Middle School ICT students investigate the positives and negatives of accessing digital media. Students also engage in activities centered on their own Digital Footprints as they access technological resources and digital media.
Is your school on track with eSafety? Assess your infrastructure, policy and practice and get your personalised action plan now. Have a look at our infographic to see why the eSafety Label is relevant to schools.
Authentic PracTICE Through Global Collaboration [GM] The authors of this blog post "@ICTPHMS (Dan KIRSCH's Blog)" and "@knolinfos (Gust MEES's Blog)" have met each other on Social Media
“Twitter” and decided one day to work together on a common blog about “Digital CitizenShip“, a “Global Collaboration” from authors of the USA and Luxembourg (Europe) was born. Find below, please, OUR collaboration blog:
Jörg leitet die Digitale Helden Schul-AG an seiner Schule. Er ist mit seiner Schule im Mentorenprogramm der Digitalen Helden.
“Unsere Schule hat super Erfahrungen mit den Digitale Helden gemacht. SchülerInnen lernen Probleme im Netz zu lösen und sich kritisch mit den Risiken und Chancen der digitalen Welt auseinander zu setzen. Wir freuen uns wieder dabei zu sein und unsere Erfahrungen auszubauen”.
A database containing usernames and passwords for almost five million Google accounts emerged on a Russian forum late on September 9. The user dumpin...
The user dumping the information on Bitcoin Security board uses the online alias “tvskit” and says that although not all the entries are valid, more than 60% of them should be working; all passwords are provided in plain text.
It is unclear how the information was collected, but the most plausible theory is that the attacker(s) gathered the details through phishing and different forms of data exfiltration, such as the use of infostealing malware.
Spotify users, take note. The music streaming service just posted a message on its company blog indicating that one user's account was hacked, but assuring that steps are being taken to ensure others will not fall victim to the same exploit
Over the coming days, the Spotify Android app will prompt users to re-enter their username and password to log back in. Users running outdated versions of the app will be guided through the update process to ensure they’re running the latest version.
The term 21st century skills refers to a broad set of knowledge, skills, work habits, and character traits that are believed—by educators, school reformers, college professors, employers, and others—to be critically important to success in today’s world, particularly in collegiate programs and contemporary careers and workplaces. Generally speaking, 21st century skills can be applied in all …
Gust MEES: In the above screenshot needs to get included CyberSecurity, Privacy and Digital CitiZENship.
Over the last month there has been an unfathomable amount of content published about the massive privacy intrusion that is Facebook Messenger. With the ability to intrude into the lives of its users in ways that the NSA would never think to, it isn’t a surprise that the new download [...]
Big Data really is and has meant is a revolutionary approach to marketing. It is our behavior online that helps brands and organizations learn about us in ways that they can contextualize and apply to their marketing strategies, and from the time that this became so eerily apparent, marketers have been seeking out ways to exploit it.
The Internet of Things is producing a lot of interesting consumer products that have the potential to lead to important enterprise tools. Here is a basic overview of the concept, together with examples of available products and what they offer.
Si vous êtes victime d’exploitation sexuelle, ou si vous en êtes témoin, n’ayez pas peur de le signaler. Des personnes sont là pour vous aider ! En signalant, vous pouvez aider une victime d’exploitation sexuelle et, potentiellement, prévenir d’autres cas similaires.
Chaque année, des millions d’enfants sont victimes d’abus et d’exploitation sexuels dans le monde entier. Aucun pays n’y échappe, et au Luxembourg aussi des enfants sont, chaque année, victimes de différentes formes de violence sexuelle. Ce site a pour objectif de permettre au grand public de se renseigner sur le sujet et de signaler des cas soupçonnés en cliquant sur un des trois boutons rouges en bas de la page.
Vous y trouverez des informations sur les différentes formes d’abus et d’exploitation sexuels des mineurs ainsi que des conseils et lescoordonnées des services d’aide aux enfants victimes d’exploitation sexuelle.
Learn more about CSID's cyberSAFE Webinar on "SMB Security for Every Phase of Growth" and download the whitepaper and infographic.
Small businesses are in a tough position when it comes to cyber security. They face a growing number of threats and attention by cyber criminals and don’t have the time or resources that larger enterprises have to devote to cyber security. As instances of data theft, malware and other risks grow, it is going to become increasingly important for small businesses to be aware of the threats they face and learn how to address them effectively and with limited resources.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.