Searching for "hackers"

topics for IM260

proposed topics for IM 260 class

  • Media literacy. Differentiated instruction. Media literacy guide.
    Fake news as part of media literacy. Visual literacy as part of media literacy. Media literacy as part of digital citizenship.
  • Web design / web development
    the roles of HTML5, CSS, Java Script, PHP, Bootstrap, JQuery, React and other scripting languages and libraries. Heat maps and other usability issues; website content strategy. THE MODEL-VIEW-CONTROLLER (MVC) design pattern
  • Social media for institutional use. Digital Curation. Social Media algorithms. Etiquette Ethics. Mastodon
    I hosted a LITA webinar in the fall of 2016 (four weeks); I can accommodate any information from that webinar for the use of the IM students
  • OER and instructional designer’s assistance to book creators.
    I can cover both the “library part” (“free” OER, copyright issues etc) and the support / creative part of an OER book / textbook
  • Big Data.” Data visualization. Large scale visualization. Text encoding. Analytics, Data mining. Unizin. Python, R in academia.
    I can introduce the students to the large idea of Big Data and its importance in lieu of the upcoming IoT, but also departmentalize its importance for academia, business, etc. From infographics to heavy duty visualization (Primo X-Services API. JSON, Flask).
  • NetNeutrality, Digital Darwinism, Internet economy and the role of your professional in such environment
    I can introduce students to the issues, if not familiar and / or lead a discussion on a rather controversial topic
  • Digital assessment. Digital Assessment literacy.
    I can introduce students to tools, how to evaluate and select tools and their pedagogical implications
  • Wikipedia
    a hands-on exercise on working with Wikipedia. After the session, students will be able to create Wikipedia entries thus knowing intimately the process of Wikipedia and its information.
  • Effective presentations. Tools, methods, concepts and theories (cognitive load). Presentations in the era of VR, AR and mixed reality. Unity.
    I can facilitate a discussion among experts (your students) on selection of tools and their didactically sound use to convey information. I can supplement the discussion with my own findings and conclusions.
  • eConferencing. Tools and methods
    I can facilitate a discussion among your students on selection of tools and comparison. Discussion about the their future and their place in an increasing online learning environment
  • Digital Storytelling. Immersive Storytelling. The Moth. Twine. Transmedia Storytelling
    I am teaching a LIB 490/590 Digital Storytelling class. I can adapt any information from that class to the use of IM students
  • VR, AR, Mixed Reality.
    besides Mark Gill, I can facilitate a discussion, which goes beyond hardware and brands, but expand on the implications for academia and corporate education / world
  • IoT , Arduino, Raspberry PI. Industry 4.0
  • Instructional design. ID2ID
    I can facilitate a discussion based on the Educause suggestions about the profession’s development
  • Microcredentialing in academia and corporate world. Blockchain
  • IT in K12. How to evaluate; prioritize; select. obsolete trends in 21 century schools. K12 mobile learning
  • Podcasting: past, present, future. Beautiful Audio Editor.
    a definition of podcasting and delineation of similar activities; advantages and disadvantages.
  • Digital, Blended (Hybrid), Online teaching and learning: facilitation. Methods and techniques. Proctoring. Online students’ expectations. Faculty support. Asynch. Blended Synchronous Learning Environment
  • Gender, race and age in education. Digital divide. Xennials, Millennials and Gen Z. generational approach to teaching and learning. Young vs old Millennials. Millennial employees.
  • Privacy, [cyber]security, surveillance. K12 cyberincidents. Hackers.
  • Gaming and gamification. Appsmashing. Gradecraft
  • Lecture capture, course capture.
  • Bibliometrics, altmetrics
  • Technology and cheating, academic dishonest, plagiarism, copyright.

RFID blocking

There Are Plenty Of RFID-Blocking Products, But Do You Need Them?

hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID

card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.

REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.

Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.

Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.

if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
+++++++++++++++
more on cybersecurity in this IMS blog

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
https://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

hack the drones

Hackers are able to seize control of consumer drones and make them fall from the sky

https://plus.google.com/+ScrewMuggz/posts/KMtnAxhMYtc

there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.

Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.

My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones

+++++++++++++++++
more on drones in this IMS blog:
https://blog.stcloudstate.edu/ims?s=drones

your social media account cracked

This is what happens when someone hacks your Spotify account

Code for Humanity

Santa Clara U Students Code for Humanity

come up with apps to help two organizations serving the poorest people. Santa Clara University’s Association for Computing Machinery chapter held its third annual hackathon, “Hack for Humanity.”

The 24-hour event brought together participants from area colleges studying not just computer science or engineering but also business, biotech, communications and graphic design. Students worked individually or in teams of four to develop applications for either of two recipients.

One is Catholic Charities, where coders were encouraged to improve one of its many services and programs for “very low income people.” For example, the students could come up with apps for improving the organization’s existing job skills training, immigration test training or nutrition information programs.

The other is VillageTech, a company that has created Looma, a low-power, affordable portable computer and projector box for classroom use in schools in developing countries. There, the hackers are supposed to come up with apps for use by students in Nepal, such as creating a content management and navigation system, to build an on-screen keyboard, to add to the maps available for Looma, to improve the speech capability, to create a tool for managing the webcam and related functions.

Power, Privacy, and the Internet

Power, Privacy, and the Internet

http://www.nybooks.com/blogs/gallery/2014/feb/07/power-privacy-and-internet-conference/

  • Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen:

https://api.soundcloud.com/tracks/126066881/download?secret_token=s-QvmZz&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c 

  • The Internet and the Future of the Press

https://api.soundcloud.com/tracks/126066391/download?secret_token=s-v6mpP&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c

  • The Internet, Repression and Dissent

https://api.soundcloud.com/tracks/126066389/download?secret_token=s-Udzom&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c

 Merkel calls for separate EU internet

http://www.aljazeera.com/video/europe/2014/02/merkel-calls-separate-eu-internet-201421955226908928.html

http://www.ted.com/talks/edward_snowden_here_s_how_we_take_back_the_internet

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/

 

 

https://blog.stcloudstate.edu/ims/2015/12/03/surveillance-age-and-librarians/

civil disobedience

Encrypted chat app Telegram reverses stance, bans 78 ISIS accounts

http://bgr.com/2015/11/19/encrypted-chat-telegram-isis/

Telegram is an encrypted chat service that lets users create anonymous channels that can be followed by hundreds of users.

In addition to Telegram, Twitter and YouTube have also removed ISIS-affiliated content, with hacker organization Anonymous having taken down more than 6,000 Twitter accounts following the Paris attacks.

Meanwhile, Telegram said it only takes steps against confirmed ISIS channels. “For example, if criticizing the government is illegal in a country, Telegram won’t be a part of such politically motivated censorship,” the company said. “While we do block terrorist (e.g. ISIS-related) bots and channels, we will not block anybody who peacefully expresses alternative opinions.”

More on this topic in this IMS blog:

https://blog.stcloudstate.edu/ims/2014/09/30/disruptive-technologies-from-swarming-to-mesh-networking/

1 2 3 4