individuals may have highly sophisticated sensors and tracking apparatus at their disposal—keeping tabs on everyone from customers to potential terrorists to aging parents. In this Fred Friendly Seminar moderated by Peabody award-winning correspondent John...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: Computer bugs are no mere prank. A disruption of global communications networks by today's sophisticated worms and viruses is costing companies billions and can do lasting damage to the world's economic health. This NewsHour program begins by defining these binary invaders and then examines the escalating security challenges of keeping networks free of infection. Members of the Computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: In today's information-starved and fear-driven society, surveillance technology seems to be deployed almost everywhere-and a surveillance mind-set is just as ubiquitous. This program introduces students to the concept of a "surveillance society" and shows how cutting-edge tools are being developed to identify, monitor, and track both people and objects. Viewers are empowered to explore the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2010

View online at AVOD

Helberg, Jacob

1 hold on 1 copy

Summary: The author, who led Google's internal global product policy efforts to combat disinformation and foreign interference from 2016 to 2020, reveals that spoils of the ongoing cyberwar with certain countries are power over every meaningful aspect of our society.

Format: text

Publisher / Publication Date: Avid Reader Press 2021

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 327.10285 HEL

Summary: Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: What harm could come from sitting leisurely at the computer, chatting with online pals? Unfortunately, many young people who spend hours in chat rooms or post sensitive information on the Internet have little or no idea of the risks involved. This program warns students about how vulnerable they are whenever they venture into the cyber realm-even when they think they're among "friends."...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Can high-tech weapons and unmanned defense systems outsmart the world's leading terrorists-perhaps even stopping them before they attack? This program looks at innovations now being developed for battlefield use as well as surveillance and security purposes. Featured technologies include guns that shoot around corners, automated vehicles that can neutralize the enemy, robots that detect and...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2010

View online at AVOD

Summary: Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: Compact and portable, digitized information is an attractive alternative to bulky books, analog media, and emulsion-based photographs-but can it stand the test of time? In this program, Stewart Brand, co-inventor of the TCP/IP Internet protocol, and others in the know assess the rapid proliferation of digitization; confront the alarming risk of massive data loss through technology obsolescence,...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: The tools required to fight Internet-based offenses must constantly evolve and adapt. Unfortunately, so do the criminals. This program examines several forms of cyber-crime and their impact on law enforcement, national security, the corporate world, and society at large. Taking a global approach, the film presents interviews with American and European experts on cyber-terrorism, identity theft,...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: The Internet offers vast possibilities for learning, making a living, and having fun-but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers-not to mention their careers, finances, and futures-that exist online. Highlighting the importance of setting up a firewall and keeping one's operating system...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Judee Sibbitt's company, AmberSAFE, uses GPS bracelets to track the whereabouts of children and seniors. In this program, Sue Abu-Hakima, co-founder and CEO of a wireless emergency notification system for schools and government agencies called Amika Mobile Corporation, and Peter Martin, a crisis management and risk assessment expert whose firm, AFI International Group, provides security for...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

chat loading...
Back to Top