Information, Technology & Consulting

What Biosecurity and Cybersecurity Research Have in Common

An opinion piece by Kendall Hoyt, assistant professor of medicine and lecturer at the Thayer School of Engineering, where she discusses how biosecurity and cybersecurity have similar dangers—and similar potential benefits. "In the wrong hands, both types of knowledge can be used to develop a weapon instead of a vaccine or a patch," says Hoyt.

Fight Cybercrime with ITS Training Modules

Faculty and Staff:

Cyber threats are becoming more sophisticated and widespread. Learn the latest tricks cyber attackers are using, and how you can defend against them by taking ITS Cyber Security’s brief security modules.

Security Tips for Traveling at Home and Abroad

We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Reading About Addictive Technology in "Irresistible"

In his latest blog post for Inside Higher Ed, Joshua Kim discusses a book about the dangers of consumer technologies. Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked by Adam Alter especially focuses on the addictive potential of smart phones, apps, websites, and video games. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).

Critical Thinking: With the Proliferation of 'Fake News' Appearing on Social Media Sites, Should Companies Like Facebook and Twitter Be Protected?

Parker Richards '18 argues that websites should not be held liable for content such as fake news or Islamic State propaganda. Richards writes that "such liability would fundamentally undermine the freedom of the press intrinsic to American democracy."

Read the full story, published on 3/14/17, in Editor & Publisher.

Defending the Data: Dartmouth Professor Dan Rockmore Helps Preserve Climate Science

Features an interview with Daniel Rockmore, the William H. Neukom 1964 Distinguished Professor of Computational Science and director of the Neukom Institute for Computational Science, who joined an international crusade by scholars and scientists to download massive volumes of valuable climate science data when word got out that the Trump administration, as part of its climate change denial efforts, planned to eliminate the data from federal government websites.

The World Wide Web's Inventor Warns It's In Peril on 28th Anniversary

Quotes Sean Smith, professor of computer science and director of the Institute for Security, Technology, and Society, about how cyberweapons pose a significantly greater threat because they spread at a faster rate than physical weapons. "It's already happening," said Smith. "If the CIA is working on breaking into phones like other hackers, you can bet it's working on other devices, just like hackers."

Read the full story, published on 3/11/17, in USA Today.

How Algorithms Can Help Beat Islamic State

An article about Hany Farid, the Albert Bradley 1915 Third Century Professor of Computer Science and the chair of computer science, and his technological solution to sweep digital networks and automatically purge extremist content, if tech companies adopt it. "The dark side of the open internet is that truly fringe and harmful ideas now are mainstream, or at least accessible to 7½ billion people." Yet, "Whenever we have one of these attacks, we just wring our hands for a few weeks and then wait for the next one to happen," said Farid.

3 Ways to Read 'Code Warriors'

In his latest blog post for Inside Higher Ed, Joshua Kim discusses the book Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky, and the impact of cryptography, NSA history, and institutional culture on organizational effectiveness. Kim is director of digital learning initiatives at the Dartmouth Center for the Advancement of Learning (DCAL).

Eight Candidates Compete for Lebanon School Board

Adam Nemeroff, an instructional designer at Dartmouth, is one of eight candidates vying for seats on the nine-person Lebanon, N.H., school board. Nemeroff is running for his first term on the board. He moved to Lebanon in 2014 and as an instructional designer he helps faculty implement technology into their teaching. "I'm truly excited about the prospect of serving my community," Nemeroff said, adding he wants to help explore how to create the best learning experiences for children.

Pages

Subscribe to Information, Technology & Consulting RSS
Close
Information, Technology & Consulting