Searching for "security"

Wearable Tech

Sizing Up Wearable Tech and IoT in the Enterprise

https://fiberlinkcorp.webex.com/fiberlinkcorp/onstage/g.php?d=358842843&t=a

Kayla Bittner  358 842 843 Twitter:#smartoffice

Det Ansinn speaker

Android Wear (java)
Pebble (C)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature

limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance

opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)

GOod wearable Design: Recognizes immediacy, leverages context of the wearer

challenging to develop good experiences for these devices.

802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
Addon –
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.

Frank Schloendorn, Fiberlink, speaker

build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available

Do you currently own smartwatch

Do you currently own smartwatch

no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone

Best practices:
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)

new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.

bricksimple.com
MaaS360.com/trial

technology for early childhood students

Plan for today, Mon, Nov 17 class session:

Parent involvement in their children’s social emotional and academic development.

  1. Introduce myself, who I am, who do I work with. Why is it good to know IMS and consider working with IMS. How to contact us – 5 min
  2. Start with a video from the following IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/ :
    http://youtu.be/d5kW4pI_VQw – 2 min. What is the video about, how do students think it relates to their class (parent involvement in their children’s social emotional and academic development) – about 5 min
  3. Group work assignment – what is digital literacy and why is it important to people of all ages:
    Students work in groups and outline a definition of digital literacy and a list of 5 reasons about the importance – 5 min
    Study and discuss the following infographic (5 min)
    http://blog.stcloudstate.edu/ims/2014/10/16/early-learners-tech-use/
    For and against children spending time with technology. Gaming, social media, and computer use in general as addiction. “Disconnect/Unplugged” (Sherry Turkle) versus contemplative computing and similar meditative and contemplative practices: http://blog.stcloudstate.edu/ims/2013/11/05/getting-unplugged/
  4. Discussion on how does digital literacy vary between age groups; how do people from different ages communicate. How do they work together and help each other when learning about digital literacy. Who is the best source for students to learn about digital literacy (hint – IMS ;)) – 10 min
    Suggested source for more information: The SlideShare presentation on the IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/: http://www.slideshare.net/dajbelshaw/etmooc-t3-s1-digital-literacies-with-dr-doug-belshaw
  5. Discussion on digital identity, digital citizenship, privacy and security. – 10 min
    http://blog.stcloudstate.edu/ims/2013/10/03/digital-identity-and-digital-citizenship/
  6. Questions and suggestions regarding

technology for social workers

Plan for Sylvester Lamin’s course:

  1. introduce myself – 5 min
  2. discuss with students how they see the impact of technology on their work – 5 min
  3. discuss with students the implications of technology on their work – 15
    http://www.socialworklicensure.org/articles/social-media-social-work.html
    http://www.socialworkblog.org/practice-and-professional-development/2011/07/social-work-social-media-where-are-the-ethical-boundaries/
    http://www.theguardian.com/social-care-network/2013/jul/23/social-workers-social-media-challenge-perception
    email as unreliable medium
    privacy
    security
  4. discuss with students the possibilities, which SCSU resources and Internet resources can provide for collaboration, creativity and streamlining the work of the social worker – 15
    File space at SCSU versus other free resources
    keeping data in the cloud
    collaborating on documents and policies
    sharing data with clients
  5. Other issues, ideas – 10

Two Google Apps for iPAD

Google Authenticator

2-Step Verification for your Google Account to provide an additional layer of security when signing in. With 2-Step Verification, signing into your account will require both your password and a verification code you can generate with this app. Once configured, you can get verification codes without the need of a network or cellular connection.

Google Admin

take care of the most common tasks from anywhere you are. Add users, reset passwords, manage groups, contact support, and view domain setting changes.

Open Source: why are we not allowed to use it?

Why Aren’t More Schools Using Free, Open Tools?

http://blogs.kqed.org/mindshift/2014/06/why-arent-more-schools-using-free-open-education-resources/

Teachers were complaining that they wanted a simple way to share files and links within the classroom, like a private Twitter app. Rather than having IT professionals respond to the request, Reisinger’s students programmed a solution that they call Paper Plane. ”Those kids have code up on GitHub [a site for open-source code] right now that they’re sharing out,” Reisinger said. Students also designed the help ticketing software that their peers use to request IT support.

oh, my, what a blasphemy; what do we do about SECURITY?…

A lot of people are scared away from open-source software or operating systems like Linux because of the belief that they are harder for teachers and students to use, and are more challenging to support.

a bigger reason people don’t go open-source is that the devices and software aren’t as shiny and exciting as iPads or Chromebooks.

recent concerns regarding third party providers and privacy are less of an issue

 

10 technology hallmarks for every campus

10 technology hallmarks for every campus

http://www.ecampusnews.com/technologies/technology-hallmarks-campus-099

1. High-speed wireless broadband.

According to the Center for Digital Education’s recent “2013 Yearbook: Technology Innovation in Education,” over 80 percent of education institutions surveyed said that wireless broadband was their “top priority for IT investment.”

2. 24/7 IT support.

We have 24/7 support for emergencies and much of our staff, just like at a hospital, are on call. That’s not a perk for the campus, it’s a necessity.

3. The cloud.

The cloud can also: acquire and implement the latest software and application updates; streamline enrollment and admissions processes; and turn to subscriptions that are scalable and provide options, says Edudemic.

4. Digital textbooks.

Planning for digital textbooks means not only boosting mobile device capabilities on campus, but helping faculty learn to implement digital resources into their course.

5. 21st Century PD for faculty and admin.

From offering a MOOC on classroom management online solutions, to hosting a PD session on Twitter, campus admin should offer multiple options for PD delivery, just like how faculty should offer students multiple options for learning–there’s no better way to teach something than to model it first!

6. MOOCs.

[Read: “3 pros and 3 cons of MOOCs.”]

7. Online course management system.

From sending in-class emails to checking grades, course management systems, like Blackboard, offer faculty and students a fairly intuitive way to manage courses more efficiently.

8. Big Data…

Future-proofing universities are beginning to deploy storage solutions to help manage the unstructured data in physical, virtual and cloud environments. More modern storage solutions are also open source for a high learning curve but low cost.

9…security.

precautions can range from scanning existing databases on the university’s servers to determine where personal information is located and then, depending on the database, destroy the personal information or add more digital security; as well as put cybersecurity systems through a series of penetration tests to highlight security shortcomings.

[Read: “University data breach prompts ‘top-to-bottom’ IT review.”]

10. Social media done well.

of the major ways campuses use social media well is by serving up both “cake” and “broccoli,” or balancing the content that is important and good for the school (broccoli) and the content that is fun and delicious (cake). “If you share enough cake, your audience will consume the occasional broccoli,” she advises.

What is plagiarism?

Martine Herzog-Evans

Follow Martine

What is plagiarism?

Law Professor at the University of Reims, FranceTop Contributor

A colleague of mine is asking us to organise a disciplinary commission for a student who, during a test (home test) quoted an author at great length. I disagree with his judgement. This in my opinion is youth caution (I’m not too sure about what I think so I protect myself with very long quotes). She did refer to the author in question and did not steal his ideas as her own. The risk for the student (who happens to be a very good one) is that she may lose the right to pass any national exam of any sort for x years. I intend to defend her at the disciplinary hearing as I happen to have supervised her for a research last year and am supervising her this year for another and know what she’s made of. The question to you all is : what constitutes plagiarism in your opinion and practice?

 

179 comments

  • Shaun JamisonShaun

    Shaun Jamison

    Law Professor & Librarian

    @ Gregg, another clue is when they don’t bother to take out the hyperlinks from the original source they didn’t credit.

  • Gregg

    Gregg Etter

    Associate Professor at University of Central Missouri

    @Shawn. the sad part is if they would have credited the source it would have been research, not plagiarism!

  • John HainsJohn

    John Hains

    Associate Professor at Clemson University

    Gregg, I get the ‘lazy’ student part. How common is it for courses to be so redundant that a paper like this could be ‘re-cycled’?

  • Gregg

    Gregg Etter

    Associate Professor at University of Central Missouri

    @ John. That’s the point. The class I was teaching was policing in a democratic society. The paper was from a juvenile justice class that was taught by another professor. The content of the two courses does not match. It becomes real obvious when you get a re-cycled criminal law paper in a hate crimes or organized crime class. Some things will transfer and all knowledge is collective. However, in organized crime if you wanted to talk about criminal law, you might talk about the application of R.I.C.O., not Marbury v Madison or Estelle v. Gamble. A person wanting to apply the principles of juvenile justice might talk about the extended rights of a juvenile under Mirranda v. Arizona, not about juvenile holding facilities or juvenile courts.

  • Dr. Murphy NmeziDr. Murphy

    Dr. Murphy Nmezi

    Professor/Academic Mentor, Pathology/Pharmacology/Biostatistics

    Apropos Howard’s response to Mihail’s question:

    I once conducted an initial interview, in virtual space, to fill one of two biostatistics faculty positions that we had. And, it is important to note that success at this interview requires that the candidate be able to answer key questions in biostatistics analysis.

    With each question, (believe me, these are basic questions that anyone with an advanced degree in a related field should be able to answer), I could distinctly hear this individual “banging away” at the keyboard in search of the answer. Obviously, this candidate wasn’t prepared for the interview, nor did s/he possess the foundational knowledge that a degree holder in a field of study must have to succeed. Was it plagiarism or not?

    Perhaps, this candidate plagiarized his/her way through college and graduate school. Who knows? But, I can confidently bet my retirement that some of these jokers are slipping, undetected, through our educational system. I will also bet that this is happening, even to a greater extent, worldwide.

    Mihails Ņ. likes this

  • Harold KatcherHarold

    Harold Katcher

    Professor at University of Maryland

    John, I for one teach four classes, human biology, human health and disease (a watered-down patho-physiology course), the biology of aging and neuroscience. Someone could submit a paper say on Alzheimer’s disease, Parkinson’s disease, any of the dementias to any of these courses, a paper on atherosclerosis to three of them etc. But what is the point of writing the papers? To present their fellow students with new information (assuming they read it) or to give the student an opportunity to learn something new and demonstrate their comprehension? For me it’s mostly the latter, and allowing recycled papers doesn’t accomplish that.
    And Dr. Nmezi I totally agree with you – for everyone we catch, how many slip through undetected?
    Most countries in the world have constitutions that when examined closely, provide all the safeguards needed by a society – but in many places those laws are not upheld (for national security’s sake – a US excuse). So all’s I’m saying is uphold those rules that are in place – softening them may help those who otherwise might not be able to complete or compete successfully in a course or program, but you a hurting the society that expects that graduates of a program will be competent in what they do.

    Dr. Murphy N. likes this

  • John HainsJohn

    John Hains

    Associate Professor at Clemson University

    Harold, I guess I was thinking in terms of courses taught by different teachers. However, four of the five lecture courses I teach are strongly related and with that in mind, I make sure that I am in control of both the content and the assessment. So I make sure that if there is some overlap in content, I do not make an assignment which allows ‘recycling’. If someone has taken a similar course at another institution and ‘recycles’ a report, I have no way to detect that. So as far as I can tell I have never had a problem with this. But my assignments are structured so that they simply can’t support ‘recycling’.

Center for Democracy & Technology

Big Data and Privacy

April 17, 2014

Big data has been generating big hype for a while. In January, the White House jumped into the fray, launching a big data and privacy review. CDT participated in all three public workshops convened in connection with the review and submitted written comments.

CDT’s Big Data and Privacy Comments

In our comments, we focused on three main areas: applying the Fair Information Practice Principles (FIPPs) to both private sector and government big data programs; exploring technical measures such as de-identification to safeguard privacy; and reforming existing privacy laws, most notably the Electronic Communications Privacy Act, to account for rapid changes in the ways that digital data is collected, stored, and used.

CDT stressed that, as entities collect more data to offer innovative products and more efficient services, they must still be guided by purpose specification, consent, security, and the other elements of the FIPPs framework.

Government and Big Data

“Strong consensus is forming that the bulk collection of phone records should end.”

-Harley Geiger

The Administration says that it will end its bulk collection of telephony metadata, although the details of what will replace it remain unsettled. Meanwhile, CDT is pointing out that the laws the government has used to justify bulk collection are not limited just to phone records. Instead, they could be used to justify collection of location data, Internet browsing history, financial records, and more. CDT has been vocal in advocating the end of all forms of bulk collection, and we endorse the USA FREEDOM Act as the best legislation to do just that.

A report from the White House review is due before the end of April, but it is expected to present more questions than answers. In this complex and unsettled space, CDT will continue to work with companies and other stakeholders to develop workable approaches that will protect privacy while pursuing the benefits promised by advanced data analytics.


Check Out CDT’s New Website

CDT has launched a totally revamped website: http://www.cdt.org. It has a fresh new look and tools that should make our content more easily accessible. Thanks to our partners at iStrategy Labs for their creative and technical efforts on the new site.

1 14 15 16 17