Skip to main content

Home/ ETAP640/ Group items tagged security

Rss Feed Group items tagged

Joan McCabe

Maslow's Hierarchy of Needs - 0 views

  • Security Needs These include needs for safety and security. Security needs are important for survival, but they are not as demanding as the physiological needs. Examples of security needs include a desire for steady employment, health insurance, safe neighborhoods, and shelter from the environment.
  •  
    Maslow's pyramid of needs that need to be fulfilled before a student can achieve individual potential, or before they can have optimal learning experiences.
ian august

Clearswift's 'Web 2.0 in the Workplace' report launched | Dynamic Business - Small Busi... - 0 views

  • Independent international research undertaken by Clearswift in 2007 found that just 11% of global businesses were making use of Web 2.0 technologies such as Facebook and Salesforce.com
  • Three years on, the latest figures show over two-thirds of companies are allowing and encouraging the use of web collaboration or social media tools in the workplace.
  • Australian business users enjoy high use of Web 2.0 technologies, such as collaborative meeting, intranet, financial, CRM and social networking applications. However, they appear the least concerned about the security implications (at 53%) despite ranking second highest of respondents who have sent
  • ...4 more annotations...
  • content via email or online applications they later regretted (29%).
  • however the research shows that half of managers believe that web collaboration te
  • ology is now ‘critical’ to the future success of their business.”
  • Barriers to adoption: Barriers to adoption of social media have shifted from productivity to focus on security, with 53 percent of companies concerned about security threats and 31 percent concerned about data breaches.
Tera

For Students | STAYSAFEONLINE.org - 2 views

  • The Internet is an amazing tool that provides both opportunities and risks. It is a source of endless information, but must be used with good judgment. When you log on to the campus network (or any network), what you do online could have impact not only on your one computer but other students and the network as well. By combining up-to-date security tools with good judgment, you and your college community are much less likely to encounter a security violation, loss of data, or system problems.
Michael Lucatorto

ExamGuard by Pearson - 0 views

  •  
    Software advertised by Pearson to secure online assessments and maintain exam integrity
Hedy Lowenheim

Libraries Struggle to Close the 'Digital Divide' - Room for Debate - NYTimes.com - 0 views

  • In the 21st century, high-speed Internet access is almost as essential as electricity. That libraries serve as the provider for millions of Americans isn't something to celebrate. It's a sign that we're in trouble. We're depriving people of basic information access that is central to every policy we care about – including health, education and national security – even though every American should be able to communicate reliably and access information at any time.
Erin Fontaine

Media Use Statistics                                           Resources on m... - 0 views

  • ne out of ten 13- to 17-year-olds have used some form of social media
  • 68% of all teens say Facebook is their main social networking site
  • 51% visit social networking sites daily
  • ...12 more annotations...
  • 34% of teens visit their main social networking site several times a day
  • 23% of teens is a “heavy” social media user, meaning they use at least two different types of social media each and every day
  • A new study finds that 20 percent of third grade students have cell phones and 90 percent of them are online, while 83 percent of children in middle school have one.
  • 63% of all teens say they exchange text messages every day with people in their lives, including their parents
  • Half (52 percent) of all zero- to 8-year-olds have access to a new mobile device such as a smart phone, video iPod, or iPad/tablet
  • Fully 95 percent of all teens ages 12-17 are now online, and 80 percent of online teens are users of social media sites. Teens of all ages and backgrounds are witnessing these mean behaviors online and are reacting in a variety of ways:
  • Ninety percent of teen social media users say they have ignored the mean behavior they have witnessed on a social network site. Eighty percent say they have personally defended a victim of meanness and cruelty. Seventy-nine percent say they have told someone to stop their mean behavior on a social network site. Twenty-one percent say they have personally joined in on the harassment of others on a social network site. Source
  • Nearly 90% of older teens (aged 14-17) have a cell phone, while just under 60% of 12- to 13-year-olds have a cell phone
  • More than a third (38 percent) of children this age have used one of these devices, including 10 percent of zero-to 1-year-olds, 39 percent of 2- to 4-year-olds, and more than half (52 percent) of 5- to 8-year-olds.
  • In a typical day, one in 10 zero- to 8-year-olds uses a smart phone, video iPod, iPad, or similar device to play games, watch videos, or use other apps. Those who do such activities spend an average of 43 minutes a day doing so
  • Sixty-five percent of high school students use cell phones in school.
  • One-quarter of text messages sent by teens are sent during class.
Amy M

Original iPad Open to Attack Due to Lack of iOS 6 Update - International Business Times - 0 views

  • Apple has released an early beta version of iOS 6 to developers - which we have reviewed - but when it is available to the public in the autumn it will only work on the iPad 2 or newer, iPhone 3GS or newer and the 4th generation iPod touch or newer.
  •  
    iPad 1 not supported in new iOS release
diane hamilton

ECRP. Vol 5 No 2. The Role of Child Development and Social Interaction in the Selection... - 0 views

  • A closer look might provide insight into how this experience will assist in Rachel's development: Positive emotions are created from the established lap reading routine that generates an intimate closeness and feeling of security. Interactive social dialogues between Rachel and her mother build on prior knowledge and provide immediate feedback as they discuss each animal as the story progresses. The language they use to label, compare, explain, and classify creates a supportive context for structuring the processes of thinking and concept formation. Each of the domains of development—linguistic, cognitive, social, and emotional—is affected during Rachel's experience, and all play an important role in her development
  • As Rachel began to internalize the actions and language of her mother, she began to use these tools to guide and monitor her own processing behavior until she is now able to take over much of the responsibility for reading the book (Dorn, French, & Jones, 1998)
  • A framework for understanding the interrelated nature of the cognitive, social, emotional, linguistic, and literacy development of children; social interaction; and literature selection in grades K-4 is provided in the appendix. The purpose of the framework is to provide a general guide for teachers, parents, and other caregivers in the appropriate selection of books that takes into consideration the importance of child development.
  •  
    this article contains a useful reference table for developing interest in literacy and applies to development of literacy dispositions and life-long learning
Heather Kurto

Making Sense of MOOCs: Musings in a Maze of Myth, Paradox and Possibility | Daniel | Jo... - 0 views

  • The first course carrying the name MOOC was offered in 2008, so this is new phenomenon. Second, the pedagogical style of the early courses, which we shall call cMOOCs, was based on a philosophy of connectivism and networking. This is quite distinct from the xMOOCs now being developed by elite US institutions that follow a more behaviourist approach. Third, the few academic studies of MOOCs are about the earlier offerings because there has been no time for systematic research on the crop of 2012 xMOOCs. Analysis of the latter has to be based on a large volume of press articles and blogs. Fourth, commentary on MOOCs includes thinly disguised promotional material by commercial interests (e.g. Koller, 2012) and articles by practitioners whose perspective is their own MOOC courses.
  • The term MOOC originated in Canada. Dave Cormier and Bryan Alexander coined the acronym to describe an open online course at the University of Manitoba designed by George Siemens and Stephen Downes. The course, Connectivism and Connective Knowledge, was presented to 25 fee-paying students on campus and 2,300 other students from the general public who took the online class free of charge (Wikipedia, 2012a).
  • Can xMOOCs make money?
  • ...10 more annotations...
  • technology has been about to transform education for a long time
  • In 1841 the 'inventor of the blackboard was ranked among the best contributors to learning and science, if not among the greatest benefactors to mankind'. A century later, in 1940, the motion picture was hailed the most revolutionary instrument introduced into education since the printing press. Television was the educational revolution in 1957. In 1962 it was programmed learning and in 1967 computers. Each was labelled the most important development since Gutenberg's printing press.
  • But first, we agree with Bates (2012) that what MOOCs will not do is address the challenge of expanding higher education in the developing world. It may encourage universities there, both public and private, to develop online learning more deliberately, and OER from MOOC courses may find their way, alongside OER from other sources, into the teaching of local institutions.
  • He notes (Siemens, 2012) that 'MOOCs are really a platform' and that the platforms for the two types of MOOC that we described at the beginning of the paper are substantially different because they serve different purposes. In Siemens' words 'our cMOOC model emphasises creation, creativity, autonomy and social networking learning.
  • teaching methods 'are based on very old and out-dated behaviourist pedagogy, relying primarily on information transmission, computer-marked assignments and peer assessment'.
  • Another myth is that computers personalise learning. Bates (2012) again: 'No, they don't. They allow students alternative routes through material and they allow automated feedback but they do not provide a sense of being treated as an individual.
  • With such support MOOCs provide a great opportunity to develop new pedagogy. In a world of abundant content, courses can draw from a pool of open educational resources (OER) and provide their students with better and more varied teaching than individual instructors could develop by themselves. The University of Michigan (2012) (which made history by using OER from Africa in its medical school) uses OER extensively in its Coursera course Internet History, Technology and Security. UC Berkeley (2012) draws extensively on OER in its course on Quantum Computing.
  • pedagogy is not a familiar word on the xMOOC campuses. It is a myth that professors distinguished by their research output are competent to create online courses without help.
  • This, in turn, will put a focus on teaching and pedagogy to which these institutions are unaccustomed, which will be healthy. At the same time academics all around the world will make judgements about the intellectual quality and rigour of the institutions that have exposed themselves in this way.
  • With such support MOOCs provide a great opportunity to develop new pedagogy. In a world of abundant content, courses can draw from a pool of open educational resources (OER) and provide their students with better and more varied teaching than individual instructors could develop by themselves.
dkiesel

Get Your Learners Chatting in Your Next E-learning Course - The Rapid eLearning Blog - 1 views

    • dkiesel
       
      draw from the facts and engage in new thought - stick to the facts and discipline your thoughts to the facts - don't we get this confused in our daily lives? 
  • reating an online chat is fairly easy to do today. There are many good chat tools available and quite a few of them are free. In addition, many organizations have chat capabilities as part of their technology infrastructure so that you can use an internal chat tool and not have security or access issues.
  •  
    "draw different implications from [the facts] and engage in new trains of thought."
s k

Sign in to Diigo | Diigo - 0 views

shared by s k on 11 Jul 08 - No Cached
1 - 20 of 21 Next ›
Showing 20 items per page