Searching for "security"

Blockchain next election

Blockchain Disciples Have a New Goal: Running Our Next Election

Amid vote-hacking fears, election officials are jumping on the crypto bandwagon — but cybersecurity experts are sounding an alarm

At democracy’s heart lies a set of paradoxes: a delicate interplay of identity and anonymity, secrecy and transparency. To be sure you are eligible to vote and that you do so only once, the authorities need to know who you are. But when it comes time for you to mark a ballot, the government must guarantee your privacy and anonymity. After the fact, it also needs to provide some means for a third party to audit the election, while also preventing you from obtaining definitive proof of your choice, which could lead to vote selling or coercion.
Building a system that accomplishes all this at once — and does so securely — is challenging enough in the physical world. It’s even harder online, as the recent revelation that Russian intelligence operatives compromised voting systems in multiple states makes clear.
In the decade since the elusive Satoshi Nakamoto published an infamous white paper outlining the idea behind bitcoin, a “peer-to-peer electronic cash system” based on a mathematical “consensus mechanism,” more than 1,500 new cryptocurrencies have come into being.
definition: Nathan Heller in the New Yorker, in which he compares the blockchain to a scarf knit with a single ball of yarn. “It’s impossible to remove part of the fabric, or to substitute a swatch, without leaving some trace,” Heller wrote. Typically, blockchains are created by a set of stakeholders working to achieve consensus at every step, so it might be even more apt to picture a knitting collective creating that single scarf together, moving forward only when a majority agrees that a given knot is acceptable.
Unlike bitcoin, a public blockchain powered by thousands of miners around the world, most voting systems, including Votem’s, employ what’s known as a “permissioned ledger,” in which a handful of approved groups (political parties, election observers, government entities) would be allowed to validate the transactions.
there’s the issue of targeted denial-of-service (DoS) attacks, in which a hacker directs so much traffic at a server that it’s overwhelmed and ceases to function.
Although a distributed ledger itself would likely withstand such an attack, the rest of the system — from voters’ personal devices to the many servers a vote would pass through on its way to the blockchain — would remain vulnerable.
there’s the so-called penetration attack, like the University of Michigan incursion, in which an adversary gains control of a server and deliberately alters the outcome of an election.
While it’s true that information recorded on a blockchain cannot be changed, a determined hacker might well find another way to disrupt the process. Bitcoin itself has never been hacked, for instance, but numerous bitcoin “wallets” have been, resulting in billions of dollars in losses. In early June 2018, a South Korean cryptocurrency exchange was penetrated, causing the value of bitcoin to tumble and resulting in a loss of $42 billion in market value. So although recording the vote tally on a blockchain introduces a new obstacle to penetration attacks, it still leaves holes elsewhere in the system — like putting a new lock on your front door but leaving your basement windows open.
A blockchain is only as valuable as the data stored on it. And whereas traditional paper ballots preserve an indelible record of the actual intent of each voter, digital votes “don’t produce an original hard-copy record of any kind,”
In the end, democracy always depends on a certain leap of faith, and faith can never be reduced to a mathematical formula. The Economist Intelligence Unit regularly ranks the world’s most democratic counties. In 2017, the United States came in 21st place, after Uruguay and Malta. Meanwhile, it’s now widely believed that John F. Kennedy owed his 1960 win to election tampering in Chicago. The Supreme Court decision granting the presidency to George W. Bush rather than calling a do-over — despite Al Gore’s popular-vote win — still seems iffy. Significant doubts remain about the 2016 presidential race.
While little doubt remains that Russia favored Trump in the 2016 election, the Kremlin’s primary target appears to have been our trust in the system itself. So if the blockchain’s trendy allure can bolster trust in American democracy, maybe that’s a net positive for our national security. If someone manages to hack the system, hopefully they’ll do so quietly. Apologies to George Orwell, but sometimes ignorance really is strength.

+++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Hololens in academic library

Blurred Lines—between virtual reality games, research, and education

http://library.ifla.org/2133/

p. 5 a LibGuide was created that provided a better description of the available software for both the Microsoft Hololens and the HTC Vive and also discussed potential applications for the technology.

Both the HTC Vive and the Hololens were made bookable through the library’s LibCalendar booking system, streamlining the booking process and creating a better user experience.

When the decision was made to bring virtual and augmented reality into the McGill University Library, an important aspect of this project was to develop a collection of related software to be used alongside the technology. In building this software collection a priority was placed on acquiring software that could be demonstrated as having educational value, or that could potentially be used in relation to, or in support of, university courses.

For the Microsoft Hololens, all software was acquired through Microsoft’s Online Store. The store has a number of educationally relevant HoloLens apps available for purchase. The app ARchitect, for example, gives a basic sense of how augmented reality could be used for viewing new building designs. The app Robotics BIW allows user to simulate robotic functions. A select number of apps, such as Land of the Dinosaurs and Boulevard, provide applications for natural history and art. There were a select number of apps related to science, mathematics and medicine, and others with artistic applications. All of the HoloLens applications were free but, compared to what is available for virtual reality, the experiences were much smaller in size and scope.

For the HoloLens, a generic user account was created and shared with person who booked the HoloLens at the time of their booking. After logging into this account – which could sometimes prove to be a challenge because typing is done using the headset’s gesture controls – the user could select a floating tile which would reveal a list of available software. An unresolved problem was that users would then need to refer to the HoloLens LibGuide for a detailed description of the software, or else choose software based on name alone, and the names were not always helpful.

For the Microsoft HoloLens, the three most popular software programs were Land of the Dinosaurs, Palmyra and Insight Heart. Insight Heart allow users to view and manipulate a 3D rendering of a high-resolution human heart, Land of the Dinosaurs provided an augment reality experience featuring 3D renderings of dinosaurs, and Palmyra gave an augmented reality tour of the ancient city of Palmyra.

p. 7 Though many students had ideas for research projects that could make use of the technology, there was no available software that would have allowed them to use augmented reality in the way they wanted. There were no students interested in developing their own software to be used with the technology either.

p. 8 we found that the Microsoft HoloLens received significant use from our patrons, we would recommend the purchase of one only for libraries serving researchers and developers.

++++++++++++

Getting Real in the Library: A Case Study at the University of Florida

Samuel R. Putnam and Sara Russell GonzalezIssue 39, 2018-02-05

Getting Real in the Library: A Case Study at the University of Florida

As an alternative, Microsoft offers a Hololens with enterprise options geared toward multiple users for $5000.

The transition from mobile app development to VR/AR technology also reflected the increased investment in VR/AR by some of the largest technology companies in the world. In the past four years, Facebook purchased the virtual reality company Oculus, Apple released the ARKit for developing augmented reality applications on iOS devices, Google developed Google Cardboard as an affordable VR option, and Sony released Playstation VR to accompany their gaming platform, just to name a few notable examples. This increase of VR/AR development was mirrored by a rise in student interest and faculty research in using and creating new VR/AR content at UF.

+++++++++++

Arnhem, J.-P. van, Elliott, C., & Rose, M. (2018). Augmented and Virtual Reality in Libraries. Rowman & Littlefield.
https://books.google.com/books?id=PslaDwAAQBAJ&lpg=PA205&ots=HT7qTY-16o&dq=hololens%20academic%20library&lr&pg=PA214#v=onepage&q=hololens%20academic%20library&f=false
360 degree video in library instruction
+++++++++++++++
Hammady, R., & Ma, M. (2018). Designing Spatial UI as a Solution of the Narrow FOV of Microsoft HoloLens: Prototype of Virtual Museum Guide. In Proceedings of the 4th International AR & VR Conference 2018. Springer. Retrieved from https://eprints.staffs.ac.uk/4799/
‘HoloMuse’ that engage users with archaeological artefacts through gesture-based interactions (Pollalis, Fahnbulleh, Tynes, & Shaer, 2017). Another research utilised HoloLens to provide in-situ assistant for users (Blattgerste, Strenge, Renner, Pfeiffer, & Essig, 2017). HoloLens also used to provide magnification for low vision users by complementary finger-worn camera alongside with the HMD (Stearns, DeSouza, Yin, Findlater, & Froehlich, 2017). Even in the medical applications, HoloLens contributed in 3D visualisation purposes using AR techniques (Syed, Zakaria, & Lozanoff, 2017) and provide optimised measurements in medical surgeries(Pratt et al., 2018) (Adabi et al., 2017). Application of HoloLens extended to visualise prototype designs (DeLaOsa, 2017) and showed its potential in gaming industry (Volpe, 2015) (Alvarez, 2015) and engaging cultural visitors with gaming activities (Raptis, Fidas, & Avouris, 2017).
++++++++++++
van Arnhem, J.-P., & Spiller, J. M. (2014). Augmented Reality for Discovery and Instruction. Journal of Web Librarianship, 8(2), 214–230. https://doi.org/10.1080/19322909.2014.904208

+++++++++++

Evaluating the Microsoft HoloLens through an augmented reality assembly application
Proceedings Volume 10197, Degraded Environments: Sensing, Processing, and Display 2017; 101970V (2017) https://doi.org/10.1117/12.2262626
Event: SPIE Defense + Security, 2017, Anaheim, California, United States
To assess the HoloLens’ potential for delivering AR assembly instructions, the cross-platform Unity 3D game engine was used to build a proof of concept application. Features focused upon when building the prototype were: user interfaces, dynamic 3D assembly instructions, and spatially registered content placement. The research showed that while the HoloLens is a promising system, there are still areas that require improvement, such as tracking accuracy, before the device is ready for deployment in a factory assembly setting.
+++++++++++
Pollalis, C., Fahnbulleh, W., Tynes, J., & Shaer, O. (2017). HoloMuse: Enhancing Engagement with Archaeological Artifacts Through Gesture-Based Interaction with Holograms. In Proceedings of the Eleventh International Conference on Tangible, Embedded, and Embodied Interaction (pp. 565–570). New York, NY, USA: ACM. https://doi.org/10.1145/3024969.3025094
https://www.researchgate.net/publication/315472858_HoloMuse_Enhancing_Engagement_with_Archaeological_Artifacts_through_Gesture-Based_Interaction_with_Holograms
++++++++++++++
Gračanin, D., Ciambrone, A., Tasooji, R., & Handosa, M. (2017). Mixed Library — Bridging Real and Virtual Libraries. In S. Lackey & J. Chen (Eds.), Virtual, Augmented and Mixed Reality (pp. 227–238). Springer International Publishing.
We use Microsoft HoloLens device to augment the user’s experience in the real library and to provide a rich set of affordances for embodied and social interactions.We describe a mixed reality based system, a prototype mixed library, that provides a variety of affordances to support embodied interactions and improve the user experience.

++++++++++++

Dourish, P. (n.d.). Where the Action Is. Retrieved November 23, 2018, from https://mitpress.mit.edu/books/where-action
embodied interactions
Computer science as an engineering discipline has been spectacularly successful. Yet it is also a philosophical enterprise in the way it represents the world and creates and manipulates models of reality, people, and action. In this book, Paul Dourish addresses the philosophical bases of human-computer interaction. He looks at how what he calls “embodied interaction”—an approach to interacting with software systems that emphasizes skilled, engaged practice rather than disembodied rationality—reflects the phenomenological approaches of Martin Heidegger, Ludwig Wittgenstein, and other twentieth-century philosophers. The phenomenological tradition emphasizes the primacy of natural practice over abstract cognition in everyday activity. Dourish shows how this perspective can shed light on the foundational underpinnings of current research on embodied interaction. He looks in particular at how tangible and social approaches to interaction are related, how they can be used to analyze and understand embodied interaction, and how they could affect the design of future interactive systems.

++++++++++

Pollalis, C., Fahnbulleh, W., Tynes, J., & Shaer, O. (2017). HoloMuse: Enhancing Engagement with Archaeological Artifacts Through Gesture-Based Interaction with Holograms. In Proceedings of the Eleventh International Conference on Tangible, Embedded, and Embodied Interaction (pp. 565–570). New York, NY, USA: ACM. https://doi.org/10.1145/3024969.3025094
HoloMuse, an AR application for the HoloLens wearable device, which allows users to actively engage with archaeological artifacts from a museum collection
pick up, rotate, scale, and alter a hologram of an original archeological artifact using in-air gestures. Users can also curate their own exhibit or customize an existing one by selecting artifacts from a virtual gallery and placing them within the physical world so that they are viewable only using the device. We intend to study the impact of HoloMuse on learning and engagement with college-level art history and archeology students.
++++++++++++

Dugas, Z., & Kerne Andruld. (2007). Location-Aware Augmented Reality Gaming for Emergency Response Education: Concepts and Development. ResearchGate. Retrieved from https://www.researchgate.net/publication/242295040_Location-Aware_Augmented_Reality_Gaming_for_Emergency_Response_Education_Concepts_and_Development

+++++++++++

Library Spaces II: The IDEA Lab at the Grainger Engineering Library Information Center

https://prism.ucalgary.ca/bitstream/handle/1880/52190/DL5_mischo_IDEA_Lab2.pdf

++++++++++
more on Hololens in this IMS blog
https://blog.stcloudstate.edu/ims?s=hololens

Does AI favor tyranny

Why Technology Favors Tyranny

Artificial intelligence could erase many practical advantages of democracy, and erode the ideals of liberty and equality. It will further concentrate power among a small elite if we don’t take steps to stop it.

https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/

YUVAL NOAH HARARI  OCTOBER 2018 ISSUE

Ordinary people may not understand artificial intelligence and biotechnology in any detail, but they can sense that the future is passing them by. In 1938 the common man’s condition in the Soviet Union, Germany, or the United States may have been grim, but he was constantly told that he was the most important thing in the world, and that he was the future (provided, of course, that he was an “ordinary man,” rather than, say, a Jew or a woman).

n 2018 the common person feels increasingly irrelevant. Lots of mysterious terms are bandied about excitedly in ted Talks, at government think tanks, and at high-tech conferences—globalizationblockchaingenetic engineeringAImachine learning—and common people, both men and women, may well suspect that none of these terms is about them.

Fears of machines pushing people out of the job market are, of course, nothing new, and in the past such fears proved to be unfounded. But artificial intelligence is different from the old machines. In the past, machines competed with humans mainly in manual skills. Now they are beginning to compete with us in cognitive skills.

Israel is a leader in the field of surveillance technology, and has created in the occupied West Bank a working prototype for a total-surveillance regime. Already today whenever Palestinians make a phone call, post something on Facebook, or travel from one city to another, they are likely to be monitored by Israeli microphones, cameras, drones, or spy software. Algorithms analyze the gathered data, helping the Israeli security forces pinpoint and neutralize what they consider to be potential threats.

The conflict between democracy and dictatorship is actually a conflict between two different data-processing systems. AI may swing the advantage toward the latter.

As we rely more on Google for answers, our ability to locate information independently diminishes. Already today, “truth” is defined by the top results of a Google search. This process has likewise affected our physical abilities, such as navigating space.

So what should we do?

For starters, we need to place a much higher priority on understanding how the human mind works—particularly how our own wisdom and compassion can be cultivated.

+++++++++++++++
more on SCSU student philosophy club in this IMS blog
https://blog.stcloudstate.edu/ims?s=philosophy+student+club

Finland ideas for US education

OPINION: Can this 12-step program from Finland aid U.S. education?

 Finland system consistently receives top marks from UNICEF, the OECD and the World Economic Forum.
Many U.S. states are similar in population size and demographics to Finland, and education is largely run at the state level. In the economically depressed forest region of North Karelia — on the Russian border — where we spent much of our time, the unemployment rate is nearly 15 percent, compared with under 5 percent in America and our home state of New York. However, the U.S. child poverty rate is four times higher than Finland’s.
Delegations and universities from China and around the developing world are visiting Finland to learn how to improve their own school systems.Singapore has launched a series of Finnish-style school reforms.

n Finland, we heard none of the clichés common in U.S. education reform circles, like “rigor,” “standards-based accountability,” “data-driven instruction,” “teacher evaluation through value-added measurement” or getting children “college- and career-ready” starting in kindergarten.

Instead, Finnish educators and officials constantly stressed to us their missions of helping every child reach his or her full potential and supporting all children’s well-being. “School should be a child’s favorite place,” said Heikki Happonen, an education professor at the University of Eastern Finland and an authority on creating warm, child-centered learning environments.

How can the United States improve its schools? We can start by piloting and implementing these 12 global education best practices, many of which are working extremely well for Finland:

1) Emphasize well-being.

2) Upgrade testing and other assessments. 

3) Invest resources fairly.

4) Boost learning through physical activity. 

5) Change the focus. Create an emotional atmosphere and physical environment of warmth, comfort and safety so that children are happy and eager to come to school. Teach not just basic skills, but also arts, crafts, music, civics, ethics, home economics and life skills.

6) Make homework efficient. Reduce the homework load in elementary and middle schools to no more than 30 minutes per night, and make it responsibility-based rather than stress-based.

7) Trust educators and children. Give them professional respect, creative freedom and autonomy, including the ability to experiment, take manageable risks and fail in the pursuit of success.

8) Shorten the school day. Deliver lessons through more efficient teaching and scheduling, as Finland does. Simplify curriculum standards to a framework that can fit into a single book, and leave detailed implementation to local districts.

9) Institute universal after-school programs.

10) Improve, expand and destigmatize vocational and technical education.   Encourage more students to attend schools in which they can acquire valuable career/trade skills.

11) Launch preventive special-education interventions early and aggressively. 

12) Revamp teacher training toward a medical and military model. Shift to treating the teaching profession as a critical national security function requiring government-funded, graduate-level training in research and collaborative clinical practice, as Finland does.

+++++++++++
more on Finland Phenomenon in this IMS blog
https://blog.stcloudstate.edu/ims?s=finland+phenomenon

Accessible Media, Web and Technology Conference

Accessing Higher Ground – Accessible Media, Web and Technology Conference

Virtual Agenda November 14-16, 2018

++++++++++++++++++

Not So Fast: Implementing Accessibility Reviews in a University’s IT Software Review Process

  • Crystal Tenan, IT Accessibility Coordinator, NC State University
  • Bill Coker, Software Licensing Manager, NC State University

Summary

In this presentation, we will provide an overview of NC State’s IT Purchase Compliance process and focus on the accessibility review process. We will discuss the process of implementation, important considerations for working with the campus community and vendors, and the impact of the IT Purchase Compliance process on campus.

Abstract

Before a university purchases software, it should review the software to ensure it complies with university standards and follows Federal and State guidelines for security and accessibility. Without review, there is a higher risk that purchases put sensitive university data at risk, do not meet the needs of the campus population with disabilities, or require integration with enterprise level applications.

In a joint effort between the Office of Information Technology, the Office of General Counsel and the Purchasing Department, NC State University implemented a process to review purchases of software prior to issuing a purchase requisition.

In this presentation, we will provide an overview of NC State’s IT Purchase Compliance process and focus on the accessibility review process. We will discuss the process of implementation, important considerations for working with the campus community and vendors, and the impact of the IT Purchase Compliance process on campus.

Keypoints

  1. Participants will learn the importance of software reviews prior to purchasing.
  2. Participants will be exposed to an example format of how to structure a software review process.
  3. Participants will learn techniques for collaborating with various campus departments for software reviews.

(handouts available: ask me)

+++++++++

Math Accessibility in Word, Canvas, Conversion and More!

  • Paul Brown, Vice President, Texthelp
  • Rachel Kruzel, Assistive Technology & Accommodations Specialist, Augsburg University

Rachel Kruzel: Free and Low Cost Accessibility Tools (March 2018) https://vimeo.com/259224118

Link to Resources at Augsburg: http://www.augsburg.edu/class/groves/assistive-technology/

Session Details

  • Length of Session: 1-hr
  • Format: Lecture
  • Expertise Level: Beginner
  • Type of session: General Conference

Summary

This session will overview Texthelp’s exciting math accessibility program, EquatIO. Learn how students and professors easily insert math into Word, Canvas, and more as well as make STEM textbook conversion a much easier process. Augsburg’s Rachel Kruzel will provide an inside look into how EquatIO is making math accessible across her campus.

Abstract

EquatIO is Texthelp’s game-changing math software program that gives students and professors multiple means of producing, engaging with, and expressing math with ease. This session will overview how to easily insert math into Microsoft Word, Canvas, and other programs as well as how it can save valuable time and resources in STEM textbook conversion. The program’s core features including math-to-speech, speech-to-math, math prediction, math OCR capabilities and many other tools will be demonstrated, helping empower students in this traditionally challenging area. Attendees will not only learn the program, but also how they can gain free access to its premium features as well as assist their students in utilizing the freemium and premium tools.

Keypoints

  1. Math accessibility is here!
  2. EquatIO is a digital math solution for all students and staff.
  3. Save time and resources in STEM textbook conversion.

Disability Areas

All Areas, Cognitive/Learning, Vision

Topic Areas

Alternate Format, Assistive Technology, eBooks, Faculty Instruction/Accessible Course Design, Including Accessibility in Curriculum, Information Technology, Uncategorized, Web/Media Access

Speaker Bio(s)

Paul Brown

Paul Brown has been in education for 20 years as a teacher, technology coach, manager, and currently is a Vice President at Texthelp. Paul’s team oversees the successful implementation of the Read&Write and EquatIO product lines. Paul is a Cleveland Browns fan for life and asks for your pity ahead of time. He and his family live in Edina, MN.

Rachel Kruzel

Rachel Kruzel, ATP, is the Assistive Technology & Accommodations Specialist at Augsburg University in Minneapolis, Minnesota, and is a RESNA Certified Assistive Technology Practitioner (ATP). She has over 8 years of experience working in in the CLASS Office (Disability Resources) focusing on assistive technology, educational technology, transitioning from K-12 to higher education, academic accommodations implementation, and digital, electronic, and web accessibility. Rachel has presented both regionally and nationally on a variety of topics about assistive technology, as well as accessibility, transition, assistive technology tools such as the QIAT-PS and specific software program demonstrations and trainings, as well as general consultation with students, parents, schools, and organizations. She also provides consulting and direct consumer support through assistive technology consultation and the implementation process.

++++++++++++++++

“We don’t have enough staff assigned to making IT accessible!”

Summary

How often do we hear people say this or feel this way ourselves? In this session the speaker will engage with attendees on promising practices for making the most of limited resources toward a more accessible IT environment on campus.

Abstract

How often do we hear people say this or feel this way ourselves? In this session the speaker will engage with attendees on promising practices for making the most of limited resources toward a more accessible IT environment on campus. Topics will included but not be limited to convening a high level task force of key stakeholders on campus, developing policies and guidelines, offering training on accessibility within other training opportunities, presenting at regularly occurring meetings and special interest groups, developing partnerships, supporting a group of IT accessibility liaisons to extend the reach of central services, securing funds to proactively caption videos and remediate inaccessible documents (particularly those that are high impact/use), providing online resources for specific target groups, and purchasing accessibility tools for campus-wide use. The speaker will provide examples and the audience will contribute their own ideas, experiences, and lessons learned.

Keypoints

  1. Organizations promoting accessible IT on campuses are often under staffed.
  2. Promising practices have been developed at some schools for maximizing the impact of available resources.
  3. Promising practices have been developed at some schools for maximizing the impact of available resources.

Disability Areas

All Areas

Topic Areas

Administrative/Campus Policy, Information Technology, Uncategorized

Speaker Bio(s)

Sheryl Burgstahler

Dr. Sheryl Burgstahler founded and directs the DO-IT (Disabilities, Opportunities, Internetworking, and Technology) Center and the ATC (Access Technology Center) as part of her role as Director of Accessible Technology Services at the University of Washington (UW). These centers promote (1) the support the success of students with disabilities in postsecondary education and careers and (2) the development of facilities, IT, services, and learning activities that are welcoming and accessible to individuals with disabilities. The ATC focuses efforts at the UW; the DO-IT Center reaches national and international audiences with the support of federal, state, corporate, foundation, and private funds. Dr. Burgstahler is an affiliate professor in the UW College of Education. She developed and taught the Accessibility and Compliance in Online Education online course offered by Rutgers University and currently teaches graduate courses in applications of universal design in higher education at City University of New York and Saint Louis University.

(handouts available: ask me)

++++++++++++++++++

Evaluating and Repairing Word and PowerPoint Files

Summary

In this hands-on workshop, learn to evaluate and repair common accessibility issues in Microsoft Word and PowerPoint.

Abstract

Both Word and PowerPoint contain a very useful accessibility checker that can identify many potential accessibility issues within a document. However, like any automated checker, there are also many issues that it cannot detect–accessibility evaluation is always a combination of evaluation tools and manual checks.

During this workshop, participants will practice evaluating and repairing many common accessibility issues of Word and PowerPoint files. We will use practice files and a printable evaluation checklist to evaluate Word docs and Power Point slides.

Keypoints

  1. Learn to use the built-in Microsoft Office Accessibility Checker
  2. Identify accessibility issues that must be analyzed manually
  3. Practice evaluating and repairing the accessibility of Word and PowerPoint files

Disability Areas

All Areas

Topic Areas

Uncategorized, Web/Media Access

Speaker Bio(s)

Jonathan Whiting

o: Jonathan Whiting is the Director of Training at WebAIM, based at Utah State University. His main passion is helping others learn to make the web more accessible to people with disabilities. Jonathan is also currently involved in the GOALS Project, a program to assist institutions of Higher Education in improving their accessibility system-wide. With a Master’s Degree in Instructional Technology and over fifteen years of experience in the field of web accessibility, Jonathan has published dozens of articles, tutorials, and other instructional resources. He has traveled extensively to train thousands of web developers and other professionals who develop or maintain web content.

(handouts available: ask me)

+++++++++++++++++++++

Powerful Presentation Skills for the Accessibility Professional

  • Christa Miller, Director of Inclusive Media Design, Virginia Tech

Summary

As subject matter experts in disabilities and accessibility, we are often called upon to provide training and professional development to others. However, it is uncommon for us to receive formal training in this area ourselves. Through discussion and small group activities, participants will explore and practice techniques for giving presentations

Abstract

As accessibility and disability professionals we are well equipped with the content knowledge needed to provide motivation, or justification on the what, why and how of accessibility. Unfortunately, we are often called upon to provide this to experts in a wide range of unrelated fields who do not intrinsically know what it means “to be accessible”. Not only is the audience challenging to reach, but the content challenges the audience on multiple levels. That being said, by using best practices for training adult learners, accessibility training can become a pleasure.

This session aims to provide techniques and practice on critical presentation skills for accessibility professionals including but not limited to: increasing audience engagement, developing powerful slides and visuals, checking your work for accessibility, and practicing before presenting.

Keypoints

  1. Presentations by accessibility professionals should exemplify best practice for accessibility
  2. Successful presentations are part performance and part technical know-how
  3. Accessibility presentations should contain more application and practice than background information

Disability Areas

All Areas

Topic Areas

Administrative/Campus Policy, Faculty Instruction/Accessible Course Design

Speaker Bio(s)

Christa Miller

Christa Miller is a proud Virginia Tech Hokie and is currently the Director of Inclusive Media Design. She first became interested in assistive technologies (AT) while earning her BS in Electrical Engineering. Her passion for accessible technology and universal design then led her to pursue her MS in Industrial Systems Engineering, concentrating in Human Factors Engineering.

Between 2006 and 2018, Christa has worked in many roles for Assistive Technologies, part of Technology-enhanced Learning and Online Strategies (TLOS). Notable among these was as the lead Braille Transcriber for Braille Services, an initiative to provide in-house production of Braille materials for the University for which she received the Excellence in Access and Inclusion Award in 2012. Her unique knowledge of the tools and technologies needed to produce Braille for Science, Technology, Engineering, and Mathematics (STEM) courses has led her to consult with disability service providers from many other post-secondary institutions and share that knowledge at national conferences.

In her current role, Christa has enjoyed co-leading a several professional development programs aimed at providing Teaching Faculty, Instructors and Graduate Teaching Assistants with the knowledge, skills and confidence necessary to create inclusive learning environments.

(handouts available: ask me)

++++++++++++++++

IT Colleagues: from Accessibility Newbies into Accessibility Auditors

  • Kristen Dabney, Assistive Technology Instruction Specialist, Tufts University

Summary

Tufts Student Accessibility Services office created accessibility testing guidelines designed to help IT professionals complete basic accessibility audits for digital products before they are purchased.

Abstract

As Tufts implemented its accessible procurement protocol, the need for a streamlined accessibility audit process became crucial. For a university to be proactive and evaluate product accessibility before purchase, a comprehensive auditing system must be in place. These audits (completed by our SAS-trained IT team) provide a more in-depth view than that described by a vendor’s VPAT. This simple to use guide enhanced campus-wide buy-in while also making forward progress on procurement audits. Attendees will learn the process used to initiate and develop these guidelines, the arguments successfully used to get the procurement process firmly in the IT office, the training process for IT auditors and best practices for sustainability beyond the initial training workshop. This session will conclude with a walk though of an example application using the guidelines developed by Tufts Student Accessibility Services office.

Keypoints

  1. Training guide for IT professionals new to testing accessibility
  2. Quick walk through Accessibility Audit process
  3. Accessibility Review Instructions + Vendor Accessibility Report Checklist (WCAG 2.1 standards)

Disability Areas

All Areas

Topic Areas

Administrative/Campus Policy, Assistive Technology, Information Technology, Uncategorized

Speaker Bio(s)

Kristen Dabney

Kristen Dabney graduated from Grinnell College with a degree in Physics, and later from University of Connecticut with a Postsecondary Disability Services Certification since the Physics degree wasn’t saying “I’m interested in accessibility” loud enough. She currently works as an Assistive Technology Instruction Specialist at Tufts University.

(handouts available: ask me)

+++++++++++++++++++

Social media and accessibility

  • Gian Wild, Ms, AccessibilityOz

Summary

Gian Wild goes through the accessibility issues of each of the four main social media sites (Facebook, Twitter, YouTube and LinkedIn) and discusses ways that you can make sure your social media content is accessible.

Abstract

Social media accessibility is an incredibly important tool in modern society. It is not just the young who access social media, with close to 30% of people over the age of 65 interacting on social networking sites, and 50% of people aged 50 – 64. As the percentage of recruiters who use LinkedIn is now 95%, social media is becoming an essential part of negotiating the current working environment. The main reason why social media is not accessible is that social networking sites and apps are almost continually refreshed. Facebook sometimes changes twice a day. This, coupled with a lack of a formal testing process, means that what may be accessible today may be literally gone tomorrow.

Keypoints

  1. Social media networks cannot be relied upon to be accessible
  2. A number of easy things you can do to make your social media more accessible
  3. The most improved and the most accessible social media networks of 2018

Disability Areas

All Areas

Topic Areas

Uncategorized, Web/Media Access

Speaker Bio(s)

Gian Wild

Gian works in the area of web accessibility: making sure web sites and mobile apps can be used by people with disabilities. She spent six years contributing to the international set of web accessibility guidelines used around the world and is also the CEO and Founder of AccessibilityOz. With offices in Australia and the United States, AccessibilityOz has been operating for five years. Its clients include the Department of Prime Minister and Cabinet, Gold Coast 2018 Commonwealth Games, Optus, Seek and Foxtel. A 2017 Australian of the Year award nominee, Gian splits her time between Australia the US. A regular speaker at conferences around the world, in 2015 she presented to the United Nations on the importance of web accessibility at the Conference of State Parties to the Convention on the Rights of Persons with Disabilities.

(handouts available: ask me)

+++++++++++++++++

I Was Wrong! Build Your Successful Accessibility Program by Learning from My Mistakes

Angela Hooker, Microsoft

Summary

Whether or not you’re new to the field, when you manage an accessibility program, you can fall into common traps–but there’s no need to! Learn from my observations and old mistakes! Get tips for running a successful program and avoiding poor management choices, poor policy, poor planning, and more that can hinder your program.

Abstract

So, you’re leading an accessibility program…how’s that working out?

If you’re a new accessibility program manager or a seasoned pro, you can still make rookie mistakes. I sure have, and that’s after over 16 years of running accessibility and user experience programs!

Has your laid back nature defeated your process-driven “evil twin”? Does your site’s written content defeat the accessibility features that your other team members created? Are you unsure why your developers still “don’t get it”? Do your leaders avoid you and conversations about accessibility, except to say that “It’s great!”? Or perhaps your web management direction–when it comes to overall content, design, and development choices–doesn’t quite support the needs of your audience, and you’re not sure where things are going wrong.

My experience from the corporate and government sectors will help you plan your program, whether it’s for a higher education, corporate, or government environment. Get on track with process, program management, setting proper expectations, and more to help you drive great user experiences and real accessibility across your organization.

Keypoints

  1. Learn the common mistakes in creating and sustaining an accessibility program and how to avoid them.
  2. Understand the importance of setting boundaries for accepting and establishing program responsibilities.
  3. Get tips to manage the overall content, design, development, and testing–which drive your program’s success.

Disability Areas

All Areas

Topic Areas

Uncategorized, Web/Media Access

Speaker Bio(s)

Angela Hooker

Angela Hooker is a Senior Accessibility Product Manager at Microsoft, where she’s built a center of expertise for accessibility, user experience, and universal design. She’s brought her web management, development, design, accessibility, and editorial and content management expertise to the government and private sector for over 20 years. Angela also advocates for role-based accessibility and believes that teaching people how to incorporate principles of accessibility in their everyday work creates a sustainable program and produces the most accessible user experiences. In addition to accessibility and universal design, she supports plain language and web standards. Angela speaks on and writes about accessibility, user experience, and plain language.

(handouts available: ask me)

+++++++++++++++++++++

Trending Tech Tools: What’s New, What’s Improved & What’s on the Horizon for Assistive Technology & Accessibility Tools

  • Rachel Kruzel, Assistive Technology & Accommodations Specialist, Augsburg University

Summary

The field of Assistive Technology and Accessibility is constantly changing. Tech giants are making more frequent updates to their products. As a result, knowing the latest updates is essential. Assistive Technology and Accessibility software updates from major tech companies such as Texthelp, Sonocent, and Microsoft, as well as free and low cost tools to support students on campus will be featured and shown.

Abstract

Both the Assistive Technology and Accessibility fields are constantly changing. Software companies are soliciting user feedback continuously and deciding which suggestions are the most important to develop and update. These updates and developments are released every six to twelve weeks. Much of this AT is central for students to access courses and curriculum in an accessible way. This presentation will focus on the most recent updates from the major assistive technology companies who are making waves in the tech field. The latest releases from companies like Texthelp, Sonocent, Microsoft, as well as other tech giants will be shown. Free and low cost assistive technology tools that are on the cutting edge or are strong supports for students will be featured in this session as well. Participants will leave with updates to tools they are using to support students on their campuses and ideas on how to use these tools on campus to implement both Assistive Technology and Accessibility.

Keypoints

  1. Assistive technology companies are releasing product updates every six to twelve weeks on average.
  2. Latest updates and features to commonly used Assistive Technology tools in higher education will be shown.
  3. Both for-purchase and free/low cost assistive technology tools can be easily implemented to support students.

Disability Areas

All Areas

Topic Areas

Assistive Technology, Uncategorized

Speaker Bio(s)

Rachel Kruzel

Rachel Kruzel, ATP, is the Assistive Technology & Accommodations Specialist at Augsburg University in Minneapolis, Minnesota, and is a RESNA Certified Assistive Technology Practitioner (ATP). She has over 8 years of experience working in in the CLASS Office (Disability Resources) focusing on assistive technology, educational technology, transitioning from K-12 to higher education, academic accommodations implementation, and digital, electronic, and web accessibility. Rachel has presented both regionally and nationally on a variety of topics about assistive technology, as well as accessibility, transition, assistive technology tools such as the QIAT-PS and specific software program demonstrations and trainings, as well as general consultation with students, parents, schools, and organizations. She also provides consulting and direct consumer support through assistive technology consultation and the implementation process.

(handouts available: ask me)

++++++++++++++++

The Big Ten Academic Alliance’s Shared Approach to Procurement and Vendor Relations

  • Bill Welsh, Rutgers University
  • Charlie Collick, Director of IT Accessibility, Rutgers University
  • Nate Evans, Manager, Digital Content & Accessibility, Michigan State University

Summary

Learn how the Big Ten Academic Alliance is working together to develop policies, processes and procedures for procurement of accessible IT as well as assisting each other with managing vendor relationships that can foster better product accessibility within the Big 10. Also, each presenter will share their own institutions practices in this area.

Abstract

The Big Ten Academic Alliance are working together through a CIO sponsored group called the Information Technology Accessibility Group to leverage their coalition in regards to the accessibility of IT products purchased. The presenters will provide insight into their current collaborative efforts and share the four goals that the ITAG/Procurement Working Group is developing to improve best practices and shared basic standards for accessibility in IT procurement processes. This partnership has identified the following four goals to address IT accessibility: 1.Education & Marketing 2. Shared Solicitation Requirements for IT purchases 3. Standardize Evaluation 4. Leverage the BTAA purchasing power to work with vendors to improve accessibility and develop shared repository of IT accessibility evaluations. Participants will discover methods of alignment, and see how shared approaches to vendor relationship management can leverage economy of scale and foster vendor commitment.

Keypoints

  1. Product accessibility best practices
  2. Establishing product accessibility repositories
  3. There are resources available in this arena for others to utilize and assist in developing

Disability Areas

All Areas

Topic Areas

Administrative/Campus Policy, Information Resources, Information Technology, Uncategorized

Speaker Bio(s)

Bill Welsh

Bill is the Associate VP of Rutgers Access and Disability Resources. He has worked at Rutgers since 2013. Previously, he worked at Penn State University (1999-2013) and Drexel University (1994-1999) as Director of Disability Services

Charlie Collick

Charlie is the Director of IT Accessibility at Rutgers University. He is responsible for the accessibility of all enterprise academic and administrative technology and digital content. He also serves as Director of Software Site Licensing where he is responsible for vetting all central funded technology purchases for the University and the distribution of the licenses to staff, faculty, and students. Charlie has been an employee of Rutgers OIT since 2008. Before serving in his current role, Charlie was the Acting Director of Teaching and Learning with Technology where he lead a team of instructional designers, education technologists, and LMS support staff. His professional experience includes accessibility, instructional design, instructional technology, functional management, organizational development, strategic planning, and technology procurement. His broad technical background spans general IT, applications and systems support, web design and development, and the delivery of related services.

Nate Evans

Nate works with students, faculty, staff, and administrators across the institution to help create more inclusive environments, and shape better digital experiences. He leads Michigan State University’s digital accessibility program, and the Digital Content & Accessibility team to provide central support and resources, and to measure digital accessibility improvement.

(handouts available: ask me)

+++++++++++++++++

Not Another Lecture-Style Presentation

  • Brad Held, Accessible Technology Coordinator, University of Central Fl

Summary

Disability Professionals struggle to garner interest for their presentations or workshops. Just getting faculty or staff to register for their training doesn’t guarantee that the topics will be practiced. In this presentation, the presenter will share tips for designing a memorable educational experience that doesn’t involve a projector/clicker.

Abstract

As accessible technology experts, we often find it difficult to fill the seats at our presentations. This might be because of the topics we discussed are overwhelmingly complicated to understand, or because attendees do not believe enough students are affected by our subject matter. Regardless of the reason, the attendee doesn’t always leave with a lasting memory of how they can create access to their environment. What if we could take some of the visual elements of our technology and incorporate it with inclusive principles, then design an experience that is FUN? Based on the popular escape room game concept, you can challenge teams to be locked in a room full of barriers. Have them escape by identifying and removing the barriers within the room with more accessible approaches within the time allotted. UCF will share their design secrets for creating an escape room activity that will have your entire institution buzzing. The presentation will end with an interactive demonstration.

Keypoints

  1. How to create a different activity other than a lecture style presentation
  2. Designing a memorable experience involving accessibility.
  3. Incorporating accessible technology and inclusive principle.

Disability Areas

All Areas

Topic Areas

Other, Uncategorized

Speaker Bio(s)

Brad Held

Brad Held has been the Assistant Director – Accessible Technology for the Student Accessibility Services office at University of Central Florida (UCF) for the past four years. He earned his Bachelor’s degree in Applied Biotechnology at the University of Georgia in 2006. Prior to arriving at UCF, Brad worked in Assistive Technology for almost ten years: four years in a public school K-12 setting with Gwinnett County Public Schools in Georgia and five years in higher-education at The University of Georgia and The University of South Carolina. He is certified in Assistive Technology Applications. Aside from helping UCF students received academic supports, Brad also has a learning disability. Brad uses his personal experience to aid students in being active participants in the accommodation process.

++++++++++++++++++

Interactive 3d printed tactile campus maps

  • Holly Lawson, Assistant Professor, Portland State University
  • Shiri Azenkot, Assistant Professor, Cornell Tech
  • Lei Shi, PhD Student, Cornell Tech
  • Michael Cantino, Research Assistant, Portland State University

Summary

This presentation introduces the Markit and Talkit iOS software, which enables an individual to add text or audio annotations to a 3d printed model. Presenters share the use of this toolkit with 3d printed tactile maps.

Abstract

Recent advances in 3d printing technology have made tactile models more available to individuals who are visually impaired. With grant funding from the National Science Foundation, we have developed and field-tested iOS technology that empowers individuals to modify models by adding audio or text annotations. Using this technology, a modified model can provide voice output or display a description of a model component when it is touched by a user. In this session, we will introduce the 3d printing technology and its application with 3d printed tactile maps for use with individuals with visual impairments at Portland State University and Portland Community College.

Keypoints

  1. interactive 3d printed models can provide greater access to campus environments than traditional tactile maps
  2. interactive 3d printed maps can be customized to include wayfinding information most pertinent to the user
  3. the use of interactive 3d printed models is a cost effective solution for institutes of higher education

Disability Areas

Mobility, Vision

Topic Areas

Assistive Technology, Uncategorized

Speaker Bio(s)

Holly Lawson

Dr. Holly Lawson is an Assistant Professor at Portland State University and

the coordinator of the Visually Impaired Learner program. Since 1994, she has worked in the VIL field, beginning as a residential instructor for the Texas School for the Blind and Visually Impaired and then the Peace Corps in Morocco. Her master’s and PhD are from the University of Arizona where she held several positions in teaching and research. She came to PSU in 2014, having previously worked as an assistant professor and the coordinator for the Virginia Consortium of Teacher Preparation in Vision Impairment at George Mason University.

Shiri Azenkot

Dr. Shiri Azenkot is an Assistant Professor at the Jacobs Technion-Cornell Institute at Cornell Tech, Cornell University, and a field member in the Information Science Department. She is also an affiliate faculty member in the Computer Science Department at the Technion–Israel Institute of Technology. Currently, her research is funded by the NSF, AOL, Verizon, and Facebook. Before arriving at Cornell Tech, she was a PhD student in Computer Science & Engineering at the University of Washington, where she was advised by Richard Ladner and Jacob Wobbrock. Shiri has received the UW graduate medal (awarded to just one PhD candidate at the university each year), a National Science Foundation Graduate Research Fellowship, and an AT&T Labs Graduate Fellowship.

Lei Shi

Lei Shi is a fourth-year Ph.D. student at Cornell University and an AOL fellow at Cornell Tech, where he is advised by Shiri Azenkot. His research interests lie in the fields of accessibility, human-computer interaction, and design. Specifically, he explores how to combine 3D printing technologies and innovative design to help people. Previously, Lei got his bachelor degree in Electrical Engineering from Zhejiang University, with a double degree in Industrial Design.

Michael Cantino

Michael Cantino worked in K-12 special education for 11 years before coming to Portland Community College in 2017. During that time, he specialized in supporting students with behavioral challenges, Autism Spectrum Disorder, and students with visual impairments. Michael is a Library of Congress certified braille transcriber and is skilled in the production of tactile graphics and 3D models for visually impaired learners. At PCC, Michael provides a broad range of supports for students experiencing disabilities, with a focus on assistive technology, alternative formats, and in-class supports. In addition to his work at Portland Community College, Michael is also a Research Assistant at Portland State University where he is studying the use of interactive 3D models to support visually impaired learners.

(handouts available: ask me)

+++++++++++++++++++

The Power of PDF

Instructional designers, document developers, analysts QA

Naveesha  and Sachun Gupta

++++++++++
more on UDL in this IMS blog
https://blog.stcloudstate.edu/ims?s=udl

Russian Influence Operations on Twitter

Russian Influence Operations on Twitter

Summary This short paper lays out an attempt to measure how much activity from Russian state-operated accounts released in the dataset made available by Twitter in October 2018 was targeted at the United Kingdom. Finding UK-related Tweets is not an easy task. By applying a combination of geographic inference, keyword analysis and classification by algorithm, we identified UK-related Tweets sent by these accounts and subjected them to further qualitative and quantitative analytic techniques.

We find:

 There were three phases in Russian influence operations : under-the-radar account building, minor Brexit vote visibility, and larger-scale visibility during the London terror attacks.

 Russian influence operations linked to the UK were most visible when discussing Islam . Tweets discussing Islam over the period of terror attacks between March and June 2017 were retweeted 25 times more often than their other messages.

 The most widely-followed and visible troll account, @TEN_GOP, shared 109 Tweets related to the UK. Of these, 60 percent were related to Islam .

 The topology of tweet activity underlines the vulnerability of social media users to disinformation in the wake of a tragedy or outrage.

 Focus on the UK was a minor part of wider influence operations in this data . Of the nine million Tweets released by Twitter, 3.1 million were in English (34 percent). Of these 3.1 million, we estimate 83 thousand were in some way linked to the UK (2.7%). Those Tweets were shared 222 thousand times. It is plausible we are therefore seeing how the UK was caught up in Russian operations against the US .

 Influence operations captured in this data show attempts to falsely amplify other news sources and to take part in conversations around Islam , and rarely show attempts to spread ‘fake news’ or influence at an electoral level.

On 17 October 2018, Twitter released data about 9 million tweets from 3,841 blocked accounts affiliated with the Internet Research Agency (IRA) – a Russian organisation founded in 2013 and based in St Petersburg, accused of using social media platforms to push pro-Kremlin propaganda and influence nation states beyond their borders, as well as being tasked with spreading pro-Kremlin messaging in Russia. It is one of the first major datasets linked to state-operated accounts engaging in influence operations released by a social media platform.

Conclusion

This report outlines the ways in which accounts linked to the Russian Internet ResearchAgency (IRA) carried out influence operations on social media and the ways their operationsintersected with the UK.The UK plays a reasonably small part in the wider context of this data. We see two possibleexplanations: either influence operations were primarily targeted at the US and British Twitterusers were impacted as collate, or this dataset is limited to US-focused operations whereevents in the UK were highlighted in an attempt to impact US public, rather than a concertedeffort against the UK. It is plausible that such efforts al so existed but are not reflected inthis dataset.Nevertheless, the data offers a highly useful window into how Russian influence operationsare carried out, as well as highlighting the moments when we might be most vulnerable tothem.Between 2011 and 2016, these state-operated accounts were camouflaged. Through manualand automated methods, they were able to quietly build up the trappings of an active andwell-followed Twitter account before eventually pivoting into attempts to influence the widerTwitter ecosystem. Their methods included engaging in unrelated and innocuous topics ofconversation, often through automated methods, and through sharing and engaging withother, more mainstream sources of news.Although this data shows levels of electoral and party-political influence operations to berelatively low, the day of the Brexit referendum results showed how messaging originatingfrom Russian state-controlled accounts might come to be visible on June 24th 2016, we believe UK Twitter users discussing the Brexit Vote would have encountered messages originating from these accounts.As early as 2014, however, influence operations began taking part in conversations aroundIslam, and these accounts came to the fore during the three months of terror attacks thattook place between March and June 2017. In the immediate wake of these attacks, messagesrelated to Islam and circulated by Russian state-operated Twitter accounts were widelyshared, and would likely have been visible in the UK.The dataset released by Twitter begins to answer some questions about attempts by a foreignstate to interfere in British affairs online. It is notable that overt political or electoralinterference is poorly represented in this dataset: rather, we see attempts at stirring societaldivision, particularly around Islam in the UK, as the messages that resonated the most overthe period.What is perhaps most interesting about this moment is its portrayal of when we as socialmedia users are most vulnerable to the kinds of messages circulated by those looking toinfluence us. In the immediate aftermath of terror attacks, the data suggests, social mediausers were more receptive to this kind of messaging than at any other time.

It is clear that hostile states have identified the growth of online news and social media as aweak spot, and that significant effort has gone into attempting to exploit new media toinfluence its users. Understanding the ways in which these platforms have been used tospread division is an important first step to fighting it.Nevertheless, it is clear that this dataset provides just one window into the ways in whichforeign states have attempted to use online platforms as part of wider information warfare
and influence campaigns. We hope that other platforms will follow Twitter’s lead and release
similar datasets and encourage their users to proactively tackle those who would abuse theirplatforms.

+++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

Students Data Privacy

What Happens to Student Data Privacy When Chinese Firms Acquire U.S. Edtech Companies?

By Jenny Abamu     Apr 24, 2018

https://www.edsurge.com/news/2018-04-24-what-happens-to-student-data-privacy-when-chinese-firms-acquire-u-s-edtech-companies

Between the creation of a social rating system and street cameras with facial recognition capabilities, technology reports coming out of China have raised serious concerns for privacy advocates. These concerns are only heightened as Chinese investors turn their attention to the United States education technology space acquiring companies with millions of public school users.

A particularly notable deal this year centers on Edmodo, a cross between a social networking platform and a learning management system for schools that boasts having upwards of 90 million users. Net Dragon, a Chinese gaming company that is building a significant education division, bought Edmodo for a combination of cash and equity valued at $137.5 million earlier this month.

Edmodo began shifting to an advertising model last year, after years of struggling to generate revenue. This has left critics wondering why the Chinese firm chose to acquire Edmodo at such a price, some have gone as far as to call the move a data grab.

as data becomes a tool that governments such as Russia and China could use to influence voting systems or induce citizens into espionage, more legislators are turning their attention to the acquisitions of early-stage technology startups.

NetDragon officials, however, say they have no interest in these types of activities. Their main goal in acquiring United States edtech companies lies in building profitability, says Pep So, NetDragon’s Director of Corporate Development.

In 2015, the firm acquired the education technology platform, Promethean, a company that creates interactive displays for schools. NetDragon executives say that the Edmodo acquisition rounds out their education product portfolio—meaning the company will have tools for supporting multiple aspects of learning including; preparation, instructional delivery, homework, assignment grading, communication with parents students and teachers and a content marketplace.

NetDragon’s monetization plan for Edmodo focuses on building out content that gets sold via its platform. Similar to tools like TeachersPayTeachers, So hopes to see users putting up content on the platform’s marketplace, some free and others for a fee (including some virtual reality content), so that the community can buy, sell and review available educational tools.

As far as data privacy is concerned, So notes that NetDragon is still learning what it can and cannot do. He noted that the company will comply with Children’s Online Privacy Protection Act (COPPA), a federal regulation created in order to protect the privacy of children online, but says that the rules and regulations surrounding the law are confusing for all actors involved.

Historically, Chinese companies have faced trust and branding issues when moving into the United States market, and the reverse is also true for U.S. companies seeking to expand overseas. Companies have also struggled to learn the rules, regulations and operational procedures in place in other countries.

++++++++++++

Iran and Huawei top agenda as Pompeo meets Merkel for 45 minutes in Berlin

https://uk.finance.yahoo.com/news/pompeo-merkel-iran-huawei-agenda-110409835.html

++++++++++++

Merkel to Ratchet up Huawei Restrictions in Concession to Hawks

https://www.bloomberg.com/news/articles/2019-11-13/merkel-to-ratchet-up-huawei-restrictions-in-concession-to-hawks

+++++++++++++
more on data privacy in this IMS blog:
https://blog.stcloudstate.edu/ims?s=data+privacy

digital transformation online professional education

<h3 “>Sharpen the digital transformation 
strategy for your business.

Enroll today in Digital Transformation: From AI and IoT to Cloud, Blockchain, and Cybersecurity

https://professionalonline1.mit.edu/digital-transformation/index.php

PROGRAM FEES $2,300 STARTS ON November 28, 20182 months, online
6-8 hours per week

A Digital Revolution Is Underway.

In a rapidly expanding digital marketplace, legacy companies without a clear digital transformation strategy are being left behind. How can we stay on top of rapid—and sometimes radical—change? How can we position our organizations to take advantage of new technologies? How can we track and combat the security threats facing all of us as we are swept forward into the future?

Who is this Program for?

  • Professionals in traditional companies poised to implement strategic change, as well as entrepreneurs seeking to harness the opportunities afforded by new technologies, will learn the fundamentals of digital transformation and secure the necessary tools to navigate their enterprise to a digital platform.
  • Participants come from a wide range of industries and include C-suite executives, business consultants, corporate attorneys, risk officers, marketing, R&D, and innovation enablers.

<h3 “>Your Learning Journey

This online program takes you through the fundamentals of digital technologies transforming our world today. Led by MIT faculty at the forefront of data science, participants will learn the history and application of transformative technologies such as blockchain, artificial intelligence, cloud computing, IoT, and cybersecurity as well as the implications of employing—or ignoring—digitalization.

Brochure_MIT_PE_DigitalTransformation_17_Oct_18_V20-1w4qpjv

<

ELI 2018 Key Issues Teaching Learning

Key Issues in Teaching and Learning

https://www.educause.edu/eli/initiatives/key-issues-in-teaching-and-learning

A roster of results since 2011 is here.

ELI 2018 key issues

1. Academic Transformation

2. Accessibility and UDL

3. Faculty Development

4. Privacy and Security

5. Digital and Information Literacies

https://cdn.nmc.org/media/2017-nmc-strategic-brief-digital-literacy-in-higher-education-II.pdf
Three Models of Digital Literacy: Universal, Creative, Literacy Across Disciplines

United States digital literacy frameworks tend to focus on educational policy details and personal empowerment, the latter encouraging learners to become more effective students, better creators, smarter information consumers, and more influential members of their community.

National policies are vitally important in European digital literacy work, unsurprising for a continent well populated with nation-states and struggling to redefine itself, while still trying to grow economies in the wake of the 2008 financial crisis and subsequent financial pressures

African digital literacy is more business-oriented.

Middle Eastern nations offer yet another variation, with a strong focus on media literacy. As with other regions, this can be a response to countries with strong state influence or control over local media. It can also represent a drive to produce more locally-sourced content, as opposed to consuming material from abroad, which may elicit criticism of neocolonialism or religious challenges.

p. 14 Digital literacy for Humanities: What does it mean to be digitally literate in history, literature, or philosophy? Creativity in these disciplines often involves textuality, given the large role writing plays in them, as, for example, in the Folger Shakespeare Library’s instructor’s guide. In the digital realm, this can include web-based writing through social media, along with the creation of multimedia projects through posters, presentations, and video. Information literacy remains a key part of digital literacy in the humanities. The digital humanities movement has not seen much connection with digital literacy, unfortunately, but their alignment seems likely, given the turn toward using digital technologies to explore humanities questions. That development could then foster a spread of other technologies and approaches to the rest of the humanities, including mapping, data visualization, text mining, web-based digital archives, and “distant reading” (working with very large bodies of texts). The digital humanities’ emphasis on making projects may also increase

Digital Literacy for Business: Digital literacy in this world is focused on manipulation of data, from spreadsheets to more advanced modeling software, leading up to degrees in management information systems. Management classes unsurprisingly focus on how to organize people working on and with digital tools.

Digital Literacy for Computer Science: Naturally, coding appears as a central competency within this discipline. Other aspects of the digital world feature prominently, including hardware and network architecture. Some courses housed within the computer science discipline offer a deeper examination of the impact of computing on society and politics, along with how to use digital tools. Media production plays a minor role here, beyond publications (posters, videos), as many institutions assign multimedia to other departments. Looking forward to a future when automation has become both more widespread and powerful, developing artificial intelligence projects will potentially play a role in computer science literacy.

6. Integrated Planning and Advising Systems for Student Success (iPASS)

7. Instructional Design

8. Online and Blended Learning

In traditional instruction, students’ first contact with new ideas happens in class, usually through direct instruction from the professor; after exposure to the basics, students are turned out of the classroom to tackle the most difficult tasks in learning — those that involve application, analysis, synthesis, and creativity — in their individual spaces. Flipped learning reverses this, by moving first contact with new concepts to the individual space and using the newly-expanded time in class for students to pursue difficult, higher-level tasks together, with the instructor as a guide.

Let’s take a look at some of the myths about flipped learning and try to find the facts.

Myth: Flipped learning is predicated on recording videos for students to watch before class.

Fact: Flipped learning does not require video. Although many real-life implementations of flipped learning use video, there’s nothing that says video must be used. In fact, one of the earliest instances of flipped learning — Eric Mazur’s peer instruction concept, used in Harvard physics classes — uses no video but rather an online text outfitted with social annotation software. And one of the most successful public instances of flipped learning, an edX course on numerical methods designed by Lorena Barba of George Washington University, uses precisely one video. Video is simply not necessary for flipped learning, and many alternatives to video can lead to effective flipped learning environments [http://rtalbert.org/flipped-learning-without-video/].

Myth: Flipped learning replaces face-to-face teaching.

Fact: Flipped learning optimizes face-to-face teaching. Flipped learning may (but does not always) replace lectures in class, but this is not to say that it replaces teaching. Teaching and “telling” are not the same thing.

Myth: Flipped learning has no evidence to back up its effectiveness.

Fact: Flipped learning research is growing at an exponential pace and has been since at least 2014. That research — 131 peer-reviewed articles in the first half of 2017 alone — includes results from primary, secondary, and postsecondary education in nearly every discipline, most showing significant improvements in student learning, motivation, and critical thinking skills.

Myth: Flipped learning is a fad.

Fact: Flipped learning has been with us in the form defined here for nearly 20 years.

Myth: People have been doing flipped learning for centuries.

Fact: Flipped learning is not just a rebranding of old techniques. The basic concept of students doing individually active work to encounter new ideas that are then built upon in class is almost as old as the university itself. So flipped learning is, in a real sense, a modern means of returning higher education to its roots. Even so, flipped learning is different from these time-honored techniques.

Myth: Students and professors prefer lecture over flipped learning.

Fact: Students and professors embrace flipped learning once they understand the benefits. It’s true that professors often enjoy their lectures, and students often enjoy being lectured to. But the question is not who “enjoys” what, but rather what helps students learn the best.They know what the research says about the effectiveness of active learning

Assertion: Flipped learning provides a platform for implementing active learning in a way that works powerfully for students.

9. Evaluating Technology-based Instructional Innovations

Transitioning to an ROI lens requires three fundamental shifts
What is the total cost of my innovation, including both new spending and the use of existing resources?

What’s the unit I should measure that connects cost with a change in performance?

How might the expected change in student performance also support a more sustainable financial model?

The Exposure Approach: we don’t provide a way for participants to determine if they learned anything new or now have the confidence or competence to apply what they learned.

The Exemplar Approach: from ‘show and tell’ for adults to show, tell, do and learn.

The Tutorial Approach: Getting a group that can meet at the same time and place can be challenging. That is why many faculty report a preference for self-paced professional development.build in simple self-assessment checks. We can add prompts that invite people to engage in some sort of follow up activity with a colleague. We can also add an elective option for faculty in a tutorial to actually create or do something with what they learned and then submit it for direct or narrative feedback.

The Course Approach: a non-credit format, these have the benefits of a more structured and lengthy learning experience, even if they are just three to five-week short courses that meet online or in-person once every week or two.involve badges, portfolios, peer assessment, self-assessment, or one-on-one feedback from a facilitator

The Academy Approach: like the course approach, is one that tends to be a deeper and more extended experience. People might gather in a cohort over a year or longer.Assessment through coaching and mentoring, the use of portfolios, peer feedback and much more can be easily incorporated to add a rich assessment element to such longer-term professional development programs.

The Mentoring Approach: The mentors often don’t set specific learning goals with the mentee. Instead, it is often a set of structured meetings, but also someone to whom mentees can turn with questions and tips along the way.

The Coaching Approach: A mentor tends to be a broader type of relationship with a person.A coaching relationship tends to be more focused upon specific goals, tasks or outcomes.

The Peer Approach:This can be done on a 1:1 basis or in small groups, where those who are teaching the same courses are able to compare notes on curricula and teaching models. They might give each other feedback on how to teach certain concepts, how to write syllabi, how to handle certain teaching and learning challenges, and much more. Faculty might sit in on each other’s courses, observe, and give feedback afterward.

The Self-Directed Approach:a self-assessment strategy such as setting goals and creating simple checklists and rubrics to monitor our progress. Or, we invite feedback from colleagues, often in a narrative and/or informal format. We might also create a portfolio of our work, or engage in some sort of learning journal that documents our thoughts, experiments, experiences, and learning along the way.

The Buffet Approach:

10. Open Education

Figure 1. A Model for Networked Education (Credit: Image by Catherine Cronin, building on
Interpretations of
Balancing Privacy and Openness (Credit: Image by Catherine Cronin. CC BY-SA)

11. Learning Analytics

12. Adaptive Teaching and Learning

13. Working with Emerging Technology

In 2014, administrators at Central Piedmont Community College (CPCC) in Charlotte, North Carolina, began talks with members of the North Carolina State Board of Community Colleges and North Carolina Community College System (NCCCS) leadership about starting a CBE program.

Building on an existing project at CPCC for identifying the elements of a digital learning environment (DLE), which was itself influenced by the EDUCAUSE publication The Next Generation Digital Learning Environment: A Report on Research,1 the committee reached consensus on a DLE concept and a shared lexicon: the “Digital Learning Environment Operational Definitions,

Figure 1. NC-CBE Digital Learning Environment

AI and ethics

Live Facebook discussion at SCSU VizLab on ethics and technology:

Heard on Marketplace this morning (Oct. 22, 2018): ethics of artificial intelligence with John Havens of the Institute of Electrical and Electronics Engineers, which has developed a new ethics certification process for AI: https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ec_bios.pdf

Ethics and AI

***** The student club, the Philosophical Society, has now been recognized by SCSU as a student organization ***

https://ed.ted.com/lessons/the-ethical-dilemma-of-self-driving-cars-patrick-lin

Could it be the case that a random decision is still better then predetermined one designed to minimize harm?

similar ethical considerations are raised also:

in this sitcom

https://www.theatlantic.com/sponsored/hpe-2018/the-ethics-of-ai/1865/ (full movie)

This TED talk:

https://blog.stcloudstate.edu/ims/2017/09/19/social-media-algorithms/

https://blog.stcloudstate.edu/ims/2018/10/02/social-media-monopoly/

 

 

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain,

+++++++++++++++++++
IoT (Internet of Things), Industry 4.0, Big Data, BlockChain, Privacy, Security, Surveilance

https://blog.stcloudstate.edu/ims?s=internet+of+things

peer-reviewed literature;

Keyword search: ethic* + Internet of Things = 31

Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical Design in the Internet of Things. Science & Engineering Ethics24(3), 905–925. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-016-9754-5

Berman, F., & Cerf, V. G. (2017). Social and Ethical Behavior in the Internet of Things. Communications of the ACM60(2), 6–7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3036698

Murdock, G. (2018). Media Materialties: For A Moral Economy of Machines. Journal of Communication68(2), 359–368. https://doi-org.libproxy.stcloudstate.edu/10.1093/joc/jqx023

Carrier, J. G. (2018). Moral economy: What’s in a name. Anthropological Theory18(1), 18–35. https://doi-org.libproxy.stcloudstate.edu/10.1177/1463499617735259

Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology. Canadian Public Administration57(2), 295–317. https://doi-org.libproxy.stcloudstate.edu/10.1111/capa.12069

Koucheryavy, Y., Kirichek, R., Glushakov, R., & Pirmagomedov, R. (2017). Quo vadis, humanity? Ethics on the last mile toward cybernetic organism. Russian Journal of Communication9(3), 287–293. https://doi-org.libproxy.stcloudstate.edu/10.1080/19409419.2017.1376561

Keyword search: ethic+ + autonomous vehicles = 46

Cerf, V. G. (2017). A Brittle and Fragile Future. Communications of the ACM60(7), 7. https://doi-org.libproxy.stcloudstate.edu/10.1145/3102112

Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health107(4), 632–537. https://doi-org.libproxy.stcloudstate.edu/10.2105/AJPH.2016.303628

HARRIS, J. (2018). Who Owns My Autonomous Vehicle? Ethics and Responsibility in Artificial and Human Intelligence. Cambridge Quarterly of Healthcare Ethics27(4), 599–609. https://doi-org.libproxy.stcloudstate.edu/10.1017/S0963180118000038

Keeling, G. (2018). Legal Necessity, Pareto Efficiency & Justified Killing in Autonomous Vehicle Collisions. Ethical Theory & Moral Practice21(2), 413–427. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10677-018-9887-5

Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for Crashes of Autonomous Vehicles: An Ethical Analysis. Science & Engineering Ethics21(3), 619–630. https://doi-org.libproxy.stcloudstate.edu/10.1007/s11948-014-9565-5

Getha-Taylor, H. (2017). The Problem with Automated Ethics. Public Integrity19(4), 299–300. https://doi-org.libproxy.stcloudstate.edu/10.1080/10999922.2016.1250575

Keyword search: ethic* + artificial intelligence = 349

Etzioni, A., & Etzioni, O. (2017). Incorporating Ethics into Artificial Intelligence. Journal of Ethics21(4), 403–418. https://doi-org.libproxy.stcloudstate.edu/10.1007/s10892-017-9252-2

Köse, U. (2018). Are We Safe Enough in the Future of Artificial Intelligence? A Discussion on Machine Ethics and Artificial Intelligence Safety. BRAIN: Broad Research in Artificial Intelligence & Neuroscience9(2), 184–197. Retrieved from http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d129943455%26site%3dehost-live%26scope%3dsite

++++++++++++++++
http://www.cts.umn.edu/events/conference/2018

2018 CTS Transportation Research Conference

Keynote presentations will explore the future of driving and the evolution and potential of automated vehicle technologies.

+++++++++++++++++++
https://blog.stcloudstate.edu/ims/2016/02/26/philosophy-and-technology/

+++++++++++++++++++
more on AI in this IMS blog
https://blog.stcloudstate.edu/ims/2018/09/07/limbic-thought-artificial-intelligence/

AI and autonomous cars as ALA discussion topic
https://blog.stcloudstate.edu/ims/2018/01/11/ai-autonomous-cars-libraries/

and privacy concerns
https://blog.stcloudstate.edu/ims/2018/09/14/ai-for-education/

the call of the German scientists on ethics and AI
https://blog.stcloudstate.edu/ims/2018/09/01/ethics-and-ai/

AI in the race for world dominance
https://blog.stcloudstate.edu/ims/2018/04/21/ai-china-education/

1 8 9 10 11 12 21