Searching for "data security"

your social media account cracked

This is what happens when someone hacks your Spotify account

surveillance and privacy

FBI quietly changes its privacy rules for accessing NSA data on Americans

Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls

The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

More on privacy in this IMS blog:
https://blog.stcloudstate.edu/ims/page/2/?s=privacy&submit=Search

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims/?s=surveillance&submit=Search

denial of sleep attacks

Security Tops List of Trends That Will Impact the Internet of Things

By David Nage 02/25/16

https://campustechnology.com/articles/2016/02/25/security-tops-list-of-trends-that-will-impact-the-internet-of-things.aspx

Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.

  1. Security. threats extend well beyond denial of sleep: “The IoT introduces a wide range of new security risks and challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected.
  2. Analytics. IoT will require a new approach to analytics. “New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics,” according to Gartner.
  3. Device (Thing) Management. IoT things that are not ephemeral — that will be around for a while — will require management like every other device (firmware updates, software updates, etc.), and that introduces problems of scale.
  4. Low-Power, Short-Range IoT Networks. Short-range networks connecting IT devices will be convoluted. There will not be a single common infrastructure connecting devices.
  5. Low-Power, Wide-Area Networks. Current solutions are proprietary, but standards will come to dominate.
  6. Processors and Architecture. Designing devices with an understanding of those devices’ needs will require “deep technical skills.”
  7. Operating Systems. There’s a wide range of systems out there that have been designed for specific purposes.
  8. Event Stream Processing.  “Some IoT applications will generate extremely high data rates that must be analyzed in real time.
  9. Platforms. “IoT platforms bundle many of the infrastructure components of an IoT system into a single product.
  10. Standards and Ecosystems. as IoT devices proliferate, new ecosystems will emerge, and there will be “commercial and technical battles between these ecosystems” that “will dominate areas such as the smart home, the smart city and healthcare.

digital literacy for EDAD

one-credit courses on digital literacy offered for the School of Education department for Educational Leadership

====================================================

EDAD 697Introduction to Educational Technology

1 credit, summer 2016

Technology forecast for education: https://blog.stcloudstate.edu/ims/2016/01/27/4710/

Course Description

This synchronous online course will introduce school administrators to the multitude and complexity of educational technology issues. Through group discussions and exercises, the course will focus on the development of knowledge, skills and depositions to effective professional practice in educational leadership. The goal of the course is to develop knowledge and understanding of appropriate application of technology in the teaching and learning process and in the management of educational programs.
Information and experience in the course will include review of the latest trends in technology. Familiarity to acquisition of expertise will be sought in understand and use of Web 2.0 and Web 3.0, as well as social media, multimedia and interactivity and how it affects school life as well as the role of the educational leader. Specific attention will be paid to the importance and ability to develop and maintain policies, which reflect the ever-changing world of technology. Auxiliary, but no less important issues such as legal issues, copyright issues, ethics and other forms of digital citizenship will be discussed.

Course Objectives:

Upon successful completion of this course the student will:

Course Objective Knowledge Skill Disposition Impact
1.      Demonstrate knowledge and the use of related technologies appropriate to the management of a school # o o
2.      Demonstrate knowledge and the use of related technologies appropriate to the instructional program of a school # o o
3.      Demonstrate knowledge and the use of various types of related technologies for supporting the instructional program of the school # o o
4.      Demonstrate knowledge of planning and management procedures and policies for the appropriate use of technological resources to serve the mission of the school # o o
5.      Demonstrate knowledge of common computer and related technological applications # o o
6.      Identify gender & diversity issues related to technology in education o o o
7.      Demonstrate knowledge of adaptive technology devices for individuals with special needs o o o o
8.      Demonstrate skill in the use of technology for materials preparation, presentations, record keeping, computation, communication, information / data collection and management, and the effective use of the Internet o o o
9.      Demonstrate an understanding of legal issues, including copyright issues, related to educational technology o o
10.  Demonstrate an understanding of the importance of ethical practice in the use of technology o o
11.  Demonstrate knowledge and understanding of administrative policies and procedures that promote appropriate utilization of technology by school personnel o o o
12.  Demonstrate familiarity with appropriate professional standards related to educational leadership and technology o o o o
13.  Demonstrate an understanding of the digital age learning culture, digital citizenship in particular o o

 

# http://ed.mnsu.edu/edleadership/docs/license_competencies/K-12_Principal_Competencies_revised_8_22_08.pdf

National Educational Technology Standards for Administrators.

http://www.iste.org/standards/ISTE-standards/standards-for-administrators

Demonstrate familiarity with appropriate professional standards related to educational leadership and technology
http://www.ccsso.org/Documents/2015/ProfessionalStandardsforEducationalLeaders2015forNPBEAFINAL.pdf

Resources On Line

IMS Technology blog: https://blog.stcloudstate.edu/ims/

Twitter: #edtech ; #edtechchat ; #edtechUK; @Edtech_K12

Facebook: #edtech ;  #edleadership

Pinterest #edtech; #edleadership ; #edtechleadership

Agency for Instructional Technology             http://www.ait.net

Center for Technology and Teacher Education            http://www.teacherlink.org

Center for Children and Technology            http://www.edc.org/CCT/

T.H.E. Journal (Technology Horizons in Education Online Journal)            http://www.thejournal.com

Cybertimes Navigator (New York Times) http://www.nytimes.com/navigator

International Society for Technology in Education (ISTE)            http://cnets.iste.org/

Technology Standards for School Administrators (TSSA)   http://cnets.iste.org/tssa

ISTE curriculum and Content Area Standards   http://Cnets.iste.org/currstands/

Preparing Tomorrow’s Teachers to use Technology (PT3)              http://www.pt3.org

Assistive Technology information:  http://www.abilityhub.com  http://www.enablemart.com

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

EDAD ??? Technology and Curriculum Design

1 credit, Summer 2016

Course Description

This course seeks hands-on experience in integration of educational technology into the classroom. Students will learn to select opportunities for application [or not] of technology in education. The course will provide a hands-on experience for educational leaders to understand the application of technology in the curriculum process. Topics of consideration include instructional design, media and formats, devices, telecommunications and social interactivity. The course will provide an opportunity to apply technology knowledge and experience in hands-on exercises for curriculum management as well as monitoring student achievement progress. Further discussions and practical approach will include modern, effective and efficient ways of communications among parents, students, faculty and administration. The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

Upon successful completion of this course the student will:

  1. Understand the impact of technology on the teaching and learning process.
  2. Understand the principles of the Universal Design for Learning (UDL) and National Educational Standards for Students (NETS*S) and their application in the curriculum process.
  3. Research and assess the opportunities for technology to be integrated in the classroom.

Universal Design for Learning (UDL)
http://www.udlcenter.org/aboutudl/whatisudl

The ISTE National Educational Technology Standards (NETS•T) and

Performance Indicators for Teachers

https://www.kent.edu/sites/default/files/file/ISTEstandards.pdf

 

EDAD ??? Technology as an Integral Part of Successful Educational Leadership

1 credit, Summer 2016

Course Description

Course Description

This class will support teacher leaders and school administrators in reviewing and systematizing the fast aspects of modern electronic technologies. Based on a foundational better understanding of how technologies work, future educational leaders will develop skills and practice the application of ideas, tactics and methods for better integration of technologies in the teaching and learning process as well as the creation of better policies and procedures.

The course is designed to bring research and analytical skills and build structure in the process of resolving technology issues, which educational leaders face in modern schools, including hardware and software problems, networks and computers, curriculum and teaching and learning methods.

The course will offer discussions as well as practical solutions such as social media (e.g. Twitter) for professional development, online tools for teacher evaluation, online tools for collaboration and creativity, immediate and future trends, which already impact education and educational leadership.
The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

  1. Students will be able to identify and update sources for information to keep current their technology knowledge
  2. Students will demonstrate knowledge and understanding of technology leadership standards.
  3. Student will demonstrate an understanding of how to create, promote, and sustain a dynamic, digital – age learning culture that provides a rigorous, relevant, and engaging education for all students.
  4. Students will demonstrate understanding of how to promote an environment of professional learning and innovation that empowers educators to enhance student learning through the infusion of contemporary technologies and digital resources.
  5. Students will demonstrate an understanding of how to provide digital – age leadership and management to continuously improve the organization through the effective use of information and technology resources.
  6. Students will understand and apply knowledge of how to model and facilitate understanding of social, ethical and legal issues and responsibilities related to an evolving digital culture.
  7. Students will demonstrate knowledge of technology as integral part of facilities and resource management
  8. Students will be able to describe and use budget planning and management procedures related to educational computing and technology.
  9. Students will be able to describe and maintain current information involving facilities planning issues related to computers and related technologies.
  10. Students will be able to design and develop policies and procedures concerning staffing, scheduling, and security for managing computers/technology in a variety of instructional and administrative school

password management

LITA listsrev has an excellent discussion on password management.
I personally am using LastPass for two years: great free option, paid one can be used on mobiles.

=========================

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Michael J. Paulmeno
Sent: Wednesday, January 06, 2016 1:36 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I second Keepass.  Not only is it free, open source, and multi-OS, but it lives on your computer, not in the cloud (although the database can be put on a shared drive or in DropBox for access across devices).  Personally that makes me feel much safer.  There are clients available for Windows, Mac, Linux, IPhone, Android and even Blackberry.

 

Cheers,

Mike

 

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Ronald Houk
Sent: Wednesday, January 06, 2016 12:38 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

I use lastpass as well.  However, LastPass was just bought by LogMeIn, so lots of people are holding their breath hoping that things stay good.  Another open source, multi-os, alternative is keepass (keepass.info)

 

On Wed, Jan 6, 2016 at 11:43 AM, Yvonne Reed <yvonner@ranchomiragelibrary.org> wrote:

Hi Everyone,

I would like offer or recommend a password management tool to my library staff that’s reliable and easy to use. Do any of you have one you can recommend?

 

 

Thank you,

 

Yvonne Reed

Technology Librarian

Rancho Mirage Public Library

71-100 Hwy 111

Rancho Mirage, CA 92270

(760)341-7323 x770
————————————–

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of O’English, Lorena
Sent: Wednesday, January 06, 2016 12:51 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I really like Dashlane (dashlane.com) – it has a lot of options, including the ability to give someone else access to your passwords in certain situations (plus, they support Firefox financially via low-impact ads). I think of this sometimes when I think about what would happen if a piano fell on me tomorrow – what a mess it would be for my spouse to cope with my digital life! That said, although I use Dashlane, I still have not quite managed to get myself to use all its functionality.

 

Lorena

***

Washington State University Libraries

oenglish@wsu.edu

wsulorena: Twitter, Skype, GTalk, Yahoo IM

———–

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Cary Gordon
Sent: Wednesday, January 06, 2016 12:37 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

1Password ++

————–

 

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of COLLINS, MATTHEW
Sent: Wednesday, January 06, 2016 12:35 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I have used Roboform for at least 10 years and never had a problem.  It manages passwords for logins and bookmarks on my PCs, my iPhone and iPad.  It synchs online so work, home, tablet and phone all have the same info.  It also stores personal info (name & multiple addresses) and confidential notes and other info.

 

–Matthew

———————-

Has anyone mentioned Password Safe? http://passwordsafe.sourceforge.net/

 

It’s worked well for organizing and managing usernames/passwords.

 

 

Angela Stangl

 

Digital Services Coordinator

Rodney A. Briggs Library

University of Minnesota, Morris

(320) 589-6164

——————————-

FEATURES

http://keepass.info/features.html

 

PLUGINS

http://keepass.info/plugins.html

Note: CAPS is used here and there to call attention without extra Gmail formatting, not to shout at anyone. Still…I know I look like I yell here. I have flogged myself, I will now bathe in the River Salt.

 

MWoT

Ok, check it out.

Plugins, macros, group/profile/source/target/timing locks, separate DBs and separate metadata for these if you like, INTERNALLY-ROTATING SUPERKEYS via REGULAR KEY TRANSORMATIONS and TWO-CHANNEL AUTO-TYPE OBFUSCATION (for obfuscating your auto-typed passwords or keys, if you select Auto)….!!!…

…and well-reasoned, well-EXPLAINED approaches to certain critical areas of password management in general and to KeePass in particular.

 

For instance: In the FAQ, read the logic breakdown (thought-by-thought explanation) of why Keepass does NOT lock itself when a SUB-dialogue box is open in Keepass whle the user then LOCKS the workstation. =)

Why doesn’t KeePass lock when Windows locks and a KeePass sub-dialog is open?

http://keepass.info/help/base/faq_tech.html#noautolock

My support of Keepass as a primary, then a close alternative, comes from four of my six years in IT being in direct computer and network security roles. Sure, not the most trench years out there, but they are all engineering and tiered-analyst roles for several major US corporations.

I’m proud of that…and in terms of relevance, I worked – and still work – with and around many engineers, analysts, and scientists (data, algorithmic). I look up to these people a great deal, and many of these coworkers come fully assembled having forgotten more than I’ll ever know and still learning faster than I could ever talk about… and even THEY use Keepass and they use it powerfully.

Detection of each site’s contact (HTTP GET, form forcus, etc) or “touch” can be different with each browser it integrates into, and that’s just for starters. One can also script up a different timing to use before the credentials are passed….;)….one can also relegate references to a central database, or one can refer only to the local system or even just a specific profile that can access said .kdbx file (KeePass database), or one can limit the data source to just one .kdbx single-instance database file, or one can use the .kdbx as a secondary for some other central repository failure, if that happens.

One can make several .kdbx files for different uses…no requirement to have just one! Each a diffferent base of unique data keys, each wtih a different direction administered on when it is referenced, how it is run, and where it lives on a system.

Aaaaaand it can integrate with other DBMs, it’s not an island!

Keepass is not the end-all be-all, but it IS FOSS (Free and Open-Source Software, great for investigating its machinery). Also it is:

Programmable (via the Plugins model, you can write some yourself if you like!)

Modularizable (again, via the Plugins model)

Profile lockable, (<— really neat!)

– SMM (Secure Memory Manageable, for Windows Clipboard and the like)

– and more!

Anyway, Keepass is rad for its cost, but, like the others on this thread, I will second LastPass as well. LastPass  is a an alternative to Keepass. =)

Daniel Strickland
linkedin.com/in/dwstrickland

 

 

Matthew Collins

Director of the Ernest Miller White Library Associate Professor of Research and Bibliography Louisville Presbyterian Theological Seminary

1044 Alta Vista Road

Louisville, KY 40205

mcollins@lpts.edu| 502.992.5420

 

Educause 2015

Gamify! Play! Learn! Turn Campus Resources into Exciting Learning Experiences

Thursday
Oct 29th, 2015
4:30 PM – 5:20 PM
Eastern Time
Sagamore Ballroom 3
slide 6
  • Gamification is the use of game mechanics and
    game design techniques in non-game contexts.
  • Gamification uses the natural desire for competition, achievement, status, altruism and/or collaboration (depending on the personality type).
slide 8 Gamification Mechanic Types
  • Objectives: A behavioral mechanic type, requiring the user to take action for the reward.
  • Progression: Move the user through the content.
  • Feedback: Informing the user of their status

Gamification Mechanic Benefits       Each gamification mechanic result in one or more benefits.

Gamification Personality Types

People are motivated to play games differently.

Explorers: Pride themselves in exploring all facets of a game or the context surrounding it.

Killers: Driven by player vs player competition. Always comparing themselves to others.

Socializer: Prefers to chat, play cooperatively, and share game experiences with others.

Achievers: Look to achieve all objectives available in a game. Desires to beat the game itself.

==========================

Adaptive Learning in Online Learning: Results from an Ongoing Evaluation

Wednesday
Oct 28th, 2015
11:40 AM – 12:30 PM
Eastern Time
Wabash Ballroom 2
This session will present results from an evaluation of the integration of RealizeIT adaptive learning technology into three fully online courses: General Psychology, Pathophysiology for Nursing Practice, and College Algebra. Presenters will discuss the impact on students, faculty, and the university.

Adaptive learning systems provide each student with a personalized learning experience, adapting the presentation of the content, and possibly the assessment to the individual ability of the student
==============================================

Badges: A New Mode for Faculty Development

Wednesday
Oct 28th, 2015
1:30 PM – 2:30 PM
Eastern Time
Poster Sessions, Exhibit Hall H-K
Co-developed by Learning Technologies and the Faculty Colloquium on Excellence in Teaching and Learning at Indiana University, a digital badge pilot (badges.iu.edu) was launched to support faculty professional development and growth. This session will cover the competency levels, topics of study, and the badging platform to document levels of achievement.
Outcomes: Understand the basics of a three-tiered framework for digital badges * Review the online badging platform * Explore topics for faculty development

=============================

Open Digital Badges: Microcredentials and the Higher Ed Landscape

Wednesday
Oct 28th, 2015
1:30 PM – 2:30 PM
Eastern Time
Poster Sessions, Exhibit Hall H-K
Because they contain claims and evidence and circulate in networks, open digital badges are transforming credentialing. We will highlight the findings from a two-year study of 29 badge development projects, introduce a new project supporting badge innovation in major learning management systems, and interactively discuss the future of badges in higher education.
Outcomes: Understand the open badge ecosystem and how it benefits learning in higher education * Review digital developments in badge delivery * Discover contexts for the future of badges. Daniel Hickeyhttp://www.educause.edu/library/resources/where-badges-work-betterA Framework for Interactivity in Competency-Based Courses: http://er.educause.edu/articles/2015/8/a-framework-for-interactivity-in-competency-based-coursesBadging in a Learner-Centered Context  http://er.educause.edu/multimedia/2015/8/badging-in-a-learner-centered-context



Mozilla Open Badges 101: Digging into Badges (a webinar)

personalized learning or competency-based does not resolve it. GPA does not respond to employers search
regimenting credentials. digital representation of of skill or achievement. represent achievements on the web. social status (foursquare). granular, evidence-based and transferable. badge ecosystem (across multiple areas), this is why open badges; open system. Open Badge Standard: issuer information; earner information; criteria URL; evidence URL; Standards Alignment; Taxonomy Tags

=============================

Data Visualization: The What, the Who, and the How

(overlaps with infographics)
Wednesday
Oct 28th, 2015
2:30 PM – 3:20 PM
Eastern Time
Meeting Room 231-232
Data visualization tools are becoming much stronger and are now targeted at a much wider audience. This panel will explore what we should be trying to do with data visualization, who will be doing it, and how we might support and steer it.
OUTCOMES: Identify multiple opportunities for use of data visualization * Learn about multiple user communities, including those not centrally managed * Explore ways to support users and steer them toward good practiceshttp://www.educause.edu/sites/default/files/library/presentations/E15/SESS029/Data%2BViz%2BEducause%2B151028%2BFINAL1.pptxslides 7: What works well for technically savvy developers may not work for faculty or staff without those same credentials.

  • Data Wrapper
  • Raw
  • Infogram
  • Tableau
    • Oracle suite of OBIEE (Oracle Business Intelligence Enterprise Edition) has been very successful for CSU
    • Cognos (IBM) is another tool that is very popular for developers and has been used by USG central office
    • D3 (For Data Driven Documents)
    • Fusion Charts
    • Chart js
    • Google Charts

slide 11: Two primary design goals supported through Data Visualization:

  • Discovery and Exploration

–What story is the data telling you

–Identify patterns and exceptions

  • Decision-making

–Compare, contrast, choose

–Explain, make a point, decide

slide 15:

qTo communicate

qPresent more clearly or more forcefully than would be accomplished with text or tables

qReports, dashboards, infographics, etc.

qTo discover

qAllow us to see what would be difficult or impossible to see if not presented in a useful visualization

qRealm of research but moving into the mainstream

qCan same visualization serve both purposes?

======================

iPad, You Pad, We All Pad: Transforming Teaching and Learning

Wednesday
Oct 28th, 2015
2:30 PM – 3:20 PM
Eastern Time
Meeting Room 237-238
California State University Northridge, Lynn University, and Jackson State University have all deployed one-to-one iPad tablet initiatives, with the objectives to increase student engagement and learning, improve the quality of teaching materials, and decrease student costs. This session will discuss the transformational educational opportunities afforded by the iPad and highlight technology and pedagogical lessons learned.
Outcomes: Learn about the transformational impact of one-to-one iPad initiatives in the classroom * Understand the need for extensive faculty development and faculty adoption strategies * Appreciate deployment and support challenges====================

The Avalon Video and Audio Repository for Libraries and Beyond

Wednesday
Oct 28th, 2015
1:30 PM – 2:30 PM
Eastern Time
Poster Sessions, Exhibit Hall H-K
The Avalon Media System provides an open-source streaming media solution, based on Hydra/Fedora repository technologies, focused on delivery of library media collections, but it is finding other uses, including support for publication, teaching and learning content, and digital scholarship. As a result, new features enhance support for additional research and instructional use cases.
Outcomes: Understand the problems Avalon solves * Understand the extended use cases addressed with Avalon, both present and intended future * Learn how best to engage with the Avalon project.========================

 Karuta: Design Your Own Portfolio Process

Wednesday
Oct 28th, 2015
1:30 PM – 2:30 PM
Eastern Time
Poster Sessions, Exhibit Hall H-K
The Karuta Open Source Portfolio, currently under incubation by the Apereo Foundation, offers dramatic flexibility for designing portfolio workflows with rubrics to assess learning outcomes. Karuta is LTI enabled for integration with the LMS for easy access and transfer of evidence of learning. Subsequent releases will add functionality for showcasing as well as reporting. Outcome: Learn how Karuta can flexibly support your programs and institution through leveraging its functionality
=======================

Supporting the Discovery and Adoption of Open E-Textbooks

Wednesday
Oct 28th, 2015
1:30 PM – 2:30 PM
Eastern Time
Poster Sessions, Exhibit Hall H-K
The California Open Education Resources Council comprises faculty from the three CA higher education systems working together to identify open textbooks for high impact courses. The selected open textbooks are in the process of being peer reviewed and curated in the CA Open Online Library.
Outcomes: Identify quality open textbooks for general education, high-impact courses * Learn how to interpret textbook peer reviews with a faculty-created rubric * Understand how to reference these resources for the discovery of quality no- or low-cost materialshttp://www.educause.edu/sites/default/files/library/presentations/E15/PS58/COOL%2BEducause%2BPoster%2B2015.pdf
====================

Seminar 12P – Six Secrets for Evaluating Online Teaching (separate registration is required)

Tuesday
Oct 27th, 2015
12:30 PM – 4:00 PM
Eastern Time
Meeting Room 241-242
What makes online teaching different from face-to-face teaching? How can we tell when it’s done well? Faculty members, administrators, and IT leaders will learn six evaluation “secrets” from the authors of the new book Evaluating Online Teaching. You will leave this seminar with use-them-now strategies, tools, and templates to take back to your campus.
OUTCOMES: Distinguish online content and practices that “count” as teaching behaviors * Design self-, peer-, and administrative-evaluation analytic tools * Develop a 6-stage, campus-wide program for evaluating online teachinghttp://www.educause.edu/annual-conference/2015/seminar-12p-six-secrets-evaluating-online-teaching-separate-registration-required

10 Handout – Forms and Resources
3 MB, PDF
08 Handout – Ten Principles Operationalized
355 KB, PDF
07 Handout – Checklist for Campus Readiness
140 KB, PDF
06 Handout – Institutional Audit
305 KB, PDF
05 Handout – The Three I’s
188 KB, PDF
04 Handout – Penn State Faculty Online …
87 KB, PDF
00 Workshop Presentation File
12 MB, Powerpoint Slides

========================

Reimagining Learning Space Design across the Disciplines

Thursday
Oct 29th, 2015
8:00 AM – 8:50 AM
Eastern Time
Meeting Room 235-236
Learn how the University of Pittsburgh is creating a scalable classroom model for active learning on a traditional campus. Administrators, faculty, and instructional technologists and designers recently collaborated to reimagine legacy large-enrollment lecture halls. The focus of this session is on the learning space design process across the disciplines.
Outcomes: Identify and apply the principles of active learning associated with learning space deign * Understand the design process * Assemble an effective learning space design teamhttp://www.educause.edu/annual-conference/2015/reimagining-learning-space-design-across-disciplines

==============================

Thinking Digitally: Advancing Digital Literacy with Personalized Learning Tools

Thursday
Oct 29th, 2015
8:00 AM – 8:50 AM
Eastern Time
Wabash Ballroom 2
The session will outline a scalable framework for integrating digital literacy in higher education curriculum, supported by tools that allow for active and personalized learning. Research and examples from Georgia State University’s experience implementing a pilot program will be used as a catalyst for interactive discussion and idea generation.
Outcomes: Understand the value of incorporating digital literacy into curriculum * Select from emerging personalized learning technologies to support digital literacy across diverse academic scenarios * Adapt a methodology for developing partnerships to advance digital literacy across the organizationhttp://www.educause.edu/annual-conference/2015/thinking-digitally-advancing-digital-literacy-personalized-learning-tools===============

What’s That Droning Overhead?

Thursday
Oct 29th, 2015
8:00 AM – 8:50 AM
Eastern Time
Meeting Room 201-202
Session Type: Concurrent Session
A discussion of unmanned aerial vehicles (drones) and drone activities that either take place on campus or impact a campus from the outside. The state of federal aviation regulations and guidelines for drones will be covered. Attendees can share their experiences with official and rogue drone activities at their institutions.
Outcomes: Learn about the drone devices in use, from miniature to massive * Understand the impact of drones on academic institutions, for better or worse * Learn what drone activities are legally allowable, banned, or discouragedhttp://www.educause.edu/annual-conference/2015/whats-droning-overhead

https://drive.google.com/file/d/0B4vcm8Bg5pkcWFlaQ1J3b3duc2M/view

5. Using small unmanned aerial vehicles  today is similar to the “fair use” of media

http://www.dronesurvivalguide.org

Resources – Higher Ed Drone Policies
The Ohio State University
Iowa State University
Indiana University
University of Kansas
Penn State University
University of New Mexico

The Association of College and University Policy
Administrators (ACUPA, acupa.org)

===================

Mobile Computing

Thursday
Oct 29th, 2015
8:00 AM – 8:50 AM
Eastern Time
Meeting Room 239
Session Type: Discussion Session
Join this lively discussion and discovery of innovative and functional uses and support for mobile computing. We will explore creative ideas for projects using mobile devices in teaching, learning, and administration. Topics may include hardware, applications, tools, special uses, wireless and mobile connectivity, web services, support issues, and security.

digital citizenship bibliography

From MyFunCity to government-structured approach to “digital citizenship,” this is recent trend, which is seriously considered by educators as a must in the curricula. While habitually connected with technology classes, it is a much larger issue, which requires faculty attention across disciplines; it encompass digital and technology literacy, netiquette and online behavior (cyberbulling most frequently addressed), as well qualities and skills to be a functional and mindful citizen of a global world.

here is some general literature on digital citizenship:

Bolkan, J. V. (2014). 13 Resources to Help You Teach Digital Citizenship. T H E Journal, 41(12), 21-23. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d100209769%26site%3dehost-live%26scope%3dsite
Robb, M., & Shellenbarger, T. (2013). Promoting Digital Citizenship and Academic Integrity in Technology Classrooms. Teaching Professor, 27(8), 1-4. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d91566420%26site%3dehost-live%26scope%3dsite
Digital Citizenship: The Internet, Society, and Participation

http://groups.lis.illinois.edu/guest_lectures/cii/digcitizen.pdf

Digital Citizenship: Addressing Appropriate Technology Behavior
Ribble, Mike S.; Bailey, Gerald D.; Ross, Tweed W.
Learning & Leading with Technology, v32 n1 p6-9, 11 Sep 2004
http://eric.ed.gov/?id=EJ695788

Techné: Research in Philosophy and Technology

Volume 9, Issue 1, Fall 2005. Education and Citizenship in the Digital Age

Isman, A., & Canan Gungoren, O. (2014). Digital Citizenship. Turkish Online Journal Of Educational Technology – TOJET, 13(1), 73-77. http://eric.ed.gov/?id=EJ1018088

PR, N. (2014, April 3). MyFunCity is a revolution in digital citizenship. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201404031549PR.NEWS.USPR.BR98059%26site%3dehost-live%26scope%3dsite

Communication Studies:

Couldry, N., Stephansen, H., Fotopoulou, A., MacDonald, R., Clark, W., & Dickens, L. (2014). Digital citizenship? Narrative exchange and the changing terms of civic culture. Citizenship Studies, 18(6/7), 615-629. doi:10.1080/13621025.2013.865903
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d98053478%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)

Simsek, E., & Simsek, A. (2013). New Literacies for Digital Citizenship. Online Submission,  Contemporary Educational Technology, 4(3), 126-137. http://eric.ed.gov/?id=ED542213

================
History:
Wineburg, S., & Reisman, A. (2015). Disciplinary Literacy in History: A Toolkit for Digital Citizenship. Journal Of Adolescent & Adult Literacy, 58(8), 636-639. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ1059107%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)

==================

Human Relations and Multicultural Education (HURL):

Baumann, P., & Education Commission of the, S. (2012). Civic Engagement through Digital Citizenship: Engaging Youth in Active, Participatory Citizenship through Digital Media. The Progress of Education Reform. Volume 13, Number 1. Education Commission Of The States, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED528864%26site%3dehost-live%26scope%3dsite
Shelat, M. (2015). Global civic engagement on online platforms: Women as transcultural citizens. Dissertation Abstracts International Section A, 75, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2015-99070-423%26site%3dehost-live%26scope%3dsite
Kurubacak, G. (2011). eLearning for Pluralism: The Culture of eLearning in Building a Knowledge Society. Online Submission, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED521663%26site%3dehost-live%26scope%3dsite
 ====================

Child and Family Studies (CFS)

Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., Rainie, L., & Pew Internet & American Life, P. (2011). Teens, Kindness and Cruelty on Social Network Sites: How American Teens Navigate the New World of “Digital Citizenship”. Pew Internet & American Life Project, http://eric.ed.gov/?id=ED537516

ORTH, D., & CHEN, E. (2013). The Strategy FOR DIGITAL CITIZENSHIP. Independent School, 72(4), 56-63. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d87618786%26site%3dehost-live%26scope%3dsite

Ives, E. A. (2012, October 1). iGeneration: The Social Cognitive Effects of Digital Technology on Teenagers. Online Submission, http://eric.ed.gov/?id=ED543278

Monterosa, V. (2015). DEVELOPING DIGITAL CITIZENS. Leadership, 44(3), 30-32. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d109111583%26site%3dehost-live%26scope%3dsite

10 Free Interactive Lessons about Digital Citizenship. (2012). Curriculum Review, 52(1), 4-5. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d79851664%26site%3dehost-live%26scope%3dsite

Graham, G. (2013, November 20). Pupils are now ‘digital citizens’ with the right to use a mobile. Daily Mail. p. 3.  http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d92031070%26site%3dehost-live%26scope%3dsite

LifeLock, I. (0009, January). Free Online Tool Empowers Families to Set Technology Ground Rules as More Kids Go Digital. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3dbizwire.c63848252%26site%3dehost-live%26scope%3dsite

============================

Teacher Development (ED/TDEV)

Dettori, G. (2012). Digital citizenship in schools – By Ribble Mike. British Journal Of Educational Technology, 43(6), E179. doi:10.1111/j.1467-8535.2012.01378_9.x http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d82468985%26site%3dehost-live%26scope%3dsite

Ribble, M. (2012). Digital Citizenship for Educational Change. Kappa Delta Pi Record, 48(4), 148-151. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ993448%26site%3dehost-live%26scope%3dsite

(please ask for copy of the article)

Johnson, M. (2012). Shaping Digital Citizens: preparing students to work and play in the online world. School Libraries In Canada (17108535), 30(3), 19-22. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d95316041%26site%3dehost-live%26scope%3dsite

Enabling digital citizenship programs within your district’s network infrastructure. (2012). District Administration, 48(9), 54-55.  http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d82747791%26site%3dehost-live%26scope%3dsite

ORECH, J. (2012). HOW IT’S DONE: Incorporating Digital Citizenship Into Your Everyday Curriculum. Tech & Learning, 33(1), 16-18.  http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d82590138%26site%3dehost-live%26scope%3dsite

Petrucco, C. (2013). Fostering digital literacy between schools and the local community: Using service learning and project-based learning as a conceptual framework. International Journal Of Digital Literacy And Digital Competence, 4(3), 10-18. doi:10.4018/ijdldc.2013070102 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2014-29004-002%26site%3dehost-live%26scope%3dsite

======================

Educational Leadership and Higher Education (ELHE)

Acosta, D. M. (2014). Tweet Up? Examining Twitter’s Impact on Social Capital and?Digital Citizenship in Higher Education. About Campus, 18(6), 10-17. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ1027263%26site%3dehost-live%26scope%3dsite

Suppo, C. A. (2013, January 1). Digital Citizenship Instruction in Pennsylvania Public Schools: School Leaders Expressed Beliefs and Current Practices. ProQuest LLC, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED553014%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)

Noonoo, S. (2014). Digital Citizenship for the Real World. T H E Journal, 41(4), 17-19. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d103335802%26site%3dehost-live%26scope%3dsite

Ribble, M. (2014). The importance of digital citizenship. District Administration, 50(11), 88. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d103369941%26site%3dehost-live%26scope%3dsite

MURLEY, S. F. (2014). Engaging With a Digital Citizenry. School Administrator, 71(10), 30-31 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dtfh%26AN%3d102610780%26site%3dehost-live%26scope%3dsite

Ahlquist, J. (2014). Trending Now: Digital Leadership Education Using Social Media and the Social Change Model. Journal Of Leadership Studies, 8(2), 57-60. doi:10.1002/jls.21332 http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d99008045%26site%3dehost-live%26scope%3dsite

Neustar, I. (0001, September). Neustar Launches Social Media Digital Citizenship Program for  Kentucky Schools. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c38975001%26site%3dehost-live%26scope%3dsite

===============

Special Education (SPED)

Farmer, L. (2012). Digital Citizenship for Youth with Autism Spectrum Disorders. CSLA Journal, 35(2), 12-13. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d91822779%26site%3dehost-live%26scope%3dsite

Common Sense Media. (2011). Common Sense Media Partners with Nickelodeon’s the Big Help on Digital Citizenship and Anti-Bullying Campaign. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c32997597%26site%3dehost-live%26scope%3dsite

===================

Sociology:

Lyons, R. (2012, January 1). Investigating Student Gender and Grade Level Differences in Digital Citizenship Behavior. ProQuest LLC, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dED546058%26site%3dehost-live%26scope%3dsite (please ask for copy of the article)

NOONAN, K. (2013). DIGITAL CITIZENS RISE TO DISASTERS. Government News, 33(1), 16. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d86153161%26site%3dehost-live%26scope%3dsite

Buente, W. (2012). Modeling citizenship offline and online: Internet use, information, and political action during the 2008 election campaign. Dissertation Abstracts International Section A, 73, 1222. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2012-99190-595%26site%3dehost-live%26scope%3dsite

Kurubacak, G. (2011). eLearning for Pluralism: The Culture of eLearning in Building a Knowledge Society. International Journal On E-Learning, 10(2), 145-167. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ926545%26site%3dehost-live%26scope%3dsite

Hill, A. M. (2015). The kids are all right online: Teen girls’ experiences with self-presentation, impression management & aggression on Facebook. Dissertation Abstracts International Section A, 76, http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2015-99170-479%26site%3dehost-live%26scope%3dsite

===============================

Criminal Justice

NPR. (2015, April 13). National Cyber Security Alliance Aligns with RSA Conference to Empower Digital Citizens to Stay Current in the Ever-changing Cybersecurity Environment. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201504131030PR.NEWS.USPR.DC78336%26site%3dehost-live%26scope%3dsite

NPR. (2014, February 11). Digital Citizens Alliance Calls Prosecution of Apps Content Thieves Important Step to Protect Internet. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3d201402111145PR.NEWS.USPR.DC63074%26site%3dehost-live%26scope%3dsite

 

NPR. (2015, May 18). Public Officials, Business Leaders and Cybersecurity Experts Gather at “Two Steps Ahead: Protect Your Digital Life” Event in Brooklyn. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201505180600PR.NEWS.USPR.DC10064%26site%3dehost-live%26scope%3dsite

 ====================

Political Science

NOONAN, K. (2013). DIGITAL CITIZENS RISE TO DISASTERS. Government News, 33(1), 16. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbuh%26AN%3d86153161%26site%3dehost-live%26scope%3dsite

Buente, W. (2012). Modeling citizenship offline and online: Internet use, information, and political action during the 2008 election campaign. Dissertation Abstracts International Section A, 73, 1222. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d2012-99190-595%26site%3dehost-live%26scope%3dsite

Kurubacak, G. (2011). eLearning for Pluralism: The Culture of eLearning in Building a Knowledge Society. International Journal On E-Learning, 10(2), 145-167. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ926545%26site%3dehost-live%26scope%3dsite

Education Commission of the State. (2012, September). Education Commission of the States Releases Brief on Civic Engagement and Digital Citizenship. Business Wire (English). http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dbwh%26AN%3dbizwire.c39665781%26site%3dehost-live%26scope%3dsite

NPR. (2015, May 18). Public Officials, Business Leaders and Cybersecurity Experts Gather at “Two Steps Ahead: Protect Your Digital Life” Event in Brooklyn. PR Newswire US. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d201505180600PR.NEWS.USPR.DC10064%26site%3dehost-live%26scope%3dsite

=================

Library:

Lofton, J. (2015). Blogging with Students: A Vehicle for Writing, Digital Citizenship, and More. School Librarian’s Workshop, 35(5), 13-15. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d103585593%26site%3dehost-live%26scope%3dsite
Oxley, C. (2011). Digital citizenship: developing an ethical and responsible online culture. Access (10300155), 25(3), 5-9. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dlxh%26AN%3d65543466%26site%3dehost-live%26scope%3dsite

Wearable Tech

Sizing Up Wearable Tech and IoT in the Enterprise

https://fiberlinkcorp.webex.com/fiberlinkcorp/onstage/g.php?d=358842843&t=a

Kayla Bittner  358 842 843 Twitter:#smartoffice

Det Ansinn speaker

Android Wear (java)
Pebble (C)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature

limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance

opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)

GOod wearable Design: Recognizes immediacy, leverages context of the wearer

challenging to develop good experiences for these devices.

802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
Addon –
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.

Frank Schloendorn, Fiberlink, speaker

build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available

Do you currently own smartwatch

Do you currently own smartwatch

no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone

Best practices:
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)

new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.

bricksimple.com
MaaS360.com/trial

technology for social workers

Plan for Sylvester Lamin’s course:

  1. introduce myself – 5 min
  2. discuss with students how they see the impact of technology on their work – 5 min
  3. discuss with students the implications of technology on their work – 15
    http://www.socialworklicensure.org/articles/social-media-social-work.html
    http://www.socialworkblog.org/practice-and-professional-development/2011/07/social-work-social-media-where-are-the-ethical-boundaries/
    http://www.theguardian.com/social-care-network/2013/jul/23/social-workers-social-media-challenge-perception
    email as unreliable medium
    privacy
    security
  4. discuss with students the possibilities, which SCSU resources and Internet resources can provide for collaboration, creativity and streamlining the work of the social worker – 15
    File space at SCSU versus other free resources
    keeping data in the cloud
    collaborating on documents and policies
    sharing data with clients
  5. Other issues, ideas – 10

1 11 12 13 14