Posts Tagged ‘mobile devices’

screen time and mental health

At Your Wits’ End With A Screen-Obsessed Kid? Read This

Anya Kamenetz and Chloee Weiner Jun 30

https://www.kqed.org/mindshift/53910/at-your-wits-end-with-a-screen-obsessed-kid-read-this

The relationship between teens, screens and mental health is complex and multidirectional

Abby’s mom has sent her articles about research linking teen depression and suicide to screen use. A 2017 article in The Atlantic magazine — “Have Smartphones Destroyed a Generation?” — drew a link between negative trends in teens’ mental health and the rise of smartphones and social media.

The negative relationship between teens’ mental health and technology use is real — but tiny, the researchers found. “A teenager’s technology use can only predict less than 1% of variation in well-being. It’s so small that it’s surpassed by whether a teenager wears glasses to school.”

How to strike a balance? To start, try mentoring, not monitoring

Heitner’s work emphasizes a concept that’s also put forth by the American Academy of Pediatrics in its guidelines for parents: media mentoring.

Look for the good in your kids’ media interests

For Benji, Minecraft is a social space where he plays with other kids and pulls pranks. He says he wishes his parents understood more about his screen use — “why it’s entertaining and why we want to do it. And also, for YouTube, why I watch other people playing games. When you watch sports, you’re watching another person playing a game! Why is it so different when you’re watching a person play a video game?”

Work together as a family to make changes.

+++++++++++++
more on contemplative computing in this IMS blog
https://blog.stcloudstate.edu/ims?s=contemplative+computing

Games for Students to Play at Home

7 Places to Create Your Own Educational Games for Students to Play at Home

https://www.freetech4teachers.com/2018/07/7-places-to-create-your-own-educational.html

ProProfs Brain Games provides templates for building interactive crossword puzzles, jigsaw puzzles, word searches, hangman games, and sliding puzzle games. The games you create can be embedded into your blog or shared via email, social media, or any place that you’d typically post a link for students. If you don’t want to take the time to create your own game, you can browse the gallery of games. Most of the games in gallery can be embedded into your blog.

ClassTools.net  templates for creating map-based games, word sorting games, matching games, and many more common game formats.

Purpose Games is a free service for creating and or playing simple educational games. The service currently gives users the ability to create seven types of games. Those game types are image quizzes, text quizzes, matching games, fill-in-the-blank games, multiple choice games, shape games, and slide games.

TinyTap is a free iPad app and Android app that enables you to create educational games for your students to play on their iPads or Android tablets. Through TinyTap you can create games in which students identify objects and respond by typing, tapping, or speaking. You can create games in which students complete sentences or even complete a diagram by dragging and dropping puzzle pieces.

Wherever I’ve demonstrated it in the last year, people have been intrigued by Metaverse. It’s a free service that essentially lets you create your own educational versions of Pokemon Go. This augmented reality platform has been used by teachers to create digital breakout games, augmented reality scavenger hunts, and virtual tours.

There was a time when Kahoot games could only be played in the classroom and only created on your laptop. That is no longer the case. Challenge mode lets you assign games to your students to play at home or anywhere else on their mobile devices.

You can even share those challenges through Remind. And the latest update to Kahoot enables you and your students to build quiz games on your mobile devices.

Flippity’s assortment of game templates.

privacy and cell phones

In Major Privacy Win, Supreme Court Rules Police Need Warrant To Track Your Cellphone

June 22, 201810:41 AM ET

Cellphone providers routinely keep location information for customers to help improve service. And until now, the prevailing legal theory was that if an individual voluntarily shares his information with a third party — for instance, by signing up for cellphone service — police can get that information without a search warrant.

On Friday, the Supreme Court blew a hole in that theory. Writing for the court majority, Chief Justice John Roberts said that cellphone location information is a “near perfect” tool for government surveillance, analogous to an electronic monitoring ankle bracelet.

While Friday’s decision may limit the government’s access to cellphone data, it has no impact on the ability of private companies to amass, use and sell their customers’ information. That is because the Fourth Amendment only limits government conduct, not private conduct. Only Congress, in enacting legislation, can limit how private companies amass and use information.

see also:
https://blog.stcloudstate.edu/ims/2015/12/03/power-privacy-internet/

Aral Balkan: https://blog.stcloudstate.edu/lib290/2018/03/01/duckduckgo-privacy-free-service/
++++++++++++
more on privacy and surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

https://blog.stcloudstate.edu/ims?s=surveillance

 

Are your phone camera and microphone spying on you

Are your phone camera and microphone spying on you?

https://www.theguardian.com/commentisfree/2018/apr/06/phone-camera-microphone-spying

Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber

Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:

  • Access both the front and the back camera.
  • Record you at any time the app is in the foreground.
  • Take pictures and videos without telling you.
  • Upload the pictures and videos without telling you.
  • Upload the pictures/videos it takes immediately.
  • Run real-time face recognition to detect facial features or expressions.
  • Livestream the camera on to the internet.
  • Detect if the user is on their phone alone, or watching together with a second person.
  • Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.

For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.

The government

  • Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
  • Government security agencies like the NSA can also have access to your devices through in-built backdoors. This means that these security agencies can tune in to your phone calls, read your messages, capture pictures of you, stream videos of you, read your emails, steal your files … at any moment they please.

Hackers

Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.

An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.

Once a user opens this PDF file, the hacker can then:

  • Install whatever software/app they like on the user’s device.
  • Use a keylogger to grab all of their passwords.
  • Steal all documents from the device.
  • Take pictures and stream videos from their camera.
  • Capture past or live audio from the microphone.
  • Upload incriminating images/documents to their PC, and notify the police.

And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too

  • You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.

++++++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

 

best practices in online proctoring

To catch a cheat: Best practices in online proctoring

As online education expands, students are bringing old-fashioned cheating into the digital age

According to the latest report from Babson Survey Research Group, nearly 6.5 million American undergraduates now take at least one course online

1. Listen to students and faculty. Every college, university, or online-learning provider has a different approach to online learning. At Indiana University, where more than 30 percent of students take at least one online course, the online education team has launched Next.IU, an innovative pilot program to solicit feedback from the campus community before making any major edtech decision. By soliciting direct feedback from students and faculty, institutions can avoid technical difficulties and secure support before rolling out the technology campus-wide.

2. Go mobile. Nine in 10 undergraduates own a smartphone, and the majority of online students complete some coursework on a mobile device. Tapping into the near-ubiquity of mobile computing on campus can help streamline the proctoring and verification process. Rather than having to log onto a desktop, students can use features like fingerprint scan and facial recognition that are already integrated into most smartphones to verify their identity directly from their mobile device.

For a growing number of students, mobile technology is the most accessible way to engage in online coursework, so mobile verification provides not only a set of advanced security tools, but also a way for universities to meet students where they are.

3. Learn from the data. Analytical approaches to online test security are still in the early stages. Schools may be more susceptible to online “heists” if they are of a certain size or administer exams in a certain way, but institutions need data to benchmark against their peers and identify pain points in their approach to proctoring.

In an initial pilot with 325,000 students, for instance, we found that cheating rose and fell with the seasons—falling from 6.62 percent to 5.49 percent from fall to spring, but rising to a new high of 6.65 percent during the summer.

++++++++++++
more on proctoring in this IMS blog
https://blog.stcloudstate.edu/ims?s=proctoring

social media socially stunting

How social media is socially stunting our society: An anthropologist and acclaimed journalist shares his warnings

https://www.naturalnews.com/2017-11-20-how-social-media-is-socially-stunting-our-society-an-anthropologist-and-acclaimed-journalist-shares-warnings.html

One of the founders of Facebook, Sean Parker, explains that these social media devices exploit the vulnerability of the human essence. The dopamine that is social media only creates a narcissistic, self-validating loops that consume valuable time and conscious attention. “Liking”, “commenting”, and “sharing” (which are virtually useless in reality) causes us to run around an endless cycle of insignificant information documentation in hopes of acknowledgment, which later on propels us to create more of the same.

Social media platform owners and creators are aware of this weakness in human psychology, and are taking advantage of it. Parker is just one of the many individuals who regret having a hand in creating these life-stagnating technologies. The mental health of the global population is deteriorating and is mostly due to anxieties produced by social media.

+++++++++++
more on contemplative computing in this IMS blog
https://blog.stcloudstate.edu/ims?s=contemplative+computing

Google in the classroom

How Has Google Affected The Way Students Learn?

con?:with the advent of personal assistants like Siri and Google Now that aim to serve up information before you even know you need it, you don’t even need to type the questions.

pro: Whenever new technology emerges — including newspapers and television — discussions about how it will threaten our brainpower always crops up, Harvard psychology professor Steven Pinker wrote in a 2010 op-ed in The New York Times. Instead of making us stupid, he wrote, the Internet and technology “are the only things that will keep us smart.”

Pro and conDaphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.

conDaphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.

con: A 2008 study commissioned by the British Library found that young people go through information online very quickly without evaluating it for accuracy.

pro or con?: A 2011 study in the journal Science showed that when people know they have future access to information, they tend to have a better memory of how and where to find the information — instead of recalling the information itself.

pro: The bright side lies in a 2009 study conducted by Gary Small, the director of University of California Los Angeles’ Longevity Center, that explored brain activity when older adults used search engines. He found that among older people who have experience using the Internet, their brains are two times more active than those who don’t when conducting Internet searches.

the Internet holds great potential for education — but curriculum must change accordingly. Since content is so readily available, teachers should not merely dole out information and instead focus on cultivating critical thinking

make questions “Google-proof.”

“Design it so that Google is crucial to creating a response rather than finding one,” he writes in his company’s blog. “If students can Google answers — stumble on (what) you want them to remember in a few clicks — there’s a problem with the instructional design.”

+++++++++++
more on use of laptop and phones in the classroom in this IMS blog
https://blog.stcloudstate.edu/ims/2017/04/03/use-of-laptops-in-the-classroom/

managing phone use in class

3 Tips for Managing Phone Use in Class

Setting cell phone expectations early is key to accessing the learning potential of these devices and minimizing the distraction factor.Liz Kolb September 11, 2017

https://www.edutopia.org/article/3-tips-managing-phone-use-class

Ten is now the average age when children receive their first cell phones

develop a positive mobile mental health in the first weeks of school by discussing their ideas on cell phone use, setting up a stoplight management system, and establishing a class contract
Build a digital citizenship curriculum that includes mobile device use.

Ask your students questions such as:

  • What do you like to do on your cell phone and why? (If they don’t have one, what would they like to do?)
  • What are the most popular apps and websites you use?
  • What do you think are inappropriate ways that cell phones have been used?
  • What is poor cell phone etiquette? Why?
  • How can cell phones help you learn?
  • How can cell phones distract from your learning?
  • How do you feel about your cell phone and the activities you do on your phone?
  • What should teachers know about your cell phone use that you worry we do not understand?
  • Do you know how to use your cell phone to gather information, to collaborate on academic projects, to evaluate websites?
  • How can we work together to create a positive mobile mental health?

Using a Stoplight Management Approach

Post a red button on the classroom door:  the cell phone parking lot.
Post a yellow button on the classroom door
Post a green button on the classroom door

Establishing a Class Contract: Ask them to brainstorm consequences and write them into a class contract.

++++++++++++
more on the use of BYOD in this IMS blog
https://blog.stcloudstate.edu/ims/2017/04/03/use-of-laptops-in-the-classroom/

1 2 3