E-Learning-Inclusivo (Mashup)
1.1M views | +25 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from Creative teaching and learning
Scoop.it!

How to attack the ‘dark side’ of Artificial Intelligence through education

How to attack the ‘dark side’ of Artificial Intelligence through education | E-Learning-Inclusivo (Mashup) | Scoop.it

"Incorporating AI into educational technology raises an ethical question. What will happen to the data? Who will store it and what for? ..."


Via Leona Ungerer
No comment yet.
Rescooped by juandoming from Creative teaching and learning
Scoop.it!

Technology in 2016: the year ahead

Technology in 2016: the year ahead | E-Learning-Inclusivo (Mashup) | Scoop.it

"From social media activism to billion-dollar 'unicorns', privacy and drones, Claire Connelly looks at the big tech trends for the year ahead ..."


Via Leona Ungerer
No comment yet.
Rescooped by juandoming from Wiki_Universe
Scoop.it!

Digitizing The World Could Be Worth $11 Trillion By 2025 | Privacy | CyberSecurity | Internet Of Things

Digitizing The World Could Be Worth $11 Trillion By 2025 | Privacy | CyberSecurity | Internet Of Things | E-Learning-Inclusivo (Mashup) | Scoop.it
Creating the "Internet of Things" by connecting everyday objects like factory machines, vehicles and buildings to the web could be worth between $3.9 trillion and $11.1 trillion by 2025,

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Smart+Cities

 


Via Gust MEES, NikolaosKourakos
Rescooped by juandoming from Digital Literacies information sources
Scoop.it!

Copyright Guidance · British Universities Film & Video Council

Copyright Guidance · British Universities Film & Video Council | E-Learning-Inclusivo (Mashup) | Scoop.it

Via Fiona Harvey
Fiona Harvey's curator insight, March 23, 2015 7:29 AM

Found this on Twitter (thanks Simon Lancaster @S_J_Lancaster )  part of the information necessary to ensure that students are protecting themselves and others

Rescooped by juandoming from Effective Technology Integration into Education
Scoop.it!

Privacy Technical Assistance Center (PTAC) | U.S. Department of Education | FERPA | Digital CitizenShip

Privacy Technical Assistance Center (PTAC) | U.S. Department of Education | FERPA | Digital CitizenShip | E-Learning-Inclusivo (Mashup) | Scoop.it

Ever have questions about your rights regarding education records? This short video highlights the key points of the Family Educational Rights and Privacy Act (FERPA).

.

Learn more:

.

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

.

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

.

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

 


Via Gust MEES, Mark E. Deschaine, PhD
Gust MEES's curator insight, March 8, 2015 1:56 PM

Ever have questions about your rights regarding education records? This short video highlights the key points of the Family Educational Rights and Privacy Act (FERPA).

.

Learn more:

.

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

.

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

.

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/


4Chelsey Shepard's curator insight, March 14, 2015 12:34 PM

The Department of Education has created the Family Educational Rights and Privacy Act (FERPA) to protect a child from being treated differently from another while at school. 

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Commotion Wireless uses wireless devices to create decentralized mesh networks

Commotion Wireless uses wireless devices to create decentralized mesh networks | E-Learning-Inclusivo (Mashup) | Scoop.it
Commotion is a free, open-source communication tool that uses wireless devices to create decentralized mesh networks. Commotion provides a way for you to share your Internet connection with the people around you, but it is not a replacement for your Internet connection. Read more about how Commotion works on our Frequently Asked Questions page.

Via Gust MEES
Gust MEES's curator insight, January 26, 2015 11:00 AM

Commotion is a free, open-source communication tool that uses wireless devices to create decentralized mesh networks. Commotion provides a way for you to share your Internet connection with the people around you, but it is not a replacement for your Internet connection. Read more about how Commotion works on our Frequently Asked Questions page.


Scooped by juandoming
Scoop.it!

Who’s the true enemy of internet freedom - China, Russia, or the US?

Who’s the true enemy of internet freedom - China, Russia, or the US? | E-Learning-Inclusivo (Mashup) | Scoop.it
Evgeny Morozov: Beijing and Moscow are rightly chastised for restricting their citizens’ online access – but it’s the US that is now even more aggressive in asserting its digital sovereignty
No comment yet.
Rescooped by juandoming from Education Technology - theory & practice
Scoop.it!

Eleven free tools to protect your online activity from surveillance

Eleven free tools to protect your online activity from surveillance | E-Learning-Inclusivo (Mashup) | Scoop.it

"These tools help you encrypt data, block intrusive trackers or remain altogether anonymous on the web ..."


Via Leona Ungerer, Lynnette Van Dyke, Timo Ilomäki
No comment yet.
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Same Security Threats, Different Devices: Wearables and Watchables

Same Security Threats, Different Devices: Wearables and Watchables | E-Learning-Inclusivo (Mashup) | Scoop.it
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.


“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/




Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | E-Learning-Inclusivo (Mashup) | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:




Via Gust MEES
Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Rescooped by juandoming from Creative teaching and learning
Scoop.it!

Facing the facts: Facial recognition and e-learning

Facing the facts: Facial recognition and e-learning | E-Learning-Inclusivo (Mashup) | Scoop.it

New facial recognition software could mean more integrity and personalization for e-learning, even if it comes with a side of creepy. (Eye tracking in #eLearning. Who would pay for this? ..."

©


Via Leona Ungerer
No comment yet.
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Skills needed in the 21st Century from Educators, Teachers, Students... by Gust MEES

Skills needed in the 21st Century from Educators, Teachers, Students... by Gust MEES | E-Learning-Inclusivo (Mashup) | Scoop.it
TOUCH this image to discover its story. Image tagging powered by ThingLink

Via Gust MEES
Scooped by juandoming
Scoop.it!

La Commission nationale de l'informatique et des libertés sanctionne Google!

Google sur le site www.cnil.fr, CNIL - Commission nationale de l'informatique et des libertés : Protéger les données personnelles, accompagner l'innovation, préserver les libertés individuelles
No comment yet.
Rescooped by juandoming from Go Big
Scoop.it!

Three Ways to Protect Your Students From the Dangers of Technology

Three Ways to Protect Your Students From the Dangers of Technology | E-Learning-Inclusivo (Mashup) | Scoop.it
Get insights on key ways to protect students from technology-related dangers.

Via THE OFFICIAL ANDREASCY, Andreas Christodoulou
Andreas Christodoulou's curator insight, December 4, 2016 2:58 AM
The hidden dangers of technology.
Camila Ossa Castaño's curator insight, December 4, 2016 4:25 PM
Nowadays technology is a great tool that helps us in our life, in our work, in our study, etc. The internet is part of our lives and is very beneficial to us. As future teachers, we must show and tell our students all the benefits and advantages that the internet brings to our lives, but we must also make them aware that this if not used in a correct way can be dangerous for them. It is important to read and take into account these three ways to protect our students from the dangers of technology, because they often do not think about the consequences that can bring to their lives the content that they upload to the internet.  We need to make sure that our students get the most out of technology.
Mary-Jane Lewis's curator insight, December 5, 2016 6:08 AM
Sage advice that teachers and parents should never skip over.
Rescooped by juandoming from Open Source Rules
Scoop.it!

#Advanced #analytics for the #InternetOfThings| Opensource.com | # ! #meet...

#Advanced #analytics for the #InternetOfThings| Opensource.com | # ! #meet... | E-Learning-Inclusivo (Mashup) | Scoop.it

 |Nicole C. Engard |

Interview with Rosaria Silipo, DMR

Learn more about Rosaria Silipo, KNIME, and the upcoming talk at OSCON.


Via Gonzalo San Gil, PhD.
Gonzalo San Gil, PhD.'s curator insight, July 13, 2015 4:34 AM

# ! ...what You get into Your #Home...

Rescooped by juandoming from Creative teaching and learning
Scoop.it!

» Resource: Online e-learning privacy modules (New Zealand)

» Resource: Online e-learning privacy modules (New Zealand) | E-Learning-Inclusivo (Mashup) | Scoop.it

"From the Privacy Commissioner of New Zealand's web site: Our new online Privacy training modules are now available to use. These are: Privacy 101 - which ..."


Via Leona Ungerer
No comment yet.
Rescooped by juandoming from Education and Training
Scoop.it!

Top 15 Tools / Apps to Keep Your Internet Activity Free from Surveillance, Censorship & Online Tracking - Quertime

Top 15 Tools / Apps to Keep Your Internet Activity Free from Surveillance, Censorship & Online Tracking - Quertime | E-Learning-Inclusivo (Mashup) | Scoop.it
Browsing the Internet is a daily routine for most people, whether it is for work or entertainment, and while there is no arguing about its usefulness, it all

Via Tom D'Amico (@TDOttawa) , ismokuhanen
No comment yet.
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

[Cookieviz] Un logiciel pour visualiser en temps réel les cookies lors de votre navigation ! | Privacy | eSkills | eLeaderShip

TUTORIEL - La CNIL met à disposition de tous un outil de visualisation qui identifie en temps réel les cookies qui transmettent des informations vous concernant à d’autres sites. Dans cette vidéo, découvrez comment utiliser l'outil Cookieviz !


Pour télécharger Cookieviz : http://www.cnil.fr/vos-droits/vos-traces/les-cookies/telechargez-cookieviz/


En savoir plus :


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cookies



Via Gust MEES
Gust MEES's curator insight, February 1, 2015 12:40 PM
TUTORIEL - La CNIL met à disposition de tous un outil de visualisation qui identifie en temps réel les cookies qui transmettent des informations vous concernant à d’autres sites. Dans cette vidéo, découvrez comment utiliser l'outil Cookieviz !


Pour télécharger Cookieviz : http://www.cnil.fr/vos-droits/vos-traces/les-cookies/telechargez-cookieviz/


En savoir plus :


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cookies


Rescooped by juandoming from business analyst
Scoop.it!

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
The New Security Landscape of IoT


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES, michel verstrepen
Rescooped by juandoming from Trending Intelligence
Scoop.it!

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | eSkills

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To? Well, there is a lot of different views! WE will explore WHAT could be THE BEST way to teach and to learn about Digital...


Via Gust MEES, Next Level
Michael Millard's curator insight, November 2, 2014 1:20 PM

Något för mig. 

IKT för äldre är inte helt lätt. 

Lindsey Hammonds's curator insight, November 3, 2014 9:50 AM

Digital Citizenship!

Tony Guzman's curator insight, November 7, 2014 4:36 PM

Some excellent tips on being a good digital citizen. How many of these have you implemented already?

Rescooped by juandoming from An Eye on New Media
Scoop.it!

The 'Chinese Google' Is Making Big Bucks Using AI to Target Ads | WIRED

The 'Chinese Google' Is Making Big Bucks Using AI to Target Ads | WIRED | E-Learning-Inclusivo (Mashup) | Scoop.it
Deep learning can do many things. Tapping the power of hundreds or even thousands of computers, this new breed of artificial intelligence can help Facebook recognize people, words, and objects that appear in digital photos. It can help Google understand what you’re saying when you bark commands into an Android phone. And it can help…

Via Ken Morrison
No comment yet.
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers reveal 3 devious ways online trackers shatter your privacy and follow your digital footsteps

Researchers reveal 3 devious ways online trackers shatter your privacy and follow your digital footsteps | E-Learning-Inclusivo (Mashup) | Scoop.it

The use of such tracking tools may be unknown to most users, according to a research paper.


The methods—known as canvas fingerprinting, evercookies and cookie syncing—are in use across a range of popular websites. The findings, first reported by Pro Publica, show how such tracking is important for targeted advertising but that the privacy risks may be unknown to all but the most sophisticated web users.


Profiling Web users, such as knowing what Web pages a person has visited before, is a central component of targeted advertising, which matches advertisements with topics a person may be interested in. It is key to charging higher rates for advertisements.


Cookies, or data files stored by a browser, have long been used for tracking, but cookies can be easily blocked or deleted, which diminishes their usefulness.


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
Gust MEES's curator insight, July 22, 2014 10:16 AM

The methods—known as canvas fingerprinting, evercookies and cookie syncing—are in use across a range of popular websites. The findings, first reported by Pro Publica, show how such tracking is important for targeted advertising but that the privacy risks may be unknown to all but the most sophisticated web users.


Profiling Web users, such as knowing what Web pages a person has visited before, is a central component of targeted advertising, which matches advertisements with topics a person may be interested in. It is key to charging higher rates for advertisements.


Cookies, or data files stored by a browser, have long been used for tracking, but cookies can be easily blocked or deleted, which diminishes their usefulness.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Canvas+Fingerprinting


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

Rescooped by juandoming from Education & Numérique
Scoop.it!

Interception des communications électroniques : quelles sont les pratiques des grands Etats ?

Interception des communications électroniques : quelles sont les pratiques des grands Etats ? | E-Learning-Inclusivo (Mashup) | Scoop.it
A la suite des révélations portant sur divers programmes de surveillance étatique tels que PRISM1, TEMPORA2, XKeyscore3, ou sur l’existence d’accords entre États permettant de contourner les lois encadrant les interceptions des communications (cf. accord entre le Canada et les Etats-Unis).

Via Jean-Pierre Blanger, Terheck
No comment yet.
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Dropbox ignored vulnerability for 5 months only fixed it when media showed interest

Dropbox ignored vulnerability for 5 months only fixed it when media showed interest | E-Learning-Inclusivo (Mashup) | Scoop.it
I think it's a pretty sad state of affairs that months can pass, and the BBC has to be called in, before a service like Dropbox takes seriously a security concern impacting the privacy of its users.


Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Keeping technology safe for our most vulnerable users - Microsoft UK Schools blog

The Microsoft UK Blog for schools, featuring news for schools from Microsoft, case studies within education, and education ICT advice


 In fact, a recent study from Fordham University shows that schools are struggling to meet even existing legal and regulatory requirements related to the protection of student data.


Additionally, a recent survey of parents conducted by Benenson Strategy Group on behalf ofCommon Sense Media found that 90 percent of respondents were “concerned about how private companies with non-educational interests are able to access and use students’ personal information” and 77 percent support making it “illegal for schools and education technology companies to sell students’ private information to advertisers.”


So, as we gather together this week, we must ask: How do we protect the most vulnerable among us – our children – and guarantee their privacy and security in the ever-changing world of education today?


Via Gust MEES
Gust MEES's curator insight, March 19, 2014 7:04 AM


How do we protect the most vulnerable among us – our children – and guarantee their privacy and security in the ever-changing world of education today?


Learn more:


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/