- This event has passed.
A Deeper Dive: Privacy in the Digital Age
August 5,7:00 pm - 8:00 pm
About Deeper Dive Courses
The Library’s Deeper Dive programs are three-part courses that take an in-depth look into important science topics. The course is free and open to the public. Registration is for all three classes.
Privacy in the Digital Age
This Deeper Dive series will focus on Internet privacy: Is there a natural right to privacy? What are we talking about when we talk about privacy? And how do new technologies lead to new challenges? We’ll examine data mining, facial recognition, the commodification of data, surveillance as a business model, and what the individual can do.
- August 5: Definitions of Privacy (And Why Digital is Different and Anonymity is Hard)
- August 12: Surveillance as a Business Model: It’s Not “What Do They Know;” It’s “What Don’t They Know.”
- August 19: Protecting Digital Privacy—What Can Be Done; Trends; and Future Directions
Brian K. Hare is Assistant Teaching Professor at the University of Missouri-Kansas City School of Computing and Engineering, where his research focus and expertise includes instructional methods, student engagement, programming, and ethical and societal issues in computing. Along with degrees in social work, Brian has a BS and an MS in computer science from UMKC.
Accessing the Program
This free, livestream course will take place via Zoom. Registration is currently open and will remain open until the last session has ended. After you register you will receive an email with a link to join the first session. You will receive an email each week with the link to that week’s program. To help us better serve our audiences, we have included some demographic questions in the registration form. Your response to these questions is voluntary but appreciated. Thank you!
The Linda Hall Library encourages people of all backgrounds and abilities to participate in our public programs. Closed captioning is provided. If you require additional reasonable accommodations in order to participate, please contact email@example.com or call 816.926.8753 at least 24 hours in advance of the event.
Once you register for this event, you will receive email communications from the Linda Hall Library and the Linda Hall Library Foundation. You may choose to opt out of these communications at any time. Your contact information will not be sold or provided to any third parties.
The program will also livestream on the Library’s Facebook page.
This program is funded by the Ewing Marion Kauffman Foundation.
Its content is solely the responsibility of the Linda Hall Library.
Further reading at the Linda Hall Library
August 5: Definitions of Privacy (And Why Digital is Different and Anonymity is Hard)
- Gillespie, Tarleton. Custodians of the internet : platforms, content moderation, and the hidden decisions that shape social media. New Haven : Yale University Press, 2018.
- Griffiths, James T. (James Tomos). The great firewall of China : how to build and control an alternative version of the internet . London : Zed Books, 2019.
- Till, Steve van. The five technological forces disrupting security : how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age. Oxford : Elsevier/ Butterworth-Heinemann, an imprint of Elsevier, 2018.
August 12: Surveillance as a Business Model: It’s Not “What Do They Know;” It’s “What Don’t They Know.”
- Flammini, Francesco; Setola, Roberto; Franceschetti, Giorgio. Effective surveillance for homeland security : balancing technology and social issues. Boca Raton, FL : CRC Press, 2013.
- Michel, Arthur Holland. The Eyes in the sky : the secret rise of Gorgon Stare and how it will watch us all. Boston : Houghton Mifflin Harcourt, 2019.
- Peter, J. Dinesh, editor; Alavi, Amir, editor; Javadi, Bahman, editor; Fernandes, Steven L., editor. The cognitive approach in cloud computing and Internet of Things technologies for surveillance tracking systems. London, United Kingdom ; San Diego, CA, United States : Academic Press, 2020.
August 19: Protecting Digital Privacy—What Can Be Done; Trends; and Future Directions
- Hu, Fei. Security and privacy in internet of things (IoTs) : models, algorithms, and implementations. Boca Raton, FL : CRC Press, 2016.
- Lennon, Brian. Passwords : philology, security, authentication. Cambridge, Massachusetts ; London, England : The Belknap Press of Harvard University Press, 2018.
- Mitnick, Kevin D. (Kevin David); Vamosi, Robert. The art of invisibility : the world’s most famous hacker teaches you how to be safe in the age of Big Brother and big data. New York, N.Y. : Little, Brown and Company, 2017.