Searching for "data security"
Teachers Turn to Gaming for Online Privacy Lessons
By Dian Schaffhauser 10/10/18
Blind Protocol, an alternate reality game created by two high school English teachers to help students understand online privacy and data security. This form of gaming blends fact and fiction to immerse players in an interactive world that responds to their decisions and actions. In a recent article on KQED, Paul Darvasi and John Fallon described how they chose the gaming format to help their students gain a deeper look at how vulnerable their personal data is.
Darvasi, who blogs at “Ludic Learning,” and Fallon, who writes at “TheAlternativeClassroom,” are both immersed in the education gaming realm.
more on online privacy and data security
College student finds privacy flaw in many security and doorbell cameras. from r/gadgets
more on security in this IMS blog
Teaching Cybersecurity: What You Need to Know
Wednesday, Nov. 13 @ 4 pm CT
In 2014, there were 1 million unfilled cybersecurity jobs globally. By 2021, it’s estimated that number will grow to 3.5 million. Exposing K-12 students to cybersecurity through a well-designed curriculum and set of activities will help alleviate the shortage by increasing the interest and skills of the new generation. Unfortunately, current secondary school curricula across the country leave students and educators with minimal or no exposure to cybersecurity topics.
Many K-12 school districts are looking for ways to create cybersecurity training programs. This edWebinar will focus on best practices for teaching and learning cybersecurity skills, including the following learning objectives:
- What skills does the instructor need to teach an introductory cybersecurity course?
- What are some best practices for teaching an introductory cybersecurity course?
- Where can instructors get help teaching their courses?
- What tools/resources do students and instructors need to teach an introductory cybersecurity course?
This edWebinar will be of interest to middle school through higher education teachers and school and district leaders. There will be time to have your questions answered at the end of the presentation. Learn more
more on cybersecurity in this IMS blog
The bottom line: While the Big Tech behemoths of the U.S. are barred from making inroads in China, the inverse doesn’t apply. That could mark an opening front in the ongoing technological and economic war between the two rivals.
more on cybersecurity in this IMS blog
How To Keep Google From Collecting Your Data
Megan E. Holstein Dec 21, 2018 https://medium.com/swlh/how-to-keep-google-from-collecting-your-data-5fd97a6bf929
here are two places where you can turn off how Google tracks you: Activity Controls and Ad Settings.
Along with turning off Ad Personalization, you should turn off Shared Endorsements.
Part 2: Deleting The Data They Already Have
Part 3: Don’t Use Your Google Account for More Than You Have To
- Don’t use Sign In With Google
- Don’t use your Gmail, even for junk email
more on privacy in this IMS blog
Think You’re Discreet
APRIL 21, 2019 Zeynep Tufekci
Think You’re Discreet Online? Think Again
Because of technological advances and the sheer amount of data now available about billions of other people, discretion no longer suffices to protect your privacy. Computer algorithms and network analyses can now infer, with a sufficiently high degree of accuracy, a wide range of things about you that you may have never disclosed, including your moods, your political beliefs, your sexual orientation and your health.
There is no longer such a thing as individually “opting out” of our privacy-compromised world.
In 2017, the newspaper The Australian published an article, based on a leaked document from Facebook, revealing that the company had told advertisers that it could predict when younger users, including teenagers, were feeling “insecure,” “worthless” or otherwise in need of a “confidence boost.” Facebook was apparently able to draw these inferences by monitoring photos, posts and other social media data.
In 2017, academic researchers, armed with data from more than 40,000 Instagram photos, used machine-learning tools to accurately identify signs of depression in a group of 166 Instagram users. Their computer models turned out to be better predictors of depression than humans who were asked to rate whether photos were happy or sad and so forth.
Computational inference can also be a tool of social control. The Chinese government, having gathered biometric data on its citizens, is trying to use big data and artificial intelligence to single out “threats” to Communist rule, including the country’s Uighurs, a mostly Muslim ethnic group.
Zeynep Tufekci and Seth Stephens-Davidowitz: Privacy is over
Zeynep Tufekci writes about security and data privacy for NY Times, disinformation’s threat to democracy for WIRED
more on privacy in this IMS blog
Edtech’s Blurred Lines Between Security, Surveillance and Privacy
Tony Wan, Bill Fitzgerald, Courtney Goodsell, Doug Levin, Stephanie Cerda
SXSW EDU https://schedule.sxswedu.com/
privacy advocates joined a school administrator and a school safety software product manager to offer their perspectives.
Navigating that fine line between ensuring security and privacy is especially tricky, as it concerns newer surveillance technologies available to schools. Last year, RealNetworks, a Seattle-based company, offered its facial recognition software to schools, and a few have pioneered the tool. http://blog.stcloudstate.edu/ims/2019/02/02/facial-recognition-technology-in-schools/
The increasing availability of these kinds of tools raise concerns and questions for Doug Levin, founder of EdTech Strategies.acial-recognition police tools have been decried as “staggeringly inaccurate.”
acial-recognition police tools have been decried as “staggeringly inaccurate.”School web filters can also impact low-income families inequitably, he adds, especially those that use school-issued devices at home. #equity.
Social-Emotional Learning: The New Surveillance?
Using data to profile students—even in attempts to reinforce positive behaviors—has Cerda concerned, especially in schools serving diverse demographics. #equity.
As in the insurance industry, much of the impetus (and sales pitches) in the school and online safety market can be driven by fear. But voicing such concerns and red flags can also steer the stakeholders toward dialogue and collaboration.
more in this IMS blog on
Six Ways to Protect Student Data and Prevent Cyberattacks
School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.
the most common cybersecurity threats, and how can school staff avoid them?
Eavesdropping / Man-in-the-Middle (MiTM) Attacks
What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.
How to avoid them: Always use a school-verified SIM card, dongle or VPN(virtual private network) to access the internet in public places.
Social Engineering Attacks
According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:
1. Phishing emails
2. Baiting attacks
3. Quid pro quo requests
4. Pretexting attacks
5. Contact with a ‘compromised’ website
Armored school doors, bulletproof whiteboards and secret snipers
Billions are being spent to protect children from school shootings. Does any of it work?
Nov. 13, 2018
Although school security has grown into a $2.7 billion market — an estimate that does not account for the billions more spent on armed campus police officers — little research has been done on which safety measures do and do not protect students from gun violence. Earlier this fall, The Washington Post sent surveys to every school in its database that had endured a shooting of some kind since the 2012 killings of 20 first-graders in Newtown, Conn., which prompted a surge of security spending by districts across the country.
In 2016, Utah’s Union Middle School had a surveillance system, external doors that could be accessed only with IDs and an armed policewoman, known as a resource officer, when a 14-year-old boy shot another student twice in the head during a confrontation outside the building just after classes ended.
“Even if we would have had metal detectors, it would not have mattered,” wrote Jeffrey P. Haney, district spokesman. “If we would have had armed guards at the entrance of the school, it would not have mattered. If we would have required students to have see-through backpacks and bags, it would not have mattered.”
The survey responses are consistent with a federally funded 2016 study by Johns Hopkins University that concluded there was “limited and conflicting evidence in the literature on the short- and long-term effectiveness of school safety technology.”
Much of what can be done to prevent harm is beyond any school’s control because, in a country with more guns — nearly 400 million — than people, children are at risk of being shot no matter where they are. A 2016 study in the American Journal of Medicine found that, among high-income nations, 91 percent of children younger than 15 who were killed by gunfire lived in the United States.
The solution, Goudreau concluded, was to embed former Special Operations agents, posing as teachers, inside schools. He argued that the benefits over resource officers were obvious.
What Happens to Student Data Privacy When Chinese Firms Acquire U.S. Edtech Companies?
Between the creation of a social rating system and street cameras with facial recognition capabilities, technology reports coming out of China have raised serious concerns for privacy advocates. These concerns are only heightened as Chinese investors turn their attention to the United States education technology space acquiring companies with millions of public school users.
A particularly notable deal this year centers on Edmodo, a cross between a social networking platform and a learning management system for schools that boasts having upwards of 90 million users. Net Dragon, a Chinese gaming company that is building a significant education division, bought Edmodo for a combination of cash and equity valued at $137.5 million earlier this month.
Edmodo began shifting to an advertising model last year, after years of struggling to generate revenue. This has left critics wondering why the Chinese firm chose to acquire Edmodo at such a price, some have gone as far as to call the move a data grab.
as data becomes a tool that governments such as Russia and China could use to influence voting systems or induce citizens into espionage, more legislators are turning their attention to the acquisitions of early-stage technology startups.
NetDragon officials, however, say they have no interest in these types of activities. Their main goal in acquiring United States edtech companies lies in building profitability, says Pep So, NetDragon’s Director of Corporate Development.
In 2015, the firm acquired the education technology platform, Promethean, a company that creates interactive displays for schools. NetDragon executives say that the Edmodo acquisition rounds out their education product portfolio—meaning the company will have tools for supporting multiple aspects of learning including; preparation, instructional delivery, homework, assignment grading, communication with parents students and teachers and a content marketplace.
NetDragon’s monetization plan for Edmodo focuses on building out content that gets sold via its platform. Similar to tools like TeachersPayTeachers, So hopes to see users putting up content on the platform’s marketplace, some free and others for a fee (including some virtual reality content), so that the community can buy, sell and review available educational tools.
As far as data privacy is concerned, So notes that NetDragon is still learning what it can and cannot do. He noted that the company will comply with Children’s Online Privacy Protection Act (COPPA), a federal regulation created in order to protect the privacy of children online, but says that the rules and regulations surrounding the law are confusing for all actors involved.
Historically, Chinese companies have faced trust and branding issues when moving into the United States market, and the reverse is also true for U.S. companies seeking to expand overseas. Companies have also struggled to learn the rules, regulations and operational procedures in place in other countries.
Iran and Huawei top agenda as Pompeo meets Merkel for 45 minutes in Berlin
Merkel to Ratchet up Huawei Restrictions in Concession to Hawks
more on data privacy in this IMS blog: