Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged workplace

Rss Feed Group items tagged

Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

2007 Junior Achievement/Deloitte Teen Ethics Survey | - 0 views

  •  
    In alarming numbers, teenagers who think they are fully prepared to make ethical decisions are also driven by the pursuit of success to cheat, by time constraints to plagiarize, and by vengeance to inflict physical violence. This paints a disturbing picture for employers who will be relying on this age group to fill the pipeline in their future workforces. The fifth annual JA/Deloitte Teen Ethics Survey found that while most teens (71 percent) feel fully prepared to make ethical decisions in the workplace, nearly 40 percent of those young people believe that lying, cheating, plagiarizing, and violence are sometimes necessary to succeed in school. Download the attached Executive Summary and survey results documents to learn more.
Anne Bubnic

The Technology Generation Gap at Work is Oh So Wide - 0 views

  •  
    Interesting report on comparison of technology usage in the workplace by boomers and Gen Y.
Anne Bubnic

Domino's employees fired over YouTube videos - 0 views

  •  
    Yet another incident showing use and misuse of technology with no understanding of offline consequences for online behavior. This time, however, it occurs in the workplace and not at school.
Go Jobio

World's 100 Most In-Demand Employers - Business Insider - 0 views

  •  
    Google, Apple, and Facebook are known for offering attractive perks, great pay, and excellent workplace cultures - so it's no surprise that they're also three of the world's most sought-after places to work right now.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Tapscott on Changing Pedagogy for the Net Generation - 6 views

  • Collaboration is another major hallmark of the Net Generation. However, Tapscott said, we have a tendency to squander or prohibit this strength in schools and workplaces.
  • "What do we do with this collaboration-geared generation? We stick them in a cubicle, supervise them like they're Dilbert, and take away their tools (i.e., blocking sites like Facebook and Youtube)." Tapscott calls this creating a generational firewall. "It says, 'We don't get you, we don't understand your tools, and we don't trust you to use them.'"
  • We can’t just throw technology in a classroom and expect good things," notes Tapscott. We need to move away from an outdated, broadcast-style of pedagogy (i.e., lecture and drilling) toward student-focused, multimodal learning, where "the teacher's no longer in the transmission of data business; she's in the customizing-learning-experiences-for-students business."
  •  
    To reshape pedagogy, Tapscott says that we must consider eight norms for the Net Generation: freedom, customization, scrutiny, integrity, collaboration, entertainment, speed, and innovation.
Anne Bubnic

Cyberbullying Goes to College - 0 views

  • Welcome to Cyberbullying 2.0, the adult version of the meanest pastime on MySpace and Facebook. In recent years, the dangerous game has grown up and grown calculated.
  • ts consequences now include adult-sized miseries — dashed career opportunities, ruined professional relationships, crippling anxiety, even thoughts of suicide.
  • Rate My Professors, the online host of Bierman’s nemesis, now boasts more than eight million student-generated ratings of more than a million professors at 6,000 schools.
  • ...1 more annotation...
  • uedj encourages faculty members who believe they have been victimized to act quickly and tell their department chairs that false rumors are being spread. Staff members should immediately inform a supervisor and seek help through the FSAO, which can help arrange legal and psychological support. “The research literature shows that bullying behaviors are not effectively stopped by intervening in a haphazard, case-by-case basis,” Guedj says. “Isolated supervisors and department heads who have little to no experience in such matters are usually in way over their heads.”
  •  
    In summer 2007, a music professor at BU was shocked to learn that he had a Facebook page - in his name, with a recent photo and a spot-on bio. But, the professor recalls, "embedded in the document were really scurrilous things that were reputed to have been said by me, and they were quite unpleasant and ugly and immature."
Vicki Davis

Dismissing the immoral teacher for conduct outside the workplace - 1 views

  •  
    From Scott McLeod - an article that he says he does not agree with, but does state that this is the current law as it pertains to teacher behavior outside school.
1 - 9 of 9
Showing 20 items per page