Archive of ‘digital identity’ category

eportofolios conference

Meaning-Making with Eportfolios

Southeast Regional Conference November 6-7, 2017 University of Virginia 

Conference Description and CFP
The Association for Authentic, Experiential, and Evidence-Based Learning (AAEEBL) and the University of Virginia (UVa) are pleased to host the 2017 Southeast Regional AAEEBL Conference.  AAEEBL is an international professional association dedicated to supporting educational leaders committed to education transformation relevant to 21st century learnings and best known for promotion of ePortfolios as a high impact practice in higher education.

Theme: Meaning-Making with Eportfolios
ePortfolios provide an authentic context for learning and assessment as well as fertile ground for the exploration of the learning process itself.  In this conference, we propose to explore the role of “meaning making” in the various facets of the ePortfolio building process and the way it informs the experiences of our students and our understanding of learning.

http://www.aaeebl.org/members/EmailOptPreferences.aspx

++++++++++++++++++++++++++++++
more on eportfolio in this IMS blog
https://blog.stcloudstate.edu/ims?s=portfolio

Minecraft empathy skills

Report: Minecraft Builds Problem-Solving and Empathy Skills in Students

By Sri Ravipati  08/14/17

https://thejournal.com/articles/2017/08/14/minecraft-builds-problem-solving-and-empathy-in-students.aspx

K–12 teachers who use Minecraft: Education Edition during class say their students are experiencing a number of social-emotional learning (SEL) benefits.

How Minecraft Supports Social and Emotional Learning in K–12 Education

Getting Smart site.

+++++++++++++++++++++
more on empathy in this IMS blog
http://blog.stcloudstate.edu/ims?s=empathy

proctoring online learning

Nobody’s Watching: Proctoring in Online Learning

There is no single best way to handle proctoring for digital courses, as this community college system pilot discovered.

By Dian Schaffhauser  07/26/17

https://campustechnology.com/articles/2017/07/26/nobodys-watching-proctoring-in-online-learning.aspx

The Higher Education Opportunity Act of 2008 lays out the rule: An institution offering “distance education” needs to have processes in place for verifying student identity to ensure that the student who registers for a class is the “same student who participates in and completes the program and receives the academic credit.”

OLC (Online Learning Consortium) Innovate conference and shared the solution: a combination of the use of an automated proctoring application and the creation of a network of colleges across the state that would provide no-cost proctoring on their campuses for students attending any of the member schools.

put together an online proctoring working group with “lots of faculty representation,” said Hadsell, which “paid off in the long run.” Other participants included people from testing centers and learning centers. Proctorio, the proctoring solution eventually recommended by the working group, is a web service that can be deployed through Canvas and installed by students with one click

++++++++++++++
more on proctoring in this IMS blog
http://blog.stcloudstate.edu/ims?s=proctor

fake emails

Why everyone still falls for fake emails

By Richard Matthews  Jul 31, 2017

https://gcn.com/articles/2017/07/31/why-fake-emails-still-work.aspx

Phishing is likely to get only more sophisticated.

Based on my experience in Tallinn, we will see companies become more transparent in how they deal with cyber attacks. After a massive cyber attack in 2007, for example, the Estonian government reacted in the right way.

free anti-phishing software

+++++++++++++++++++++
more on phishing in this IMS blog
http://blog.stcloudstate.edu/ims?s=phishing+

anonymous browsing data

‘Anonymous’ browsing data can be easily exposed, researchers reveal

https://www.theguardian.com/technology/2017/aug/01/data-browsing-habits-brokers

A similar strategy was used in 2008, Dewes said, to deanonymise a set of ratings published by Netflix to help computer scientists improve its recommendation algorithm: by comparing “anonymous” ratings of films with public profiles on IMDB, researchers were able to unmask Netflix users – including one woman, a closeted lesbian, who went on to sue Netflix for the privacy violation.

++++++++++++++++
A hacker explains the best way to browse the internet anonymously.
https://www.facebook.com/techinsider/videos/824655787732779/ 

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

RFID blocking

There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID

card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.

REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.

Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.

Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.

if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
+++++++++++++++
more on cybersecurity in this IMS blog

girl scouts, badges for cybersecurity

Girl Scouts to Earn Badges in Cybersecurity

The education program is being developed in a partnership between the Girl Scouts and Palo Alto Networks. Jun 23, 2017

https://securitytoday.com/articles/2017/06/23/girl-scouts-to-earn-badges-in-cybersecurity.aspx

The education program, which aims to reach as many as 1.8 million Girl Scouts in kindergarten through sixth grade, is being developed in a partnership between the Girl Scouts and Palo Alto Networks, a security company, the organization said in a press release.

++++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=cybersecurity

social media in your course

8 Things You Should Know before Using Social Media in Your Course

Jennifer Rafferty, Director, OLC Institute for Professional Development, 

https://onlinelearningconsortium.org/8-things-you-should-know-before-using-social-media-in-your-course

a variety of available platforms, and many creative ways that faculty are integrating social media into their teaching practice.

  • how the digital medium will foster engagement and enhance learning outcomes.
  • aware of the implications of having students post content on third-party services (those not provided or hosted by your institution).
  • Social media usage in the classroom intersects with both FERPA and Copyright Compliance, so keep this checklist handy as you develop your class activity.

Include details about the activity in your syllabus & course description.

Use contracts.
Link to institutional policies.
Use aliases for social media accounts.
Teach your students to use digital media responsibly.
Know where to provide assignment feedback.
Don’t use personal accounts for university business.
Understand the Terms of Service.

Sources

Classification of Social Media Platforms, DelValle Institute Knowledge Base, Office of Public Health Preparedness. Retrieved on March 24, 2017 from  https://delvalle.bphc.org/mod/wiki/view.php?pageid=65

Copyright Clearance Center, Inc. 2005. Using Digital Content. Retrieved on March 24, 2017 from http://www.copyright.com/Services/copyrightoncampus/basics/teach.html

Educause, Is Your Use of Social Media FERPA Compliant? Retrieved on March 24, 2017 from http://www.educause.edu/ero/article/your-use-social-media-ferpa-compliant

Kind, T., Genrich G. and Chretien, K.(2010)  Social Media Policies at US Medical Schools. Medical Education Online.  Retrieved on March 24, 2017 from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2941429/

Meyer, L., (2015). Six Alternative Social Media Tools for Teaching and Learning, Campus Technology. Retrieved on March 24, 2017 from https://campustechnology.com/Articles/2015/01/07/6-Alternative-Social-Media-Tools-for-Teaching-and-Learning.aspx?Page=4

Orlando, J., 2011. FERPA and Social Media, Faculty Focus. Retrieved on March 24, 2017 from http://www.facultyfocus.com/articles/teaching-with-technology-articles/ferpa-and-social-media/

+++++++++++++++++++++++++
more on social media for teaching practices in this IMS blog

http://blog.stcloudstate.edu/ims?s=social+media+teaching

NMC Horizon Report 2017 Library

NMC Horizon Report > 2017 Library Edition

http://www.nmc.org/publication/nmc-horizon-report-2017-library-edition/

PDF file 2017-nmc-horizon-report-library-EN-20ml00b

p. 26 Improving Digital Literacy

As social networking platforms proliferate and more interactions take place digitally, there are more opportunities for propagation of misinformation, copyright infringement, and privacy breaches.
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-3/
http://blog.stcloudstate.edu/ims/2017/03/28/fake-news-resources/

p. 34 Embracing the need for radical change

40% of faculty report that their students ” rarely” interact with campus librarians.

Empathy as the Leader’s Path to Change | Leading From the Library, By on October 27, 2016, http://lj.libraryjournal.com/2016/10/opinion/leading-from-the-library/empathy-as-the-leaders-path-to-change-leading-from-the-library/

Empathy as a critical quality for leaders was popularized in Daniel Goleman’s work about emotional intelligence. It is also a core component of Karol Wasylyshyn’s formula for achieving remarkable leadership. Elizabeth Borges, a women’s leadership program organizer and leadership consultant, recommends a particular practice, cognitive empathy.

Leadership in disruptive times, , First Published September 27, 2016, http://journals.sagepub.com/doi/full/10.1177/0340035216658911

What is library leadership?  a library leader is defined as the individual who articulates a vision for the organization/task and is able to inspire support and action to achieve the vision. A manager, on the other hand, is the individual tasked with organizing and carrying out the day-to-day operational activities to achieve the vision.Work places are organized in hierarchical and in team structures. Managers are appointed to administer business units or organizations whereas leaders may emerge from all levels of the hierarchical structures. Within a volatile climate the need for strong leadership is essential.  

Leaders are developed and educated within the working environment where they act and co-work with their partners and colleagues. Effective leadership complies with the mission and goals of the organization. Several assets distinguish qualitative leadership:

Mentoring. Motivation. Personal development and skills. Inspiration and collaboration. Engagement. Success and failure. Risk taking. Attributes of leaders.

Leaders require having creative minds in shaping strategies and solving problems. They are mentors for the staff, work hard and inspire them to do more with less and to start small and grow big. Staff need to be motivated to work at their optimum performance level. Leadership entails awareness of the responsibilities inherent to the roles of a leader. However, effective leadership requires the support of the upper management.

p. 36. Developments in Technology for Academic and Research Libraries

http://horizon.wiki.nmc.org/Horizon+Topics

  1. consumer technologies
  2. Digital strategies are not so much technologies as they are ways of using devices and software to enrich teaching, learning, research and information management, whether inside or outside the library. Effective Digital strategies can be used in both information and formal learning; what makes them interesting is that they transcended conventional ideas to create something that feels new, meaningful, and 21st century.
  3. enabling technologies
    this group of technologies is where substantive technological innovation begins to be visible.
  4. Internet technologies.
  5. learning technologies
  6. social media technologies. could have been subsumed under the consumer technology category, but they have become so ever-present and so widely used in every part of society that they have been elevated to their own category. As well-established as social media is, it continues to evolve at a rapid pace, with new ideas, tools, and developments coming online constantly.
  7. Visualization technologies.  from simple infographics to complex forms of visual data analysis. What they have in common is that they tap the brain’s inherent ability to rapidly process visual information, identify patterns, and sense order in complex situations. These technologies are a growing cluster of tools and processes for mining large data sets, exploring dynamic processes, and generally making the complex simple.

new horizon report 2017 technologies

 

 

p. 38 Big Data
Big data has significant implications for academic libraries in their roles as facilitators and supporters of the research process. big data use in the form of digital humanities research. Libraries are increasingly seeking to recruit for positions such as research data librarians, data curation specialists, or data visualization specialists

p. 40  Digital Scholarship Technologies

digital humanities scholars are leveraging new tools to aid in their work. ubiquity of new forms of communication including social media, text analysis software such as Umigon is helping researchers gauge public sentiment. The tool aggregates and classifies tweets as negative, positive, or neutral.

p. 42 Library Services Platforms

Diversity of format and materials, in turn, required new approaches to content collection and curation that were unavailable in the incumbent integrated library systems (ILS), which are primarily designed for print materials. LSP is different from ILS in numerous ways. Conceptually, LSPs are modeled on the idea of software as a service (SaaS),which entails delivering software applications over the internet.

p. 44 Online Identity.
incorporated  the  management of digital footprints into their programming and resources

simplify the idea of digital footprint as“data about the data” that people are searching or using online. As resident champions for advancing digital literacy,304 academic and research libraries are well-positioned to guide the process of understanding and crafting online identities.

Libraries are becoming integral players in helping students understand how to create and manage their online identities. website includes a social media skills portal that enables students to view their digital presence through the lens in which others see them, and then learn how they compare to their peers.

p. 46  Artificial Intelligence

https://www.semanticscholar.org/

p. 48 IoT

beacons are another iteration of the IoT that libraries have adopted; these small wireless devices transmit a small package of data continuously so that when devices come into proximity of the beacon’s transmission, functions are  triggered based on a related application.340 Aruba Bluetooth low-energy beacons to link digital resources to physical locations, guiding patrons to these resources through their custom navigation app and augmenting the user experience with location-based information, tutorials, and videos.

students and their computer science  professor  have  partnered  with   Bavaria’s State Library to develop a library app that triggers supplementary information about its art collection or other points of interest as users explore the space

+++++++++++++++++++++++++++
more on Horizon Reports in this IMS blog
http://blog.stcloudstate.edu/ims?s=horizon+report

1 2 3 8