Class | Topic | Presentations | Assignments | Recordings |
---|---|---|---|---|
1 |
Project- Internet Legal Issue- Why Write?
Chapter 1-Introduction To Law |
Class Introduction Chapter01 |
Project topic website URL submission Summative01 |
01-course intro 02-url submission 03- Chapter 1 |
2 |
Part 2-Intellectual Property Chapter 2-Copyright Basics |
Chapter02 CC explained Love DRM? Copyright, library reserves Copyright Fair(y) Use CopyRight, unfair use? |
Summative02 |
|
3 | Chapter 3-Copyright Infringement | Chapter03 |
Summative03 |
05-Chapter03 |
4 | Chapter 4-Patents, Trademarks and Trade Secrets Chapter 5-Trademarks and the Internet *** Discuss Project Research *** |
Chapter04 Listen to Patent Attack podcastTESS Trademarks Value of Coca Cola Chapter05 Redirect MySpace.com |
Summative04 Summative05 |
06- Chapter04 07- Chapter05 |
Midterm 1-Law and Intellectual Property-Chapters 1 to 5 -available in D2L |
||||
5 | Part 3-CyberCrime Chapter 6-Cybercrime |
Chapter06 IBM & Watson Some candy? Phishing Pharming Hosts Eraser Cookies Where's My Cookies? GRC and Cookies GRC-Cookie Forensics Police? Cell Phone Hacking! SecurityNow! Narus Protection Bitcoin Bitcoin Silk Road Crime Spree? Bitcoin explained Silk Road Silk Road crime cell phone video StreetView BlockShopper.com Privacy by encryption Internet Archive |
Summative06 |
08-chapter06 |
Class | Class work | Presentations | Assignments | Recordings |
6 |
Part 4-Privacy Chapter 7-Privacy Basics |
Chapter07 MMPORPG defeating facial recognition |
Summative07 |
09-chapter07 |
7 | Chapter 8-Data Privacy |
Chapter08 What's my IP? Google Yourself! Google Data Learn about Yourself Panopticlick Leaking Data TrueCrypt Leaky Copy Machines? (5:15) |
Summative08 Project topic |
10-chapter08 |
8 | Chapter 9-Expectation of Privacy |
Chapter09 |
Summative09 |
11-chapter09 |
9 | Chapter 10-Privacy and the Police State | Chapter10 | Summative10 | 12-chapter10 |
10 | Chapter 11-Privacy Policies
and Behavioral Marketing |
Chapter11 |
Summative11 |
13-chapter11 |
11 | Chapter 12-Privacy and Children |
Chapter12 |
Summative12 | 14-chapter12 |
12 |
Chapter 13-Social Media Discuss Project-use the WSU Library as a resource |
Chapter13 |
Summative13 | 15-chapter13 |
Midterm 2 - Crime & Privacy-chapters 6 to 13 -available in D2L |
||||
Class | Class work | Presentations | Assignments | Recordings |
13 |
Part Five-Free Speech Chapter 14-Free Speech |
Chapter14 |
Summative14 |
16-chapter 14 |
14 | Chapter 15-Defamation, CDA and Anonymous Speech | Chapter15 WayBackMachine FreeFlow of Information OnGuard |
Summative15 |
17-chapter15 |
15 | Chapter 16- Student Speech
|
Chapter16 | Summative16 |
18-chapter16 |
16 | Chapter 17- Journalism in the Digital Age | Chapter17 GoogleTrends Ban.jo! |
Summative17 | 19-chapter17 |
17 | Chapter 18-Obscenity and Child Pornography |
Chapter18 |
Summative18 |
20-chapter18
|
18 | Chapter 19-Hate Speech and Repression |
Chapter19 |
Summative19 | 21-chapter19 |
Class | Class work | Presentations | Assignments | Recordings |
19 | Part Six-Business and the Internet Chapter 20- Business and the Internet |
Chapter20 Global Business Rankings Doing Business Curses, dooced again |
Summative20 | 22-chapter20 |
20 | Chapter 21 Web Contracts | Chapter21 E-SIGN Electronic Signature |
Summative21 | 23-chapter21 |
21 |
Part Seven-Beyond the Horizon Chapter 22- Issues on the Horizon |
Chapter22 BandwidthThe Machine is Us/ing Us Google Fiber MLab Internet Sales Tax Calculator |
Summative22 | 24-chapter22 |
22 | Final Exam-chapters 1 to 22 -available in D2L Project Final Report |
|||
Class | Class work | Presentations | Assignments | Recordings |
...