Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Let us go for an ===> Visual walk <=== on what the internet is, try to follow me please: YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer, Smartphones, tablets through YOUR browser…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!
.
EDUcation and Schools RESPONSIBILITY: a safe place for the LEARNers, students! Because of the internet there are NOT ANYMORE walls in the schools and SO the safe place is ALSO the internet!
After having read this and YOU are STILL NOT convinced about THE MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, YOU SHOULD ask YOURSELVES if YOU are on the ===> NAIVETY STATUS <=== OR already on the ===> MATURITY STATUS <===, thus meaning if YOU take YOUR RESPONSIBILITY for the future of OUR kids 😉
This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===
« Good habits formed at youth make all the difference. »Aristotle
YOU are STILL feeling YOUNG, aren’t YOU 😉
.
Click the above image, please, to access the article.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
Keywords necessary for me to create this blog post:RESPONSIBILITY, what is the internet?, comparison Virtual World and Real World, highway, Internet of Things, Internet of Everything, Social Media, PracTICE, Learning to learn digital citizenship, CyberAttacks interactive maps, REALITY,
[GM] The authors of this blog post “@ICTPHMS (Dan KIRSCH‘s Blog)” and “@knolinfos (Gust MEES‘s Blog)” have met each other on Social Media “Twitter” and decided one day to work together on a common blog about “Digital CitizenShip“, a “Global Collaboration” from authors of the USA and Luxembourg (Europe) was born. Find below, please, OUR collaboration blog:
Ideas: using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style whereTHEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.
I created these comics with dialogues with the following online program:
If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:
The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <===
.
WHY do WE use a bunch of different so-called tools to LEARN about Digital Citizenship?
Please check the below picture, who explains 😉
.
.
I will let “Dan KIRSCH” explain to YOU in detail about WHAT WE were working together…
I have utilized the collaboration with Gust via twitter on the topic of Digital Citizenship within my 8th grade ICT classes. Currently, I am teaching 3 classes with approximately 30 students in each. One of our curriculum standards is to teach Digital Citizenship/Internet Safety. I began to investigate different ways of teaching this to my 8th graders where it could be authentic and actually “practice what is being taught“. Through collaboration with Gust and other social media colleagues on twitter I began to utilize blogging (Edublogs) as a platform to teach Digital Citizenship.
Each student has their own blog, which is contained under my class blog. In this platform, we treat our blogs as our “social network” where students comment on blog prompts given by me or themselves containing information on Digital Citizenship, real-life scenarios, and social media. It is also used to teach other “edtech” skills; such as inserting media, using embed code, and RSS Feeds. This is the fourth year I have used edublogs and I enjoy reading what my students produce; especially the reflections and connections they make with one another.
It’s amazing to see how students communicate via the technology “more” than they would face to face; especially on how to become a positive Digital Citizen! Recently, I have begun to archive their posts on to storify (with no last names) to use for future classes you can access this via my edublog: http://mrkirsch.edublogs.org
Post: 20/03/15
The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.
Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).
The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.
Understanding what your digital footprint says about you. The following blog post (prompt) ==> check link here <== was given to my 8th grade students as a more interpersonal digital citizenship reflection. The previous posts have been more focused on the “broad” perspective of Digital Citizenship and what it is ==> what it means. <== The objective was for students to take an interpersonal “look” at themselves and reflect on the ==>HOW TO<== become & maintain a positive digital footprint as they progress through their high school years, and into college. My goal as their ICTinstructor is to make students realize that once they enter college and are “away” from parents/guardians peer pressure can and often times does involve them in negative way. The point is ==> teaching students to be aware of this now they will be able to think twice before they “make the choice” to share/post negative material on the internet/social media, which in return could damage their “digital footprints.”
Student example as seen on mrkirsch.edublogs.org of Digital Citizenship.
Teaching Digital Citizenship Through Comics
Objective: The objective of the post is for students to learn about Digital Citizenship through stories.
Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students created comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.
The following link is a curate blog reflections from my students on Digital Citizenship/Internet Safety. This was a “lead-up” activity to the comic strips seen above. The curation tool I utilized for this is Storify.
Teaching with Content Curation (added February, 3, 2015)
Content curation is the “…process of collecting, organizing and displaying information relevant to a particular topic. Teacher content curation can be used by students and students can be asked to show expertise with examples of curation.” In my 8th grade ICT class we will be completing webquests on content curation as a teach method of introducing students to “Content Curation.” The following text reviews what content curation is and it’s purpose, along with several content curation platforms, what a webquest is, and followed by a lesson plan I will use in my classes.
Content curation is the “…process of sorting through the vast amounts of content on the web and presenting it in a meaningful and organized way around a specific theme. The work involves sifting, sorting, arranging, and publishing information.” A content curator picks the best content that is “…important and relevant to share with their community (in the case our class community). It isn’t unlike what a museum curator does to produce an exhibition: They identify the theme, they provide the context, they decide which paintings to hang on the wall, how they should be annotated, and how they should be displayed for the public.”
Content curation is not about collecting links or being an information pack rat, it is more about “…putting them into a context with organization, annotation, and presentation. Content curators provide a customized selection of the best and most relevant resources on a very specific topic or theme” (in this case ours will be on Digital Citizenship, ICT, and Educational Technology). A content curator “…continually seeks, makes sense of, and shares the best and most relevant content on a particular topic online.”
Why is Content Curation Valuable?
Individuals and organizations are making, sharing media, and content all over the social web. For example, on Facebook the average user creates 90 pieces of content each month. If you “…multiply that by the 800 million Facebook users, it isn’t surprising that data or content on the Internet is measured in billions of gigabytes.” Essentially, we are living an era of content overload!!! A content curator offers high value to anyone looking for quality content because finding that information (and making sense of it) requires more and more time, attention, and focus.
For individuals and organizations, content curation can help establish their “thought” leadership and capture attention in today’s information “overloaded” world. Content curation can “…help your organization become the go-to authority on an issue or topic area.” It can be done as simply as writing a blog post (this is excatly what we will be doing with our edublogs in my classes) with links or sharing annotated links on Twitter around your topic.
.
Getting Started
This questionnaire (citation on pic) can help you think through a plan for content curation before you dive into the curation tools. There has been an explosion of tools and you can distracted by useless features. Even better, “… perhaps focus on the skills with the tools you know how to use already.” You might want to integrate the process of content curation into a channel you’re already using (in my class students will be including this within a category on their blogs).
[DK] Please check the link ==> Content Curation Lesson Plan to access my recently created content curation lesson plan for my 8th grade students. This lesson plan is posted for colleagues in my PKM to access.
Webquests are useful teaching tools for educators. An imaginative webquest can capture the attention of a student as he or she learns about any number of topics. For instance, I have chosen to use my classes edublogs as our webquest platform where we can incorporate curated content on Digital Citizenship.
A teacher who wants to bring his or her own webquest ideas to life must make a detailed plan. Some teachers begin by choosing a web quest template. There are online resources available that outline the specific elements of a webquest. For example, a webquest has an introduction that explains its purpose to students. A webquest also includes a task that lets students know what they are expected to do. Next, the process sets out a path for students to follow that leads them to relevant information. Those are just a few of the steps that a teacher needs to fulfill in order to make an effective webquest.
Spend time discussing the basics of Internet searches (e.g., have students with more experience help others). See Evaluating Websites from the University of California Berkley in Resources. Talk about Search engines and other ways to find information (2nd and 3rd tier investigation).
Create a webquest (using our edublogs) and have students write about what sites they come up with using our “curated content.”
Have the students support why their “curated content” was appropriate for this lesson within their blog posts.
Students will then be assigned a topic (social media, educational technology, digital citizenship, and/or online security) to begin their curated content. Once content as been established and shared via WordPress or social media the students will then blog (webquest) about their thoughts on curated content.
In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To
.
Click the above image, please, to access the article.
How To Design A Course About Digital CitizenShip?
Please check below, on How-To YOU could create YOUR own course, based on PracTICE AND student centered:
.
.
.
THE Whole FREE Course On ONLY One Interactive Image
Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉
.
.
.
Using A Flowchart To Design The Course
Check below, please, to find out the how-to.
.
Click the above image, please, to display it larger.
.
THE Whole FREE Course Using FlowCharts On ONLY One Interactive Image
Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉
Click the blue “Create a Story” button in the top right hand corner.
Look at the right side of the new screen where the icons of your favorite social media websites reside.
Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.
Want an Example?
Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.
Keywords necessary to create this blog post: @ICTPHMS, @Knolinfos, collaboration, Global Collaboration, Education, Global Education, TRUST, #digcit, Digital CitizenShip, digital citizen, Cyber-Security, Internet-Safety, Best Practices, Learning To Learn, Learning By Doing, Student centered, Coaching, #EdTech #tools, #esafety, #blogging, ICT, #edblogs, authentic practice.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
..
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge to be on my school districts ICTcurriculum committee. We are rewriting and updating our ICT curriclulum in grades 6-8 for the 2015-2016 school year.
Social Media is about sharing, right!? That’s WHAT it is mostly, BUT there are the HIDDEN commercial intents which MOST people don’t see (OUR Privacy is sold and OUR friends one too…) and there is ALSO OUR responsibility about it WHEN WE share, WE will discuss in detail here…
First of ALL, there isn’t ANYTHING for FREE in this world, even the death costs the life and a lot of money for the funerals 😉
SO… Let us analyse WHY WE get Social Media and other services on the internet for “FREE“. BTW: there isn’t anything for FREE, WE pay with OUR information which the companies are gathering!
.
WE Are The Product
It is important to know how tech companies generally track your data and what you’re agreeing to in those terms of service agreements. Check the infographic below, please to understand.
.
Click the above infographic to access the article, please.
How can WE get protected about an overuse of OUR Privacy!?
First of all, please read the article below.
Click the image above, please, to access the article.
SO, by knowing now a bit more YOU certainly ask if there are some Apps and/or software who help us to protect OUR PRIVACY, here WE go (non-exhaustive list…):
.
Click the image above, please, to access the article.
AVIRA SocialShield
.
.
Click the image above, please, to access the article.
.
BitdefenderSafego
.
.
Click the above images to access the articles, please.
You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.
Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.
.
.
Facebook Apps AND Privacy
.
.
WHAT YOU probably don’t know, check links below, please:
Keywords necessary for me to create this blog post: Apps and privacy, Bitdefender, Avast secure.me, AVG Privacyfix, Avira Socialshield, ESET Social Media Scanner, Bitdefender Safego, F-Secure Safe Profile, Privacy, CyberSecurity,
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
The first steps before the kids go online are to protect the computer and Smartphone(s) at its BEST as possible to make sure that a BAD click will NOT become a catastrophe!Second step is to talk to the kids about the dangers of the internet and related with the use of the computer and the tablets, Smartphones and about the dangers of Social Media.
.
French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!
« Good habits formed at youth make all the difference. »Aristotle
.
How To Protect The Home Network AND The Computers In This Network!?
YES, YOU have read it correctly, I mentioned “Network”. WHY!? Because just letting everybody owning ONLY his (her) own device at home wouldn’t make sense, BETTER is to connect ALL the devices (Smartphones, tablets…) together in a Network where YOU could share even together your files, photos, videos… AND this through a secured Network. Everybody will get his OWN “User Account” where one “User Account” will be the “Administrator Account“, the parents account, who will have 100% access on the main computer. ALL the others will have an “User Account” with restricted access. Check out below on the How-To create “User Accounts”.
.
Click the above image to view the video on the How-To, please.
Click the above image to access the articles, please.
.
YOU may ALSO change the Wi-Fi Password 2-3 times a week on YOUR router so that YOUR kids get ONLY access after THEY made certain tasks which YOU told THEM to achieve 😉 Thus meaning, YOU handle over the NEW Password ONLY when those tasks were achieved!
Change your Router’s Pass Word!
Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security:
.
===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===
SO, NOW YOU got a protected Network and the family members are in a technical secured home environment, what else to do!?
For whatever device (computer, tablet, Smartphone…) and/or OS (Operating System/Mac, Linux, Windows) YOUR family members own, YOU MUST install an antivirus on them. I recommend to use an “Internet Security Suite” which combines antivirus, firewall, antispyware and… Read more below what else to do…
Learn in one week how to get Best protection-The Practice
.
I will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…
Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious! “WOT” ALONE isn’t enough! My experience over years 😉
Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.
.Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!
.
As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉
.
For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:
.
.
Let Us ALSO Protect OUR Privacy
Are YOU aware of the dangers of WiFi on public places? YOU should!
.
Protect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
And NOT TO FORGET the Apps: Do YOU know WHICH permissions YOU gave YOUR #Apps? Do YOU know HOW MUCH #Privacy YOU share without knowing? Check below, please and WONDER:
By knowing NOW about the dangers and PRIVACY I suggest that YOU install a “VPN” (Virtual Private Network) application on each browser (Mozilla Firefox, Google Chrome, Safari, Opera, IE…) that YOU use, here below my selection (non-exhaustive list).
WHAT’s The Appropriate Age For Kids To Start With It AND How-To?
.
« Good habits formed at youth make all the difference. »Aristotle
.
WHAT’S THE appropriate age for kids to start learning about InternetSafety and CyberSecurity? A question I get asked very often. Well, let us say it this way: when kids understand what is BAD and GOOD, that will be the perfect timing to start to teach them about the dangers of the internetand how to get the right reflexes. YES, reflexes they can learn them easily, NO Technic of course as they wouldn’t understand it! Experts say that the right age would be 5 years old, check the link below, please:
Personally I started to teach my wife’s niece 12 years ago when she was 4 1/2 year old and that worked perfectly. I will tell YOU how I did and YOU can try it out as well, success guaranteed.
First of all ask the kid if it knows about the BAD and the GOOD in our real world and tell it that on the internet (virtual world) it is the same. Tell them that the BAD guys will infect the computer, explain them that it is similar to an infection in real world (flu, as example…). For that reason they need a protection on the computer which will get updated, that’s the vaccine. When they know about vaccine in real world, they will understand that it is a MUST!
Parents should have taught them this about vaccines! WE will remember them each day (or at any time they go online) when getting online with the computer to check if the antivirus is switched on, they will get ===> THE reflex <=== later to check about THAT action. It is actually very easy, I will explain below.
.
As YOU can see on left-hand side the antivirus, in our case “Norton Internet Security Suite” is visible (see red circle). WE see as well that there is a green checkmark. This checkmark shows us that the antivirus is switched on and updated. Tell the kids up from early age to check this every time they use the computer, they will remember it.
Install ALSO WOT and McAfee SiteAdvisor on any devices as both show what websites to trust by indicating it with three different colours (green,orange, red). The kids will recognize the colours and understand.
.
.
With the above mentioned advice your kids will learn the necessary basic reflexes to stay safe on the internet. BUT DON’T FORGET: a security by 100% doesn’t exist and the weakest link in the security chain is the human!
Learning Responsibility: Family Pledge And Passwords
.
Use a psychological trick to remember your family members about the MUST to take care about their weeklyCyberHygiene, the reflex to learn, and play the song “The Reflex-Duran Duran”. They will get used to it, and every time they hear the song they would know that there is something special to do, such as NEW “Updates“! Easy to use, isn’t it 😉
.
.
Organize a Family Weekly-Security-Day
My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…
===> Play as a team in the family to make sure that everybody respects the weeklySecurity-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===
You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL 😉
.
===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===
.
Penalties could get reset for a certain time (up to you to make the rules…)
Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
Your own ideas for motivating the team to do the tasks…
.
Create a family pledge where the members have to agree to to respect the family community responsibility. You may ALSO make one member of the family the responsible person for one week who takes care of the others and who will supervise that each member of the family respects the weekly security tasks. A spreadsheet may help, here below an example.
.
Click the above image to access the document.
.
This blog post was featured on “Cyberwise” in March 06, 2015.
Click the above image, please, to access the article
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
Necessary keywords for me to create this blog post: Family pledge: learning responsibility. password ONLY when done some tasks… Password CHANGE ALL 3 months, reflexes, showing the way, remembering the said when growing, asking questions when not comfortable, comfort zone together with parents, workstation NOT in separate room, published articles in the press, responsibility, community feeling, empathy, examples from traffic, the THREE colours (red, green, orange), WOT, McAfee Site Advisor, secure surfing, Antivirus reflex, Wi-Fi password change every day or once a week when tasks are done kids get it 😉 Router configuration for family… Passwords, sending messages over the network (#FSCD), planifying #FSCD over DOODLE, Family Safety, computer in a place who everybody is seeing; NOT in bedroom!, Install VPN on any devices as browser add-on.===> creating different accounts, ONE Administrator the others with restricted…, creating a Home-Network for sharing documents, photos, etc., tutorial from Microsoft about different accounts, links, Privacy settings, WOT, Any Friday #FSCD, family pledge, creating a sense of responsibility, Updates, 3dParty, CyberBullying Avira !!!!!!!!!!!!!!!!!!!!!!!!!! garage appointment for cars, CyberHygiene, creating sense of responsibility,
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter @NancyW <===. Here WE go, check the infographic below, please.
.
[GM] Please check my blog posts below, who explain in detail:
When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking<===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:
.
Click the above image, please, to access the article.
.
[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.
[MK] Mindy KIM (USA)
[MK] What changes could be made to improve the overall message?
[MK] You made a strong point here, where else could you apply the same idea?
[MK] Who is your audience?
[MK] Could you say the same thing using less words? Would your message be understood?
Greetings from Patrick Henry Middle School in Sioux Falls, SD.We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.
The following linkhttp://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.
.
.
Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!
Post: 04/28/2015
The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.
The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.
Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).
The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.
Learning about Digital Citizenship through comic strip creations. See an example below, please.
.
.
Objective: The objective of the post is for students to learn about Digital Citizenship through stories.
Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.
Sample of my 8th grade Blog Prompt for next week. Check Below..
Who owns information?
Objective:
After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism. Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.
Rationale:
In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online. They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.
Focus question:
When you buy a song, is it really yours to use how you want? Are all images online available to use however you want?
Should creators of information, images, songs etc. be paid for their work?
Students will watch short video on monkey photo and discuss what rights monkey/photographer have in this specific case:
Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics).
This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use ischogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂
Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere. Once the project is completed examples will be provided.
Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:
“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?
How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”
Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts).
Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another.
Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information. Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.
Click the blue “Create a Story” button in the top right hand corner.
Look at the right side of the new screen where the icons of your favorite social media websites reside.
Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.
Want an Example?
Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.
Post: 25/11/2014
Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.” The link is provided below:
Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:
The following link is directly from my class blog:http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy.
[GM] Gust MEES (Luxembourg/Europe)
Added on 07/01/2015:
Ideas: using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.
I created these comics with dialogues with the following online program:
If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:
The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉
Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉
.
.
By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.
Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.
.
.
Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.
The authors [GM], [MK], [ICTPHMS] will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.
[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:
Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.
This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?
Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)!TIP: read ONLY the bold text to understand it quickly 😉
Check ALSO these links, please, who explain about “International Collaboration”:
The authors are from Europe (Luxembourg) and the USA, please check below:
.
The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor)will be represented by THEIR initials such as:
Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.
.
Please click this link first before STARTING ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.
.
Student Centered Initiatives
[GM] Well, that’s WHY I was inviting @ICTPHMS as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet.
[MK]My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.
Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.
We begin lessons by learning important vocabulary and learning basic knowledge:
.
.
.
.
This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:
1). Why do circles have no sides?
2). How many squares make up a box?
.
.
.
.
WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?
[ICTPHMS]
Online is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.
Two Sides of the Coin
The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.
Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.
These scholarships can be easily lost if students post inappropriate profiles on various sites like
Twitter
Facebook
MySpace
Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.
Google Search to Screen Students
In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.
Air-Tight Online Profile
How can students make sure they are squeaky clean online?
Do not post anything to your site that would be morally or ethically questionable.
Never post personal information such as your address, daily schedule, or phone number.
Make your profiles private so only a selected group can view your information.
Don’t add “friends” you don’t personally know.
Ask friends to remove any photos of you that could be seen as unflattering.
Make sure they never use your name when they add you to their site.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance ofGOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.
Do WE Still Have Privacy Rights In The Digital World!?
.
According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.
[MK] Online perceptions, everyone can “learn” about who you are.
[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.
[MK] Beware what you share, share what you would not mind the whole world knowing.
.
.
.
.
.
How Can Education Help To Lower Cybercrime?
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Educationto teach people aboutCyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,
.
.
.
.
A NEVER Ending Story Which WE MUST Be Prepared For, But How!?
Technology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.
Team, YOUR collaboration is required, please propose YOUR questions:
A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
Q: Can my child do this?
A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
Q: How can I access the blog?
A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
Q:…
A:…
Q:…
A:…
Q:…
A:…
Q:…
A:…
[ICTPHMS] (Editor)
Q:…
A:…
Q:…
A:…
Q:…
A:…
.
[GM]Together with[MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:
How Will WE Handle This Blog Post To Stay Up-To-Date?
[GM] Well, that isn’tTHAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.
Well, there is a lot of different views! WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter @NancyW<===. Here WE go, check the infographic below, please. .
.
WHEN WE have a deep look on it WE will see ALSO ===> Digital Security <=== which I will define here as ===> Cyber Security <=== where ===> Internet Safety <=== is included as well in it.
I prefer using only one word for NOT making people dizzy ===> Cyber Security <===, later, after learning about, YOU will automatically know what is belonging to it…
We will use ALSO Social Media twitter to communicate with OTHERS, here below an example on how this could be done:.
=> 9/n Concerning ===> #CyberSecurity <===: WE will install #Protection #Software on #AnyOS#AnyDevice for OUR own protection AND to protect ALSO OUR #Community as WE know THAT any infected device can infect OTHERS!
Check out WHAT the “ISTE” says about Digital Citizenship below, please. The International Society for Technology in Education (ISTE®) is the premier nonprofit organization serving educators and education leaders committed to empowering connected learners in a connected world. ISTE serves more than 100,000 education stakeholders throughout the world.
As WE know NOW know about WHAT ===> Digital Citizen Ship <=== is about, my idea about the How-To students could learn it through THEIR OWN responsibility by creating an ===> Advisory Board <=== on each school where THEY run it.
.
Digital Citizen Ship | Advisory Board Run By Students
What would be BETTER than using practice to learn about a difficult task such as ===> Digital Citizen Ship <===, isn’t it!? Well, how to do this? It’s a question which I was asking myself a lot and after ===> Deep THINKing <=== I got this idea: let the students, learners, create themselvesan ===> Advisory Board <=== on each school where THEY learn the practice, where THEY have their OWN voice and where THEY HELP each other to resolve problems (Cyber Bullying…), to get NEW ideas, to learn together, to take their OWN ===> Responsibility<===, where they learn to communicate, organizing meetings with parents and teachers to discuss…
How could that be done, organized?
Well, WHY NOT getting students, learners from any age of the school being part of such an ===> Advisory Board <===, together with one adult person who is present as a coach, not controlling them but guiding them. THEY should meat at least once a week and also taking care of THEIR school community (learning responsibility) by remembering THEM about the ===> #FSCD <===, THE “Friday Security Check Day“, where people learn to get the right reflexes about looking for “Updates” of installed software, checking the browsers if they are updated, helping to create a ===> Coding Club <===, helping to create a ===> Maker Space <===, and a lot more… Use YOUR creativity to find some more ideas 😉
SO… Let it GO, let it FLOW! Go for ===> DeepTHINKing <=== about the idea and THINK about the word ===> together <=== who brings people on a ===> Win-Win situation <===.
.
Keywords necessary for me to create this blog post:Proactive THINKing, understanding the internet, out of NAIVETY status, community protecting, Internet Of Things, Critical Thinking, Awareness, Internet Safety, Cyber Security, using Maker Space and Coding for the PRAXIS, IT Security-Scouts,
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Learning from the fails of others for a BETTER more secure Internet!
Keywords for this free course:
.
Naivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
.
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!
.
What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvety, naïveté, etc.), is the state of being naive—having or showing a lack of experience, understanding or sophistication, often in a context where one neglectspragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]
.
.
Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…
Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…
.
Smile: Your Selfie Is A Mugshot For The NSA | Naivety
Image Credit: Click image please to access the article
Strava fitness app divulges heatmap of secretive British SAS base
A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.
A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!
If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]
An external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.
This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.
[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.
The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:
Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]
In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.
==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==
While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.
===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===
Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
.. Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:
Good example on how an App accesses your data below .
.
This App from ThingLink is one of the best examples of good practice as it doesn’t access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage
===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===
Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.
As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===
Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:
Naivety in the Digital Age means not realizing and accepting thedangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinkingskills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!
.
.
.
Concerning download sites, here are the trustful download websites:
One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!
It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!
But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:
In21st CenturyInternet-SafetyALONEisn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!
Would YOU like to get called a naif because not having those skills?
Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…
[Beginning Text from Mashable] In our Cybercrime Series, presented by Norton, Mashableexplores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]
Not so clever after all…man falls victim to IQ test scam
A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.
After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.
Read the whole story here, you will get a big laugh:
It took me a really a while before I took the courage to post the following now:
Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudesfrom people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!
.
Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:
Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((
A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉
.
The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!
.Anything else which is important? YES, ICT Awareness!
To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:
YOU will learn NOT to be a naif and to see the reality!
Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===
===> The roots of education are bitter, but the fruit is sweet. Aristotle <===
.Take your time, please! There are a lot of information for some to learn; take it easy .
.
..
WHAT YOU MUST KNOW!
.
We are ALL responsible for a secure Internet!
Automatic Windows Update must be enabled
For Apple devices: ALL the updates must be installed also!
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
While using “BYOD” we need a strong “BYOD-Policy” at least!
While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.
===> I created a new Hashtag: #FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===
.
. .
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Actually (January 2020 and even before…) there are a lot of warnings from Cyber-Security experts and EVEN from the FBI concerning Smart-homes and its connected devices:
SO NOW, after having bought a Smart-TV and other so-called smart devices which are connecting to the internet, WHAT to do? First of all: do YOU really need it, as nearly any devices are getting sold with IoT capabilities? IF NOT, WHAT to do?
Before connecting the power:
Check your Router settings and block any unknown devices!
IF you are able to access your IT device, change straight the manufacturer password; give it a STRONG password!
Concerning passwords: I recommend to use a Password-Manager such as:
With a Password-Manager you just need to remember a Master-Password and ALL other Passwords will get generated with a STRONG Password from the software itself!!
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
. Stay tuned for next blog post(s) 😉
.
.
.
.
.
.
.
.
.
Keywords necessary for me to create this blog post: Routers, Passwords, authorization, IoT, Smart Home, Smart TVs, vigilance, connected stuff, Responsibility, Cyber-Hygiene, Digital CitiZENship,
Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.
Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020, with the strapline of ===> “Together for a better internet” <=== following the success of last year’s campaign.
My participation for the SID2020
WHAT is special this year with my participation on SID2020?
I created a ===> #GlobalCollaboration blog in 2017 <=== from @knolinfos (my pseudo on twitter) & @ICTPHMS& @kimmindy7 for #LEARNing about #DigitalCitizenShip. The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.
Well, there is a lot of different views about ===> Digital CitiZENship <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitiZENship (hashtag on Twitter is #digcit).
How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):
Contributions de Gust MEES: Publications sur leBlog de Gust MEES (in English) avec 202K (202.000) views „Digital Citizenship“ Global Education Collaboration Blog (in English),
Publications sur le Blog von Gust MEES (auf Deutsch),
Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===>OUR responsibility to build up the future for OUR kids, learners and students!<===
WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!
.
======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======
.
.
That is why I am participating on SID2020 with my FREE courses here:
MOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2020 on their blogs and/or websites
People who are on Twitter may use the hashtag #SID2020 to promote that Event, thanks for Helping to make the Internet a more secure place!
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
SO, you are a retired EDUcator, TEACHer, Instructor, LEHRENDER: WHAT to do NOW?!!
Well, that was the question I was asking myself when I became retired in 2014. As I did innovation in Modern-EDUcation in my country Luxembourg, there was NO WAY to give that up, BTW! SO, years before my retirement I was already present on Social-Media Twitter (2009), Facebook, and I did Curation (2011), as I was blogging (2010-2011) ALSO, actually very successful with > 197K (197.132) views (November 2019).
Giving up something which was already well known worldwide, was NO OPTION! Well, please check below HOW YOU can stay informed and trying to help others as well; remember: you are NOT anymore in the “School-Cocoon” and MORE FREE to say WHAT YOU want!! YOU DON’T have to go to “stupid” meetings anymore which are time-killing and mostly useless!!!
A BIG difference, use it, please to make a CHANGE!! Others will listen and maybe follow your advice for a BETTER EDUcation, a Modern-EDUcation! Advice: Please check below to follow and to stay Up-To-Date!
AND, why not starting with tinkering and coding, being part of the Maker-Community and trying it out to be able to share it with your community in the MakerED, Maker-Spaces? You have time NOW, use it, please for the benefit of the LEARNERS! Check below please:
NEW Words, Trends to Know and to LEARN about in 21st Century
Are YOU feeling overwhelmed with strange words, NEW trends, when you are reading and following posts, tweets, articles about/and in Social Media!? Well, I can understand YOU!!! There are SO MUCH, if I wouldn’t do curation, I wouldn’t understand it anymore as well, to be honest! 😉 Through my daily curation I see it and I read those articles, from WHERE I learn a lot as an autodidact. WHEN there are some words which I DON’T understand I am going MOSTLY to Wikipedia to find its explication and if NOT sufficient, I use GOOGLE and other online resources to know MORE about it!
For ME it’s THE BEST way (Curation) to learn and to stay up-to-date with my Professional Development! I tried out a lot of different ways after being online since 1998 and believe me, please, it’s the fastes way to keep it UP! 😉 Through Curation I build up my <===> PKM <===> Personal [Professional] Knowledge Management from where I can use it in ANY of my blogs, twitter posts and other Social Media to share it to people willing to learn.
Let us FIRST have a look about WHAT Curation and PKM is (first stuff to read and bring into PracTICE) before WE continue with THE strange words and trends later:
SO, let’s have a look on some (actually a lot…) NEW words and trends in EDUcation and WHO will influence EDUcation below, as THEY are actually running in Real-World, let us START first with the words:
P.S.: The present words with NOT YET a link will get updated later, otherwise I wouldn’t finish this blog post! 😉
Dynamic Learning
Does your classroom offer one-and-done types of learning activities, or does the learning grow, inspire, and evolve throughout the year and beyond? With digital tools like G Suite for Education that are available 24/7, the learning doesn’t have to stop when the bell rings at the end of class, or when the worksheet is turned in, or even when the school year ends. The learning takes on a life of its own; it becomes dynamic. This concept alone should change the way you think about learning in general and change the way you facilitate learning in the classroom.
Through Curation, Social Media twitter and by building a PLN this is perfectly possible!
BTW : Did YOU actually realize that NOW it’s the PracTICE WHICH is dominating the Real-World before it EVEN is taught by EDUcation, a BIG CHANGE, isn’t it!!! Because of Entrepreneurship (bold actions…) the internet helped to CHANGE the world and flipped EDUcation to bring it MORE close to the needs of the workforce/Industry!!!
The NEW Pedagogy is MORE about the learners, students and to put THEM into the drivers seat; looking to find a Win-Win situation about THE How-To to GET THEM learning together in a team (EVEN outside the School-Cocoon with Social Media…) and to prepare THEM for the workforce/labor/industry by being able for <===> Learning-To-Learn <===> for a Life-Long Learning once out of school!
Related Music as MOTIVATION: Listen to <===> Simple Minds – Alive And Kicking and enjoy it 😎🎵🎶🤘🤪🤪🤪
.
.
Keywords for me to create this blog post: Cybersecurity, Curation, Blogs, Digital CitiZENship,Modern EDUcation, Modern Pedagogy, Modern LEARNing, LEARNing-To-LEARN, Life-Long-LEARNing, Coaching, Collaboration, Social Media, Twitter, Digital CitiZENship, Digital Responsibility, Curation…
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)..
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!
RT @Telegraph: 🔴 There may be more water on the Moon than previously thought after scientists discovered a new source which could make it e… 6 hours ago
RT @crypto: NOW: Bitcoin dropped following news of Binance and CEO CZ being sued by the US CFTC over regulatory violations https://t.co/9hQ…7 hours ago
RT @business: BREAKING: Binance, the world’s largest crypto exchange, and CEO Changpeng Zhao, were sued by the US CFTC for allegedly breaki… 12 hours ago