cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
DON’T: Save personal passwords in your work device keychain.
DON’T: Make off-color jokes on messaging software.
DON’T: Access free public wi-fi while working on sensitive material.
DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
DON’T: Store personal data.
DON’T: Work on your side hustle while at the office.
Bertin, M., Atanassova, I., Gingras, Y., & Larivière, V. (2016). The Invariant Distribution of References in Scientific Articles. Journal Of The Association For Information Science & Technology, 67(1), 164-177. doi:10.1002/asi.23367
from the viewpoint of bibliometrics, how references are distributed along the structure of scientific papers as well as the age of these cited references
Once the sections of articles are realigned to follow the IMRaD sequence, the position of cited references along the text of articles is invariant across all PLoS journals, with the
introduction and discussion accounting for most of the references. It also provides evidence that the age of cited references varies by section, with older references being found in the methods and more recent references in the discussion.
different roles citations have in the scholarly communication process.
App Smashing is the process of using multiple apps to create projects or complete tasks. App Smashing can provide your students with creative and inspired ways to showcase their learning and allow you to assess their understanding and skills.
Content created in one app transferred to and enhanced by a second app and sometimes third. Preferably the final product is then published to the web – remember, digital presence is the new résumé (CV).
Reasons to App Smash:
It demands creative thinking
It demands more from the technology (value for money)
It turns the issue of not having a ‘wonder app’ into a positive
It removes any restrictions to take a topic as far as it can be taken.
It often results in more engaging learning products
It’s a fun challenge for ‘digital natives’
Key rules for successful App Smashing:
Use the Camera Roll as your main conduit between apps
Leave the app choice to the students
Have a list of apps capable of smashing content together (See below)
These gaps and others “suggest a disconnect, the report stated, “between the impacts that many administrators perceive and the reality of how digital learning is changing the market.” Open-ended responses suggested that expectations for the impact of digital learning were “set too high” or weren’t being “measured or communicated well.” Another common refrain: There’s inadequate institutional support.
While most administrators told researchers that “faculty are crucial to the success of digital learning initiatives — serving as both a bolster and a barrier to implementation success,” the resources for supporting faculty to implement digital learning are insufficient. Just a quarter of respondents said faculty professional development was implemented “effectively and at scale.” Thirty-five percent said implementation was in progress. And a third (33 percent) reported that faculty professional development was “incomplete, inconsistent, informal and/or optional.”
The report offered recommendations for improving and expanding digital learning adoption. Among the guidance:
Get realistic. While the data suggested that digital learning could improve scheduling flexibility and access, among other benefits, schools need to identify which goals are most important and “clearly articulate how and to what extent its digital learning programs are expected to help.”
Measure impact and broadcast it. Forget about small pilots; go for a scale that will demonstrate impact and then share the findings internally and with other institutions.
Use buying power to influence the market. Connect faculty with vendors for “education, product discovery and feedback.” Insist on accessibility within products, strong integration features and user friendliness.
Prepare faculty for success. Make sure there are sufficient resources and incentives to help faculty “buy into the strategy” and follow through on implementation.
MEL Science aims to release more than 150 lessons covering all the main topics included in K–12 schools’ chemistry curriculum. Later this year, MEL Science also aims to add support for other VR platforms, including Google Cardboard and Samsung Gear VR.
ELI Online Event | July 12, 2017 | Noon–4:00 p.m. (ET)
One in five colleges have issued digital badges, according to a recent survey.* Today, all kinds of organizations, from higher education institutions to professional associations to employers, are issuing digital microcredentials. Are you?
Join us for an introductory webinar, “Alternative Credentialing in Higher Education,” on July 10. Both events are free and open to all EDUCAUSE members (available to purchase for nonmembers).
Shoshana Mayden is a content strategist with the University of Arizona Libraries in Tucson, Arizona. She advises on issues related to website content and contributes to developing a content strategy across multiple channels for the library. She works with content managers and library stakeholders to re-write, re-think and re-organize content for the main library website, as well as develop workflows related to the lifecycle of content. She also a copy editor for Weave: the Journal of Library User Experience.
++++++++++++++++++++++++
Information Architecture: Designing Navigation for Library Websites
Information Architecture is an essential component of user-centered design of information spaces, especially websites. Website navigation is a key design device to help users search and browse library websites and information systems. The design of Website navigation can be simple or complex, flat or deep. In all cases, website navigation should take into account information architecture (IA) best practices, common user tasks in the library domain, user research, analytics and information seeking models.
Laura-Edythe Coleman is a Museum Informaticist: her focus is on the point of convergence for museums, information, people, and technology. Knowing that societies need museums for creating and sustaining cultural memory, she strives to help communities co-create heritage collections with museums. She holds a PhD in Information Science, a Masters of Library and Information Science and a Bachelors of Fine Arts. She can be reached via Twitter: @lauraedythe, website: http://www.lauraedythe.com, or by email lauraedythecoleman@gmail.com
a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.
53 percent of survey respondents reported a year-over-year increase in cyber attacks;
62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
16 percent do not have an incident response plan.
65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
More than half say cyber security professionals “lack an ability to understand the business”;
One in four organizations allot less than $1,000 per cyber security team member for training; and
About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.
++++++++++++++++++++++++++
IoT to Represent More Than Half of Connected Device Landscape by 2021
analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.
IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.