Updating search results...

Search Resources

18 Results

View
Selected filters:
  • surveillance
Air Traffic Control
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course introduces the various aspects of present and future Air Traffic Control systems. Among the topics in the present system that we will discuss are the systems-analysis approach to problems of capacity and safety, surveillance, including the National Airspace System and Automated Terminal Radar Systems, navigation subsystem technology, aircraft guidance and control, communications, collision avoidance systems and sequencing and spacing in terminal areas. The class will then talk about future directions and development and have a critical discussion of past proposals and of probable future problem areas.

Subject:
Applied Science
Engineering
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Hansman, John
Date Added:
09/01/2006
Balloons
Read the Fine Print
Educational Use
Rating
0.0 stars

Students follow the steps of the engineering design process as they design and construct balloons for aerial surveillance. After their first attempts to create balloons, they are given the associated Estimating Buoyancy lesson to learn about volume, buoyancy and density to help them iterate more successful balloon designs.Applying their newfound knowledge, the young engineers build and test balloons that fly carrying small flip cameras that capture aerial images of their school. Students use the aerial footage to draw maps and estimate areas.

Subject:
Applied Science
Engineering
Mathematics
Physical Science
Physics
Technology
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Marissa H. Forbes
Mike Soltys
Date Added:
09/18/2014
Inquiry Based Project: Privacy v. Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Date Added:
10/10/2016
Inquiry Project: Surveillance vs Rights
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This a inquiry based project about the topic of government surveillance. This includes the driving question, grabber and culminating activity. This also includes a number of different resources that the students can use to do research.

Subject:
Social Science
Material Type:
Homework/Assignment
Date Added:
10/10/2016
Measuring Health and Disease I: Introduction to Epidemiology Module Guide
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This module was designed to meet the growing need for an applied course in the measurement of a variety of health indicators and outcomes. Whether you manage a health programme, a health facility, or simply have to interpret health data in the course of your work, this module sets out to increase your capacity to deal with health and disease information. It aims to assist you in applying epidemiological knowledge and skills to a variety of Public Health problems such as:Is your DOTS programme succeeding?What does it mean if a TB prevalence is 850/100 000?Is this a Public Health problem or not?What is the Ňburden of diseaseÓ in different communities?

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Assessment
Diagram/Illustration
Lecture
Lesson Plan
Unit of Study
Provider:
OER Africa
Author:
Debra Jackson
Neil Myburgh
Date Added:
11/05/2010
Measuring Health and Disease I: Introduction to Epidemiology Module Guide
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This module was developed at the School of Public Health, University for the Western Cape for the Postgraduate Certificate in Public Health which was offered as a distance learning module between 2001 and 2008. It was designed to meet the growing need for an applied course in the measurement of a variety of health indicators and outcomes. Whether you manage a health programme, a health facility, or simply have to interpret health data in the course of your work, this module sets out to increase your capacity to deal with health and disease information. It aims to assist you in applying epidemiological knowledge and skills to a variety of Public Health problems such as: Is your DOTS programme succeeding? What does it mean if a TB prevalence is 850/100 000? Is this a Public Health problem or not? What is the burden of disease in different communities?

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Textbook
Provider:
OER Africa
Author:
Neil Myburgh, Debra Jackson
Date Added:
02/27/2012
NSA Surveillance: A Debate
Unrestricted Use
CC BY
Rating
0.0 stars

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Social Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
Out of Ground Zero: Catastrophe and Memory
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Within twenty-four hours of the attack on the World Trade Center on September 11, 2001 politicians, artists, and cultural critics had begun to ask how to memorialize the deaths of thousands of people. This question persists today, but it can also be countered with another: is building a monument the best way to commemorate that moment in history? What might other discourses, media, and art forms offer in such a project of collective memory? How can these cultural formations help us to assess the immediate reaction to the attack? To approach these issues, “Out of Ground Zero” looks back to earlier sites of catastrophe in Germany and Japan.

Subject:
Anthropology
Arts and Humanities
English Language Arts
Literature
Reading Literature
Social Science
Sociology
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Scribner, Charity
Date Added:
09/01/2005
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/10/2018
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
11/14/2017
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/14/2018
Special Topics: Designing Sociable Media
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This project-based course explores new design strategies for social interaction in the computer mediated world. Through weekly readings and design assignments we will examine topics such as:

Data-based portraiture
Depicting growth, change and the passage of time
Visualizing conversations, crowds, and networks
Interfaces for the connected city
Mobile social technologies

The course emphasizes developing visual and interactive literacy.

Subject:
Applied Science
Arts and Humanities
Business and Communication
Career and Technical Education
Communication
Computer Science
Engineering
Graphic Arts
Graphic Design
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Donath, Judith
Date Added:
02/01/2008
StoryWorks: Beautiful Agitators
Unrestricted Use
CC BY
Rating
0.0 stars

StoryWorks develops inclusive and transformative educational theater experiences that provide students with the opportunity to examine our country’s civil rights history. Through content consistent with school curriculum standards, the program engages students in experiential learning and inspires them to ask deeper questions about the historical underpinnings behind contemporary issues. The process creates pathways to civic engagement, creates lasting memories and instills a tangible sense of social belonging. This StoryWorks educational project is built around Beautiful Agitators, a theatrical play about Vera Mae Pigee, a hair stylist and business owner in Clarksdale, Mississippi, and one of the unsung heroes of the civil rights era. Using her beauty parlor as a hub for Delta-based organizing and resistance, Pigee operated her salon by day and then transformed it into a clandestine center for civil rights organization and education in the evenings. Known for her big hats and larger than life personality, Mrs. Pigee led the direct action that registered nearly 6,000 African Americans to vote in the region. Although Pigee was largely left out of the history books, along with many women of the movement, our play Beautiful Agitators and accompanying curriculum revives her legacy, highlighting her methods and tactics. Inspired by the innovative K-12 civil rights education standards developed by the Mississippi Civil Rights Commission. Our commitment is to expand upon the standards by further developing content related to social justice, power relations, environmental justice, diversity, equity, mutual respect, and civic engagement. Beautiful Agitators combines inquiry with higher-order thinking skills of analysis, evaluation and synthesis. Set in a beauty parlor owned and operated by a Black woman in the Mississippi Delta, our curriculum is based on our investigation into primary sources and their relationship to critical moments in the national movement. This foundation of historical context allows for students and educators to find contemporary parallels which further engage learners to reflect upon the legacy of the civil rights movement and the struggles that we, as citizens, continue to grapple with today.View the complete play Beautiful Agitators on the StoryWorks Theater site.Implementation1. Beautiful Agitators Performance Classroom watches a prerecorded, staged reading of the play Beautiful Agitators, which was created and performed by artists from the Mississippi Delta, home of Vera Mae Pigee.2. Lesson Plan Activities Following the eight-lesson plan structure, students will read aloud or act out scenes from the play. This participatory interaction with the text and the historical events promotes a high level of engagement from the students and encourages experiential learning. These activities directly correspond to scenes in the play and to specific content area standards. Teacher leads guided discussions and helps to explain the historical context and theme of each scene. Students/actors have the opportunity to share their experiences having portrayed these historical figures. 

Subject:
Arts and Humanities
Composition and Rhetoric
English Language Arts
Literature
Performing Arts
Political Science
Social Science
U.S. History
Material Type:
Full Course
Date Added:
07/12/2021
StoryWorks: Beautiful Agitators, StoryWorks: Beautiful Agitators Curriculum, 5. Mississippi Sovereignty Commission: Surveillance, Corruption and Violence
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Through the play Beautiful Agitators and accompanying curriculum, students will eplore the life of Vera Mae Pigee and the power and influence of the Mississippi Sovereignty Commission.

Subject:
Performing Arts
Social Science
Material Type:
Unit of Study
Author:
Jennifer Welch
Rebecca Welch Weigel
Date Added:
07/12/2021
Surveillance and monitoring of disease
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Monitoring of the epidemiological patterns (animal, place, time) of diseases and pathogens within populations provides a vital system for the identification of changes in disease status within this population (whether this relates to all animals worldwide, or those within a single country, region, village or farm). For this reason, most countries have systems in place for the intermittent collection and collation of data relating to disease. Monitoring of production levels also provides a method of informing farmers about the productivity of their animals. These processes can be described as monitoring systems.

Subject:
Life Science
Material Type:
Diagram/Illustration
Reading
Provider:
WikiVet
Provider Set:
Veterinary Epidemiology
Date Added:
02/27/2015
Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational.

Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure.

The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

Subject:
Applied Science
Engineering
Material Type:
Textbook
Provider:
New Prairie Press
Author:
Candice Carter
Hans C. Mumm
Julie J.C.H. Ryan
Randall K. Nichols
Wayne D. Lonstein
Date Added:
09/14/2018