Updating search results...

Search Resources

35 Results

View
Selected filters:
  • privacy
Privacy and Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Privacy and Security for Teens
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)

Subject:
Electronic Technology
Information Science
Material Type:
Lesson Plan
Author:
Alyssa King
Tracy Cramer
MSDE Admin
Date Added:
07/17/2018
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018
Reading
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Date Added:
01/03/2018
Reading and Analyzing Text in the Context of a Societal Issue: Privacy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Date Added:
04/17/2016
Regulating Healthcare
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit provides an overview of the regulation of healthcare, including regulatory and professional organizations, the regulation of safety in medicine, and key legal aspects of medicine. This unit also covers compliance issues including privacy violations, reimbursement and fraud and abuse.

Subject:
Applied Science
General Law
Health, Medicine and Nursing
Law
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
SETDA Cybersecurity Policy Brief (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points in cybersecurity advocacy. This document is designed to support state leaders engaged in state and federal advocacy, and to establish a focal point on the topic for the broader SETDA community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/10/2022
SETDA Cybersecurity State Spotlight: Convening (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders convene and collaborate, to compensate for shortcomings in district cybersecurity expertise.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Incident Response Plan (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders encourage incident response plans to help districts prepare for inevitable cyber events.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Phishing and Awareness Training (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders provide phishing and awareness training to help districts identify vulnerabilities.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Procurement Practices (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders establish procurement practices to help districts vet vendors more efficiently.

Subject:
Education
Educational Technology
Material Type:
Case Study
Date Added:
10/24/2022
SETDA K12 Cybersecurity Landscape Scan (March 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
09/23/2022
Small Districts, Big Hurdles
Unrestricted Use
CC BY
Rating
0.0 stars

Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, offers details on how state agencies and other support organizations are empowering their smallest districts to secure their data and networks. From detailing various funding sources to providing insights into statewide and regional partnerships and offering practical examples of cybersecurity training, the document is a must-read for everyone involved in helping districts improve their cybersecurity posture. It is the newest addition to SETDA’s Cybersecurity & Privacy Collection.

Subject:
Education
Educational Technology
Material Type:
Reading
Provider:
SETDA
Author:
SETDA
Date Added:
10/10/2023
Social Visualization
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Millions of people are on-line today and the number is rapidly growing - yet this virtual crowd is often invisible. In this course we will examine ways of visualizing people, their activities and their interactions. Students will study the cognitive and cultural basis for social visualization through readings drawn from sociology, psychology and interface design and they will explore new ways of depicting virtual crowds and mapping electronic spaces through a series of design exercises.

Subject:
Anthropology
Applied Science
Arts and Humanities
Computer Science
Engineering
Graphic Arts
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Donath, Judith
Date Added:
09/01/2004
Techno-identity: Who we are and how we perceive ourselves and others
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The nature of human identity - how we think of ourselves, how we perceive others - is a mutable concept, changing with the rise and fall of religious beliefs, social mores, philosophical theories. Today, we live in a world in which science and technology are among the most powerful forces reshaping our culture - and thus our definitions and perceptions of identity. In this seminar, we will examine the impact of science and technology on identity.
The instructor’s course page may be viewed at http://smg.media.mit.edu/classes/IdentitySeminar/

Subject:
Anthropology
Arts and Humanities
Graphic Arts
Philosophy
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Donath, Judith
Date Added:
02/01/2002