Skip to main content

Home/ WomensLearningStudio/ Group items tagged security

Rss Feed Group items tagged

Lisa Levinson

8 digital skills we must teach our children | World Economic Forum - 0 views

  •  
    Written by Yuhyun Park , the chair of infollutionZero Foundation. Great graphic of the digital literacies children must learn as "they spend, on average, 7 hours a day in front of screens from television and computers to mobile phones and various digital devices." He defines these skills as Digital Intelligence, or DQ: Digital Safety (behavior risks, content risks, contact risks), Digital Security (password protection, internet security, mobile security), Digital Emotional Intelligence (empathy, emotional awareness/regulation, social and emotional awareness), Digital Communication (online collaboration, online communication, digital footprint), digital literacy (computational thinking, content curation, critical thinking), digital rights (privacy, intellectual property rights, freedom of speech), digital identity (digital citizen, digital co-creator, digital entrepreneur), and Digital Use (screen time, digital health, community participation).
Lisa Levinson

Gender: Food security - 0 views

  •  
    Food and Agriculture Organization of the United Nations report on food security and how women play a decisive role in household food security, dietary diversity, and children's health. When looking at making sure everyone has enough to eat, involving women is crucial, yet in many societies they are not allowed to be part of the process.
Lisa Levinson

3 Ways Technology Ignorance Can Cost You - 0 views

  •  
    The first will do anything you tell them, as long as the ones, zeros, and higher-level instructions pan out. The latter will do a variety of things depending on their needs, moods, emotions, and understanding of what is happening and acceptable and important. When the human beings start using the technology, failure becomes a problem that must be managed. As most anyone who has had their email hacked can tell you, the weakest link in any security system is usually the humans. And sometimes the humans leave the door wide open, in part because they don't understand how to close it, don't care enough about closing it, or think the IT folks are just jerks for demanding it be checked so often.
Doris Reeves-Lipscomb

Google's Chrome to start auto-pausing Flash ads today - 0 views

  • As for Flash, the change in Chrome's behavior is just another cut that's making the security-flaw-ridden platform less relevant and, hopefully, soon obsolete.
  •  
    on Mashable, Stan Schroeder, end of August 2015 As for Flash, the change in Chrome's behavior is just another cut that's making the security-flaw-ridden platform less relevant and, hopefully, soon obsolete.
Lisa Levinson

Architecting for Data | Stanford Social Innovation Review - 0 views

  •  
    by Rahul Bhargava in the summer issue. Nice article on effective use of data for organizations. He stresses that "to use data effectively, orgs need architecture - people, process, and technology-driven structures that support the effective and intentional use of data to further their mission - for data management, data security, data culture, and data use." Nice use of graphic icons to simplify most sections.
  •  
    by Rahul Bhargava in the summer issue. Nice article on effective use of data for organizations. He stresses that "to use data effectively, orgs need architecture - people, process, and technology-driven structures that support the effective and intentional use of data to further their mission - for data management, data security, data culture, and data use." Nice use of graphic icons to simplify most sections.
Doris Reeves-Lipscomb

Leaning into Discomfort: Social Sector Leadership in the 21st Century - NPQ - Nonprofit... - 0 views

  •  
    Article on Leaning into Discomfort: Social Sector Leadership inthe 21st Century, NPQ (Nonprofit Quarterly), May 7, 2012 Excerpt from interview with Nancy Northup, Center for Reproductive Rights: ""In fact, leaning into discomfort, I think, is critical, to make sure that what we are doing-both externally, as we work to establish reproductive rights around the world, and internally, at the organization level-is bold enough. The organization had better be feeling discomfort if it's leaning into new strategies and ways of working. "You have always to ask, Am I pushing for the change that's really needed? On all of those levels, you have to continually refresh and check and make sure that you're getting the most power for the mission by being as uncomfortable as possible. Because change is hard, and the reason why you have to look at all those different levels-yourself, your organization, and then the world-is that if you're not willing to hold the tension of change as an organization, how can you begin to understand what you have to risk and what others have to risk to make change happen in the world?"" Excerpt from interview with Ai-jen Poo, National Domestic Workers Alliance: As Poo observed, "Domestic workers work in isolated workplaces. They don't have any job security whatsoever, and there are no labor standards or protections, except-for now-in New York, because of us. But really, there's nothing mediating the relationship between a worker and an employer-your workplace is somebody else's so-called castle. It already takes a lot of courage to assert your rights and dignity, and to make sure that you get paid on time, and to make sure that you can get home on time to your own children. And all of these challenges that are just day-to-day challenges of living in that environment already demonstrate a tremendous amount of day-to-day courage." Excerpt from interview with George Goehl, National People's Action
anonymous

Five LinkedIn Strategies You Haven't Thought Of Before - 1 views

  •  
    "Last week a client asked if I could stay for a bit after our weekly meeting so he could thank me, not for a PR project, but to show me how he'd used a tactic I'd shown him on LinkedIn to put himself well on the track of securing a much more aggressive marketing budget next year. Wow!"
Lisa Levinson

Latinos Are the Future of US Economic Security | Stanford Social Innovation Review - 0 views

  •  
    Maria Perez, in this article on 4/23/15 from the Stanford Social Innovation Review blog, states that by 2043 the US will be a "minority" nation, and the Latino population will increase by more than 100% between now and 2060 when one in three people will be Latino. As a result of this, she argues that it is time to embrace the idea of new integration models that will increase Latino college graduation rates, wealth, income, representation in all professions, boards of directors, gov't, and business. The article goes on to describe what these integration models could be.
Doris Reeves-Lipscomb

Big Data vs. Big Brother - InFocusInFocus - 0 views

  • This may be oversimplifying, but the nuance with privacy is that it’s not just about securing personally identifiable information (PII), it’s also about considering what other related pieces of information could be used together to infer PII. Therefore, you need to be very careful about the information you share, and the intentions of the people who collect it.
  • but the nuance with privacy is that it’s not just about securing personally identifiable information (PII), it’s also about considering what other related pieces of information could be used together to infer PII. Therefore, you need to be very careful about the information you share, and the intentions of the people who collect it.
  • As we train people to become Data Scientists and design sophisticated algorithms, I encourage practitioners and leaders to consider the trade offs between utility and privacy. This is a new, emerging and complex area, and I’ll explore it further in future posts.
  •  
    blog post by David Dietrich, June 25, 2013, director of technical marketing for the big data solutions group at EMC, founder of an initiatve at MIT, big data@CSAIL on how privacy is sacrificed online because of big data collection and algorithms that can figure out profiles based on seemingly unrelated information.
Lisa Levinson

Architecting for Data | Stanford Social Innovation Review - 1 views

  •  
    Four ways nonprofits can cut through the data hype and start using data on purpose. Architecture for Data Management, Architecture for Data Security, Architecture for Building a Data Culture, Architecture for Data Use.
Doris Reeves-Lipscomb

The Benefits Of Professional Organization Membership | Star Tribune - 0 views

  •  
    article by Robert Elsenpeter, Star Tribune, 2008. Expand Your Network Many admins are already members of the International Association of Administrative Professionals (IAAP). And while that is a group worth joining, there are other organizations - like Toastmasters - that can help your professional life. "Attend community groups and industry association meetings," says Kathy Northamer, vice president of OfficeTeam in the Twin Cities. "Make presentations on your area of expertise. Volunteer with a nonprofit. You'll not only gain new contacts, but acquire experience and work samples you can use to build your career." Different organizations can offer different opportunities. But there is one thing they all have in common and it's something beneficial for the admin. "Networking, networking, networking!" says Northamer. "The more contacts in your network who know you, the more likely you will secure leads, interviews and interesting job offers." Reasons to Join a Professional Organization: Personal and professional development resources. Networking opportunities. Professional certification that can help your career. Service and support from the national organization. Opportunities to develop one's leadership skills. Discounts on related products and services. Regular organization conferences. Member publications.
Doris Reeves-Lipscomb

Don't Blame Tenured Academics for the Adjunct Crisis - The Chronicle of Higher Education - 0 views

  •  
    beautiful brief assessment of impact of losses in workplace and how they negatively affect earnings, job security, & retirement
Lisa Levinson

7 Mobile Technology Skills You Need to Master - WorkIntelligent.ly - 0 views

  •  
    As mobile technology replaces pc and mainframe technology, and more business is done using tablets and smartphones, these skills, managing battery life,using your phone camera effectively, keeping work files,contacts, email ready offline so they can be used without wifi, managing alert noise, sending downloading, editing files, etc become very important.
Doris Reeves-Lipscomb

The FTC's Privacy Cop Cracks Down | MIT Technology Review - 0 views

  • You’ve brought major cases against Facebook and Google, and you’re requiring them to undergo audits every two years until 2032. What is the significance of those cases? These are examples of enforcement actions we brought to ensure that companies adhere to the promises they make to consumers about privacy.
  • n the meantime, your agency recommended that Internet companies voluntarily adopt a “Do Not Track” policy. What if they don’t?
  • That technology is coming to the U.S., and coming very quickly. It’s obviously a great convenience for consumers, but there are serious privacy and security issues.
  •  
    short interview with David Vladeck, former head of FTC Consumer Affairs on privacy issues online and how Google and Facebook failed to live up to protecting privacy of their users. by Jessica Leber, June 26, 2012.
Doris Reeves-Lipscomb

Let's Embrace Our Open-Source Overlords: Associations Now - 0 views

  • Open-source software often gets derided for its downsides—maintenance concerns, the need for development resources, concerns about security—but its huge transparency and collaboration benefits typically get missed.
  • (It’s worth noting that you may be using open-source software without realizing it: Most major content management systems, including WordPress and Drupal, are based on open-source code bases. Not that you’d immediately think of them in that context.)
  • Open source tends to follow current standards. The reason Mozilla Firefox gained so much momentum on Microsoft’s Internet Explorer about a decade ago has everything to do with programming strategy. IE, being proprietary and without much competition, didn’t have a reason to keep innovating quickly. Firefox, on the other hand, was in a spot to iterate relatively quickly and drive online development—and when Google Chrome came into the picture, this process moved even faster. This is true of a lot of open-source software. It can ensure you’re working with this year’s model.
  •  
    good article on value of open source software by Ernie Smith, Associaitons Now, June 16, 2015
Doris Reeves-Lipscomb

Living by the Numbers: The End of Inspector Chance - SPIEGEL ONLINE - 0 views

  • Two professors, computer scientist George Mohler and anthropologist Jeffrey Brantingham, who specializes in crime scenarios, were instrumental in developing the predictive method of fighting crime. Their program is based on models for predicting the aftershocks of earthquakes.
  • The two data experts, Mohler and Brantingham, have since started a company and are marketing their product, Predictive Policing, worldwide
  • "Security is one of the biggest growth areas for Big Data applications," says Schröder. In addition to crime and terrorism, Splunk focuses on the growing number of attacks in, and by means of, the Internet and its software can detect hacker attacks or other cyber attacks. "We are positioning ourselves for an expanding cyber war," Schröder says. But the data hunters' new war also has many civilian aspects.
  •  
    part of a series on Big Data, Spiegel
Doris Reeves-Lipscomb

Shocker: 40% of Workers Now Have 'Contingent' Jobs, Says U.S. Government - Forbes - 0 views

  • Tucked away in the pages of a new report by the U.S. General Accounting Office is a startling statistic: 40.4% of the U.S. workforce is now made up of contingent workers—that is, people who don’t have what we traditionally consider secure jobs.
  • It reinforces estimates of the independent workforce that have come from observers ranging from the Freelancers Union to Faith Popcorn
  • people in this workforce are struggling economically
  • ...1 more annotation...
  • In its push for growth, Upwork faces competition from a growing number of other freelance platforms, ranging from general marketplaces such as Freelancer.com and People Per Hour to industry-specific ones, such as 99 Designs.
  •  
    article by Elaine Pofeldt, Forbes contributor, May 25, 2015, on 40% of the workforce working in "contingent" jobs as contractors, project employees, part-timers, on-call, agency temps, contract workers, etc. according to new GAO report.
Doris Reeves-Lipscomb

Google's Search Algorithm Could Steal the Presidency | WIRED - 0 views

  • So even at an order of magnitude smaller than the experimental effect, VMP could have serious consequences. “Four to 8 percent would get any campaign manager excited,” says Brian Keegan, a computational social scientist at Harvard Business School. “At the end of the day, the fact is that in a lot of races it only takes a swing of 3 or 4 percent. If the search engine is one or two percent, that’s still really persuasive.”
  • as Harvard Law professor Jonathan Zittrain has proposed—Facebook didn’t push the “vote” message to a random 61 million users? Instead, using the extensive information the social network maintains on all its subscribers, it could hypothetically push specific messaging to supporters or foes of specific legislation or candidates. Facebook could flip an election; Zittrain calls this “digital gerrymandering.” And if you think that companies like the social media giants would never do such a thing, consider the way that Google mobilized its users against the Secure Online Privacy Act and PROTECT IP Act, or “SOPA-PIPA.
  • tempting to think of algorithms as the very definition of objective, they’re not. “It’s not really possible to have a completely neutral algorithm,” says Jonathan Bright, a research fellow at the Oxford Internet Institute who studies elections.
  • ...1 more annotation...
  • Add the possibility of search rank influence to the individualization Google can already do based on your gmail, google docs, and every other way you’ve let the company hook into you…combine that with the feedback loop of popular things getting more inbound links and so getting higher search ranking…and the impact stretches way beyond politics.
  •  
    Adam Rogers, Science, Wired, 8.6.15, writes about how the Google tanking algorithm of positive and negative stories on the candidates could affect major elections 25% of the timer. This is the tyranny of the algorithm. They tested the impact in mock voter labs before elections in Australia and India where the impact of feeding positive stories about a candidate first shaped voters decisions between 24 and 72 percent of the time with certain voter groups. Voters in towns in the US that watch a local a Fox channel vote more conservatively because of recency and placement issues. While the numbers in real live do not add up to the impact achieved in the test research, when elections are decided by 1 or 2 percentage points, it's enough to turn the tide in favor of a candidate.
Doris Reeves-Lipscomb

Kill the Password: Why a String of Characters Can't Protect Us Anymore | WIRED - 0 views

  • All a hacker has to do is use personal information that’s publicly available on one service to gain entry into another.
  • Since that awful day, I’ve devoted myself to researching the world of online security. And what I have found is utterly terrifying. Our digital lives are simply too easy to crack.
  • The common weakness in these hacks is the password. It’s an artifact from a time when our computers were not hyper-connected. Today, nothing you do, no precaution you take, no long or random string of characters can stop a truly dedicated and devious individual from cracking your account. The age of the password has come to an end; we just haven’t realized it yet.
  •  
    It is ironic that this article on password vulnerability was published today. Mat Honan, Wired, August 11, 2015.
Doris Reeves-Lipscomb

It's Time to Review Your Adjunct Employment Policies - Commentary - The Chronicle of Hi... - 0 views

  • Also swelling is the number of adjuncts. They now make up 50 to 75 percent of those teaching in higher education. Why colleges rely so much on adjuncts has been discussed thoughtfully and at length elsewhere; chief among the reasons are that they are not as expensive as tenure-track professors, their scheduling can more easily align with the needs of the college, and firing them is not fraught with the same peril as firing full-time faculty members. It should hardly come as a surprise that all of the factors that make adjuncts attractive to administrators make them equally attractive to union organizers. For example, at Washington University in St. Louis, where adjuncts voted 138 to 111 in favor of organizing, the core issues were low wages, lack of benefits, and lack of job security.
  •  
    Adjunct employment in HE, February 16, 2015
1 - 20 of 23 Next ›
Showing 20 items per page