Apr
2016
Digital Literacy for St. Cloud State University
Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls
The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.
Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…
More on privacy in this IMS blog:
https://blog.stcloudstate.edu/ims/page/2/?s=privacy&submit=Search
more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims/?s=surveillance&submit=Search
By David Nage 02/25/16
Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.
====================================================
1 credit, summer 2016
Technology forecast for education: https://blog.stcloudstate.edu/ims/2016/01/27/4710/
Course Description
This synchronous online course will introduce school administrators to the multitude and complexity of educational technology issues. Through group discussions and exercises, the course will focus on the development of knowledge, skills and depositions to effective professional practice in educational leadership. The goal of the course is to develop knowledge and understanding of appropriate application of technology in the teaching and learning process and in the management of educational programs.
Information and experience in the course will include review of the latest trends in technology. Familiarity to acquisition of expertise will be sought in understand and use of Web 2.0 and Web 3.0, as well as social media, multimedia and interactivity and how it affects school life as well as the role of the educational leader. Specific attention will be paid to the importance and ability to develop and maintain policies, which reflect the ever-changing world of technology. Auxiliary, but no less important issues such as legal issues, copyright issues, ethics and other forms of digital citizenship will be discussed.
Course Objectives:
Upon successful completion of this course the student will:
Course Objective | Knowledge | Skill | Disposition | Impact |
1. Demonstrate knowledge and the use of related technologies appropriate to the management of a school # | o | o | ||
2. Demonstrate knowledge and the use of related technologies appropriate to the instructional program of a school # | o | o | ||
3. Demonstrate knowledge and the use of various types of related technologies for supporting the instructional program of the school # | o | o | ||
4. Demonstrate knowledge of planning and management procedures and policies for the appropriate use of technological resources to serve the mission of the school # | o | o | ||
5. Demonstrate knowledge of common computer and related technological applications # | o | o | ||
6. Identify gender & diversity issues related to technology in education | o | o | o | |
7. Demonstrate knowledge of adaptive technology devices for individuals with special needs | o | o | o | o |
8. Demonstrate skill in the use of technology for materials preparation, presentations, record keeping, computation, communication, information / data collection and management, and the effective use of the Internet | o | o | o | |
9. Demonstrate an understanding of legal issues, including copyright issues, related to educational technology | o | o | ||
10. Demonstrate an understanding of the importance of ethical practice in the use of technology | o | o | ||
11. Demonstrate knowledge and understanding of administrative policies and procedures that promote appropriate utilization of technology by school personnel | o | o | o | |
12. Demonstrate familiarity with appropriate professional standards related to educational leadership and technology | o | o | o | o |
13. Demonstrate an understanding of the digital age learning culture, digital citizenship in particular | o | o |
National Educational Technology Standards for Administrators.
http://www.iste.org/standards/ISTE-standards/standards-for-administrators
Demonstrate familiarity with appropriate professional standards related to educational leadership and technology
http://www.ccsso.org/Documents/2015/ProfessionalStandardsforEducationalLeaders2015forNPBEAFINAL.pdf
Resources On Line
IMS Technology blog: https://blog.stcloudstate.edu/ims/
Twitter: #edtech ; #edtechchat ; #edtechUK; @Edtech_K12
Facebook: #edtech ; #edleadership
Pinterest #edtech; #edleadership ; #edtechleadership
Agency for Instructional Technology http://www.ait.net
Center for Technology and Teacher Education http://www.teacherlink.org
Center for Children and Technology http://www.edc.org/CCT/
T.H.E. Journal (Technology Horizons in Education Online Journal) http://www.thejournal.com
Cybertimes Navigator (New York Times) http://www.nytimes.com/navigator
International Society for Technology in Education (ISTE) http://cnets.iste.org/
Technology Standards for School Administrators (TSSA) http://cnets.iste.org/tssa
ISTE curriculum and Content Area Standards http://Cnets.iste.org/currstands/
Preparing Tomorrow’s Teachers to use Technology (PT3) http://www.pt3.org
Assistive Technology information: http://www.abilityhub.com http://www.enablemart.com
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 credit, Summer 2016
Course Description
This course seeks hands-on experience in integration of educational technology into the classroom. Students will learn to select opportunities for application [or not] of technology in education. The course will provide a hands-on experience for educational leaders to understand the application of technology in the curriculum process. Topics of consideration include instructional design, media and formats, devices, telecommunications and social interactivity. The course will provide an opportunity to apply technology knowledge and experience in hands-on exercises for curriculum management as well as monitoring student achievement progress. Further discussions and practical approach will include modern, effective and efficient ways of communications among parents, students, faculty and administration. The course offered in synchronous online mode and F2F mode.
Objectives/Outcomes
Upon successful completion of this course the student will:
Universal Design for Learning (UDL)
http://www.udlcenter.org/aboutudl/whatisudl
The ISTE National Educational Technology Standards (NETS•T) and
Performance Indicators for Teachers
https://www.kent.edu/sites/default/files/file/ISTEstandards.pdf
1 credit, Summer 2016
Course Description
Course Description
This class will support teacher leaders and school administrators in reviewing and systematizing the fast aspects of modern electronic technologies. Based on a foundational better understanding of how technologies work, future educational leaders will develop skills and practice the application of ideas, tactics and methods for better integration of technologies in the teaching and learning process as well as the creation of better policies and procedures.
The course is designed to bring research and analytical skills and build structure in the process of resolving technology issues, which educational leaders face in modern schools, including hardware and software problems, networks and computers, curriculum and teaching and learning methods.
The course will offer discussions as well as practical solutions such as social media (e.g. Twitter) for professional development, online tools for teacher evaluation, online tools for collaboration and creativity, immediate and future trends, which already impact education and educational leadership.
The course offered in synchronous online mode and F2F mode.
Objectives/Outcomes
LITA listsrev has an excellent discussion on password management.
I personally am using LastPass for two years: great free option, paid one can be used on mobiles.
=========================
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Michael J. Paulmeno
Sent: Wednesday, January 06, 2016 1:36 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management
I second Keepass. Not only is it free, open source, and multi-OS, but it lives on your computer, not in the cloud (although the database can be put on a shared drive or in DropBox for access across devices). Personally that makes me feel much safer. There are clients available for Windows, Mac, Linux, IPhone, Android and even Blackberry.
Cheers,
Mike
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Ronald Houk
Sent: Wednesday, January 06, 2016 12:38 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management
I use lastpass as well. However, LastPass was just bought by LogMeIn, so lots of people are holding their breath hoping that things stay good. Another open source, multi-os, alternative is keepass (keepass.info)
On Wed, Jan 6, 2016 at 11:43 AM, Yvonne Reed <yvonner@ranchomiragelibrary.org> wrote:
Hi Everyone,
I would like offer or recommend a password management tool to my library staff that’s reliable and easy to use. Do any of you have one you can recommend?
Thank you,
Yvonne Reed
Technology Librarian
Rancho Mirage Public Library
71-100 Hwy 111
Rancho Mirage, CA 92270
(760)341-7323 x770
————————————–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of O’English, Lorena
Sent: Wednesday, January 06, 2016 12:51 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management
I really like Dashlane (dashlane.com) – it has a lot of options, including the ability to give someone else access to your passwords in certain situations (plus, they support Firefox financially via low-impact ads). I think of this sometimes when I think about what would happen if a piano fell on me tomorrow – what a mess it would be for my spouse to cope with my digital life! That said, although I use Dashlane, I still have not quite managed to get myself to use all its functionality.
Lorena
***
Washington State University Libraries
wsulorena: Twitter, Skype, GTalk, Yahoo IM
———–
—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Cary Gordon
Sent: Wednesday, January 06, 2016 12:37 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management
1Password ++
————–
—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of COLLINS, MATTHEW
Sent: Wednesday, January 06, 2016 12:35 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management
I have used Roboform for at least 10 years and never had a problem. It manages passwords for logins and bookmarks on my PCs, my iPhone and iPad. It synchs online so work, home, tablet and phone all have the same info. It also stores personal info (name & multiple addresses) and confidential notes and other info.
–Matthew
———————-
Has anyone mentioned Password Safe? http://passwordsafe.sourceforge.net/
It’s worked well for organizing and managing usernames/passwords.
Angela Stangl
Digital Services Coordinator
Rodney A. Briggs Library
University of Minnesota, Morris
(320) 589-6164
——————————-
FEATURES
http://keepass.info/features.html
PLUGINS
http://keepass.info/plugins.html
Note: CAPS is used here and there to call attention without extra Gmail formatting, not to shout at anyone. Still…I know I look like I yell here. I have flogged myself, I will now bathe in the River Salt.
MWoT
Ok, check it out.
Plugins, macros, group/profile/source/target/timing locks, separate DBs and separate metadata for these if you like, INTERNALLY-ROTATING SUPERKEYS via REGULAR KEY TRANSORMATIONS and TWO-CHANNEL AUTO-TYPE OBFUSCATION (for obfuscating your auto-typed passwords or keys, if you select Auto)….!!!…
…and well-reasoned, well-EXPLAINED approaches to certain critical areas of password management in general and to KeePass in particular.
For instance: In the FAQ, read the logic breakdown (thought-by-thought explanation) of why Keepass does NOT lock itself when a SUB-dialogue box is open in Keepass whle the user then LOCKS the workstation. =)
Why doesn’t KeePass lock when Windows locks and a KeePass sub-dialog is open?
http://keepass.info/help/base/faq_tech.html#noautolock
My support of Keepass as a primary, then a close alternative, comes from four of my six years in IT being in direct computer and network security roles. Sure, not the most trench years out there, but they are all engineering and tiered-analyst roles for several major US corporations.
I’m proud of that…and in terms of relevance, I worked – and still work – with and around many engineers, analysts, and scientists (data, algorithmic). I look up to these people a great deal, and many of these coworkers come fully assembled having forgotten more than I’ll ever know and still learning faster than I could ever talk about… and even THEY use Keepass and they use it powerfully.
Detection of each site’s contact (HTTP GET, form forcus, etc) or “touch” can be different with each browser it integrates into, and that’s just for starters. One can also script up a different timing to use before the credentials are passed….;)….one can also relegate references to a central database, or one can refer only to the local system or even just a specific profile that can access said .kdbx file (KeePass database), or one can limit the data source to just one .kdbx single-instance database file, or one can use the .kdbx as a secondary for some other central repository failure, if that happens.
One can make several .kdbx files for different uses…no requirement to have just one! Each a diffferent base of unique data keys, each wtih a different direction administered on when it is referenced, how it is run, and where it lives on a system.
Aaaaaand it can integrate with other DBMs, it’s not an island!
Keepass is not the end-all be-all, but it IS FOSS (Free and Open-Source Software, great for investigating its machinery). Also it is:
– Programmable (via the Plugins model, you can write some yourself if you like!)
– Modularizable (again, via the Plugins model)
– Profile lockable, (<— really neat!)
– SMM (Secure Memory Manageable, for Windows Clipboard and the like)
– and more!
Anyway, Keepass is rad for its cost, but, like the others on this thread, I will second LastPass as well. LastPass is a an alternative to Keepass. =)
Daniel Strickland
linkedin.com/in/dwstrickland
Matthew Collins
Director of the Ernest Miller White Library Associate Professor of Research and Bibliography Louisville Presbyterian Theological Seminary
1044 Alta Vista Road
Louisville, KY 40205
mcollins@lpts.edu| 502.992.5420
Gamification Mechanic Benefits Each gamification mechanic result in one or more benefits.
Gamification Personality Types
People are motivated to play games differently.
Explorers: Pride themselves in exploring all facets of a game or the context surrounding it.
Killers: Driven by player vs player competition. Always comparing themselves to others.
Socializer: Prefers to chat, play cooperatively, and share game experiences with others.
Achievers: Look to achieve all objectives available in a game. Desires to beat the game itself.
==========================
Adaptive learning systems provide each student with a personalized learning experience, adapting the presentation of the content, and possibly the assessment to the individual ability of the student
==============================================
=============================
=============================
slide 11: Two primary design goals supported through Data Visualization:
–What story is the data telling you
–Identify patterns and exceptions
–Compare, contrast, choose
–Explain, make a point, decide
slide 15:
qTo communicate
qPresent more clearly or more forcefully than would be accomplished with text or tables
qReports, dashboards, infographics, etc.
qTo discover
qAllow us to see what would be difficult or impossible to see if not presented in a useful visualization
qRealm of research but moving into the mainstream
qCan same visualization serve both purposes?
======================
========================
==============================
https://drive.google.com/file/d/0B4vcm8Bg5pkcWFlaQ1J3b3duc2M/view
5. Using small unmanned aerial vehicles today is similar to the “fair use” of media
http://www.dronesurvivalguide.org
Resources – Higher Ed Drone Policies
The Ohio State University
Iowa State University
Indiana University
University of Kansas
Penn State University
University of New Mexico
The Association of College and University Policy
Administrators (ACUPA, acupa.org)
===================
From MyFunCity to government-structured approach to “digital citizenship,” this is recent trend, which is seriously considered by educators as a must in the curricula. While habitually connected with technology classes, it is a much larger issue, which requires faculty attention across disciplines; it encompass digital and technology literacy, netiquette and online behavior (cyberbulling most frequently addressed), as well qualities and skills to be a functional and mindful citizen of a global world.
here is some general literature on digital citizenship:
http://groups.lis.illinois.edu/guest_lectures/cii/digcitizen.pdf
Techné: Research in Philosophy and Technology
Volume 9, Issue 1, Fall 2005. Education and Citizenship in the Digital Age
Isman, A., & Canan Gungoren, O. (2014). Digital Citizenship. Turkish Online Journal Of Educational Technology – TOJET, 13(1), 73-77. http://eric.ed.gov/?id=EJ1018088
PR, N. (2014, April 3). MyFunCity is a revolution in digital citizenship. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201404031549PR.NEWS.USPR.BR98059%26site%3dehost-live%26scope%3dsite
Communication Studies:
Couldry, N., Stephansen, H., Fotopoulou, A., MacDonald, R., Clark, W., & Dickens, L. (2014). Digital citizenship? Narrative exchange and the changing terms of civic culture. Citizenship Studies, 18(6/7), 615-629. doi:10.1080/13621025.2013.865903
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d98053478%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)
Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., Rainie, L., & Pew Internet & American Life, P. (2011). Teens, Kindness and Cruelty on Social Network Sites: How American Teens Navigate the New World of “Digital Citizenship”. Pew Internet & American Life Project, http://eric.ed.gov/?id=ED537516
ORTH, D., & CHEN, E. (2013). The Strategy FOR DIGITAL CITIZENSHIP. Independent School, 72(4), 56-63. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d87618786%26site%3dehost-live%26scope%3dsite
Ives, E. A. (2012, October 1). iGeneration: The Social Cognitive Effects of Digital Technology on Teenagers. Online Submission, http://eric.ed.gov/?id=ED543278
Monterosa, V. (2015). DEVELOPING DIGITAL CITIZENS. Leadership, 44(3), 30-32. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d109111583%26site%3dehost-live%26scope%3dsite
10 Free Interactive Lessons about Digital Citizenship. (2012). Curriculum Review, 52(1), 4-5. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d79851664%26site%3dehost-live%26scope%3dsite
Graham, G. (2013, November 20). Pupils are now ‘digital citizens’ with the right to use a mobile. Daily Mail. p. 3. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d92031070%26site%3dehost-live%26scope%3dsite
LifeLock, I. (0009, January). Free Online Tool Empowers Families to Set Technology Ground Rules as More Kids Go Digital. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3dbizwire.c63848252%26site%3dehost-live%26scope%3dsite
Dettori, G. (2012). Digital citizenship in schools – By Ribble Mike. British Journal Of Educational Technology, 43(6), E179. doi:10.1111/j.1467-8535.2012.01378_9.x http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d82468985%26site%3dehost-live%26scope%3dsite
Ribble, M. (2012). Digital Citizenship for Educational Change. Kappa Delta Pi Record, 48(4), 148-151. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ993448%26site%3dehost-live%26scope%3dsite
(please ask for copy of the article)
Johnson, M. (2012). Shaping Digital Citizens: preparing students to work and play in the online world. School Libraries In Canada (17108535), 30(3), 19-22. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d95316041%26site%3dehost-live%26scope%3dsite
Enabling digital citizenship programs within your district’s network infrastructure. (2012). District Administration, 48(9), 54-55. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d82747791%26site%3dehost-live%26scope%3dsite
ORECH, J. (2012). HOW IT’S DONE: Incorporating Digital Citizenship Into Your Everyday Curriculum. Tech & Learning, 33(1), 16-18. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d82590138%26site%3dehost-live%26scope%3dsite
Petrucco, C. (2013). Fostering digital literacy between schools and the local community: Using service learning and project-based learning as a conceptual framework. International Journal Of Digital Literacy And Digital Competence, 4(3), 10-18. doi:10.4018/ijdldc.2013070102 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2014-29004-002%26site%3dehost-live%26scope%3dsite
Acosta, D. M. (2014). Tweet Up? Examining Twitter’s Impact on Social Capital and?Digital Citizenship in Higher Education. About Campus, 18(6), 10-17. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ1027263%26site%3dehost-live%26scope%3dsite
Suppo, C. A. (2013, January 1). Digital Citizenship Instruction in Pennsylvania Public Schools: School Leaders Expressed Beliefs and Current Practices. ProQuest LLC, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED553014%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)
Noonoo, S. (2014). Digital Citizenship for the Real World. T H E Journal, 41(4), 17-19. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d103335802%26site%3dehost-live%26scope%3dsite
Ribble, M. (2014). The importance of digital citizenship. District Administration, 50(11), 88. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d103369941%26site%3dehost-live%26scope%3dsite
MURLEY, S. F. (2014). Engaging With a Digital Citizenry. School Administrator, 71(10), 30-31 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dtfh%26AN%3d102610780%26site%3dehost-live%26scope%3dsite
Ahlquist, J. (2014). Trending Now: Digital Leadership Education Using Social Media and the Social Change Model. Journal Of Leadership Studies, 8(2), 57-60. doi:10.1002/jls.21332 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d99008045%26site%3dehost-live%26scope%3dsite
Neustar, I. (0001, September). Neustar Launches Social Media Digital Citizenship Program for Kentucky Schools. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c38975001%26site%3dehost-live%26scope%3dsite
Farmer, L. (2012). Digital Citizenship for Youth with Autism Spectrum Disorders. CSLA Journal, 35(2), 12-13. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d91822779%26site%3dehost-live%26scope%3dsite
Common Sense Media. (2011). Common Sense Media Partners with Nickelodeon’s the Big Help on Digital Citizenship and Anti-Bullying Campaign. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c32997597%26site%3dehost-live%26scope%3dsite
Lyons, R. (2012, January 1). Investigating Student Gender and Grade Level Differences in Digital Citizenship Behavior. ProQuest LLC, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED546058%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)
NOONAN, K. (2013). DIGITAL CITIZENS RISE TO DISASTERS. Government News, 33(1), 16. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d86153161%26site%3dehost-live%26scope%3dsite
Buente, W. (2012). Modeling citizenship offline and online: Internet use, information, and political action during the 2008 election campaign. Dissertation Abstracts International Section A, 73, 1222. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2012-99190-595%26site%3dehost-live%26scope%3dsite
Kurubacak, G. (2011). eLearning for Pluralism: The Culture of eLearning in Building a Knowledge Society. International Journal On E-Learning, 10(2), 145-167. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ926545%26site%3dehost-live%26scope%3dsite
Hill, A. M. (2015). The kids are all right online: Teen girls’ experiences with self-presentation, impression management & aggression on Facebook. Dissertation Abstracts International Section A, 76, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2015-99170-479%26site%3dehost-live%26scope%3dsite
NPR. (2015, April 13). National Cyber Security Alliance Aligns with RSA Conference to Empower Digital Citizens to Stay Current in the Ever-changing Cybersecurity Environment. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201504131030PR.NEWS.USPR.DC78336%26site%3dehost-live%26scope%3dsite
NPR. (2014, February 11). Digital Citizens Alliance Calls Prosecution of Apps Content Thieves Important Step to Protect Internet. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3d201402111145PR.NEWS.USPR.DC63074%26site%3dehost-live%26scope%3dsite
NPR. (2015, May 18). Public Officials, Business Leaders and Cybersecurity Experts Gather at “Two Steps Ahead: Protect Your Digital Life” Event in Brooklyn. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201505180600PR.NEWS.USPR.DC10064%26site%3dehost-live%26scope%3dsite
====================
NOONAN, K. (2013). DIGITAL CITIZENS RISE TO DISASTERS. Government News, 33(1), 16. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d86153161%26site%3dehost-live%26scope%3dsite
Buente, W. (2012). Modeling citizenship offline and online: Internet use, information, and political action during the 2008 election campaign. Dissertation Abstracts International Section A, 73, 1222. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2012-99190-595%26site%3dehost-live%26scope%3dsite
Kurubacak, G. (2011). eLearning for Pluralism: The Culture of eLearning in Building a Knowledge Society. International Journal On E-Learning, 10(2), 145-167. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ926545%26site%3dehost-live%26scope%3dsite
Education Commission of the State. (2012, September). Education Commission of the States Releases Brief on Civic Engagement and Digital Citizenship. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c39665781%26site%3dehost-live%26scope%3dsite
NPR. (2015, May 18). Public Officials, Business Leaders and Cybersecurity Experts Gather at “Two Steps Ahead: Protect Your Digital Life” Event in Brooklyn. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201505180600PR.NEWS.USPR.DC10064%26site%3dehost-live%26scope%3dsite
=================
Library:
https://fiberlinkcorp.webex.com/fiberlinkcorp/onstage/g.php?d=358842843&t=a
Kayla Bittner 358 842 843 Twitter:#smartoffice
Android Wear (java)
Pebble (C)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature
limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance
opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)
GOod wearable Design: Recognizes immediacy, leverages context of the wearer
challenging to develop good experiences for these devices.
802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
Addon –
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.
build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available
no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone
Best practices:
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)
new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.
bricksimple.com
MaaS360.com/trial
Plan for Sylvester Lamin’s course:
1. User and Data Access control security policies for the end user
2. Access Through Secured Connection ( TLS/SSL and HTTPS)
3. Network Security
4. Disaster Recovery, Environmental Safeguards and Physical Access Security Policies
5. Third-party Certificates