Your new post is loading...
Professeur documentaliste, library specialist.
Education nationale, France.
Interested in Web 2.0, Education, Social Media, Digital Literacy, Curation, STEM and LIS.
Discovering, Learning... for
Sharing Culture and Knowledge in a Digital Age.
You can also follow me on :
- Twitter : https://twitter.com/Terheck
- Google+ : https://plus.google.com/105731467372397585166
- Pinterest : http://pinterest.com/terheck/
- RebelMouse : https://www.rebelmouse.com/Terheck/
|Rescooped by Terheck from Digital Media Literacy + Cyber Arts + Performance Centers Connected to Fiber Networks|
A few short weeks ago, we were conducting a security training for a group of journalists in Palestine. The journalists were deeply aware of the potential threats facing them—and by not one, but three governments—but didn’t have the first idea of how to mitigate against those threats. “It’s too confusing!” claimed one, while another said it was futile.
Unfortunately, these reactions are all too typical. We’ve heard from a variety of populations all over the world. Despite all of the awareness-raising around surveillance that has taken place over the last year, many individuals feel disempowered, helpless to fight back.
Efforts such as the February 11 initiative the Day We Fight Back aim to empower individuals to lobby their representatives for better regulation of mass surveillance. But legislation and policy are only part of the solution.
In order to successfully protect our privacy, we must take an approach that looks at the whole picture: our behavior, the potential risks we face in disclosing data, and the person or entity posing those risks, whether a government or company. And in order to successfully fight off the feeling of futility, we must understand the threats we face.
In a recent piece for Slate, Cyrus Nemati hems and haws over the complexities of creating a private online existence, ultimately choosing to give up on Internet privacy and embrace the convenience of sharing. While working at an organization that advocates for digital rights, Nemati found himself anxious about his personal privacy and took steps that made browsing “a chore”; later, after getting married and wanting access to social tools, he claims he “learned … to love a less private Internet.”
The truth is that most of us simply can’t protect ourselves from every threat 100 percent of the time, and trying to do so is a recipe for existential dread. But once we understand our threat model—what we want to keep private and whom we want to protect it from—we can start to make decisions about how we live our lives online. You’ll find yourself empowered, not depressed.
Threat modeling is an approach undertaken by the security community. It looks at the specific circumstances of the individual and the potential threats facing him or her and makes a diagnosis (and a prescription) on that basis. Threat modeling looks at what a person has to protect (her assets), who she has to protect those assets from (her threat), the likelihood that she will need to protect them, her willingness to do so, and the potential consequences of not taking precautions.
A teacher in suburban California doesn’t have the same set of online privacy concerns than a journalist in Palestine. And the kinds of steps the teacher might take to protect his personal photos from nosey students and their parents are quite different from the precautions the journalist might take to protect her anonymous sources from being identified by the government.
Some us don’t want our Internet browsing habits tracked by companies like Google and Facebook. Some of us don’t want the NSA reading our emails. But without enumerating our threats and our assets, it’s easy to choose tools that are inappropriate or unnecessary to the task at hand.
The schoolteacher probably doesn’t need to PGP-encrypt his email or run every privacy-enhancing app and plugin, like Nemati did in his privacy hipster phase. The journalist might find that taking the time to use PGP gives her peace of mind.
Click headline to read more--
Every time I visit the Museum of Modern Art (MoMA) in New York City, I see something I’ve never seen before. In fact, t’s considered the most influential museum of modern art in the world. With that in mind, meet Klaus Biesenbach. Klaus holds the title “Chief Curator at Large” at MoMA. If you’ve visited the MoMA and walked away impressed (like I have), Klaus has a lot to do with that.
As content curators, we should all aspire to be like Klaus. After all, wouldn’t it be great if our content collections drew as much interest, respect and admiration as the collections at MoMA? In order to achieve this feat, we need to become highly effective content curators. In other words, we need to curate Internet content as we would fine art.
Let’s consider seven habits of content creation that would make Klaus Biesenbach proud. Continue reading →
Voici le travail effectué par Guillaume Azema - professeur de SVT et membre du GREID SVT de l'académie de Créteil - et son collègue Martial Lenzen, professeur de mathématiques, référent numérique de leur établissement, pour lequel ils ont initialement réalisé ce "lexique des termes du monde numérique".
Ils nous proposent ici une version allégée utilisable par tous dans l'académie.
GitHub is known for the great features it can offer programmers, but it's not only for them. There are plenty of other creative uses for GitHub. Here are nine different examples on what else GitHub can be used for. What's GitHub? GitHub is an online repository service that anyone can sign up for. It uses…
"Support de conférence donnée dans le cadre de la formation initiale et continue des professeurs documentalistes de la Martinique. Concepts et notions abordées sous l'angle de la vulgarisation : apprentissages nomades (+ BYOD), MOOC, biens communs, data."
by Brigitte Pierrat, professeur documentaliste, EN, France
Terme assez récent apparu probablement en 2009 aux Etats-Unis, la curation désigne dans le domaine du web une activité de sélection de contenus suivie d'une diffusion à des lecteurs potentiels.
La curation : Pourquoi ? Comment ? En quoi diffère-t-elle de la simple agrégation de contenu ?
Le logiciel Impress de la suite bureautique libre OpenOffice.org ou LibreOffice permettant de faire des présentations sous formes de diapositives. ce logiciel est très pratique et facile d’utilisation.
Voici un petit tutoriel pour les utilisateurs qui débutent avec ce logiciel.
"A l’occasion du Safer Internet Day (journée de l’Internet sans crainte), le SCEREN-CRDP de l’Académie de Versailles via sa d’éducation aux médias plateforme Citoyen de l’Internet a mis en ligne un nouveau MemoTICE (brochure conseil) intitulé Mes réseaux et moi qui s’intéresse aux pratiques des enfants et adolescents sur les médias sociaux.Ce document pédagogique et didactique est librement téléchargeable et diffusable (sous licence Creative Commons)."