Summary: Most people learn traditional standards of behavior and respect for others by the time they are teenagers-but many don't realize that those rules are just as valid in cyberspace. This program helps students take the high road on the information superhighway and avoid the temptations of the fast lane, pointing the way toward an ethically sound Internet presence and lifestyle. Guidelines for the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2007
View online at AVOD
Summary: Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2008
View online at AVOD
Summary: Computer bugs are no mere prank. A disruption of global communications networks by today's sophisticated worms and viruses is costing companies billions and can do lasting damage to the world's economic health. This NewsHour program begins by defining these binary invaders and then examines the escalating security challenges of keeping networks free of infection. Members of the Computer...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2006
View online at AVOD
Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: In this Fred Friendly Seminar moderated by Harvard Law School's Arthur Miller, panelists such as U.S. Supreme Court Justice Stephen Breyer; Nadine Strossen, president of the ACLU; Jamie Gorelick, of the U.S. Department of Justice; Professor Stephen Carter, of Yale Law School; and others examine the fine balance between the power of the government and the rights of the individual in a fictional...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2007
View online at AVOD
Summary: How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2006
View online at AVOD
Summary: Civil liberties advocates have warned against government surveillance for decades. Today, corporations use technology to monitor employees and customers. Is big business the new big brother? This program addresses the growing debate about our "surveillance society" and its erosion of privacy and anonymity-which could become casualties of the war for market supremacy as well as the war on...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2007
View online at AVOD
Summary: Judee Sibbitt's company, AmberSAFE, uses GPS bracelets to track the whereabouts of children and seniors. In this program, Sue Abu-Hakima, co-founder and CEO of a wireless emergency notification system for schools and government agencies called Amika Mobile Corporation, and Peter Martin, a crisis management and risk assessment expert whose firm, AFI International Group, provides security for...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2009
View online at AVOD
Summary: Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy....
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2006
View online at AVOD
Summary: The Internet offers vast possibilities for learning, making a living, and having fun-but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers-not to mention their careers, finances, and futures-that exist online. Highlighting the importance of setting up a firewall and keeping one's operating system...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2007
View online at AVOD
Summary: Compact and portable, digitized information is an attractive alternative to bulky books, analog media, and emulsion-based photographs-but can it stand the test of time? In this program, Stewart Brand, co-inventor of the TCP/IP Internet protocol, and others in the know assess the rapid proliferation of digitization; confront the alarming risk of massive data loss through technology obsolescence,...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: The consequences of lax Internet security are severe! Use Securing the Web to awaken your students to the very real dangers posed by online security threats. In this video, a couldn't-care-less computer user is transported into his PC where he learns firsthand about phishing and pharming, spyware and adware, viruses and Trojans, and denial-of-service attacks and zombie networks. Weapons in the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2009
View online at AVOD
Summary: Few think of it in these terms, but logging onto the Web can be like letting strangers walk into your living room. Hosted by Dan Rather, this program explores the very real dangers of the Internet through a number of eye-opening examples, including coverage of Operation Blue Ridge Thunder, a task force that patrols the Internet for pedophiles; the tragic story of Amy Boyer, a 21-year-old woman...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: Digital technology plays an increasingly significant-and, many believe, unethical and intrusive-role in the lives of Americans. This CNBC program examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light. Case studies include a man whose cell phone records were acquired by his former employer, a woman whose...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2008
View online at AVOD
Summary: With such widespread access to the Internet, how vulnerable to online sabotage are banks, government agencies, nuclear plants, utilities, and hospitals? This program examines the Internet's exponential growth and evaluates risks posed by groups and individuals bent on crime or terrorism. Experts from the FBI, the Pentagon, and private companies, and even a self-confessed hacker comment on the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005
View online at AVOD
Summary: The tools required to fight Internet-based offenses must constantly evolve and adapt. Unfortunately, so do the criminals. This program examines several forms of cyber-crime and their impact on law enforcement, national security, the corporate world, and society at large. Taking a global approach, the film presents interviews with American and European experts on cyber-terrorism, identity theft,...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2009
View online at AVOD
Summary: In today's information-starved and fear-driven society, surveillance technology seems to be deployed almost everywhere-and a surveillance mind-set is just as ubiquitous. This program introduces students to the concept of a "surveillance society" and shows how cutting-edge tools are being developed to identify, monitor, and track both people and objects. Viewers are empowered to explore the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2010
View online at AVOD
Summary: What harm could come from sitting leisurely at the computer, chatting with online pals? Unfortunately, many young people who spend hours in chat rooms or post sensitive information on the Internet have little or no idea of the risks involved. This program warns students about how vulnerable they are whenever they venture into the cyber realm-even when they think they're among "friends."...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2007
View online at AVOD
Summary: Can high-tech weapons and unmanned defense systems outsmart the world's leading terrorists-perhaps even stopping them before they attack? This program looks at innovations now being developed for battlefield use as well as surveillance and security purposes. Featured technologies include guns that shoot around corners, automated vehicles that can neutralize the enemy, robots that detect and...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2010
View online at AVOD
Summary: Nanotechnology will likely transform the security and surveillance industries in the near future. Governments, corporations, and even individuals may have highly sophisticated sensors and tracking apparatus at their disposal—keeping tabs on everyone from customers to potential terrorists to aging parents. In this Fred Friendly Seminar moderated by Peabody award-winning correspondent John...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2009
View online at AVOD
Summary: With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2011
View online at AVOD
Summary: It's been more than two decades since the first PC virus hit the Internet, and what was once little more than an annoyance created by teen hackers and hobbyists has become a sophisticated tool for crime. In this TEDTalk, computer security expert Mikko Hypponen discusses the viruses that can scavenge credit card numbers and deplete bank accounts, and the international crime rings behind them. As...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2011