Skip to main content

Home/ MALET Issues/ Group items tagged security

Rss Feed Group items tagged

dpangrazio

Where is the governance in Internet governance? - 0 views

  •  
    The governance of the Internet provides one of the most important arenas in which new ideas regarding Internet studies can be applied and tested. . "If the government, NGOs and other stakeholders would expand their perspectives on Internet governance derived from more institutionalized arenas, and from a more sophisticated understanding of the way inter-state politics play a role in establishing the pressures and constraints of security policy, it would allow a more critical understanding of the way security claims can be exploited strategically to advance the interests of military and governmental actors'
Tim Burke

Online Privacy and Secure Management of Data - 2 views

http://resolver.ebscohost.com.library.esc.edu/openurl?sid=EBSCO%3aaci&genre=article&issn=13634127&ISBN=&volume=14&issue=3&date=20090801&spage=124&pages=124-130&title=Information+Security+Technical+...

data security privacy

started by Tim Burke on 03 Dec 16 no follow-up yet
sophiaavella

New York State Education Department Data Privacy and Security Policy - 0 views

  •  
    Reviews the standards, purpose, and objective for data privacy and security in New York State schools
scbruno

Medical Schools Embrace Benefits of Tablets, Mobile Devices; Create New Ways of Learning - 1 views

  •  
    By Alicia Gallegos, special to the Reporter During a student demonstration in 2010, instructors at Stanford University School of Medicine loaded a children's wagon with all the learning materials medical students traditionally acquire in their preclinical years. The towering stacks of paper rose 3 feet high.
  •  
    Scott, An interesting article. I know that medical schools (and allied health education, including nursing) have been leaders in adopting new technologies for educational purposes. Medical schools immediately identified a use for using podcasts to teach medical students how to detect abnormal heart sounds! Research quickly followed to prove this to be the most effective form of teaching normal and abnormal cardiac sounds. This learning concept is also used to teach radiology residents how to recognize normal and abnormal blood flow sounds when examining vessels (arteries/veins) using doppler ultrasound. Pharmacy schools (and departments) have utilized iPads/tablets/smartphone to run apps (http://www.appszoom.com/android-apps/pharmacology) that include entire pharmacology drug reference lists, commonly used drugs/medications, standard dosages, etc. for quick, searchable referencing.
  •  
    Scott, I am curious about the level of security placed on the wireless networks used in hospital environments. The more mobile the physicians, nurses and caregivers, the more secure the wireless networks need to be. What measures are being taken to guarantee secure airwaves? Bill
scbruno

Which Android Security Tools Are Worth Your Time? - 0 views

  •  
    As Android smartphones and tablets grow in popularity, it's no surprise that the number of malware outbreaks is growing. Mobile antimalware apps can give your phone or tablet an extra layer of protection--but which ones do the job? Independent security testing lab AV-Test evaluated 41 virus scanners for Android, including those by mainstream security companies like Norton and Trend Micro.
toddplymale

How Educational Institutions Are Failing to Adequately Protect Student Data - Security ... - 0 views

  •  
    This news article is from a lesser known online publication, though the author is careful to provide links to well-known publications and government sources to support their points. The goal is to highlight the lack of security protocols by universities and schools managing student data and the potential hazards including hackers releasing student information
anonymous

Chief Privacy Officer's 2021 Annual Report on Data Privacy and Security - 2 views

  •  
    This report out of NYS looks at a variety of issues regarding data privacy in NYS School districts. It looks at the number of violations, the cause of the violation, and advisement to districts of how to avoid these problems.
Tim Burke

Playing Defense: Why journalists need to be diligent about securing data in the field - 1 views

http://library.esc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgea&AN=edsgcl.303975394&site=eds-live

data security

started by Tim Burke on 03 Dec 16 no follow-up yet
scbruno

7 essential steps to secure your smartphone or tablet | Komando.com - 0 views

shared by scbruno on 07 Nov 15 - No Cached
  •  
    Think for a second about how much of your life is on your smartphone or tablet. It probably has emails, texts, call logs, contacts, browsing history, social media apps, finance apps, saved passwords, credit card numbers, personal photos and more.
scbruno

10 simple ways to secure and optimize your iPad - 0 views

  •  
    The iPad has become a mainstay in the industry , but with its increased use comes the increased risk of breaches. And although preventing them seems basic, Christina Thielst, vice president at Tower Strategies and author of the blog Christina's Considerations , believes there are benefits to be had from discussing simple ways to not only protect, but also optimize your iPad.
toddplymale

A Resource-Constrained Approach to Implementing Analytics in an Institution of Higher E... - 0 views

  •  
    This article analyzes the constraints of analytics when used to improve student retention. I will use it for this purpose as well as its discussion on the lack of security associated with educational data.
dpangrazio

Online risks obstructing safe internet access for students - 1 views

  •  
    This article examines the risk to students on the internet. It talks about adult content, cyberbullying sexual harassment, online gambling etc. and the safety issues that go along with these topics. There was a study done that logged data to see if student preferred web sites were to understand whether students can visit web sites which contain unsafe material bypassing the computer-supported security policies and to see which types of web locations contain unsafe content.
sophiaavella

The Educator's Role: Privacy, Confidentiality, and Security in the Classroom - Student ... - 3 views

  •  
    A look into how we ensure that teachers have the knowledge to make decisions regarding student privacy and follow best security practices?
teneyck

Government regulations in cyber security - 1 views

Srinivas, Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188. https://doi.org/10.101...

MALET Social & Ethical Issues privacy

started by teneyck on 30 Mar 22 no follow-up yet
Tim Burke

When it rains, it pours: protecting student data stored in the cloud - 1 views

http://library.esc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgea&AN=edsgcl.455286508&site=eds-live

data security

started by Tim Burke on 03 Dec 16 no follow-up yet
Tim Burke

Mobile Technology Theft and Security - 1 views

http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm

mobile technology

started by Tim Burke on 03 Dec 16 no follow-up yet
Mark Ness

The Ethics and Issues of Preservation in a Rapidly-Changing Digital Environment: An Ann... - 0 views

  •  
    This is an annotated bibliography comparing digitization (i.e., "creating digital surrogates of paper-based sources") as a form of artifact preservation to the preservation of digital resources (i.e., archiving digitally created sources). Articles included in the bibliography share a common idea that institutions need to commit to collaborating if digitization of artifacts is to be completed satisfactorily. Cox (2008) states in the abstract that "archival security is not just about guarding against theft and vandalism; it is about accountability and ethics and the potential challenges to archives and archivists" (p. 12). According to Cottrell (1999), digital archiving "technologies have created new ethical dilemmas in librarianship. Four possible areas of concern are identified: privacy and confidentiality, acquisitions and collection development, archiving and preservation, and deskilling and gender bias" (p. 11).
1 - 20 of 22 Next ›
Showing 20 items per page