An opinion piece by Kendall Hoyt, assistant professor of medicine and lecturer at the Thayer School of Engineering, where she discusses how biosecurity and cybersecurity have similar dangers—and similar potential benefits. "In the wrong hands, both types of knowledge can be used to develop a weapon instead of a vaccine or a patch," says Hoyt. "The genetic tools and exploit software that enable these activities are becoming easier to use and to acquire, prompting security experts to ask one question with growing urgency: How can we protect against misuse without limiting discovery and...Read more.
News & Events
Tuesday, March 28, 2017 - 12:57pm
Thursday, March 16, 2017 - 9:48am
We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.
Before you go:
If you plan on using Dartmouth’s online resources, learn how to establish a secure connection to Dartmouth’s...Read more.
Wednesday, March 15, 2017 - 2:09pm
In his latest blog post for Inside Higher Ed, Joshua Kim discusses a book about the dangers of consumer technologies. Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked by Adam Alter especially focuses on the addictive potential of smart phones, apps, websites, and video games. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).
Read the full...Read more.
Critical Thinking: With the Proliferation of 'Fake News' Appearing on Social Media Sites, Should Companies Like Facebook and Twitter Be Protected?
Wednesday, March 15, 2017 - 2:06pm
Parker Richards '18 argues that websites should not be held liable for content such as fake news or Islamic State propaganda. Richards writes that "such liability would fundamentally undermine the freedom of the press intrinsic to American democracy."
Read the full story, published on 3/14/17, in Editor & Publisher.
Wednesday, March 15, 2017 - 2:01pm
Features an interview with Daniel Rockmore, the William H. Neukom 1964 Distinguished Professor of Computational Science and director of the Neukom Institute for Computational Science, who joined an international crusade by scholars and scientists to download massive volumes of valuable climate science data when word got out that the Trump administration, as part of its climate change denial efforts, planned to eliminate the data from federal government websites.
Read the full story...Read more.
Wednesday, March 15, 2017 - 2:00pm
Quotes Sean Smith, professor of computer science and director of the Institute for Security, Technology, and Society, about how cyberweapons pose a significantly greater threat because they spread at a faster rate than physical weapons. "It's already happening," said Smith. "If the CIA is working on breaking into phones like other hackers, you can bet it's working on other devices, just like hackers."
Read the full story, published on 3/11/17, in USA Today.
Wednesday, March 15, 2017 - 1:57pm
An article about Hany Farid, the Albert Bradley 1915 Third Century Professor of Computer Science and the chair of computer science, and his technological solution to sweep digital networks and automatically purge extremist content, if tech companies adopt it. "The dark side of the open internet is that truly fringe and harmful ideas now are mainstream, or at least accessible to 7½ billion people." Yet, "Whenever we have one of these attacks, we just wring our hands for a few weeks and then wait for the next one to happen," said Farid.
Read the...Read more.
Wednesday, March 15, 2017 - 1:51pm
In his latest blog post for Inside Higher Ed, Joshua Kim discusses the book Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky, and the impact of cryptography, NSA history, and institutional culture on organizational effectiveness. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).
Read the full story, published on March 9, in Inside...Read more.
Wednesday, March 15, 2017 - 1:48pm
Adam Nemeroff, an instructional designer at Dartmouth, is one of eight candidates vying for seats on the nine-person Lebanon, N.H., school board. Nemeroff is running for his first term on the board. He moved to Lebanon in 2014 and as an instructional designer he helps faculty implement technology into their teaching. "I'm truly excited about the prospect of serving my community," Nemeroff said, adding he wants to help explore how to create the best learning experiences for children.
Read the ...Read more.
Wednesday, March 15, 2017 - 1:46pm
In his latest post for "13.7 Cosmos & Culture," Marcelo Gleiser, the Appleton Professor of Natural Philosophy, discusses a satirical essay written by Adam Gopnik of The New Yorker, in which he wondered whether the strange reality we live in could be some kind of computer game played by an advanced intelligence. "It seems to me that being so advanced they would have collected enough knowledge about their past to have little interest in this kind of simulation," says Gleiser. "But a full-fledged, resource-consuming simulation of an entire universe? Sounds like a colossal waste...Read more.