Banking on Bitcoin
How a Cyber-Currency is Disrupting the Economy

Show More

Related videos

The 'M' Way: Time + People = Money  - An Indian Owned Software Company
This film was shot inside MphasiS-BFL Limited, a medium-sized Indian IT services company that typifies this highly competitive business, in which the provision of high quality and low-cost service is key to attracting and retaining customers. The film focuses on two teams - a software development team and a quality…
July Boys: New Global Players - Catering to the Global High-Tech Service Industry
This documentary focuses on a small 'startup' company in Bangalore that designs and produces software products for cellular service providers in Europe and the U.S. Turning the tables on the usual outsourcing story, July Systems has leveraged U.S.-based venture capital and Indian technical expertise to break into the latest high-tech…
Stuxnet—The First Cyber Guided Missile
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.
Cyber Fraud, Theft, and Organized Crime
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are…
Nations at Cyber War
Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an…
Where is the World Going, Mr. Stiglitz? - An Explanation of the World's Economy
Simply and eloquently, Nobel Prize-winning economist Joseph Stiglitz explains how the world's economy works. Drawing not only from his academic expertise but also from time spent on the ground in countries around the world, Stiglitz offers fresh thinking about the questions and challenges facing all of us - from well-off…
Four Horsemen - A Look at the World Economy
The modern day Four Horsemen continue to ride roughshod over the people who can least afford it. Crises are converging when governments, religion and mainstream economists have stalled. Twenty-three international thinkers come together and break their silence about how the world really works and why there is still hope in…
Thinking about Cybersecurity - From Cyber Crime to Cyber Warfare Series
Virtually every aspect of global civilization now depends on interconnected cyber systems to operate... which makes keeping these systems safe from threat one of the most pressing problems we face. Get an intriguing look at the structure of the Internet, the unique dangers it breeds, and the ways we're learning…
Privacy for the Cyber Age
It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data"--and how "Big Data" can keep the government honest--you'll discover insights into how we can evolve our privacy laws while embracing new…
The Incredible Scope of Cyberspace
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that…
The Five Gateways of Internet Vulnerability
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.
Of Viruses, Botnets, and Logic Bombs
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture…