Archive of ‘Digital literacy’ category

not on your work computer

6 things you should never do on your work computer

Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM

http://www.businessinsider.com/things-you-should-never-do-on-your-work-computer-2017-3

cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.

  1. DON’T: Save personal passwords in your work device keychain.
  2. DON’T: Make off-color jokes on messaging software.
  3. DON’T: Access free public wi-fi while working on sensitive material.
  4. DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
  5. DON’T: Store personal data.
  6. DON’T: Work on your side hustle while at the office.

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims?s=surveillance

citations bibliometrics

Bertin, M., Atanassova, I., Gingras, Y., & Larivière, V. (2016). The Invariant Distribution of References in Scientific Articles. Journal Of The Association For Information Science & Technology67(1), 164-177. doi:10.1002/asi.23367

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d112228404%26site%3dehost-live%26scope%3dsite

from the viewpoint of bibliometrics, how references are distributed along the structure of scientific papers as well as the age of these cited references

Once the sections of articles are realigned to follow the IMRaD sequence, the position of cited references along the text of articles is invariant across all PLoS journals, with the
introduction and discussion accounting for most of the references. It also provides evidence that the age of cited references varies by section, with older references being found in the methods and more recent references in the discussion.

different roles citations have in the scholarly communication process.

+++++++++++++++++++
more on bibliometrics in this IMS blog
https://blog.stcloudstate.edu/ims?s=bibliometrics

app smashing

My note:
#appsmashing must be the evolution of the ~ 2010 #mashup

appsmashing

from: http://www.zigzagstech.com/app-smashing

http://k12technology.weebly.com/app-smashing.html

App Smashing is the process of using multiple apps to create projects or complete tasks. App Smashing can provide your students with creative and inspired ways to showcase their learning and allow you to assess their understanding and skills.

http://thinglinkblog.com/2014/12/18/6-amazing-appsmashes-to-inspire-creativity/

http://edtechteacher.org/unleashing-creativity-greg-kulowiec-app-smashing-from-beth-holland/

https://padlet.com/lmoore4/72nzkwdipo5y

Why App Smash?

What is an App Smash?

Content created in one app transferred to and enhanced by a second app and sometimes third. Preferably the final product is then published to the web – remember, digital presence is the new résumé (CV).

Reasons to App Smash:

  1. It demands creative thinking
  2. It demands more from the technology (value for money)
  3. It turns the issue of not having a ‘wonder app’ into a positive
  4. It removes any restrictions to take a topic as far as it can be taken.
  5. It often results in more engaging learning products
  6. It’s a fun challenge for ‘digital natives’

Key rules for successful App Smashing:

  1. Use the Camera Roll as your main conduit between apps
  2. Leave the app choice to the students
  3. Have a list of apps capable of smashing content together (See below)

http://blog.whooosreading.org/19-apps-to-make-app-smashing-a-smashing-success/

 

TELLAGAMI, 

GREEN SCREEN DOINK 

YAKIT KIDS AND CHATTERPIX

EDUCREATIONS AND DOCERI 

BOOK CREATOR 

GOOGLE DOCS, SLIDES 

STRIP CREATOR 

SCOODLEJAM 

HELLO CRAYON 

GOOGLE DRAWING 

TOONTASTIC

PUBLISHING

thinglink, youtube, padlet, seesaw, realtimes,

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

digital learning faculty support

Report: Faculty Support Lacking for Wide Adoption of Digital Learning

By Dian Schaffhauser 06/19/17

https://campustechnology.com/articles/2017/06/19/faculty-support-lacking-for-wide-adoption-of-digital-learning.aspx

new report produced by Tyton Partners in collaboration with the Babson Survey Research Group. two fall 2016 surveys of a national sample of 3,500 postsecondary respondents.

extent of digital learning implementation in support of strategic priorities

These gaps and others “suggest a disconnect, the report stated, “between the impacts that many administrators perceive and the reality of how digital learning is changing the market.” Open-ended responses suggested that expectations for the impact of digital learning were “set too high” or weren’t being “measured or communicated well.” Another common refrain: There’s inadequate institutional support.

While most administrators told researchers that “faculty are crucial to the success of digital learning initiatives — serving as both a bolster and a barrier to implementation success,” the resources for supporting faculty to implement digital learning are insufficient. Just a quarter of respondents said faculty professional development was implemented “effectively and at scale.” Thirty-five percent said implementation was in progress. And a third (33 percent) reported that faculty professional development was “incomplete, inconsistent, informal and/or optional.”

The report offered recommendations for improving and expanding digital learning adoption. Among the guidance:

  • Get realistic. While the data suggested that digital learning could improve scheduling flexibility and access, among other benefits, schools need to identify which goals are most important and “clearly articulate how and to what extent its digital learning programs are expected to help.”
  • Measure impact and broadcast it. Forget about small pilots; go for a scale that will demonstrate impact and then share the findings internally and with other institutions.
  • Use buying power to influence the market. Connect faculty with vendors for “education, product discovery and feedback.” Insist on accessibility within products, strong integration features and user friendliness.
  • Prepare faculty for success. Make sure there are sufficient resources and incentives to help faculty “buy into the strategy” and follow through on implementation.

++++++++++++++++++
more on digital learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+learning

VR chemistry

MEL Science Launches Virtual Reality Chemistry Lessons

By Richard Chang 06/15/17

https://thejournal.com/articles/2017/06/15/mel-science-launches-virtual-reality-chemistry-lessons.aspx

MEL Science, based in London, has launched a series of virtual reality (VR) chemistry lessons for K–12. The 3-year-old company this week released a MEL Chemistry VR app, featuring a virtual chemistry lab, for free on Google Daydream. This free version, which contains the first six chemistry lessons, is available at this MEL Science site.

MEL Science aims to release more than 150 lessons covering all the main topics included in K–12 schools’ chemistry curriculum. Later this year, MEL Science also aims to add support for other VR platforms, including Google Cardboard and Samsung Gear VR.

+++++++++++++++++++
more on VR in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

GradeCraft

University of Michigan Commercializes Gameful Learning Tool

By Rhea Kelly 06/20/17

https://campustechnology.com/articles/2017/06/20/university-of-michigan-commercializes-gameful-learning-tool.aspx

GradeCraft, the software uses gaming elements such as competition, badges and unlocks to help students progress through their courses.

GradeCraft was co-developed in 2012 by Barry Fishman, professor at the University of Michigan’s Schools of Information and Education, and Caitlin Holman, doctoral candidate in the School of Information and lead software developer at Office of Academic Innovation‘s Digital Innovation Greenhouse. The project was recognized with a Campus Technology Innovators award in 2016.

The University of Arizona has become one of the first universities to purchase a site license for GradeCraft.

++++++++++++++++++
more on gamification in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=gamification

microcredentials

What You Need to Know About Microcredentials

ELI Online Event | July 12, 2017 | Noon–4:00 p.m. (ET)

One in five colleges have issued digital badges, according to a recent survey.* Today, all kinds of organizations, from higher education institutions to professional associations to employers, are issuing digital microcredentials. Are you?

Join us for “Microcredentials and Digital Badging in Higher Education,” where expert presenters from various higher education, industry, and government fields will explore today’s issues. Here are just a few highlights:

Join us for an introductory webinar, “Alternative Credentialing in Higher Education,” on July 10. Both events are free and open to all EDUCAUSE members (available to purchase for nonmembers).

Register Now →

++++++++++++++++++++
more about badges and microcredentials
https://blog.stcloudstate.edu/ims?s=badges

library website content strategy

Developing a Website Content Strategy

Instructor: Shoshana Mayden, Dates: July 3-28, 2017
http://libraryjuiceacademy.com/049-content-strategy.php

Shoshana Mayden is a content strategist with the University of Arizona Libraries in Tucson, Arizona. She advises on issues related to website content and contributes to developing a content strategy across multiple channels for the library. She works with content managers and library stakeholders to re-write, re-think and re-organize content for the main library website, as well as develop workflows related to the lifecycle of content. She also a copy editor for Weave: the Journal of Library User Experience.

++++++++++++++++++++++++

Information Architecture: Designing Navigation for Library Websites

Instructor: Laura-Edythe Coleman

http://libraryjuiceacademy.com/046-designing-navigation.php

Information Architecture is an essential component of user-centered design of information spaces, especially websites. Website navigation is a key design device to help users search and browse library websites and information systems. The design of Website navigation can be simple or complex, flat or deep. In all cases, website navigation should take into account information architecture (IA) best practices, common user tasks in the library domain, user research, analytics and information seeking models.

Laura-Edythe Coleman is a Museum Informaticist: her focus is on the point of convergence for museums, information, people, and technology. Knowing that societies need museums for creating and sustaining cultural memory, she strives to help communities co-create heritage collections with museums. She holds a PhD in Information Science, a Masters of Library and Information Science and a Bachelors of Fine Arts. She can be reached via Twitter: @lauraedythe, website: http://www.lauraedythe.com, or by email lauraedythecoleman@gmail.com

+++++++++++++++++++++++++

Content Strategy for Library Websites from Rebecca Blakiston
http://www.academia.edu/12370418/Content_Strategy_for_Library_Websites 
https://steadfastlibrarian.wordpress.com/2012/06/27/211/
https://connect.library.utoronto.ca/download/attachments/25199917/2013_-__-_DevelopingaContentStrategyforanAcademicLibraryWebs%5Bretrieved-2015-11-17%5D.pdf
https://www.researchgate.net/publication/271758861_Developing_a_Content_Strategy_for_an_Academic_Library_Website
+++++++++++++++++++++
Other resources: 
http://guiseppegetto.com/ux-content-strategy-library/

+++++++++++++++++
more on Libary web site in this IMS blog
https://www.lib.umich.edu/blog-tags/web-content-strategy
https://blog.stcloudstate.edu/ims?s=library+web+page

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

https://www.ecampusnews.com/campus-administration/internet-things-higher-ed/

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

1 109 110 111 112 113 176