PowerPoint

Data Security and Privacy: Legal, Policy and Enterprise Issues

Collection: 
Open.Michigan
Author: 
Don Blumenthal
Year: 
2010
Conditions of Use: 
Attribution-ShareAlike 3.0 Unported
Level: 
Media Format: 
Material Type: 
Description: 
This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal.

Networks: Theory and Application

Collection: 
Open.Michigab
Author: 
Lada Adamic
Year: 
2009
Conditions of Use: 
Attribution-ShareAlike 3.0 Unported
Level: 
Media Format: 
Description: 
The course covers topics in network analysis, from social networks to applications in information networks such as the Internet. I will introduce basic concepts in network theory, discuss metrics and models, use software analysis tools to experiment with a wide variety of real-world network data, and study applications to areas such as information retrieval.

Internet History, Technology, and Security

Collection: 
Open.Michigan
Author: 
Charles Severance
Year: 
2013
Conditions of Use: 
Attribution 3.0 Unported
Media Format: 
Material Type: 
Description: 
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Open Educational Resources and the University of Michigan

Collection: 
Open.Michigan
Author: 
Joseph Hardin
Year: 
2012
Conditions of Use: 
Attribution 3.0 Unported
Level: 
Media Format: 
Material Type: 
Description: 
This course introduces students to the ideas and practices surrounding teaching, learning and research at a world class research university like the University of Michigan, and the emerging role in these practices of Open Educational Resources, including open content such as opencourseware, open access initiatives, open publishing of research and learning materials as found in open journals, databases and e-prints, open textbooks, related open software efforts such as open learning systems, and emerging open teaching experiments.
ACM Classification Tree: 

Ethics and Information Technology (Lectures)

Collection: 
Open.Michigan
Author: 
Paul Conway
Year: 
2011
Conditions of Use: 
Attribution-NonCommercial-ShareAlike 3.0 Unported
Media Format: 
Material Type: 
Description: 
Ethics and Information Technology focuses on the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments.

Programming for Everybody

Collection: 
Open.Michigan
Author: 
Charles Severance
Year: 
2014
Conditions of Use: 
Attribution 4.0 International
Media Format: 
Material Type: 
Description: 
This course aims to teach everyone to learn the basics of programming computers using Python. The course has no pre-requisites and avoids all but the simplest mathematics. Anyone with moderate computer experience should be able to master the materials in this course.

Introduction to Information Studies

Collection: 
Open.Michigan
Author: 
Robert Frost
Year: 
2012
Conditions of Use: 
Attribution-ShareAlike 3.0 Unported
Media Format: 
Material Type: 
Description: 
This course will provide the foundational knowledge necessary to begin to address the key issues associated with the Information Revolution. Issues will range from the theoretical (what is information and how do humans construct it?), to the cultural (is life on the screen a qualitatively different phenomenon from experiences with earlier distance-shrinking and knowledge-building technologies such as telephones?), to the practical (what are the basic architectures of computing and networks?). Successful completion of this "gateway" course will give you, the student, the conceptual tools necessary to understand the politics, economics, and culture of the Information Age, providing a foundation for later study in Information or any number of more traditional disciplines.

Networked Computing: Storage, Communication, and Processing

Collection: 
Open.Michigan
Author: 
Charles Severance
Year: 
2010
Conditions of Use: 
Attribution 3.0 Unported
Level: 
Media Format: 
Material Type: 
Description: 
This course introduces students, at several different levels of abstraction, to sets of functional components and alternative ways of combining those components to form systems. It also introduces a set of desirable system properties and a core set of techniques that are useful in building systems that have those properties.

Mining of Massive Datasets (Jure Leskovec, Anand Rajaraman, Jeff Ullman)

Collection: 
Individual Authors
Author: 
Jure Leskovec, Anand Rajaraman, Jeff Ullman
Year: 
2014
Conditions of Use: 
Free download
Media Format: 
Material Type: 
Description: 
The book is based on Stanford Computer Science course CS246: Mining Massive Datasets (and CS345A: Data Mining). The book, like the course, is designed at the undergraduate computer science level with no formal prerequisites. To support deeper explorations, most of the chapters are supplemented with further reading references.

Computer Ethics (Benjamin Wage)

Collection: 
Individual Author
Author: 
Benjamin Wage
Year: 
2012
Conditions of Use: 
Creative Commons Attribution Share-Alike 3.0
Media Format: 
Material Type: 
Description: 
The Course: Computer Ethics addresses a definition of ethics, provides a framework for making ethical decisions, and analyzes in detail several areas of ethical issues that computer professionals are likely to encounter. Topics include philosophical, business, and professional ethics, privacy, criminal conduct, property rights, speech, and reliability.
ACM Classification Tree: 
Subscribe to PowerPoint