Instructional Video18:50
TED Talks

TED: How the blockchain is changing money and business | Don Tapscott

12th - Higher Ed
What is the blockchain? If you don't know, you should; if you do, chances are you still need some clarification on how it actually works. Don Tapscott is here to help, demystifying this world-changing, trust-building technology which, he...
Instructional Video14:36
TED Talks

Andrew Marantz: Inside the bizarre world of internet trolls and propagandists

12th - Higher Ed
Journalist Andrew Marantz spent three years embedded in the world of internet trolls and social media propagandists, seeking out the people who are propelling fringe talking points into the heart of conversation online and trying to...
Instructional Video14:27
TED Talks

Jennifer Zhu Scott: Why you should get paid for your data

12th - Higher Ed
The world's most valuable tech companies profit from the personal data you generate. So why aren't you getting paid for it? In this eye-opening talk, entrepreneur and technologist Jennifer Zhu Scott makes the case for private data...
Instructional Video11:23
TED Talks

TED: Inside the massive (and unregulated) world of surveillance tech | Sharon Weinberger

12th - Higher Ed
What is a weapon in the Information Age? From microscopic "smart dust" tracking devices to DNA-tracing tech and advanced facial recognition software, journalist Sharon Weinberger leads a hair-raising tour through the global, unregulated...
Instructional Video12:23
TED Talks

Douglas Rushkoff: How to be "Team Human" in the digital future

12th - Higher Ed
Humans are no longer valued for our creativity, says media theorist Douglas Rushkoff -- in a world dominated by digital technology, we're now just valued for our data. In a passionate talk, Rushkoff urges us to stop using technology to...
Instructional Video10:39
TED Talks

Stephen Friend: The hunt for "unexpected genetic heroes"

12th - Higher Ed
What can we learn from people with the genetics to get sick — who don't? With most inherited diseases, only some family members will develop the disease, while others who carry the same genetic risks dodge it. Stephen Friend suggests we...
Instructional Video1:46
MinutePhysics

When It's OK to Violate Privacy

12th - Higher Ed
REFERENCES Cynthia Dwork (key inventor of Differential Privacy), giving a great intro talk about differential privacy https://www.youtube.com/watch?v=lg-VhHlztqo Hazards of Smoking: the Effect on Life Span...
Instructional Video14:55
TED Talks

TED: The secret US prisons you've never heard of before | Will Potter

12th - Higher Ed
Investigative journalist Will Potter is the only reporter who has been inside a Communications Management unit, or CMu, within a uS prison. These units were opened secretly, and radically alter how prisoners are treated -- even...
Instructional Video16:00
TED Talks

TED: How Airbnb designs for trust | Joe Gebbia

12th - Higher Ed
Joe Gebbia, the co-founder of Airbnb, bet his whole company on the belief that people can trust each other enough to stay in one another's homes. How did he overcome the stranger-danger bias? Through good design. Now, 123 million hosted...
Instructional Video13:53
TED Talks

Anna Piperal: What a digital government looks like

12th - Higher Ed
What if you never had to fill out paperwork again? In Estonia, this is a reality: citizens conduct nearly all public services online, from starting a business to voting from their laptops, thanks to the nation's ambitious post-Soviet...
Instructional Video14:56
TED Talks

Alessandro Acquisti: What will a future without secrets look like?

12th - Higher Ed
The line between public and private has blurred in the past decade, both online and in real life, and Alessandro Acquisti is here to explain what this means and why it matters. In this thought-provoking, slightly chilling talk, he shares...
Instructional Video15:50
Crash Course

Social Media: Crash Course Navigating Digital Information #10

12th - Higher Ed
Today, in our series finale, we're going to talk about the great white whale of navigating online information: your social media feed. Social media shapes both our online and offline behaviors from how we engage in communities and...
Instructional Video6:05
TED Talks

Matt Cutts: What happens when a Silicon Valley technologist works for the government

12th - Higher Ed
What if the government ran more like Silicon Valley? Engineer Matt Cutts shares why he decided to leave Google (where he worked for nearly 17 years) for a career in the US government -- and makes the case that if you really want to make...
Instructional Video11:57
TED Talks

TED: We can fight terror without sacrificing our rights | Rebecca MacKinnon

12th - Higher Ed
Can we fight terror without destroying democracy? Internet freedom activist Rebecca MacKinnon thinks that we'll lose the battle against extremism and demagoguery if we censor the internet and press. In this critical talk, she calls for a...
Instructional Video13:16
TED Talks

TED: How deepfakes undermine truth and threaten democracy | Danielle Citron

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. The use of deepfake technology to manipulate video and audio for malicious purposes -- whether it's to stoke...
Instructional Video6:32
TED Talks

Gary Kovacs: Tracking our online trackers

12th - Higher Ed
As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business. But, says Gary Kovacs, it's...
Instructional Video12:09
TED Talks

Andy Yen: Think your email's private? Think again

12th - Higher Ed
Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that...
Instructional Video7:18
3Blue1Brown

The DP-3T algorithm for contact tracing (via Nicky Case)

12th - Higher Ed
An overview of a simplified version of the DP-3T algorithm for privacy-first contact-tracing
Instructional Video13:57
TED Talks

Jamie Bartlett: How the mysterious dark net is going mainstream

12th - Higher Ed
There's a parallel Internet you may not have run across yet -- accessed by a special browser and home to a freewheeling collection of sites for everything from anonymous activism to illicit activities. Jamie Bartlett reports from the...
Instructional Video12:11
Crash Course

Big Data Problems - Crash Course Statistics

12th - Higher Ed
There is a lot of excitement around the field of Big Data, but today we want to take a moment to look at some of the problems it creates. From questions of bias and transparency to privacy and security concerns, there is still a lot to...
Instructional Video14:25
TED Talks

TED: How to practice safe sexting | Amy Adele Hasinoff

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Sexting, like anything that's fun, runs its risks -- but a serious violation of privacy shouldn't be one of them....
Instructional Video17:37
TED Talks

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

12th - Higher Ed
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords...
Instructional Video12:56
TED Talks

Eva Galperin: What you need to know about stalkerware

12th - Higher Ed
"Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on...
Instructional Video6:18
TED Talks

TED: The press trampled on my privacy. Here's how I took back my story | Kate Stone

12th - Higher Ed
After a horrific accident put her in the tabloid headlines, Kate Stone found a way to take control of her narrative -- and help prevent others from losing their privacy, too. Learn how she reclaimed her story in this personal talk...