The Perfect Storm...
Follow
Find tag "eCitizen"
7.0K views | +2 today
The Perfect Storm Team
Building Your Business Using Social Media Marketing
Curated by Stan Smith
Your new post is loading...
Your new post is loading...
Rescooped by Stan Smith from 21st Century Learning and Teaching
Scoop.it!

10 sites with stunning visual data that will change your world view | Privacy

10 sites with stunning visual data that will change your world view | Privacy | The Perfect Storm Team | Scoop.it
We all know what a picture's worth. These websites use graphics to display everything from Twitter traffic to births and deaths, in ways that truly drive home what words alone cannot.

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
more...
ewarta geo's curator insight, July 9, 6:28 AM

Very interesting sites. Shows the differences in every country from the trending twitter topics to even the amount of computer hacks.

Cliensol Energy's comment, July 10, 7:47 AM
De nada :D
Lina Heaster-Ekholm's curator insight, July 10, 1:35 PM

Not sure it changed my world view, but does provide links to some interesting resources

Rescooped by Stan Smith from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | The Perfect Storm Team | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 10:18 AM
Thank you for the information.
Gary Harwell's curator insight, April 2, 2013 9:47 PM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 10:08 AM

More information on BYOD