Research Capacity-Building in Africa
4.7K views | +1 today
Follow
Research Capacity-Building in Africa
Your new post is loading...
Your new post is loading...
Rescooped by Nevermore Sithole from Education and Training
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | Research Capacity-Building in Africa | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.

 

The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 


Via Gust MEES, ismokuhanen
more...
Gust MEES's curator insight, February 20, 10:48 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 4:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Protecting Privacy In The Digital Age: Mikko Hyppönen Answers Your Questions

Protecting Privacy In The Digital Age: Mikko Hyppönen Answers Your Questions | Research Capacity-Building in Africa | Scoop.it
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
more...
Gust MEES's curator insight, October 6, 2014 10:46 AM
White hat hacker Mikko Hyppönen on the importance of privacy in the digital age.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Willem Kuypers's curator insight, October 7, 2014 3:44 AM

Un Avis dont on peut tenir compte. A voir aussi sa prensetation au TED Talk En 2011.

Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship | Research Capacity-Building in Africa | Scoop.it
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.



Via Gust MEES
more...
Gust MEES's curator insight, April 7, 2015 4:13 PM
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

IBM Software Learns Your Personality, Could Tailor Ads Accordingly | MIT Technology Review

IBM Software Learns Your Personality, Could Tailor Ads Accordingly | MIT Technology Review | Research Capacity-Building in Africa | Scoop.it
Technology that derives personality traits from Twitter updates is being tested to help target promotions and personalize customer service.

 

Learn more:

 

http://www.scoop.it/t/social-media-and-its-influence/?tag=IBM

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethics

 


Via Gust MEES
more...
Oscar Melendez's curator insight, December 22, 2013 11:45 AM

Great what type of products will marketers try to sell you if your psycho-analysis tell them you're crazy.

Gust MEES's curator insight, July 1, 2014 5:03 PM

Learn more:


http://www.scoop.it/t/social-media-and-its-influence/?tag=IBM


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethics


Gust MEES's curator insight, July 1, 2014 5:04 PM

A MUST READ!!!