How safe are your students online? This lesson includes resources with facts and …
How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)
This resource guide was created as an accompaniment for a hands-on, three-hour …
This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.
This guide provides: - an overview of security and privacy - information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management - some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more - instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices
This lesson is designed for students in adult basic education grade level …
This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.
This lesson is designed for students in adult basic education grade level …
This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.
This unit provides an overview of the regulation of healthcare, including regulatory …
This unit provides an overview of the regulation of healthcare, including regulatory and professional organizations, the regulation of safety in medicine, and key legal aspects of medicine. This unit also covers compliance issues including privacy violations, reimbursement and fraud and abuse.
Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points …
Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points in cybersecurity advocacy. This document is designed to support state leaders engaged in state and federal advocacy, and to establish a focal point on the topic for the broader SETDA community.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders convene and collaborate, to compensate for shortcomings in district cybersecurity expertise.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders encourage incident response plans to help districts prepare for inevitable cyber events.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders provide phishing and awareness training to help districts identify vulnerabilities.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders establish procurement practices to help districts vet vendors more efficiently.
The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, …
The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.
Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, …
Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, offers details on how state agencies and other support organizations are empowering their smallest districts to secure their data and networks. From detailing various funding sources to providing insights into statewide and regional partnerships and offering practical examples of cybersecurity training, the document is a must-read for everyone involved in helping districts improve their cybersecurity posture. It is the newest addition to SETDA’s Cybersecurity & Privacy Collection.
Millions of people are on-line today and the number is rapidly growing …
Millions of people are on-line today and the number is rapidly growing - yet this virtual crowd is often invisible. In this course we will examine ways of visualizing people, their activities and their interactions. Students will study the cognitive and cultural basis for social visualization through readings drawn from sociology, psychology and interface design and they will explore new ways of depicting virtual crowds and mapping electronic spaces through a series of design exercises.
The nature of human identity - how we think of ourselves, how …
The nature of human identity - how we think of ourselves, how we perceive others - is a mutable concept, changing with the rise and fall of religious beliefs, social mores, philosophical theories. Today, we live in a world in which science and technology are among the most powerful forces reshaping our culture - and thus our definitions and perceptions of identity. In this seminar, we will examine the impact of science and technology on identity. The instructor’s course page may be viewed at http://smg.media.mit.edu/classes/IdentitySeminar/
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.