Updating search results...

Search Resources

29 Results

View
Selected filters:
  • privacy
CoSN Cybersecurity Staffing Resource for K-12
Unrestricted Use
CC BY
Rating
0.0 stars

Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and requires the creation of a culture of cybersecurity within each K-12 organization. This paper identifies and addresses staffing cybersecurity across the K-12 organization, including identifying several strategies for staffing cybersecurity within the school system. These strategies include developing focused cybersecurity positions; incorporating cybersecurity duties and responsibilities in all existing K-12 technology positions, leveraging cross-district collaboration and/or managed services to augment cybersecurity staffing; and expanding the expectation that cybersecurity is a responsibility of all members of the K-12 education community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
CoSN
Date Added:
10/05/2022
Cybersecurity-Cybercrime-The Legal Environment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
The Educator's Guide to Student Data Privacy
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This guide is meant to help teachers utilize technology in the classroom while protecting their students’ privacy.

Technology tools and apps are making it possible for educators and students to collaborate, create, and share ideas more easily than ever. When schools use technology, students’ data—including some personal information—is collected both by educators and often the companies that provide apps and online services. Educators use some of this data to inform their instructional practice and get to know their students better. It is just as essential for educators to protect their students as it is to help them learn.

Subject:
Education
Educational Technology
Material Type:
Reading
Author:
Future of Privacy Forum
Connect Safely
Date Added:
12/29/2020
Ethics and Information Technology
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Ethics and Information Technology focuses on the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments. Students explore the technological underpinnings of associated technology systems, experiment with individual and group interaction with technologies, and examine the mechanics of ethical and unethical behaviors.

Material Type:
Full Course
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
Paul Conway
Date Added:
04/12/2011
Genetic privacy in a ‘post-genomic’ world
Unrestricted Use
CC BY
Rating
0.0 stars

This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:

"Advancements in metagenomic technology have been a boon to research but may encroach on people’s expectation of privacy. A staggering amount of information can be derived from the cells we leave behind on everyday surfaces, and our ability to interpret this information to learn about YOU will only grow with time. While these advancements are not likely to ever be 100% accurate, they present a potential avenue for discrimination. Genetic privacy is not a new concept, and in the US and elsewhere, there are laws protecting people from some discrimination based on genomic-derived data, but metagenomics is not covered by the existing laws and requires its own ethical and legal scrutiny. Our world is rapidly becoming one with ubiquitous genetic, molecular, and data profiling. In that world, privacy will be difficult to protect unless statutes and laws are brought up to date with the advancement in biotechnology..."

The rest of the transcript, along with a link to the research itself, is available on the resource itself.

Subject:
Biology
Life Science
Material Type:
Diagram/Illustration
Reading
Provider:
Research Square
Provider Set:
Video Bytes
Date Added:
10/13/2021
How to practice safe sexting
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Sexting, like anything that's fun, runs its risks — but a serious violation of privacy shouldn't be one of them. Amy Adele Hasinoff looks at problematic responses to sexting in mass media, law and education, offering practical solutions for how individuals and tech companies can protect sensitive (and, ahem, potentially scandalous) digital files.

Subject:
Social Science
Material Type:
Lesson
Provider:
TED
Author:
Amy Adele Hasinoff
Date Added:
03/29/2017
Inquiry Based Project: Privacy v. Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Date Added:
12/17/2018
Internet Privacy: A Personal and Political Issue
Read the Fine Print
Rating
0.0 stars

In this interactive lesson, students consider the issue of internet privacy, both in their own lives and in society, including government spying, parental monitoring, and corporate tracking of consumers. What is the connection and potential conflict between safety and privacy, both on a personal and institutional level?

Subject:
Applied Science
Arts and Humanities
Information Science
Social Science
Sociology
Material Type:
Activity/Lab
Reading
Provider:
Morningside Center for Teaching Social Responsibility
Provider Set:
Teachable Moment
Date Added:
07/06/2013
K12 SIX Cybersecurity Frameworks (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
K12 SIX
Date Added:
10/18/2022
MSDE Student Data Privacy Presentation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Privacy presentation presented at the MSDE Inspired Designer OER Development workshop. Privides a general overview of federal student data privacy regulations as well as Maryland COMAR. Also includes activities and additional resources for a professional development session.

Subject:
Education
Material Type:
Lecture
Date Added:
09/24/2018
NSA Surveillance: A Debate
Unrestricted Use
CC BY
Rating
0.0 stars

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Social Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
NSA Surveillance and the Politics of Whistleblowing
Read the Fine Print
Rating
0.0 stars

Edward Snowden's leak of classified information about the NSA's surveillance of American citizens has touched off a debate about the need for government secrecy versus the public's right to know. Two student readings and discussion questions probe the controversy.

Subject:
Political Science
Social Science
Sociology
Material Type:
Activity/Lab
Reading
Provider:
Morningside Center for Teaching Social Responsibility
Provider Set:
Teachable Moment
Date Added:
06/21/2013
OER Creation: Gaining Ethical Consent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Whilst this specifically covers the issue of privacy / moral rights / ethical rights with medical OERs, this guide is applicable for all learning and teaching subjects.

Subject:
Arts and Humanities
Education
Higher Education
Material Type:
Teaching/Learning Strategy
Provider:
OER Africa
Author:
OER Africa
Date Added:
07/21/2011
Praxisboxen nachhaltig digital: Handreichung für Dozent*innen und Weiterbildner
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Nachhaltige Digitalisierung ist eine Digitalisierung, die sich einbettet in die Werte und Normen der Gesellschaft sowie die planetaren Grenzen beachtet. Um zur Umsetzung von nachhaltiger Digitalisierung beizutragen, hat die Volkshochschule Bonn im Rahmen der Learning City Bonn ein modular aufgebautes Weiterbildungsangebot für die DozentInnen entwickelt und stellt es Volkshochschulen und anderen Einrichtungen der Weiterbildung zur Verfügung. abei ist die Kernfrage: Wie können Dozent*innen unterstützt werden, Aspekte einer nachhaltigen Digitalisierung zu beachten und zu vermitteln? Wir verstehen dabei nachhaltige Digitalisierung als Querschnittsthema, das mit unterschiedlichen Schwerpunkten je nach Kurs und Format zur Anwendung kommen kann. Dozent*innen werden sowohl als Weiterbildungsakteure sowie als Multiplikator*innen angesprochen. Als Themenfelder nachhaltiger Digitalisierung wurden erarbeitet: Teilhabe, Klima- und Ressourcenschutz, Privatheit, Selbstbestimmung und Wohlbefinden.

Die Praxisboxen umfassen (für den Anfang) folgende Module:
- Ökologischer Rucksack des Smartphones“
- „Always on? Klimasensibel lehren“
- „Digital inklusiv – Vielfalt online ermöglichen“
- „Downsizing“
- „Sharing is caring“
- „Gemeinsam Spaß statt Social Distancing“
- "#StopFakeNews"
- „Mit Mehrdeutigkeit und Widersprüchen gut leben“
- „Wenn Du nichts bezahlst, bist Du das Produkt!“

Die Praxisboxen sind nach einer jeweils gleichen Systematik aufgebaut, die sich auf Lehr-Lernsituation sowie die Herausforderung der nachhaltigen Digitalisierung bezieht. Sie stellen praxisorientiert Handlungsmöglichkeiten, Tipps sowie Impulse zur Übertragung des Themas auf eigene Kontexte dar. Hinweise zum Weiterlesen werden gegeben. Die Praxisboxen können nach Bedarf ausgewählt werden.

Subject:
Education
Higher Education
Material Type:
Activity/Lab
Author:
Dr. Ingrid Schöll
Dr. Saskia Dörr
Date Added:
06/30/2022
Privacy, Data Sharing and Evidence Based Policy Making
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

14. Brave New World: Privacy, Data Sharing and Evidence Based Policy Making

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more accessible with technology and more connected.

Subject:
Business and Communication
Management
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Medgar Evers College
Author:
Rhonda S. Binda
Date Added:
10/30/2020
Privacy and Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Privacy and Security for Teens
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)

Subject:
Electronic Technology
Information Science
Material Type:
Lesson Plan
Author:
Alyssa King
Tracy Cramer
MSDE Admin
Date Added:
07/17/2018
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018