Kodakcoin
+++++++++++++++
more on cryptocurrency in this IMS blog
https://blog.stcloudstate.edu/ims?s=cryptocurrency
Digital Literacy for St. Cloud State University
+++++++++++++++
more on cryptocurrency in this IMS blog
https://blog.stcloudstate.edu/ims?s=cryptocurrency
at RMG’s Annual Presidents’ Seminar:
The View from the Top on Friday February 9, 2018, 2:00 p.m. – 4:00 p.m.
ALA Midwinter Conference, Denver Colorado Convention Center Room 505
Who, When, Where?
Library Industry ?
The Seminar is open to everyone for dialogue on topical issues and concerns — registration is not required.
Attendees are invited to ask questions of Library Industry executives entrusted with delivering platforms and solutions for global library systems, services, and content to thousands of libraries serving millions of library users worldwide.
Participating companies & executives include:
Axiell (Ann Maelerts), BiblioLabs (Mitchell Davis),
Demco Software (Ravi Singh), Easy Mile, Index Data (Sebastian Hammer), Innovative Interfaces (James Tallman), Overdrive (Steve Potash), ProQuest (Rich Belanger), SirsiDynix (Bill Davison), The Library Corporation (Annette Murphy)
Rob McGee will moderate the session with assistance from Marshall Breeding and RMG’s Geoff Payne (Melbourne Office).
++++++++++++++
more on artificial intelligence in this ims blog
https://blog.stcloudstate.edu/ims?s=artificial+intelligence
Join us for a LIVE broadcast:
Live broadcast on Adobe Connect: |
Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.
Learning Outcomes:
if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.
+++++++++++++++++++++++++++++++++
Here some online games suitable for educators:
http://www.onlinecolleges.net/50-great-sites-for-serious-educational-games/
https://www.learn4good.com/games/for-high-school-students.htm
+++++++++++++++++++++++++++++++++
Let’s learn more about gaming and education with Kahoot (please click on Kahoot):
https://play.kahoot.it/#/k/78e64d54-3607-48fa-a0d3-42ff557e29b1
Let’s take a quiz together:
++++++++////////////////+++++++++++/////////////////+++++++++++++///////////////++++++++
+++ hands-on ++++++++++++++++ hands-on ++++++++++++++++ hands-on ++++++
Let’s learn more about gaming and education with Kahoot (please click on Kahoot):
https://play.kahoot.it/#/k/6c9e7368-f830-4a9c-8f5a-df1899e96665
++++++ RESOURCES ++++++++++ RESOURCES ++++++++++ RESOURCES +++++++
https://blog.stcloudstate.edu/ims?s=games
https://blog.stcloudstate.edu/ims?s=gamification
https://blog.stcloudstate.edu/ims?s=virtual+reality
https://blog.stcloudstate.edu/ims?s=video+360
+++++++++++++++++++++++++++++++++++++++++++++++++++++
For further information about Information Media:
IM Facebook Group | https://www.facebook.com/groups/326983293392/ |
IM Facebook Page | http://www.facebook.com/Informationmedia |
IM Blog | blog.stcloudstate.edu/im |
IM LinkedIn | https://www.linkedin.com/in/information-media-department-31360b28/ |
https://twitter.com/IM_SCSU | |
Youtube | https://www.youtube.com/channel/UCIluhVNJLJYEJ7983VmhF8w |
1. Link Security
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.
+++++++++++++++
more on cybersecurrity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
Support analytics initiatives with data integration and governance. The changing landscape of enterprise IT is characterized by an expanding set of services, systems, and sourcing strategies. Data governance, cross-enterprise partnerships, and data integration are key ingredients in supporting higher education’s growing need for reliable information.
In this set of EDUCAUSE Review case studies, see how Drake University, the University of Tennessee, and the University of Montana improved their analytics initiatives through data integrations and governance.
+++++++++
more on analytics in this IMS blog
https://blog.stcloudstate.edu/ims?s=analytics
++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy
Good news, Snap investors. By
https://www.recode.net/2017/12/16/16783570/snapchat-instagram-teenagers-rbc-survey-favorite-app
+++++++++++
more on Snapchat for education in this IMS blog
https://blog.stcloudstate.edu/ims?s=snapchat
++++++++++++++
more on ECAR studies in this IMS blog
https://blog.stcloudstate.edu/ims?s=ecar
Avi Selk The Washington, P. (2017, February 26). Terrorists are building drones and France is destroying them with eagles. Toronto Star (Canada).
in France, four eggs “were placed before birth on top of drones while still inside the eggshell and, after hatching, (were kept) there during their early feeding period,” Reuters reported in November.
The eagles were named after characters in The Three Musketeers, and by February proved capable of intercepting drones in lightning-fast horizontal chases.
“Soon they will be casting off from peaks in the nearby Pyrenees Mountains,” AFP reported.
The military has already ordered a second brood of eagles, according to AFP.
++++++++++++++++
more on drones in this IMS blog
https://blog.stcloudstate.edu/ims?s=drones
The dating app knows me better than I do, but these reams of intimate information are just the tip of the iceberg. What if my data is hacked – or sold?
Every European citizen is allowed to do so under EU data protection law, yet very few actually do, according to Tinder.
With the help of privacy activist Paul-Olivier Dehaye from personaldata.io and human rights lawyer Ravi Naik, I emailed Tinder requesting my personal data and got back way more than I bargained for.
Some 800 pages came back containing information such as my Facebook “likes”, links to where my Instagram photos would have been had I not previously deleted the associated account, my education, the age-rank of men I was interested in, how many Facebook friends I had, when and where every online conversation with every single one of my matches happened … the list goes on.
Reading through the 1,700 Tinder messages I’ve sent since 2013, I took a trip into my hopes, fears, sexual preferences and deepest secrets. Tinder knows me so well. It knows the real, inglorious version of me who copy-pasted the same joke to match 567, 568, and 569; who exchanged compulsively with 16 different people simultaneously one New Year’s Day, and then ghosted 16 of them.
“What you are describing is called secondary implicit disclosed information,” explains Alessandro Acquisti, professor of information technology at Carnegie Mellon University. “Tinder knows much more about you when studying your behaviour on the app. It knows how often you connect and at which times; the percentage of white men, black men, Asian men you have matched; which kinds of people are interested in you; which words you use the most; how much time people spend on your picture before swiping you, and so on. Personal data is the fuel of the economy. Consumers’ data is being traded and transacted for the purpose of advertising.”.
In May, an algorithm was used to scrape 40,000 profile images from the platform in order to build an AI to “genderise” faces. A few months earlier, 70,000 profiles from OkCupid (owned by Tinder’s parent company Match Group) were made public by a Danish researcher some commentators have labelled a “white supremacist”, who used the data to try to establish a link between intelligence and religious beliefs. The data is still out there.
+++++++++++
more on social media dating in this IMS blog
https://blog.stcloudstate.edu/ims?s=tinder