SocialMediaDesign
15.2K views | +0 today
Follow
SocialMediaDesign
Content curation
Curated by Jimun Gimm
Your new post is loading...
Your new post is loading...
Rescooped by Jimun Gimm from 21st Century Learning and Teaching
Scoop.it!

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags

Curation: Tips And Tricks With Scoop.it-Rescoop And Tags | SocialMediaDesign | Scoop.it
. . WHAT is Curation And What Is NOT Curation? . . . Most of people know WHAT "Aggregation" is, it is the simplest way to share links, YOU just forward it! BUT that is NOT "Curation", most people d...

Via Gust MEES
more...
Gust MEES's curator insight, February 25, 2014 11:49 AM


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Curation


Elizabeth Hutchinson's curator insight, February 26, 2014 12:51 PM

I definitely need to start looking at my tags. 

Alison Hewett's curator insight, February 28, 2014 3:56 PM

Curation versus mere aggregation, useful reminder.

Rescooped by Jimun Gimm from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Knol For Education - Gust MEES

Knol For Education - Gust MEES | SocialMediaDesign | Scoop.it

"GOOGLE Knol" has a BIG POWER for Education which authors will explain and show here. Everyone is learning from everybody...


Via Gust MEES
more...
AGIR Halle de Han's comment, October 11, 2011 9:42 AM
Merci pour l'info sur les tags :-)
Rescooped by Jimun Gimm from Web 2.0 for Education
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | SocialMediaDesign | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES, Lee Hall
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD