TEFL & Ed Tech
Follow
Find tag "Government"
17.8K views | +1 today
TEFL & Ed Tech
English language, linguistics, teaching resources, teaching tips, educational technology, foreign language learning
Curated by Evdokia Roka
Your new post is loading...
Your new post is loading...
Rescooped by Evdokia Roka from Social Media and its influence
Scoop.it!

How to improve your Twitter security and privacy

How to improve your Twitter security and privacy | TEFL & Ed Tech | Scoop.it
We don't lump Twitter in the same privacy bracket as, say, Facebook. But like any social network, Twitter is vulnerable to oversharing, data leakage and unintended consequences. We take a look at T...

Via Gust MEES
more...
Gust MEES's curator insight, August 30, 2:41 AM

We don't lump Twitter in the same privacy bracket as, say, Facebook. But like any social network, Twitter is vulnerable to oversharing, data leakage and unintended consequences. We take a look at T...


Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

10 URLs That Every Google User Should Know

10 URLs That Every Google User Should Know | TEFL & Ed Tech | Scoop.it
Which website has access to my Google account? What does Google know about me? Where can I see ads that I've clicked on Google search?

Via Gust MEES
more...
Gust MEES's curator insight, March 7, 6:02 AM


A MUST have guide!


Rescooped by Evdokia Roka from ESL, EFL interesting stuff. ESL Pêle Mêle.
Scoop.it!

Online Comic Creators

This presentation offers ideas on how to use comics in the classroom and a list of online comic creators

Via Ana Cristina Pratas, juandoming, Maria Margarida Correia, Gianfranco D'Aversa, Gust MEES, Amélie Silvert
more...
Sarah McElrath's curator insight, August 11, 10:34 AM

Great list of comic creators. Love that there are many different styles.

Mirta Liliana Filgueira's curator insight, August 12, 11:54 AM

Creadores de Comic Online

Edgar Mata's curator insight, August 13, 4:52 PM

Es una buena idea, pueden obtenerse beneficios si se emplean en la educación.

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

7 Ways to Raise an Ethical Child

7 Ways to Raise an Ethical Child | TEFL & Ed Tech | Scoop.it
Why we must nurture children's hearts as well as minds: 7 ways to teach kids strong, ethical behavior and character in a decade of moral erosion

Via Gust MEES
more...
Nancy Jones's curator insight, January 12, 9:01 AM

I particularly like the part that concerns  to train for positive assertion versus constant compliance. The compliance to please teachers versus the ownership of learning all  to please parents often provides a conflict for me. 

Jenn Alevy's comment, January 13, 12:44 AM
The only concern I have and I have not read the book, is that her assertions seem to be feeding into the culture of fear and would like to see the stats she refers to when she says youth crime is on the rise. And whose morals is she talking about? People come from a variety of countries and cultures, I hope she does not assume we are all on the same page about 'moral' issues, she may be more conservative while others are more liberal in their beliefs.
Ness Crouch's curator insight, January 14, 6:30 PM

This is an important article. Some teachers find themselves in situations where they are teaching ethical behaviour to children. This is worth a read.

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

For BYOD Best Practices, Secure Data, Not Devices

For BYOD Best Practices, Secure Data, Not Devices | TEFL & Ed Tech | Scoop.it

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

 

Read more, very interesting...:

http://trap.it/KpeRhS

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

Five IT security threats and how to combat them

Five IT security threats and how to combat them | TEFL & Ed Tech | Scoop.it

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the heat.

 

Organizations traditionally have had only two options to address identity and access management:

 

1. Internal excessive privilege - System Administrators with complete access to servers and data can pose a tremendous internal threat if they turn against the company. Similarly, everyone from admins up to executives poses a threat to security and data if they maintain excessive access rights after changing positions or taking on different roles.

 

2. Third party access - Giving partners and other third parties appropriate access to data is no longer cut and dried. Data stored in the cloud may be located across the country or overseas—or sit on physical servers owned by one vendor, but housed in facilities owned by any number of data centers. Employees of these third parties often have direct access to unencrypted data, or they may retain copies of both encrypted or unencrypted data.

 

3. Hacktivism - Politically motivated hacking is on the rise. Members of various groups assert that much of their success comes not from their technical expertise, but from having found easy targets. While an organization may not have control over whether or not it is attacked, effective identity and access management strategies and technologies, and basic employee security training, will reduce the chances that attacks will succeed.

 

4. Social engineering - Social engineering is the age-old technique of using lies, deception and manipulation to gain sufficient knowledge to dupe an unwary employee or company. Using public social channels to detail every aspect of your upcoming “unplugged” vacation trip may be just what a scammer needs to put an attack in motion.

 

5. Internal negligence - Negligence typically is an offense committed by management when “they should have known better.” Most successful data security breaches have some element of managerial negligence associated with them, such as simply forgetting to check log reports for clearly suspicious patterns.

 

Gust MEES: A MUST READ for Education and Business!

 

Read more:

http://www.net-security.org/secworld.php?id=13084&utm_source=dlvr.it&utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from 21st Century Tools for Teaching-People and Learners
Scoop.it!

The best educational software for students

The best educational software for students | TEFL & Ed Tech | Scoop.it
We give you 10 great productivity programs that are perfect for students. They'll help you improve your schoolwork, study more efficiently, and manage your hectic schedule.

Via Gust MEES
more...
Gust MEES's curator insight, August 20, 8:00 AM

Check it out!


Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

Teaching with Twitter – Please check your baggage at the door

Teaching with Twitter – Please check your baggage at the door | TEFL & Ed Tech | Scoop.it

How-to’s and link roundups on teaching with Twitter has been done many times before, but the topic is worth frequent revisiting and refreshing, especially in the context of the #FutureEd initiative and the Pedagogy Project by HASTAC Scholars.

 

The goal of this review is to help think through if, why, and how to use Twitter in our teaching and learning – especially for those who remain skeptical.

 


Via Gust MEES
more...
María Dolores Díaz Noguera's curator insight, February 15, 10:37 AM

Very nice sharing. Thanks

Christopher Resetar's curator insight, February 16, 10:01 AM

I really like this article because it is very effective at weighing the pros and cons of using twitter in the classroom.  Some of the supplemental links are also very helpful to look at and include content on how to teach with Twitter and how to avoid some of the pitfalls that can result from using Twitter in a classroom setting.   In general, I believe strongly in helping students to develop global competency (as we have discussed in class) and I believe that Twitter is one of the best and most convenient mediums to do this.  While I am slightly apprehensive about how and if it is even possible to use Twitter in an elementary school classroom I definitely see more potential in using it after reading this article. 

objectplace's curator insight, February 16, 8:40 PM

twitter why and why not discussion with deep links for more.

Good for higher ed

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

How hackers use Wi-Fi to steal your passwords

How hackers use Wi-Fi to steal your passwords | TEFL & Ed Tech | Scoop.it
Using Wi-Fi hotspots they set up, hackers can obtain your passwords and gain access to your sensitive information. Here’s how it works what you can do to prevent it.

Via Gust MEES
more...
Gust MEES's curator insight, January 21, 9:20 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Julia da Silva's curator insight, January 21, 10:32 AM

Check this out .

Scott Lewis's curator insight, January 22, 11:24 AM

I have said for a long time that WiFi Hotspots are not a secure place to do anything online that you would not want exposed to the general public. This being online banking, online shopping, viewing your corporate email account, etc. being just a few. 

 

With free online tools available on the Internet, it has become very easy for an attacker to view the information that you are entering into your computer from a free Wifi hotspot. These WiFi hotspots may be very handy, but not very secure.

 

The article above will show you a couple of ways that you can protect you and your computer if you travel frequently and use these hotspots. I want you to stay protected. 

 

Stay safe out there!

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

A must See Chart on Education1.0 Vs Education 2.0 Vs Education 3.0

A must See Chart on Education1.0 Vs Education 2.0 Vs Education 3.0 | TEFL & Ed Tech | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, November 23, 2013 6:46 AM

 

A MUST read!!!

 

Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

Which is the most popular antivirus software?

Which is the most popular antivirus software? | TEFL & Ed Tech | Scoop.it
Using a data set consisting of 120,000 data points, researchers from OPSWAT estimate that Avast is the market share leader in the antivirus software market.

 

Gust MEES:

 

1.) IT-Security, Internet-Safety, Online-Safety, Cyber-Security are a need and a MUST for 21st Century Teaching and Learning! That's why this article is mentioned in this Topic!!!

 

2.) other companies not mentioned should perhaps make more efforts on "Social Media" and get more "social" as well to be present on main PC Magazines + Mac Magazines for a better marketing of their products! Critical Thinking, sorry ;) Learn that the customer doesn't need to go to you, but that YOU should go to the customer ;)

 

Read more:

http://www.zdnet.com/blog/security/which-is-the-most-popular-antivirus-software/12608

 


Via Gust MEES
more...
No comment yet.
Rescooped by Evdokia Roka from 21st Century Learning and Teaching
Scoop.it!

New site offers a whole new approach to online safety | eSchool News

New site offers a whole new approach to online safety | eSchool News | TEFL & Ed Tech | Scoop.it
While schools are right in teaching students about the dangers that exist online, a new website aims to promote the benefits of internet use—as well as bridge the generational gap in online use and knowledge between youth and their teachers and...

 

Gust MEES: A very good approach which I agree too, but the need of learning IT-Security is still there and a MUST!

 

Critical-Thinking: Existing problems don't go away with a makeup ;) Internet will not look more sexy after that, sorry...

 

Protect your computer and you protect ALSO the community on Internet, check my free courses to learn more:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

 

 

-  http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

 

 

 


Via Gust MEES
more...
No comment yet.