Digital Identity ...
Follow
Find
10.2K views | +6 today
 
Rescooped by Frank J. Klein from Technology in Education
onto Digital Identity and Access Management
Scoop.it!

7 habits of highly effective teachers Always Prepped Blog

7 habits of highly effective teachers Always Prepped Blog | Digital Identity and Access Management | Scoop.it

Via Felix Jacomino
more...
Craig Crossley's curator insight, August 28, 2013 10:31 PM

Is this you?

Audrey's comment, August 30, 2013 8:38 AM
Definitely. Would agree 100%!!

From around the web

Digital Identity and Access Management
Digital authentication, authorization,administration and auditing of a persons identity.
Curated by Frank J. Klein
Your new post is loading...
Your new post is loading...
Rescooped by Frank J. Klein from Geography Education
Scoop.it!

3 easy ways to tell if a viral photo is bogus

3 easy ways to tell if a viral photo is bogus | Digital Identity and Access Management | Scoop.it

"Many people posting it wrote that the photo was taken during the recent Nepal earthquakes, and that it depicts 'a brother protecting his sister.' Pretty heartwarming, right? It’s the exact sort of thing your aunt would share on Facebook. A perfectly clear, resonant message about survival and empathy and inequality, all that good stuff.  There’s only one problem: That picture is fake."


Via Seth Dixon
more...
MsPerry's curator insight, Today, 9:28 AM

Study Skills

Courtney Barrowman's curator insight, Today, 10:43 AM

course resource, life resource :)

Eden Eaves's curator insight, Today, 1:05 PM

This picture supposedly taken in Nepal of a brother protecting his younger sister due to recent earthquakes is, in fact, false. These kinds of photos portraying helpless people in foreign countries are often created to increase Instagram likes and retweets on twitter. Some times are real photos of someone or something going through tragedy, but often they are not.    

Rescooped by Frank J. Klein from E-Learning and Online Teaching
Scoop.it!

AN APPROACH TO GLOBAL NETIQUETTE RESEARCH

ABSTRACT The user base of the Internet is today more diverse than ever. People with different cultural backgrounds may have very different views on some crucial Internet-related matters, such as the regulation of the Internet, the responsibility of an individual in the Internet, copyright issues, issues of anonymity, and so forth. Differing opinions on these matters have already roused heated debates. Although there are a number of local codes of conduct for proper behavior on the Internet, and although countries have set laws and regulations concerning the net, there are almost no studies on the set of rules that would be commonly agreed on by all users of the Internet, in all their cultural diversity. In this paper we propose a study that will be based on established qualitative, anthropological methods, and that aims at finding a commonly agreed core set of rules for appropriate use of the Internet.

 

KEYWORDS Netiquette; Global Netiquette; Multicultural Web Communities; Cultural Dialogue


Via Dennis T OConnor
more...
Dennis T OConnor's curator insight, May 25, 5:40 PM

The authors define Netiquette as, "In this paper we use the term netiquette to mean a body of conventions and manners for using the Internet as a tool for communication or data exchange, practiced or advocated by a group of people. In this sense, netiquette includes laws, regulations, as well as good manners and practices."


The idea of a Global Netiquette is intriguing.  

Rescooped by Frank J. Klein from E-Learning and Online Teaching
Scoop.it!

AN APPROACH TO GLOBAL NETIQUETTE RESEARCH

ABSTRACT The user base of the Internet is today more diverse than ever. People with different cultural backgrounds may have very different views on some crucial Internet-related matters, such as the regulation of the Internet, the responsibility of an individual in the Internet, copyright issues, issues of anonymity, and so forth. Differing opinions on these matters have already roused heated debates. Although there are a number of local codes of conduct for proper behavior on the Internet, and although countries have set laws and regulations concerning the net, there are almost no studies on the set of rules that would be commonly agreed on by all users of the Internet, in all their cultural diversity. In this paper we propose a study that will be based on established qualitative, anthropological methods, and that aims at finding a commonly agreed core set of rules for appropriate use of the Internet.

 

KEYWORDS Netiquette; Global Netiquette; Multicultural Web Communities; Cultural Dialogue


Via Dennis T OConnor
more...
Dennis T OConnor's curator insight, May 25, 5:40 PM

The authors define Netiquette as, "In this paper we use the term netiquette to mean a body of conventions and manners for using the Internet as a tool for communication or data exchange, practiced or advocated by a group of people. In this sense, netiquette includes laws, regulations, as well as good manners and practices."


The idea of a Global Netiquette is intriguing.  

Rescooped by Frank J. Klein from Tools for Teachers & Learners
Scoop.it!

Creatubbles - The place to nurture children’s creativity

Creatubbles - The place to nurture children’s creativity | Digital Identity and Access Management | Scoop.it

Creatubbles is a safe place for those who care about creativity to upload, share and start conversations around young people’s artwork. Start Now - It's Free!


Via Nik Peachey
more...
Nik Peachey's curator insight, May 24, 12:07 PM

Great place for safely connecting young artists.

Rescooped by Frank J. Klein from digital marketing strategy
Scoop.it!

The Best Tools for Mobile App Prototyping

Compiling a list of tools, native apps as well as cloud-based, to help build compelling Mobile (and Desktop) App prototypes. | UXPin: UX Design & Wireframing Tools As Beautiful As Your Work, Pixate, Origami from Facebook, Framework7, and Free Web & Mobile (iOS, Android) Prototyping and UI Mockup Tool | InVision

Via malek
more...
AUSLNX LLC's curator insight, May 25, 4:57 PM

A great starting point for those thinking about apps and how they can be leveraged

Zigmas Bigelis's curator insight, May 26, 12:43 AM

See and try

tom cockburn's curator insight, May 26, 4:58 PM

Sounds useful

Rescooped by Frank J. Klein from Digital Presentations in Education
Scoop.it!

10 Tips for Building a Strong Story

Need to improve your storytelling? Here are 10 tips to help your presentation.

Via Baiba Svenca
more...
Baiba Svenca's curator insight, May 24, 3:55 AM

This can serve as a guide to students who are learning how to build a presentation that has a strong backbone and impressive muscle.

Marco Favero's curator insight, May 24, 6:00 AM

aggiungi la tua intuizione ...

Ruby Day's curator insight, May 25, 2:48 AM

Basic tips, good resource for students. I like how it encourages building a script through practice as opposed to a written script 

Rescooped by Frank J. Klein from Tools for Teachers & Learners
Scoop.it!

Free Online Poster Maker

Free Online Poster Maker | Digital Identity and Access Management | Scoop.it

Lucidpress is a professional-quality poster maker for everyone. With a library of templates and a drag-and-drop interface, you'll have an attention-grabbing poster made in no time.


Via Nik Peachey
more...
173 Sud's curator insight, May 24, 11:07 AM


Si vous voulez créer une affiche  de qualité professionnelle, essayez Lucidpress. Une application Web gratuite pour tout le monde.

Carolyn Quarterman's curator insight, May 26, 11:58 AM

Could be great for reporting outcomes of class projects.

Елена Гончарова's curator insight, Today, 6:51 AM

добавить ваше понимание ...

Rescooped by Frank J. Klein from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Writing Reverse TCP Exploit - InfoSec Institute

Writing Reverse TCP Exploit - InfoSec Institute | Digital Identity and Access Management | Scoop.it
In the previous article, we analyzed the Echo Server program in which we understood things like Crashing the program remotely by manipulating input with th

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Frank J. Klein from iPads in Education
Scoop.it!

Edtech: Mastering the device vs mastering the pedagogy - Innovate My School

Edtech: Mastering the device vs mastering the pedagogy - Innovate My School | Digital Identity and Access Management | Scoop.it
What separates the successful mobile learning projects from the unsuccessful? This is a ‘million dollar’ question, and I’ve thought long and hard about it. From the 17 large 1:1 projects I’ve worked on, only three have been truly successful in producing transformational learning. In your own experience, how many schools do you know who have transformed learning vs how many you know rely on iPads as laptop placements, focusing on web browsing and research functions only? I’m sure you’ll draw similar conclusions to my own, but if a handful of schools can transform learning with mobile devices, how do we replicate it across more schools? I believe I’ve found the answer.

Via John Evans
more...
No comment yet.
Rescooped by Frank J. Klein from Geography Education
Scoop.it!

These maps depict the world's news in real time

These maps depict the world's news in real time | Digital Identity and Access Management | Scoop.it
An experimental tool to understand the world.

Via Seth Dixon
more...
Sameer Mohamed's curator insight, Today, 8:49 AM

I think this is an interesting representation to show how the ability to have access to news and internet is the new most important thing to have to get word out. Now if you can speak English and have a computer with internet access you can.

Shane C Cook's curator insight, Today, 9:14 AM

This map allows people to understand the flow of news from around the world. We can use it to see where and what is happening and chart it to connect trends for example Syria and France are large because of the recent happenings with terrorists and terror attacks.

MsPerry's curator insight, Today, 9:30 AM

Intro

Rescooped by Frank J. Klein from IT, Security, Hacking, Malware, Programming
Scoop.it!

Injecting Spyware in an EXE (Code Injection) - InfoSec Institute

Injecting Spyware in an EXE (Code Injection) - InfoSec Institute | Digital Identity and Access Management | Scoop.it
Implanting malicious code in the form of spyware to an existing running process is one of the more sophisticated tasks. Before the advent of disassembler o

Via Ge0rge
more...
No comment yet.
Rescooped by Frank J. Klein from iPads in Education
Scoop.it!

The Best 8 Tools to Create Posters for your Classroom ~ Educational Technology and Mobile Learning

The Best 8 Tools to Create Posters for your Classroom ~ Educational Technology and Mobile Learning | Digital Identity and Access Management | Scoop.it

"Today, we are sharing with you some great web tools that you can use to create your own posters and customize them the way you want. Check out the list below and share with us what you think of them. Enjoy."


Via John Evans
more...
Tony Guzman's curator insight, May 22, 11:46 AM

This article shares some web tools you can use to create posters for your classrooms. I only had heard of a couple of them so some new tools to consider here.