Your new post is loading...
Your new post is loading...
Today, as part of its anti-misinformation campagign, the United Nations launched the campaign #TakeCareBeforeYouShare There is a video of the launch press conference here: https://youtu.be/rH8BkTkRFuY They chose to launch on World Social Media Day (30 June),
Since its debut in 2004, Gmail has had the most popular email service on the planet, with a staggering 1.5 billion users worldwide. It’s one of the most versatile and useful email platforms out there. Besides its built-in features, it also supports rich customization via a wide range of plugins. That, combined with its powerful search features and the fact that Gmail is free—well, it’s little wonder that over a third of the world’s four billion internet users use it for their email needs.
The American association concerned with tech in higher education EDUCAUSE has announced its "key issues" for 2018. They were voted on by EDUCAUSE members. Some of them look like perennial issues to me, and some are rather generic (e.g. the first one seems to amount to - things keep changing!), but at least information literacy makes it in there (albeit subordinated to digital literacy). There is an Infographic (reproduced here: copyright EDUCAUSE used under a Creative Commons licence) and some links to EDUCAUSE resources under each heading.
As in previous years, it would be quite easy to fill a whole article in this series on “data insecurity,” on the data breaches and cyberattacks that continue to plague education – both schools and software. The issue extends well beyond education technology, of course, and in 2017 we witnessed yet again a number of high profile incidents (including some corporate admissions of breaches that had happened in years past): that over 140 million Social Security Numbers and other personal data had been stolen in a data breach at Equifax, for starters; that every single account at Yahoo – some 3 billion in all – had been affected in its 2013 breach.
Blogger can be a good choice for many classroom blogs. One of its selling points for schools that use G Suite for Education is that students can log-in by using their school-issued Google Accounts. Another great aspect of Blogger is that you can get a blog started in a manner of minutes. But with that ease of set-up comes some default settings that you might want to change. One of those settings being the privacy settings.
It’s your profile, you can include what you want to include—right? Before you post, think. Are you prepared to have those words and images represent you for months, and even years to come? Your postings on profiles and to chats and blogs may have cyberlives much longer than what you might have imagined or intended, and may reach a much wider audience than you could have anticipated.
In Britain, more than half of 12- to 15-year-olds are on Instagram, according to OfCom (pdf), the country’s communications regulator. So are 43% of 8- to 11-year-olds. But how many of them understand what they signed when they joined? Pretty much 0%, according to “Growing Up Digital”, a report released Jan. 5 (pdf) by the UK Children’s Commissioner.
When Max Schrems, an Austrian privacy activist, requested to see his personal data that Facebook stored on its servers, he was mailed a CD-ROM containing a 1,222-page document. That file, which would stretch nearly a quarter of a mile if printed and laid end-to-end, offered a glimpse into Facebook's appetite for the private details of its 1.65 billion users.
In the future, our digital selves will have personalities that are accessible to anyone who cares to look, with huge implications for our privacy
The home secretary has said no networks should be excluded from collecting and storing your browsing data
"Social media and text messages have blurred the lines between students’ school lives and private lives. While most schools take clear steps to protect students at school, more schools are beginning to consider the need to set policies that apply to students’ activities outside of school."
Via EDTECH@UTRGV
A couple of months ago my son, who is six years old, performed a solo routine at his school talent competition. I couldn’t attend but my wife filmed it on her mobile phone so I could watch it later...
|
Big tech companies have been spying on us for years. This knowledge isn’t new information, but what could be surprising is exactly to what extent each company does it. Security Baron categories what data six of the biggest tech companies collect from you in The Data Big Companies Have On You inf
Via Ana Cristina Pratas
We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.
Data protection law regulates how colleges, universities and other learning providers collect and use information about students, staff and others. It also provides individuals with the right to see information that is held about them.
I’ve written in the past about understanding the Terms of sites you are asking students to use and been interviewed about the implications of social media in classes. This year, one of the things I want to focus on is bringing those two things together. It is important that we don’t just know the terms we are asking our students to work under when we enforce the use of social media or other proprietary digital platforms for course work, it is important we know the implications and the devastating effects these tools and platforms might have in the future for our students.
As broadband privacy rules are rolled back, what can libraries do to respond? By Anne Ford | April 21, 2017
On April 3 President Trump signed a measure repealing Obama-era broadband privacy rules. Those rules, which had not yet gone into effect, would have required internet service providers (ISPs) to obtain customers’ permission before selling their information to third parties—information that includes browsing history, location data, and other highly sensitive content.
The Snooper's Charter will turn us all into security experts this year
Internet of Things technologies are already arriving on college campuses, bringing with them bandwidth, security and privacy concerns.
Learning analytics are becoming increasingly popular for improving learning and cutting drop-out rates – but critics question the impact on privacy
"Increasingly, colleges and universities are using predictive analytics to determine future outcomes for students in academic performance and engagement. But some wonder if the practice violates student privacy."
Via EDTECH@UTRGV
As the Government's Investigatory Powers Bill, or ‘Snoopers Charter’ as it has come to be known, passes through Parliament Eric Bohms considers the potential implications for the sector.
Data mining is a powerful tool being used by educational institutions to support student success, but often students do not know what data are being
Adobe has just given us a graphic demonstration of how not to handle security and privacy issues. A hacker acquaintance of mine has tipped me to a huge security and privacy violation on the part of Adobe. That anonymous acquaintance was examining Adobe’s DRm for educational purposes when they noticed that Digital Editions 4, the newest version of …
|