Archive of ‘Digital literacy’ category

ALA VR in libraries

Virtual and Augmented Reality in Libraries

Hannah PopeLibrary Technology Reports

Hannah Pope is the Emerging Technologies Librarian at the Belk Library and Information Commons at Appalachian State University. She has been working with virtual and augmented reality devices for almost two years. She continues to grow the program at her library and frequently works with faculty members to incorporate virtual and augmented reality into their curriculum by providing avenues for students to experience curated applications. Pope has an MS library science degree from the University of North Carolina at Chapel Hill.

+++++++++
more on VR in libraries in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality+library

Firefox Reality

available for Viveport, Oculus, and Daydream

From the moment you open the browser, you will be presented with immersive experiences that can be enjoyed on a VR headset directly from the Firefox Reality browser. We are working with creators around the world to bring an amazing collection of games, videos, environments, and experiences that can be accessed directly from the home screen.

++++++++++++
more on VR in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality+education

blockchain and refugees

blockchain for refugees

As Norwegian Refugee Council research found, 70 percent of Syrian refugees lack basic identification and documents showing ownership of property.

The global passport

Host nations certainly has a share in the damage, as they face problems concerning the accessibility of vital information about the newcomers — dealing with the undocumented refugee, the immigration service can’t gain the information about his/her health status, family ties or criminal record, or verify any other vital data that helps them make a decision. Needless to say, this may lead to the designation of refugee status being exploited by economic migrants, fugitives or even the war criminals that caused the mass displacement to begin with.

Another important issue is data security. Refugees’ personal identities are carefully re-established with the support of clever biometric systems set up by the U.N. Agency for Refugees (UNHCR). UNHCR registers millions of refugees and maintains those records in a database. But the evidence suggests that centralized systems like this could be prone to attacks. As a report on UNCHR’s site notes, Aadhaar — India’s massive biometric database and the largest national database of people in the world — has suffered serious breaches, and last year, allegations were made that access was for sale on the internet for as little as $8

Finland, a country with a population of 5.5 million, cannot boast huge numbers of refugees. For 2018, it set a quota of 750 people, mainly flying from Syria and the Democratic Republic of Congo. That’s way less than neighboring Sweden, which promised to take in 3,400. Nevertheless, the country sets a global example of the use of effective technology in immigration policy: It’s using blockchain to help the newcomers get on their feet faster.

The system, developed by the Helsinki-based startup MONI, maintains a full analogue of a bank account for every one of its participants.

Speaking at the World Economic Forum in Davos in January 2018, the billionaire investor and philanthropist George Soros revealed that his structures already use a blockchain in immigration policies

In 2017, Accenture and Microsoft Corp. teamed up to build a digital ID network using blockchain technology, as part of a U.N.-supported project to provide legal identification to 1.1 billion people worldwide with no official documents.

a Memorandum of Understanding (MOU) with blockchain platform IOTA to explore how the technology could increase efficiency.

++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Beginner’s Guide to Google Analytics

The Absolute Beginner’s Guide to Google Analytics

https://moz.com/blog/absolute-beginners-guide-to-google-analytics

Kristi Hines June 24th, 2015

  • How many people visit my website?
  • Where do my visitors live?
  • Do I need a mobile-friendly website?
  • What websites send traffic to my website?
  • What marketing tactics drive the most traffic to my website?
  • Which pages on my website are the most popular?
  • How many visitors have I converted into leads or customers?
  • Where did my converting visitors come from and go on my website?
  • How can I improve my website’s speed?
  • What blog content do my visitors like the most?

Google Analytics account. If you have a primary Google account that you use for other services like Gmail, Google Drive, Google Calendar, Google+, or YouTube, then you should set up your Google Analytics using that Google account. Or you will need to create a new one.

Big tip: don’t let your anyone (your web designer, web developer, web host, SEO person, etc.) create your website’s Google Analytics account under their own Google account so they can “manage” it for you. If you and this person part ways, they will take your Google Analytics data with them, and you will have to start all over.

go to Google Analytics and click the Sign into Google Analytics button.

Google Analytics offers hierarchies to organize your account. You can have up to 100 Google Analytics accounts under one Google account. You can have up to 50 website properties under one Google Analytics account. You can have up to 25 views under one website property.

++++++++++
more on Google Analytics in this IMS blog
https://blog.stcloudstate.edu/ims?s=google+analytics

 

Cybersecurity Risks in schools

FBI Warns Educators and Parents About Edtech’s Cybersecurity Risks

By Tina Nazerian     Sep 14, 2018

https://www.edsurge.com/news/2018-09-14-fbi-warns-educators-and-parents-about-edtech-s-cybersecurity-risks

The FBI has released a public service announcement warning educators and parents that edtech can create cybersecurity risks for students.

In April 2017, security researchers found a flaw in Schoolzilla’s data configuration settings. And in May 2017, a hacker reportedly stole 77 million user accounts from Edmodo.

Amelia Vance, the director of the Education Privacy Project at the Future of Privacy Forum, writes in an email to EdSurge that the FBI likely wanted to make sure that as the new school year starts, parents and schools are aware of potential security risks. And while she thinks it’s “great” that the FBI is bringing more attention to this issue, she wishes the public service announcement had also addressed another crucial challenge.

“Schools across the country lack funding to provide and maintain adequate security,” she writes. “Now that the FBI has focused attention on these concerns, policymakers must step up and fund impactful security programs.”

According to Vance, a better approach might involve encouraging parents to have conversations with their children’s’ school about how it keeps student data safe.

++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

Encyclopedia of Criminal Activities and the Deep Web

>>>>>>> Publishing Opportunity <<<<<<<<<<<<<<

Encyclopedia of Criminal Activities and the Deep Web

Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.

In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.

You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).

Recommended topics for papers include, but are not limited to:

  • Bitcoin and Crime
  • Botnets and Crime
  • Child Exploitation
  • Contract Killing
  • Criminology
  • Cryptocurrency
  • Cyber Espionage
  • Cyber Stalking
  • Cybercrime
  • Cybercriminals
  • Cybersecurity Legislation
  • Cyberterrorism Fraud
  • Dark Web
  • Dark Web Vendors
  • Darknets
  • Data Privacy
  • Dating Websites and Crime
  • Deep Web
  • Drug Trafficking
  • E-Banking Fraud
  • Email Scams
  • Fraud and Internet
  • Gaming and Crime
  • Government Regulations of the Dark Web
  • Hacking and Crime
  • Hacktivism
  • Human Trafficking
  • Identity Theft
  • International Regulations of the Dark Web
  • Internet Privacy
  • Internet Regulations
  • Internet Safety & Crime
  • Online Advertisement Websites and Crime
  • Online Blackmail
  • Online Forums and Crime
  • Online Hate Crimes
  • Online Predators
  • Online Privacy
  • Social Media Deception
  • Social Networking Traps
  • Undercover Dark Web Busts
  • Undercover Operations
  • Vigilante Justice
  • Virtual Currencies & Crime
  • Whistleblowing

IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018

Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication. 

Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com

Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Encyclopedia of Criminal Activities and the Deep Web
EncyclopediaCADW@igi-global.com

Multimedia eBook

5 Ideas for Multimedia eBook Projects

5 Ideas for Multimedia eBook Projects

Book Creator
LucidPress and Book Creator supports uploading many kinds of media and then adding that media to the pages of an ebook. This can be a great way to have students build digital portfolios of their best work.

 

+++++++++++++
more on ebooks in this IMS blog
https://blog.stcloudstate.edu/ims?s=ebooks

dating apps

Documentary Swipes Left On Dating Apps

September 9, 20185:46 PM ET 

https://www.npr.org/2018/09/09/645704776/a-documentary-swipes-left-on-dating-apps

I would love for the film to raise a discussion around dating app culture and online dating and sexual violence. I was really not aware of this, I would say, relationship between dating apps and rape culture before I started interviewing young women for the film.

+++++++++++
more on online dating in this IMS blog
https://blog.stcloudstate.edu/ims?s=online+dating

Scheduling Meetings

Three Good Tools for Scheduling Meetings With Students, Parents, and Colleagues

https://www.freetech4teachers.com/2018/09/three-good-tools-for-scheduling.html

Choice Eliminator is a Google Forms Add-on that lets you create a Form on which choices disappear after they have been used.

Doodle is a free tool for scheduling group meetings with the input of all group members. Doodle is essentially a polling platform.

Calendly is a tool that integrates with your Google Calendar and makes it easy to create appointment slots with just a click or two.

 

1 75 76 77 78 79 176