Archive of ‘Library and information science’ category

IoT hack

My note:
I listened to the report in my car yesterday. It is another sober reminder for being proactive rather then reactive (or punitive). We must work toward digital literacy and go beyond that comfortably numb stage of information literacy.

An Experiment Shows How Quickly The Internet Of Things Can Be Hacked

http://www.npr.org/sections/alltechconsidered/2016/11/01/500253637/an-experiment-shows-how-quickly-the-internet-of-things-can-be-hacked

We have basic security in place in modern devices that screen out the most obvious attacks. Really getting phished, if you will, is more of a problem where you are tricked in surrendering your password or username to a common service. If you plug in your webcam into your router or to your Wi-Fi, you’re relatively safe.

I think the biggest security concern for folks at home would be if their router actually is old, it might have an easily guessed password that someone could gain control. Most modern devices don’t have that problem, but that certainly is a concern for older devices.


+++++++++++
more on cybersecurity in this blog:
https://blog.stcloudstate.edu/ims?s=cybersecurity

Google AI

Google Researchers Create AI That Builds Its Own Encryption

BY TOM BRANT OCTOBER 28, 2016 04:45PM EST

http://www.pcmag.com/news/349154/google-researchers-create-ai-that-builds-its-own-encryption

Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.

They’re artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can’t hack is being hailed as an important advance in machine learning and cryptography.

Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.

As the Abadi and Anderson wrote, “instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose.”

same in German

Googles AI entwickelt eigenständig Verschlüsselung

von – 31.10.2016
http://www.com-magazin.de/news/verschluesselung/googles-ai-entwickelt-eigenstaendig-verschluesselung-1145175.html
Google-Forscher Martin Abadi und David G. Andersen des Deep-Learning-Projekts “Google Brain” eine neue Verschlüsselungsmethode entwickelt beziehungsweise entwickeln lassen. Die Forscher haben verschiedene neurale Netze damit beauftragt, eine abhörsichere Kommunikation aufzustellen.

++++++++++++++++
more on AI in this IMS blog:
https://blog.stcloudstate.edu/ims?s=artificial+intelligence

biometric authentication online ed

Wiklund, M., Mozelius, P., Westing, T., & Norberg, L. (2016). Biometric Belt and Braces for Authentication in Distance Education. Retrieved from https://www.researchgate.net/publication/309548915_Biometric_Belt_and_Braces_for_Authentication_in_Distance_Education
Abstract
a need for new techniques to handle the problem in online environments. To achieve zero cheating is hard (or impossible) without repelling not only cheaters but also those students who do not cheat, where a zero ‐ tolerance emphasis also would risk inhibiting students’ intrinsic motivation. Several studies indicate that existing virtual learning environments do not provide the features needed to control that the intended student is the one taking the online exam. Biometric Belt and Braces for Authentication in Distance Education.
One approach to prevent student’s dishonesty is the university code of honour. This is a set of rules describing what actions are not permitted and the consequences for students taking such actions. Another way of preventing cheating is the use of proctors during written exams. Even while using such codes of honour and proctors, universities still have found many students to cheat. Biometric Belt and Braces for Authentication in Distance Education.
Neutralisation is the phenomenon when a person rationalises his or her dishonest behaviour with arguments like “I can do this because the work load within this course is just too overwhelming” or “I can do this because I have a half ‐ time job on the side which gives me less study time than the other students have”. By doing so the student puts the blame for cheating on external factors rather than on himself, and also protects himself from the blame of others (Haines et al. 1986). This neutralises the behavior in the sense that the person’s feelings of shame are reduced or even eliminated. Haines et al. (1986 Biometric Belt and Braces for Authentication in Distance Education.
Simply asking participants to read a code of honour when they had the opportunity to cheat reduced dishonesty. Also whether one signed the code of honour or just read it influenced cheating. The Shu et al. (2011) study suggests that opportunity and knowledge of ethical standards are two factors that impact students’ ethical decision about cheating. This is in line with the results in (McCabe, Trevino and Butterfield 2001), showing that if students regularly are reminded of the university’s code of honour, they are less likely to cheat Biometric Belt and Braces for Authentication in Distance Education.
For an online course setting, Gearhart (2001) suggest that teachers should develop a guideline for “good practices”.
In online examination there are reports of students hiring other persons to increase their scores (Flior & Kowalski, 2010) and there is a need for new enhanced authentication tools (Ullah, Xiao & Lilley, 2012). For companies and Internet environments the process of authentication is often completed through the use of logon identification with passwords and the assumption of the password to guarantee that the user is authentic (Ramzan, 2007), but logins and passwords can be borrowed (Bailie & Jortberg, 2009). The discussion on how to provide enhanced authentication in online examination has led to many suggested solutions; four of them are: Biometric Belt and Braces for Authentication in Distance Education.
  • Challenge Questions: with questions based on third ‐ party data ƒ
  • Face ‐ to ‐ Face Proctored Exam: with government or institution issued identification ƒ
  • Web Video Conference Proctor: audio and video conference proctoring via webcam and screen monitoring service with live, certified proctors ƒ
  • Biometrics and Web Video Recording: with unique biometrics combined with the recording of student in exam via webcam

An idea for online courses is that assessment should not only be a one way process where the students get grades and feedback. The examination process should also be a channel for students’ feedback to teachers and course instructors (Mardanian & Mozelius, 2011). New online methods could be combined with traditional assessment in an array of techniques aligned to the learning outcomes (Runyon and Von Holzen, 2005). Examples of summative and formative assessment in an online course could be a mix of: Biometric Belt and Braces for Authentication in Distance Education.

  • Multiple choice questions (MCQ) tests, automatically corrected in a virtual learning environment ƒ
  • Term papers or essays analysed by the course instructors ƒ
  • Individual or group assignments posted in digital drop ‐ boxes ƒ
  • Oral or written tests conducted in the presence of the instructor or through videoconferences (Dikli, 2003)

Authors’ suggestion is a biometric belt and braces model with a combination of scanned facial coordinates and voice recognition, where only a minimum of biometric data has to be stored. Even if the model is based on biometrics with a medium to low grade of uniqueness and permanence, it would be reliable enough for authentication in online courses if two (or more) types of biometrics are combined with the presented dialogue based examination using an interaction/obser ‐ vation process via web cameras. Biometric Belt and Braces for Authentication in Distance Education.

++++++++++++++++++
more on identification in this IMS blog
https://blog.stcloudstate.edu/ims?s=identification

++++++++++++++++
more on proctoring and detecting cheating:

http://www.wgu.edu/blogpost/innocent-red-flags-caught-by-online-exam-proctors

voices from the other side:
http://infoproc.blogspot.com/2013/04/how-to-cheat-online-exam-proctoring.html

https://campustechnology.com/articles/2016/04/06/how-students-try-to-bamboozle-online-proctors.aspx

http://www.usnews.com/education/online-education/articles/2014/06/17/think-twice-before-cheating-in-online-courses

Google virtual tours museums

Google Arts & Culture

https://www.google.com/culturalinstitute/beta/

Android App:
https://play.google.com/store/apps/details?id=com.google.android.apps.cultural&referrer=utm_source%3Dstella%26utm_medium%3Dhome-header

iOS App:
https://itunes.apple.com/app/arts-culture/id1050970557

++++++++++++++++++

more on virtual tours of museums in this IMS blog:
https://blog.stcloudstate.edu/ims?s=museum

ALA on digital literacy

In the wake of NMC release regarding digital literacy, https://blog.stcloudstate.edu/ims/2016/10/25/nmc-on-digital-literacy/ (not coincidence, the author is active with NMC)

ALA is offering a webinar:
Rethinking Digital Literacy to Serve Library Staff and Users eCourse
Paul Signorelli Item Number: 1541-9124

http://www.alastore.ala.org/detail.aspx?ID=11469&zbrandid=4634&zidType=CH&zid=38811756&zsubscriberId=1026665847&zbdom=http://ala-publishing.informz.net

Asynchronous eCourse beginning November 14, 2016 and continuing for 5 weeks (includes an extension of 1 week for Thanksgiving)

Estimated Hours of Learning: 24
Certificate of Completion available upon request

Learning outcomes

After participating in this course, you will be able to:

  • incorporate ever-evolving definitions of digital literacy into learning opportunities
  • draw upon a variety of digital resources to create digital-learning opportunities
  • seek additional resources that you can use in your continuing efforts to keep up with new developments in digital literacy in libraries and other learning organizations

What is digital literacy? Do you know how you can foster digital literacy through formal and informal learning opportunities for your library staff and users?

Supporting digital literacy still remains an important part of library staff members’ work, but sometimes we struggle to agree on a simple, meaningful definition of the term. In this four-week eCourse, training/learning specialist Paul Signorelli will begin by exploring a variety of definitions, focusing on work by a few leading proponents of the need to foster digital literacy among people of all ages and backgrounds. He will explore a variety of digital-literacy resources – including case studies of how we creatively approach digital-literacy learning opportunities for library staff and users, and will explore a variety of digital tools that will help to encourage further understanding of this topic.

Now, who is ready to build their digital-literacy skills and help their users become digital literate as well?

eCourse Outline

Part 1: Digital Literacy: Initial Definitions and Explorations

  • An overview of various definitions of digital literacy
  • Several components of digital literacy
  • Exploring Doug Belshaw’s extensive work on defining and fostering digital literacy

Part 2: Digital Literacy: Crap Detection and Other Skills and Tools

  • Exploring Howard Rheingold’s approach to crap detection and other digital literacy/net literacy skills
  • Participation, collaboration, creativity, and experimentation as digital-literacy skills
  • Building our digital-literacy toolkit

Part 3: Digital Literacy in Learning

  • The varying digital literacy needs of our youngest students, of teens, and of adults
  • Exploring various online resources supporting our digital-literacy training-teaching-learning efforts
  • The myth of the digital native

Part 4: Fostering Digital Literacy: Creating Within a Digital Environment

  • Creating a framework to promote digital literacy
  • Designing workshops and other learning opportunities
  • Keeping up in an evolving digital literacy landscape

How this eCourse Works

The eCourse begins on Monday, November 14, 2016. Your participation will require approximately six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:

  • Read, listen to or view online content
  • Post to online discussion boards
  • Complete weekly assignments or activities

Instructor Paul Signorelli will monitor discussion boards regularly during the four-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.

User Requirements

Participants will need regular access to a computer with an internet connection for online message boards participation, viewing online video, listening to streaming audio (mp3 files), and downloading and viewing PDFs and PowerPoint files. ALA Editions eCourses are fully compatible with Windows and MacOs.

About the Instructor

Paul Signorelli, co-author of Workplace Learning & Leadership with Lori Reed, is a San Francisco-based writer, trainer, presenter, and consultant exploring, fostering, and documenting innovations in learning. Having earned an MLIS through the University of North Texas (with an emphasis on online learning), he remains active in the American Library Association, the New Media Consortium (educational technology), and the Association for Talent Development (formerly the American Society for Training & Development).

My note: Finally ALA is addressing a huge gap. Namely, letting conservative librarians dress information literacy with the appearance of “digital literacy.”

++++++++++++++++
more on digital literacy in this IMS blog:

1 154 155 156 157 158 220