Research Capacity-Building in Africa
4.6K views | +1 today
Follow
Research Capacity-Building in Africa
Your new post is loading...
Your new post is loading...
Rescooped by Nevermore Sithole from Education and Training
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | Research Capacity-Building in Africa | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.

 

The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 


Via Gust MEES, ismokuhanen
more...
Gust MEES's curator insight, February 20, 3:48 PM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 9:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Literacy with ICT Across the Curriculum

Literacy with ICT Across the Curriculum | Research Capacity-Building in Africa | Scoop.it

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Literacy



Via Dan Kirsch, Gust MEES
more...
Gust MEES's curator insight, April 1, 2015 6:58 PM

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Literacy


Linda Buckmaster's curator insight, April 2, 2015 7:52 AM

The LwICT continuum guides learners on the road to lifelong literacy with ICT; functioning as planning tool and as assessment FOR/AS/OF learning.

Teachers observe and determine which behaviours students demonstrate and those they are still working towards, which helps the teacher to plan for further development in literacy with ICT (assessment FOR learning).

Polimusica's curator insight, April 2, 2015 9:31 PM

MUY A propósito .....

Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Information security training for new employees | CyberSecurity | EDUcation

This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...

Via Gust MEES
more...
Gust MEES's curator insight, December 5, 2014 7:54 AM
This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
elisajames's comment, December 5, 2014 7:57 AM
thanks for this sharing its really informative
Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Public Private Partnerships in Network and Information Security Education — ENISA

Public Private Partnerships in Network and Information Security Education — ENISA | Research Capacity-Building in Africa | Scoop.it
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/



Via Gust MEES
more...
Gust MEES's curator insight, October 6, 2014 3:27 PM
This report focuses on the brokerage of best practices between the public and private sectors aimed at all members of the Network and Information Security Education community in Europe. ENISA is committed to taking the lead in encouraging the exchange of NIS best practices and it follows a strong community-building process for NIS Education stakeholders.


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Why security awareness matters | Security awareness training should be the first line of defense.

Why security awareness matters | Security awareness training should be the first line of defense. | Research Capacity-Building in Africa | Scoop.it
In this interview, Paulo Pagliusi, CEO at MPSafe Cybersecurity Awareness, talks about the value of security awareness and how it influences the overall security posture of an organization.

 




===> Security awareness training should be the first line of defense. <===


Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/




Via Gust MEES
more...
Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship | Research Capacity-Building in Africa | Scoop.it
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.



Via Gust MEES
more...
Gust MEES's curator insight, April 7, 2015 9:13 PM
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills

How cybercriminals hack our brains | Social Engineering | CyberCrime | CyberSecurity | Digital CitizenShip | eSkills | Research Capacity-Building in Africa | Scoop.it
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually re...

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Social+Engineering

 


Via Gust MEES
more...
Gust MEES's curator insight,