MinuteEarth
Is It Safe To Get Your DNA Tested?
Once it’s out of your body, your genetic information is valuable to a variety of people, but you can keep it safe(ish) with a few simple steps. ___________________________________________ To learn more, start your googling with these...
MinuteEarth
Is It Safe To Get Your DNA Tested?
Once it’s out of your body, your genetic information is valuable to a variety of people, but you can keep it safe(ish) with a few simple steps. ___________________________________________ To learn more, start your googling with these...
TED Talks
Alessandro Acquisti: What will a future without secrets look like?
The line between public and private has blurred in the past decade, both online and in real life, and Alessandro Acquisti is here to explain what this means and why it matters. In this thought-provoking, slightly chilling talk, he shares...
TED Talks
TED: How tech companies deceive you into giving up your data and privacy | Finn Lutzow-Holm Myrstad
Have you ever actually read the terms and conditions for the apps you use? Finn Lutzow-Holm Myrstad and his team at the Norwegian Consumer Council have, and it took them nearly a day and a half to read the terms of all the apps on an...
TED Talks
Gary Kovacs: Tracking our online trackers
As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business. But, says Gary Kovacs, it's...
Crash Course
Big Data Problems - Crash Course Statistics
There is a lot of excitement around the field of Big Data, but today we want to take a moment to look at some of the problems it creates. From questions of bias and transparency to privacy and security concerns, there is still a lot to...
Crash Course
Media Policy & You: Crash Course Media Literacy
Copyright and other media regulations have always been a bit tricky, but the internet made all of that infinitely more complicated. But what does all of that mean for you, the consumer?
SciShow
What Happens to an Email After You Click "Send"?
Email is one of the most essential things to our life. But do you actually know what happens when you click the "send" button, and how it's sent to your friends?
Wonderscape
Exploring the Advantages of Cryptocurrencies
Discover the benefits of cryptocurrencies, including their independence from central authorities, potential for high returns, and user anonymity. Learn how decentralized technology is reshaping financial transactions and enabling global...
Curated Video
ChatGPT 101 - Supercharge Your Work and Life with ChatGPT - ChatGPT Restrictions
This video explores the restrictions that apply to the use of ChatGPT. You will learn about the types of content that ChatGPT cannot provide, such as medical or legal advice, and ethical considerations in using an AI language model. The...
Curated Video
SkillSprints: Identity Theft
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Curated Video
High Five Facts - Online Safety
This video explores five fun facts about Online Safety.
Curated Video
Digital Citizenship
The video “Digital Citizenship” discusses how to be safe, responsible, and respectful when using technology.
Curated Video
Social Media Security
Social media security is the practice of analyzing data from active social media sites to protect against threats and security breaches.
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
I WONDER - How Can You Stay Safe Online?
This video is answering the question of how can you stay safe online.
Curated Video
iPhone Security Model
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
Healthcare Triage
Suicide Rates and Insights from Medical Sociology - Healthcare Triage
Aaron's guest this month is Dr. Bernice Pescosolido, who is a medical sociologist at Indiana University. Dr. Pescosolido studies the environments, neighborhoods, and connections that contribute to patients' identities, and looks how this...
The Wall Street Journal
"Reasonable Security" Under the California Consumer Privacy Act
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
The Wall Street Journal
Future Of: Data
How should brands, networks and publishers adapt in the age of "always-on" connectivity? As privacy issues, and trust surrounding the platforms, dominate the news cycle, has the way brands develop and disseminate campaigns changed?
National Institute of Standards and Technology
Forum on National Strategy for Trusted Identities in Cyberspace
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace (NSTIC)
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...