Instructional Video14:25
TED Talks

TED: How to practice safe sexting | Amy Adele Hasinoff

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Sexting, like anything that's fun, runs its risks -- but a serious violation of privacy shouldn't be one of them....
Instructional Video11:01
MinutePhysics

Protecting Privacy with MATH (Collab with the Census)

12th - Higher Ed
This video was made in collaboration with the US Census Bureau and fact-checked by Census Bureau scientists. Any opinions and errors are my own. For more information,
Instructional Video2:49
The Business Professor

Invasion of Privacy - Tort

Higher Ed
This Video Explains Invasion of Privacy - Tort
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video7:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Professional Communication, Part 2

Higher Ed
This video explains seeing the results in action.
<
br/>
This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section introduces you to Safety and...
Instructional Video3:12
Curated Video

Unintended Consequences from Technology

3rd - Higher Ed
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Instructional Video7:09
Seven Dimensions

Understanding Confidentiality in Human Resources

Higher Ed
This video discusses the importance of confidentiality in human resources and the challenges faced by HR professionals in maintaining it. It highlights the different types of information that should be kept confidential and the...
Instructional Video20:06
Institute for New Economic Thinking

Amir Herzberg: Cyber Security & Centralized Data, What Could Go Wrong?

Higher Ed
A global watchdog has sounded the alarm about the growing danger of cyber attacks, on financial markets, warning that firms and regulators around the world need to address the “uneven” response to the threat of online...
Instructional Video3:24
Curated Video

Internet Safety- Knock, Knock, Who's There?-1

K - 8th
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
Instructional Video3:22
All In One Social Media

Google+ is DEAD - Google To Close Google Plus Social Network in 2019

Higher Ed
Google+ is DEAD - Google To Close Google Plus Social Network in 2019 // Google will be closing Google Plus, the company’s long-struggling answer to Facebook’s giant social network, after it discovered a security vulnerability that...
Instructional Video21:45
IDG TECHtalk

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

Higher Ed
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell...
Instructional Video3:06
The Business Professor

Invasion of Privacy - Tort

Higher Ed
This Video Explains Invasion of Privacy - Tort
Instructional Video3:37
Curated Video

Internet Safety- Keep Private Information Private

K - 8th
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.
Instructional Video3:49
Mazz Media

Internet Safety- Keep Private Information Private

6th - 8th
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.