Colleges no longer simply want to know what their students know, but how they think.
Higher-order thinking skills are “something that schools are paying a little bit more attention to these days,”
educators also say that paper-and-pencil examinations have limits—for one thing, knowing that you are being tested can drag down performance—and they are looking for new methods to measure skills like critical thinking, creativity, and persistence.
Session Title: Measuring Learning Outcomes of New Library Initiatives Coordinator: Professor Plamen Miltenoff, Ph.D., MLIS, St. Cloud State University, USA Contact: pmiltenoff@stcloudstate.edu Scope & rationale: The advent of new technologies, such as virtual/augmented/mixed reality, and new pedagogical concepts, such as gaming and gamification, steers academic libraries in uncharted territories. There is not yet sufficiently compiled research and, respectively, proof to justify financial and workforce investment in such endeavors. On the other hand, dwindling resources for education presses administration to demand justification for new endeavors. As it has been established already, technology does not teach; teachers do; a growing body of literature questions the impact of educational technology on educational outcomes. This session seeks to bring together presentations and discussion, both qualitative and quantitative research, related to new pedagogical and technological endeavors in academic libraries as part of education on campus. By experimenting with new technologies such as Video 360 degrees and new pedagogical approaches such as gaming and gamification, does the library improve learning? By experimenting with new technologies and pedagogical approaches, does the library help campus faculty to adopt these methods and improve their teaching? How can results be measured, demonstrated?
Over the past year, interest in eXtended reality (XR) technologies (such as virtual, augmented, immersive, and mixed reality) has surged. New and more affordable XR technologies, along with voice activation and sophisticated visual display walls, provide promising directions and opportunities to immerse learners in the curriculum, offering deeper and more vivid learning experiences and extending the learning environment. But what’s the curricular reality with respect to these technologies? What is hype and what is substance? Specifically:
What practical applications do “XR technologies” have for teaching, learning, and research?
How are these technologies being applied to engage learners as consumers and creators of XR experiences?
What evidence is there to support XR technologies as effective tools in the learning environment?
How can these technologies be integrated into learning spaces?
What are the ethical questions we should consider as we explore XR?
The EU’s code of conduct on countering illegal online hate speech was first presented in 2016 and initially had four major internet platforms that participated – Facebook, Microsoft, Twitter, and YouTube. Snapchat is the seventh major IT platform to join the EU’s non-binding ethics regulations to fight illegal online hate speech.
Facebook has moved more than 1.5 billion users out of reach of European privacy law, despite a promise from Mark Zuckerberg to apply the “spirit” of the legislation globally.
Privacy researcher Lukasz Olejnik disagreed, noting that the change carried large ramifications for the affected users. “Moving around one and a half billion users into other jurisdictions is not a simple copy-and-paste exercise,” he said.
+++++++++++++++++++
Facebook To Offer Users Opt-Outs That Comply With New European Privacy Rules
As we reported earlier this week, a federal judge in California ruled that Facebook could be sued in a class-action lawsuit brought by users in Illinois who say the social media company improperly used facial recognition to upload photographs.
Also on Wednesday, TechCrunch reports that Facebook is investigating a security research report showing that its user data is vulnerable to third-party JavaScript trackers embedded on websites offering the “Login With Facebook” feature.
Preliminary Information and Literature. Please do not hesitate to share in the comments section your ideas, suggestions and questions
предварителна информация и литература по дискусията. Не се колебайте да споделите мнения, препоръки и въпроси в “Comment” секцията:
++++++++++++++++
For more information and for backchanneling please use the following social media
за повече въпроси и информация, както и за споделяне на вашите идеи и мисли използвайте следните канали / социални медии:
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
The government
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.