Archive of ‘digital identity’ category

proctoring ideas

Digital Proctoring

I great exchange on ideas regarding digital proctoring in the Blended and Online Learning listserv:

STUDENTS

David Huckleberry

Coordinator of Digital Instruction – Physics & Astronomy

Purdue University

Office = PHYS 176

525 Northwestern Avenue

West Lafayette, IN 47907

dhuckleb@purdue.edu

++++++++++++

Proctorio

Scott Robison, Ph.D.
Associate Director, Digital Learning and Design
Portland State University

Portland, OR 97201
503-725-9118
@otterscotter
+++++++++++++++++
At University of Wisconsin – Superior – we have stopped offering proctoring for students.  Faculty, however, have come up with a way for online testing. They ask student to use Kaltura tto record their face and part of the test and then post the video in the dropbox.

Rebecca Graetz, EdD

Instructional Program Manager II

UW – Superior

rgraetz@uwsuper.edu

++++++++++++

ProctorU, an online proctoring service, with online courses that offered online exams and BioSig ID for courses that did not require exams.

Kelvin Bentley
Email: timelord33@gmail.com
Twitter: blacktimelord
++++++++++++++

+++++++++++++
more on proctoring in this IMS blog
https://blog.stcloudstate.edu/ims?s=proctoring

WhatsApp privacy France

French privacy watchdog raps WhatsApp over Facebook data sharing

 France’s data privacy watchdog may fine messaging app WhatsApp if it does not comply with an order to bring its sharing of user data with parent company Facebook into line with French privacy law.
Separately, Germany’s cartel office said on Tuesday it had found Facebook had abused its dominant market position, in a ruling that questioned the company’s model of monetizing the personal data of its users through targeted advertising.
My note: it seems the EU is gearing toward in increase scrutiny of social media giants regarding users’ privacy:
https://blog.stcloudstate.edu/ims/2018/01/05/tinder-dating-privacy/ 

++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

 

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

eportofolios conference

Meaning-Making with Eportfolios

Southeast Regional Conference November 6-7, 2017 University of Virginia 

Conference Description and CFP
The Association for Authentic, Experiential, and Evidence-Based Learning (AAEEBL) and the University of Virginia (UVa) are pleased to host the 2017 Southeast Regional AAEEBL Conference.  AAEEBL is an international professional association dedicated to supporting educational leaders committed to education transformation relevant to 21st century learnings and best known for promotion of ePortfolios as a high impact practice in higher education.

Theme: Meaning-Making with Eportfolios
ePortfolios provide an authentic context for learning and assessment as well as fertile ground for the exploration of the learning process itself.  In this conference, we propose to explore the role of “meaning making” in the various facets of the ePortfolio building process and the way it informs the experiences of our students and our understanding of learning.

http://www.aaeebl.org/members/EmailOptPreferences.aspx

++++++++++++++++++++++++++++++
more on eportfolio in this IMS blog
https://blog.stcloudstate.edu/ims?s=portfolio

Minecraft empathy skills

Report: Minecraft Builds Problem-Solving and Empathy Skills in Students

By Sri Ravipati  08/14/17

https://thejournal.com/articles/2017/08/14/minecraft-builds-problem-solving-and-empathy-in-students.aspx

K–12 teachers who use Minecraft: Education Edition during class say their students are experiencing a number of social-emotional learning (SEL) benefits.

How Minecraft Supports Social and Emotional Learning in K–12 Education

Getting Smart site.

+++++++++++++++++++++
more on empathy in this IMS blog
https://blog.stcloudstate.edu/ims?s=empathy

proctoring online learning

Nobody’s Watching: Proctoring in Online Learning

There is no single best way to handle proctoring for digital courses, as this community college system pilot discovered.

By Dian Schaffhauser  07/26/17

https://campustechnology.com/articles/2017/07/26/nobodys-watching-proctoring-in-online-learning.aspx

The Higher Education Opportunity Act of 2008 lays out the rule: An institution offering “distance education” needs to have processes in place for verifying student identity to ensure that the student who registers for a class is the “same student who participates in and completes the program and receives the academic credit.”

OLC (Online Learning Consortium) Innovate conference and shared the solution: a combination of the use of an automated proctoring application and the creation of a network of colleges across the state that would provide no-cost proctoring on their campuses for students attending any of the member schools.

put together an online proctoring working group with “lots of faculty representation,” said Hadsell, which “paid off in the long run.” Other participants included people from testing centers and learning centers. Proctorio, the proctoring solution eventually recommended by the working group, is a web service that can be deployed through Canvas and installed by students with one click

++++++++++++++
more on proctoring in this IMS blog
https://blog.stcloudstate.edu/ims?s=proctor

fake emails

Why everyone still falls for fake emails

By Richard Matthews  Jul 31, 2017

https://gcn.com/articles/2017/07/31/why-fake-emails-still-work.aspx

Phishing is likely to get only more sophisticated.

Based on my experience in Tallinn, we will see companies become more transparent in how they deal with cyber attacks. After a massive cyber attack in 2007, for example, the Estonian government reacted in the right way.

free anti-phishing software

+++++++++++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing+

anonymous browsing data

‘Anonymous’ browsing data can be easily exposed, researchers reveal

https://www.theguardian.com/technology/2017/aug/01/data-browsing-habits-brokers

A similar strategy was used in 2008, Dewes said, to deanonymise a set of ratings published by Netflix to help computer scientists improve its recommendation algorithm: by comparing “anonymous” ratings of films with public profiles on IMDB, researchers were able to unmask Netflix users – including one woman, a closeted lesbian, who went on to sue Netflix for the privacy violation.

++++++++++++++++
A hacker explains the best way to browse the internet anonymously.
https://www.facebook.com/techinsider/videos/824655787732779/ 

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

RFID blocking

There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID

card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.

REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.

Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.

Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.

if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
+++++++++++++++
more on cybersecurity in this IMS blog

1 2 3 4 5 10