InforMedia Services (IMS)

Technology Instruction for St. Cloud State University

Archive for the 'Cybersecurity' Category

Gaming and Education: Resources

Posted by Plamen Miltenoff on 3rd July 2014

Gaming Learning Society
https://www.gameslearningsociety.org/

Report from the intersection of Games, Learning, and Society
http://remakelearning.org/blog/2014/06/19/games-learning-society-recap/
Games, Learning and Society conference in Madison, Wisconsin. practical ideas and arguments from GLS to help you get through the roadblocks that stand between you and learning or teaching through games.

keywords: gamification + library in Twitter:
Readers Save Legacy Library Content by Crowdsourcing Metadata Games
http://www.gamification.co/2014/05/12/readers-save-legacy-content-by-crowdsourcing-metadata-games/What is Gamification and Why Use It in Teaching?
http://ii.library.jhu.edu/2014/05/13/what-is-gamification-and-why-use-it-in-teaching/What Does the Next-Generation School Library Look Like?
http://blogs.kqed.org/mindshift/2014/06/what-does-the-next-generation-school-library-look-like/
The library now also has reading lounge areas with comfortable modular seating, as well as tables with chairs and stools that students are free to move around; two music studios; a HackerSpace (with high-tech equipment such as a microscope, 3D printer, gaming hardware and software, and a green screen for filming) and a Maker Space that also houses a 3D printer and serves as a “hands-on” craft room where old technology can be disassembled and re-configured with other materials. In short, the Monticello Library Media Center has become a “Learning Commons.”

following now @valibrarian because of MineCraft http://t.co/RnwW7ahOK2
Minecraft and the library: http://blogs.curtin.edu.au/gamification/news/minecraft-and-the-library/

Library Quest Wrap-Up and Post-Game Assessment
https://babeltech.wordpress.com/2014/03/25/library-quest-wrap-up-and-post-game-assessment/

If you build it …? One campus’ firsthand account of gamification in the academic library
http://crln.acrl.org/content/74/4/208.full
Straight from CRL News
SCVNGR as a platform was attractive to us for several reasons, including UCSD’s experience. First, it incorporated gaming into students’ experience of the library, which has been widely explored and recommended as a way to engage library patrons.2,3 Second, it would enable us to connect with students early in the year without needing to commit personnel to lengthy tours and other scheduled services during a busy time.

Pls consider former IMS blog entries. Keyword: “game”:
http://blog.stcloudstate.edu/ims/?s=game

 

Posted in Digital literacy, gaming, hacker | 2 Comments »

10 technology hallmarks for every campus

Posted by Plamen Miltenoff on 1st May 2014

10 technology hallmarks for every campus

http://www.ecampusnews.com/technologies/technology-hallmarks-campus-099

1. High-speed wireless broadband.

According to the Center for Digital Education’s recent “2013 Yearbook: Technology Innovation in Education,” over 80 percent of education institutions surveyed said that wireless broadband was their “top priority for IT investment.”

2. 24/7 IT support.

We have 24/7 support for emergencies and much of our staff, just like at a hospital, are on call. That’s not a perk for the campus, it’s a necessity.

3. The cloud.

The cloud can also: acquire and implement the latest software and application updates; streamline enrollment and admissions processes; and turn to subscriptions that are scalable and provide options, says Edudemic.

4. Digital textbooks.

Planning for digital textbooks means not only boosting mobile device capabilities on campus, but helping faculty learn to implement digital resources into their course.

5. 21st Century PD for faculty and admin.

From offering a MOOC on classroom management online solutions, to hosting a PD session on Twitter, campus admin should offer multiple options for PD delivery, just like how faculty should offer students multiple options for learning–there’s no better way to teach something than to model it first!

6. MOOCs.

[Read: “3 pros and 3 cons of MOOCs.”]

7. Online course management system.

From sending in-class emails to checking grades, course management systems, like Blackboard, offer faculty and students a fairly intuitive way to manage courses more efficiently.

8. Big Data…

Future-proofing universities are beginning to deploy storage solutions to help manage the unstructured data in physical, virtual and cloud environments. More modern storage solutions are also open source for a high learning curve but low cost.

9…security.

precautions can range from scanning existing databases on the university’s servers to determine where personal information is located and then, depending on the database, destroy the personal information or add more digital security; as well as put cybersecurity systems through a series of penetration tests to highlight security shortcomings.

[Read: “University data breach prompts ‘top-to-bottom’ IT review.”]

10. Social media done well.

of the major ways campuses use social media well is by serving up both “cake” and “broccoli,” or balancing the content that is important and good for the school (broccoli) and the content that is fun and delicious (cake). “If you share enough cake, your audience will consume the occasional broccoli,” she advises.

Posted in Cybersecurity, Desire2Learn (D2L), distance learning, distributive learning, e-learning, E-Learning Authoring Tool, educational technology, information technology, learning, mobile apps, mobile learning, MOOC, mooc, online learning, social media, teaching | No Comments »

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

Posted by Plamen Miltenoff on 23rd October 2013

http://www.nybooks.com/articles/archives/2013/nov/07/are-we-puppets-wired-world/

Are We Puppets in a Wired World?

But while we were having fun, we happily and willingly helped to create the greatest surveillance system ever imagined, a web whose strings give governments and businesses countless threads to pull, which makes us…puppets. The free flow of information over the Internet (except in places where that flow is blocked), which serves us well, may serve others better. Whether this distinction turns out to matter may be the one piece of information the Internet cannot deliver.

 

Posted in Blog, collaboration and creativity, copyright, Cybersecurity, digital citizenship, digital identity, Digital literacy, Digital rights management (DRM), Digital rights management (DRM), digital storytelling, information technology, issues, media management, mobile apps, mobile devices, mobile learning, privacy, social media, technology, technology literacy | No Comments »

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

Posted by Plamen Miltenoff on 30th May 2013

The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords

Posted in cracker, Cybersecurity, hacker, technology | No Comments »

3 cyber bills passed in the House

Posted by Plamen Miltenoff on 18th April 2013

The House is passing 3 bills:

The House passed the Cybersecurity Enhancement Act, which mandates strategic guidance for federal cybersecurity research and development. To establish that guidance, the bill calls for input from public and private stakeholders, and strengthens security automation standards and checklists for federal systems.

How this will impact education and academia? What input can SCSU contribute with?…

http://fcw.com/articles/2013/04/17/cyber-bills-explained.aspx?s=fcwdaily_180413

FISMA – Federal Information Security Management Act of 2002 https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002

CISPA- Cyber Intelligence Sharing and Protection Act http://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act

 

Posted in Cybersecurity, technology | 1 Comment »