Archive of ‘Cybersecurity’ category
Gaming Learning Society
Report from the intersection of Games, Learning, and Society
Games, Learning and Society conference in Madison, Wisconsin. practical ideas and arguments from GLS to help you get through the roadblocks that stand between you and learning or teaching through games.
Readers Save Legacy Library Content by Crowdsourcing Metadata Games
http://www.gamification.co/2014/05/12/readers-save-legacy-content-by-crowdsourcing-metadata-games/What is Gamification and Why Use It in Teaching?
http://ii.library.jhu.edu/2014/05/13/what-is-gamification-and-why-use-it-in-teaching/What Does the Next-Generation School Library Look Like?
The library now also has reading lounge areas with comfortable modular seating, as well as tables with chairs and stools that students are free to move around; two music studios; a HackerSpace (with high-tech equipment such as a microscope, 3D printer, gaming hardware and software, and a green screen for filming) and a Maker Space that also houses a 3D printer and serves as a “hands-on” craft room where old technology can be disassembled and re-configured with other materials. In short, the Monticello Library Media Center has become a “Learning Commons.”
@valibrarian because of MineCraft http://t.co/RnwW7ahOK2
Minecraft and the library: http://blogs.curtin.edu.au/gamification/news/minecraft-and-the-library/
Library Quest Wrap-Up and Post-Game Assessment
If you build it …? One campus’ firsthand account of gamification in the academic library
Straight from CRL News
SCVNGR as a platform was attractive to us for several reasons, including UCSD’s experience. First, it incorporated gaming into students’ experience of the library, which has been widely explored and recommended as a way to engage library patrons.2,3 Second, it would enable us to connect with students early in the year without needing to commit personnel to lengthy tours and other scheduled services during a busy time.
Pls consider former IMS blog entries. Keyword: “game”:
10 technology hallmarks for every campus
1. High-speed wireless broadband.
According to the Center for Digital Education’s recent “2013 Yearbook: Technology Innovation in Education,” over 80 percent of education institutions surveyed said that wireless broadband was their “top priority for IT investment.”
2. 24/7 IT support.
We have 24/7 support for emergencies and much of our staff, just like at a hospital, are on call. That’s not a perk for the campus, it’s a necessity.
3. The cloud.
The cloud can also: acquire and implement the latest software and application updates; streamline enrollment and admissions processes; and turn to subscriptions that are scalable and provide options, says Edudemic.
4. Digital textbooks.
Planning for digital textbooks means not only boosting mobile device capabilities on campus, but helping faculty learn to implement digital resources into their course.
5. 21st Century PD for faculty and admin.
From offering a MOOC on classroom management online solutions, to hosting a PD session on Twitter, campus admin should offer multiple options for PD delivery, just like how faculty should offer students multiple options for learning–there’s no better way to teach something than to model it first!
[Read: “3 pros and 3 cons of MOOCs.”]
7. Online course management system.
From sending in-class emails to checking grades, course management systems, like Blackboard, offer faculty and students a fairly intuitive way to manage courses more efficiently.
8. Big Data…
Future-proofing universities are beginning to deploy storage solutions to help manage the unstructured data in physical, virtual and cloud environments. More modern storage solutions are also open source for a high learning curve but low cost.
precautions can range from scanning existing databases on the university’s servers to determine where personal information is located and then, depending on the database, destroy the personal information or add more digital security; as well as put cybersecurity systems through a series of penetration tests to highlight security shortcomings.
[Read: “University data breach prompts ‘top-to-bottom’ IT review.”]
10. Social media done well.
of the major ways campuses use social media well is by serving up both “cake” and “broccoli,” or balancing the content that is important and good for the school (broccoli) and the content that is fun and delicious (cake). “If you share enough cake, your audience will consume the occasional broccoli,” she advises.
Are We Puppets in a Wired World?
To Save Everything, Click Here: The Folly of Technological Solutionism
Hacking the Future: Privacy, Identity and Anonymity on the Web
From Gutenberg to Zuckerberg: What You Really Need to Know About the Internet
Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die
Big Data: A Revolution That Will Transform How We Live, Work, and Think
Status Update: Celebrity, Publicity, and Branding in the Social Media Age
Privacy and Big Data: The Players, Regulators and Stakeholders
The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.
The House is passing 3 bills:
The House passed the Cybersecurity Enhancement Act, which mandates strategic guidance for federal cybersecurity research and development. To establish that guidance, the bill calls for input from public and private stakeholders, and strengthens security automation standards and checklists for federal systems.
How this will impact education and academia? What input can SCSU contribute with?…
FISMA – Federal Information Security Management Act of 2002 https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002
CISPA- Cyber Intelligence Sharing and Protection Act http://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act