In this Open Education Week keynote talk, Cory Doctorow discusses how the …
In this Open Education Week keynote talk, Cory Doctorow discusses how the collapse of the internet into “five giant websites, each filled with screenshots of text from the other four” wasn’t inevitable. From privacy to harassment to garden-variety ripoffs, the internet’s degradation was the result of identifiable policy choices that can – and must – be reversed. Learn how they broke the internet – and how we can fix it.
Pharo is a clean, innovative, open-source, live-programming environment. Enterprise Pharo is the …
Pharo is a clean, innovative, open-source, live-programming environment.
Enterprise Pharo is the third volume of a series of book covering Pharo and its community. Whereas the first volume Pharo by Example is intended for newcomers and the second volume Deep into Pharo covers deep topics of Pharo, this third volume covers libraries and frameworks for enterprises, and in particular those doing web development.
This graduate seminar is taught in a lecture and lab exercise format. The …
This graduate seminar is taught in a lecture and lab exercise format. The subject matter is tailored to introduce Environmental Engineering students to the use and potential of Geographic Information Systems in their discipline. Lectures will cover the general concepts of GIS use and introduce the material in the exercises that demonstrate the practical application of GIS.
Intellectual Outputs from Erasmus+ DELTA project, offering teaching programmes about the use …
Intellectual Outputs from Erasmus+ DELTA project, offering teaching programmes about the use of inoffensive drones and Wrok based learning approach to boost STEM didactics in VET secodary education
This course introduces students to iterative decoding algorithms and the codes to …
This course introduces students to iterative decoding algorithms and the codes to which they are applied, including Turbo Codes, Low-Density Parity-Check Codes, and Serially-Concatenated Codes. The course will begin with an introduction to the fundamental problems of Coding Theory and their mathematical formulations. This will be followed by a study of Belief Propagation–the probabilistic heuristic which underlies iterative decoding algorithms. Belief Propagation will then be applied to the decoding of Turbo, LDPC, and Serially-Concatenated codes. The technical portion of the course will conclude with a study of tools for explaining and predicting the behavior of iterative decoding algorithms, including EXIT charts and Density Evolution.
The current corporate governance models of today’s organizations are unfit for organizations …
The current corporate governance models of today’s organizations are unfit for organizations of the future, and even today. What does this mean for directors and the management? Let’s have a look into the future, divided into long-term, middle-term, and short-term future lenses.
This course introduces the theory of error-correcting codes to computer scientists. This …
This course introduces the theory of error-correcting codes to computer scientists. This theory, dating back to the works of Shannon and Hamming from the late 40’s, overflows with theorems, techniques, and notions of interest to theoretical computer scientists. The course will focus on results of asymptotic and algorithmic significance. Principal topics include:
Construction and existence results for error-correcting codes. Limitations on the combinatorial performance of error-correcting codes. Decoding algorithms. Applications in computer science.
Ethical Hacking is a course in our IT Cyber Security Program created …
Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum. This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking. Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath. All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.
TCP/IP Level Attacks Port Scanning DDoS Footprinting and Social Engineering Enumeration Programming for Security Professionals Operating System Vulnerabilities Embedded System Security Hacking Web Servers Hacking Wireless Networks Cryptography Protecting Networks with Security Devices
Short Description: This book is the result of a co-design project in …
Short Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education.This is the first of 2 Versions of this pressbook. Click on Volume 2 for information.
Long Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education. Students were asked to review, analyze, and synthesize each topic from three meta-ethical theoretical positions: deontological, consequentialist, and virtue ethical (Farrow, 2016). The chapters in this open educational resource (OER) were co-designed using a participatory pedagogy with the intention to share and mobilize knowledge with a broader audience. The first three chapters in the book discuss specific ethical considerations related to technologies such as Artificial Intelligence (AI) , social networking services (SNS), and 3D printing. The next four chapters shift to a broader discussion of resource sharing, adaptive learning systems, STEM, and assistive technologies. The final two chapters discuss admissions and communications that need to be considered from an institutional perspective. In each of the nine chapters, the authors discuss the connection to the value of technology in education, and practical possibilities of learning technologies for inclusive, participatory, democratic, and pluralistic educational paradigms.
Word Count: 56853
ISBN: 0-88953-438-1
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: This book is the result of a co-design project in …
Short Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education.
Long Description: Click on Volume 1 to read the first book in this series.
This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments, and is the second volume in the series. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education. Students were asked to review, analyze, and synthesize each topic from three meta-ethical theoretical positions: deontological, consequentialist, and virtue ethical (Farrow, 2016). The chapters in this open educational resource (OER) were co-designed using a participatory pedagogy with the intention to share and mobilize knowledge with a broader audience. The first section, comprised of four chapters, focuses on topics relating to well-being in technology-enabled learning environments, including the use of web cameras, eproctoring software, video games, and access to broadband connectivity. The second section focuses on privacy and autonomy of learners and citizens in a variety of contexts from schools to clinical settings. In each of the seven chapters, the authors discuss the connection to the value of technology in education, and practical possibilities of learning technologies for inclusive, participatory, democratic, and pluralistic educational paradigms. The book concludes with reflections from the course instructor gained over two iterations of teaching the course.
Word Count: 40312
ISBN: 978-0-88953-472-8
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This course considers the interaction between law, policy, and technology as they …
This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of “transparency” – regulations and technologies that govern the use of information, as well as access to information. Topics explored will include:
Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web
Artificial Intelligence (AI), and the algorithmic judgment at its core, is developing …
Artificial Intelligence (AI), and the algorithmic judgment at its core, is developing at breakneck speed. This version of the popular Ethics for Engineers course focuses on the ethics issues involved in the latest developments of computer science.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.