Searching for "security"

Online privacy: It’s time for a new security paradigm

Online privacy: It’s time for a new security paradigm

http://fcw.com/articles/2014/09/23/online-privacy-new-security-paradigm.aspx

Verizon’s 2014 Data Breach Investigations Report,

Fragmentation of online identity means that we as online users are forced to struggle with proliferating accounts and passwords. And we are regularly required to reveal sensitive information about ourselves and repeatedly enter the same information to create accounts that establish new, disparate online identities.

Establishing a system for trust management requires a common infrastructure for specifying policies that can protect yet enable access to data and systems, representing identities and credentials, and evaluating and enforcing an organization’s policies — all while maintaining privacy.

Emerging Trends and Impacts of the Internet of Things in Libraries

Emerging Trends and Impacts of the Internet of Things in Libraries

https://www.igi-global.com/gateway/book/244559

Chapters:

Holland, B. (2020). Emerging Technology and Today’s Libraries. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 1-33). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch001

The purpose of this chapter is to examine emerging technology and today’s libraries. New technology stands out first and foremost given that they will end up revolutionizing every industry in an age where digital transformation plays a major role. Major trends will define technological disruption. The next-gen of communication, core computing, and integration technologies will adopt new architectures. Major technological, economic, and environmental changes have generated interest in smart cities. Sensing technologies have made IoT possible, but also provide the data required for AI algorithms and models, often in real-time, to make intelligent business and operational decisions. Smart cities consume different types of electronic internet of things (IoT) sensors to collect data and then use these data to manage assets and resources efficiently. This includes data collected from citizens, devices, and assets that are processed and analyzed to monitor and manage, schools, libraries, hospitals, and other community services.

Makori, E. O. (2020). Blockchain Applications and Trends That Promote Information Management. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 34-51). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch002
Blockchain revolutionary paradigm is the new and emerging digital innovation that organizations have no choice but to embrace and implement in order to sustain and manage service delivery to the customers. From disruptive to sustaining perspective, blockchain practices have transformed the information management environment with innovative products and services. Blockchain-based applications and innovations provide information management professionals and practitioners with robust and secure opportunities to transform corporate affairs and social responsibilities of organizations through accountability, integrity, and transparency; information governance; data and information security; as well as digital internet of things.
Hahn, J. (2020). Student Engagement and Smart Spaces: Library Browsing and Internet of Things Technology. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 52-70). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch003
The purpose of this chapter is to provide evidence-based findings on student engagement within smart library spaces. The focus of smart libraries includes spaces that are enhanced with the internet of things (IoT) infrastructure and library collection maps accessed through a library-designed mobile application. The analysis herein explored IoT-based browsing within an undergraduate library collection. The open stacks and mobile infrastructure provided several years (2016-2019) of user-generated smart building data on browsing and selecting items in open stacks. The methods of analysis used in this chapter include transactional analysis and data visualization of IoT infrastructure logs. By analyzing server logs from the computing infrastructure that powers the IoT services, it is possible to infer in greater detail than heretofore possible the specifics of the way library collections are a target of undergraduate student engagement.
Treskon, M. (2020). Providing an Environment for Authentic Learning Experiences. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 71-86). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch004
The Loyola Notre Dame Library provides authentic learning environments for undergraduate students by serving as “client” for senior capstone projects. Through the creative application of IoT technologies such as Arduinos and Raspberry Pis in a library setting, the students gain valuable experience working through software design methodology and create software in response to a real-world challenge. Although these proof-of-concept projects could be implemented, the library is primarily interested in furthering the research, teaching, and learning missions of the two universities it supports. Whether the library gets a product that is worth implementing is not a requirement; it is a “bonus.”
Rashid, M., Nazeer, I., Gupta, S. K., & Khanam, Z. (2020). Internet of Things: Architecture, Challenges, and Future Directions. In Holland, B. (Ed.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 87-104). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch005
The internet of things (IoT) is a computing paradigm that has changed our daily livelihood and functioning. IoT focuses on the interconnection of all the sensor-based devices like smart meters, coffee machines, cell phones, etc., enabling these devices to exchange data with each other during human interactions. With easy connectivity among humans and devices, speed of data generation is getting multi-fold, increasing exponentially in volume, and is getting more complex in nature. In this chapter, the authors will outline the architecture of IoT for handling various issues and challenges in real-world problems and will cover various areas where usage of IoT is done in real applications. The authors believe that this chapter will act as a guide for researchers in IoT to create a technical revolution for future generations.
Martin, L. (2020). Cloud Computing, Smart Technology, and Library Automation. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 105-123). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch006
As technology continues to change, the landscape of the work of librarians and libraries continue to adapt and adopt innovations that support their services. Technology also continues to be an essential tool for dissemination, retrieving, storing, and accessing the resources and information. Cloud computing is an essential component employed to carry out these tasks. The concept of cloud computing has long been a tool utilized in libraries. Many libraries use OCLC to catalog and manage resources and share resources, WorldCat, and other library applications that are cloud-based services. Cloud computing services are used in the library automation process. Using cloud-based services can streamline library services, minimize cost, and the need to have designated space for servers, software, or other hardware to perform library operations. Cloud computing systems with the library consolidate, unify, and optimize library operations such as acquisitions, cataloging, circulation, discovery, and retrieval of information.
Owusu-Ansah, S. (2020). Developing a Digital Engagement Strategy for Ghanaian University Libraries: An Exploratory Study. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 124-139). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch007
This study represents a framework that digital libraries can leverage to increase usage and visibility. The adopted qualitative research aims to examine a digital engagement strategy for the libraries in the University of Ghana (UG). Data is collected from participants (digital librarians) who are key stakeholders of digital library service provision in the University of Ghana Library System (UGLS). The chapter reveals that digital library services included rare collections, e-journal, e-databases, e-books, microfilms, e-theses, e-newspapers, and e-past questions. Additionally, the research revealed that the digital library service patronage could be enhanced through outreach programmes, open access, exhibitions, social media, and conferences. Digital librarians recommend that to optimize digital library services, literacy programmes/instructions, social media platforms, IT equipment, software, and website must be deployed. In conclusion, a DES helps UGLS foster new relationships, connect with new audiences, and establish new or improved brand identity.
Nambobi, M., Ssemwogerere, R., & Ramadhan, B. K. (2020). Implementation of Autonomous Library Assistants Using RFID Technology. In Holland, B. (Ed.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 140-150). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch008
This is an interesting time to innovate around disruptive technologies like the internet of things (IoT), machine learning, blockchain. Autonomous assistants (IoT) are the electro-mechanical system that performs any prescribed task automatically with no human intervention through self-learning and adaptation to changing environments. This means that by acknowledging autonomy, the system has to perceive environments, actuate a movement, and perform tasks with a high degree of autonomy. This means the ability to make their own decisions in a given set of the environment. It is important to note that autonomous IoT using radio frequency identification (RFID) technology is used in educational sectors to boost the research the arena, improve customer service, ease book identification and traceability of items in the library. This chapter discusses the role, importance, the critical tools, applicability, and challenges of autonomous IoT in the library using RFID technology.
Priya, A., & Sahana, S. K. (2020). Processor Scheduling in High-Performance Computing (HPC) Environment. In Holland, B. (Ed.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 151-179). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch009
Processor scheduling is one of the thrust areas in the field of computer science. The future technologies use a huge amount of processing for execution of their tasks like huge games, programming software, and in the field of quantum computing. In real-time, many complex problems are solved by GPU programming. The primary concern of scheduling is to reduce the time complexity and manpower. Several traditional techniques exit for processor scheduling. The performance of traditional techniques is reduced when it comes to the huge processing of tasks. Most scheduling problems are NP-hard in nature. Many of the complex problems are recently solved by GPU programming. GPU scheduling is another complex issue as it runs thousands of threads in parallel and needs to be scheduled efficiently. For such large-scale scheduling problems, the performance of state-of-the-art algorithms is very poor. It is observed that evolutionary and genetic-based algorithms exhibit better performance for large-scale combinatorial and internet of things (IoT) problems.
Kirsch, B. (2020). Virtual Reality in Libraries. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 180-193). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch010
Librarians are beginning to offer virtual reality (VR) services in libraries. This chapter reviews how libraries are currently using virtual reality for both consumption and creation purposes. Virtual reality tools will be compared and contrasted, and recommendations will be given for purchasing and circulating headsets and VR equipment. Google Tour Creator and a smartphone or 360-degree camera can be used to create a virtual tour of the library and other virtual reality content. These new library services will be discussed along with practical advice and best practices for incorporating virtual reality into the library for instructional and entertainment purposes.
Heffernan, K. L., & Chartier, S. (2020). Augmented Reality Gamifies the Library: A Ride Through the Technological Frontier. In Holland, B. (Ed.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 194-210). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch011
Two librarians at a University in New Hampshire attempted to integrate gamification and mobile technologies into the exploration of, and orientation to, the library’s services and resources. From augmented reality to virtual escape rooms and finally an in-house app created by undergraduate, campus-based, game design students, the library team learned much about the triumphs and challenges that come with attempting to utilize new technologies to reach users in the 21st century. This chapter is a narrative describing years of various attempts, innovation, and iteration, which have led to the library team being on the verge of introducing an app that could revolutionize campus discovery and engagement.
Miltenoff, P. (2020). Video 360 and Augmented Reality: Visualization to Help Educators Enter the Era of eXtended Reality. In Holland, B. (Eds.), Emerging Trends and Impacts of the Internet of Things in Libraries (pp. 211-225). IGI Global. http://doi:10.4018/978-1-7998-4742-7.ch012
The advent of all types of eXtended Reality (XR)—VR, AR, MR—raises serious questions, both technological and pedagogical. The setup of campus services around XR is only the prelude to the more complex and expensive project of creating learning content using XR. In 2018, the authors started a limited proof-of-concept augmented reality (AR) project for a library tour. Building on their previous research and experience creating a virtual reality (VR) library tour, they sought a scalable introduction of XR services and content for the campus community. The AR library tour aimed to start us toward a matrix for similar services for the entire campus. They also explored the attitudes of students, faculty, and staff toward this new technology and its incorporation in education, as well as its potential and limitations toward the creation of a “smart” library.

Zoom succumbs to Chinese authorities

After March 2020 reports about Zoom privacy issues, now Zoom acknowledges working with the Chinese government:

Zoom acknowledged it shut down the accounts of several activists and online commemorations of the Tiananmen Square…

Posted by NPR on Friday, June 12, 2020

++++++++++++++

Is Zoom Safe for Chinese Students?

Elizabeth Redden June 12, 2020

https://www.insidehighered.com/news/2020/06/12/scholars-raise-concerns-about-using-zoom-teach-about-china

Unlike many other major tech platforms based in the U.S., Zoom, which is headquartered in California, has not been blocked by the Chinese government. Zoom said in a blog post that it is “developing technology over the next several days that will enable us to remove or block at the participant level based on geography” which will allow the company to “to comply with requests from local authorities when they determine activity on our platform is illegal within their borders; however, we will also be able to protect these conversations for participants outside of those borders where the activity is allowed.”

Zoom’s interference with the Tiananmen gatherings and its suspension of user accounts raised alarm among many in higher education, which increasingly depends on Zoom to operate courses remotely — including for students located within China’s borders.

Multiple scholars took to Twitter to express their worries

PEN America, a group that advocates for free expression, condemned Zoom for shuttering the activist’s account.

This is not the first time Zoom’s links to China have come under scrutiny. In April, the company admitted that some of its user data were “mistakenly” routed through China; in response, the company announced that users of paid Zoom accounts could opt out of having their data routed through data centers in China.

An April 3 report by scholars at the University of Toronto’s Munk School of Global Affairs & Public Policy said Zoom’s research and development operations in China could make the company susceptible “to pressure from Chinese authorities.”

Zoom, whose Chinese-born CEO is a U.S. citizen, said in its latest annual report to the U.S. Securities and Exchange Commission that it had more than 700 employees at its research and development centers in China as of Jan. 31. The SEC filing notes that Zoom has a “high concentration of research and development personnel in China, which could expose us to market scrutiny regarding the integrity of our solution or data security features.”

+++++++++++++

Zoom Just Totally Caved In to China on Censorship from r/technology


++++++++++++++
more about Zoom in this IMS blog
https://blog.stcloudstate.edu/ims?s=zoom

Faculty Learn New Teaching Methods

Survey: Emergency Move Online Forced More than Half of Faculty to Learn New Teaching Methods

Rhea Kelly 04/22/20

https://campustechnology.com/articles/2020/04/22/survey-emergency-move-online-forced-more-than-half-of-faculty-to-learn-new-teaching-methods.aspx

56 percent of faculty who moved courses online were using teaching methods they had never used before. That’s according to “Digital Learning Pulse Survey: Immediate Priorities,” a study conducted by Bay View Analytics

+++++++++++++

Free and Discounted Ed Tech Tools for Online Learning During the Coronavirus Pandemic

Dian Schaffhauser  03/16/20

https://campustechnology.com/articles/2020/03/16/free-and-discounted-ed-tech-tools-for-online-learning-during-the-coronavirus-pandemic.aspx

here some examples from a long list of free services:

Addigy, a cloud-based Apple device management platform, has announced free 60-day access for colleges and universities. The program helps organizations deploy, manage, and track new and existing Apple devices from a single console; automate IT tasks and implement IT policies related to deploying software, updating security settings, running scripts, managing groups of users, and distributing and updating software; and troubleshoot problems for users remotely and in real-time. https://addigy.com/covid-19-addigy-60/?utm_content=covid-19-addigy-60

Arizona State University’s EdPlus is working with Complexly’s Crash Course on a series of entry-level course videos, starting with English composition. (Complexly and Crash Course are an initiative of the Green brothers, hosts of a popular vlog and best-selling fiction.) The new content in “Study Hall,” won’t offer credit or replace any degree programs, but rather will serve as a supplement for high school or college learners. Each subject will be the focus of about 15 videos 15 minutes long, covering major points in the topic. Those are being hosted on YouTube. https://www.youtube.com/playlist?list=PLNrrxHpJhC8mNXjrAL3Ey1Q6iI35cymzl

Babbel is offering three months of free language learning to U.S. students through mid-June 2020 in any of its languages: Spanish, French, German, Italian, Portuguese, Polish, Russian, Dutch, Turkish, Danish, Norwegian, Swedish, Indonesian, and English. https://welcome.babbel.com/en/student-discount/

Gale is offering educators and librarians free access to digital content and resources to enhance instruction and learning. Resources include: interdisciplinary, curriculum-aligned resources to support online learning; live and on-demand training materials; e-books on virtual learning; and more. https://www.gale.com/covid19support.

Through July 1, Google is allowing G Suite for Education customers to use the Hangouts Meet premium functionality for free. People can host virtual meetings with up to 250 people and live streams with up to 100,000 viewers. Additionally, they’ll be able to save recordings of their meetings to Google Drive. https://support.google.com/meet/answer/9760270?hl=en

++++++++++++
more on online teaching in this IMS blog
https://blog.stcloudstate.edu/ims?s=online+teaching

Keep the Crashers Out of Your Zoom

+++++++++
https://blog.zoom.us/wordpress/2020/03/20/keep-the-party-crashers-from-crashing-your-zoom-event/

How to Keep the Crashers Out of Your Zoom Event

++++++++++++++

How to Secure Your Zoom Meetings from Zoom-Bombing Attacks

https://www.bleepingcomputer.com/news/software/how-to-secure-your-zoom-meetings-from-zoom-bombing-attacks/

++++++++++++++++

Maybe we shouldn’t use Zoom after all

he Intercept reported that Zoom video calls are not end-to-end encrypted, despite the company’s claims that they are.

Motherboard reports that Zoom is leaking the email addresses of “at least a few thousand” people because personal addresses are treated as if they belong to the same company

Apple was forced to step in to secure millions of Macs after a security researcher found Zoom failed to disclose that it installed a secret web server on users’ Macs, which Zoom failed to remove when the client was uninstalled

+++++++++++++

‘Zoom is malware’: why experts worry about the video conferencing platform

https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing

security researchers have called Zoom “a privacy disaster” and “fundamentally corrupt” as allegations of the company mishandling user data snowball.

A report from Motherboard found Zoom sends data from users of its iOS app to Facebook for advertising purposes, even if the user does not have a Facebook account.
++++++++++++++++

Zoom’s security and privacy problems are snowballing from r/technology

+++++++++++++++++++

this Tweet threads informative:

+++++++++++++++++

https://www.edsurge.com/news/2020-03-27-holding-class-on-zoom-beware-of-these-hacks-hijinks-and-hazards

your teaching online we can help

both these tweets very valid about the past:

while this one is very valid for the present

in a need to choose the right tool for remote learning? Contact us, we will help you

lockdown drills

About 95% of American public schools conduct some form of regular active shooter safety drill — sometimes called a lockdown or active threat drill — according to the National Center for Education Statistics. But concerns are growing that these drills have not been proven effective in preventing violence and that they may even traumatize some students.

In a 2019 research paper, James H. Price and Jagdish Khubchandani found a lack of empirical evidence in favor of active shooter drills and other “hardening” measures used in schools. Partly this is because gun violence in school remains very rare.

And yet, the school security industry is worth a reported $3 billion. Guy Grace with the Partner Alliance for Safer Schools, an educator and industry partnership, insists that twice a year active shooter drills for students are an important piece of violence prevention.

Higher ed trends 2020 educause

Higher Education’s 2020 Trend Watch & Top 10 Strategic Technologies

D. Christopher Brooks  Mark McCormack  Ben Shulman Monday, January 27, 2020

https://library.educause.edu/resources/2020/1/higher-educations-2020-trend-watch-and-top-10-strategic-technologies

https://www.educause.edu/ecar/research-publications/higher-education-trend-watch-and-top-10-strategic-technologies/2020/introduction

Top 10 Strategic Technologies

    1. Uses of APIs
    2. Institutional support for accessibility technologies
    3. Blended data center (on premises and cloud based)
    4. Incorporation of mobile devices in teaching and learning
    5. Open educational resources

Technologies for improving analysis of student data

    1. Security analytics
    2. Integrated student success planning and advising systems
    3. Mobile apps for enterprise applications
    4. Predictive analytics for student success (institutional level)

At least 35% of institutions are tracking these five technologies in 2020: Support for 5G; Wi-Fi 6 (802.11 ax, AX Wi-Fi); Identity as a Service (IDaaS); Digital microcredentials (including badging); Uses of the Internet of Things for teaching and learning; and Next-generation digital learning environment

++++++++++
more on educause in this IMS blog
https://blog.stcloudstate.edu/ims?s=educause

Vietnam cybercrime law

Vietnam’s battalions of ‘cyber-armies’ silencing online dissent from r/TechNewsToday

Vietnam‘s cyber-army, also known as Force 47, was deployed to counter the content on social media platforms deemed critical of the way the authorities handled the situation.

Vietnam’s Force 47 is run by the Ministry of Public Security (MPS) to hack anti-government websites and spread pro-government messages online, and is believed to be at least 10,000-strong.

Digital rights campaigners accuse Vietnam of attempting to replicate China’s “Great Firewall”  by regulating and censoring the internet  with the cybersecurity law.

Neither Google, which owns YouTube, nor Facebook has complied with the legislation, which requires the American tech giants to open local data storage facilities inside Vietnam by January 1.

Vietnam has a population of 96 million. With more than 60 million Facebook users, it is the platform’s one of the fastest-growing markets.

1 2 3 4 5 18