RSS

Category Archives: Digital Citicenship

WHY is Proactive-Thinking IMPORTANT and a MUST in Modern-Education with and about ICT!?

WHY is Proactive-Thinking IMPORTANT and a MUST in Modern-Education with and about ICT!?

.

Most dangerous phrase...

.


WHY is Proactive-Thinking IMPORTANT and a MUST in Modern-Education with and about ICT!?

Most dangerous phrase...In the last twenty (20) years Technology has changed a lot; with the internet and the use of ICT by nearly everybody around the world… ICT is present everywhere, nearly anybody is using smartphones, the internet, Social-Media and in the schools slowly but surely BYOD (Bring Your Own Device) is getting accepted and ALSO used in courses. The same in Supermarkets: QR-Codes are nearly on any products, special QR-Codes on advertising panels to attract the customers for new products… BTW: by seeing how much people are running around in the Supermarkets with THEIR Smartphones switched on and talking with whom ever, (secretly) installed Beacons follow YOUR actions and show YOU over Advertising messages on YOUR Smartphones WHERE to GO for YOUR shopping preferences!!

It is a booming market for commercials to sell NEW products about ICT, IoT (Internet of Things) and anything else related to ICT; BUT there are NO laws and regulations (YET) about THE dangers by using THEM! As the MOST sold devices are already connecting to the internet (Smart-TVs, fridge, cameras, household devices…) the users just buy and DON’T get advised about Cyber-Security and Privacy dangers; which is seriously a BIG SHAME and a MUST!! :(((

.

The Future Of Advertising (Cartoon)

Click image, please, to access the article.

.

Learn more:

Well, anybody knows (or at least SHOULD know) that every medal has its reverse! BUT: NEW devices are getting sold with NEW Technologies and the customers (WE users…) are NOT getting advised about the FIRST steps on the How-To to use THEM!!! Is THIS <===> Responsibility!??? <===> I guess NOT as everybody knows already NOW WHAT problems occur about Cyber-Security worldwide and ALSO about Privacy!

Personal Data-cisco-IoT

Click the image, please, to access the article.

IF NOT, please check:


Backup A MUST With ALL The Malware AND Especially Ransomware Around! | CyberSecurity

Information LiteracyEach day (nearly) WE hear about Cyber-Security problems, such as “Ransomware” e.g. and the BEST solution to be prepared for such incidents is to make a “Backup“!

NOT sure if YOU followed OR if YOU are conscientious about WHAT is going around actually on the internet concerning “Malware” and “CyberSecurity“, BUT YOU SHOULD!!! THIS is a <===> Wake-UP Call <===> take it serious please! That is called ALSO <===> #ProactiveTHINKing <===> I will NOT post another article on the How-To to make a backup as there are already so much around, BUT I will show YOU WHY it is necessary for everyone to make a backup and delivering YOU the BEST articles and tutorials to do so…

Cross-platform malware is around and infects any OS (Operating System)!!! [START Text from Kaspersky] PC, Mac, Smartphone and Tablet users are under ever-evolving threat from computer viruses and malware. Taking action means understanding what you’re up against. Here’s a look at the major types of malware and their potential impact. [END Text from Kaspersky]

.

 

Learn more:

 

Follow my blog post about Backups:

 


WHAT SHOULD users know to do as FIRST STEPS!??

programmerman2Well, this is WHAT sales men (women) SHOULD tell users as a priority after having bought some NEW stuff interacting with the internet; whatever device(s) it is and handling out ALSO a print out of it from the manufacturer:

  • CHANGE STRAIGHT the Password from “Admin” to YOUR OWN created Password!!
  • Check the Privacy settings and reduce THEM on a maximum!!

Any guidelines for that!?


How can that naivety be changed!?

Well, first let us say that the word <===> naivety <===>ISN’T a bad word! Let us have a look on its definition:

What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvetynaïveté, etc.), is the state of being naive—having or showing a lack of experienceunderstanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]

The users (WE) get confronted with new technical stuff which the manufacturers bring on the market without respecting a minimum of Cyber-Security and/or without the necessary knowledge about it!! THEIR main thing is to make money… That’s NOT serious, but so it is handled, as NO (NOT YET…) international laws are existing…

SO, problem is known since very long, BUT NO solutions YET provided!! Here comes NOW <===> #ProactiveTHINKING <===> in action…

As people, users (WE) didn’t get an education about Cyber-Security (in most countries…) Proactive-THINKing should be part of the curriculum of any Modern-EDUcation system which works with and about ICT!!

First of all I would recommend (mandatory) to teach first <===> Critical-THINKing <===> as it is THE base for quality <===> Proactive-THINKing!!

 


SO, WHAT is Critical-THINKing?

.

critical-thinking_ENG2

Click image, please, to access the article.

 

Please read the article from <===> https://www.elesapiens.com/blog/critical-thought-educating-competent-citizens/ <===> Critical thought is a cognitive process that proposes the systematic analysis of information, opinion and statements that we accept in our daily life as valid or true. It is a basic skill for a competent, free and responsible citizen

Learn more:

.


WHAT is Proactive-THINKing?

I invite YOU to read my tweets below, who are explaining mainly…

 

Proactive THINKing-Twitter-Gust MEES-2017

Click image, please, to access the tweets on twitter.

..

As WE are living in a Sharing-Economy, who doesn’t share photos and links!!?, WE MUST be aware NOT to share malware infected stuff as OTHERS would get their devices (Laptop, PC, computers, tablets, smartphones…) infected! Therefore WE MUST be on <===> Proactive-THINKing <===> to avoid such things happening!

Learn more:

.

A reminder for <===> Cyber-Security <===> as a <===> Proactive-THINKing thought 😉

.

ICT RESPONSIBILITY

.


 

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

 

Keywords necessary for me to create this blog post: Critical Thinking, Proactive Thinking, Cyber-Security, habits of people, Maturity, linking different blog posts together, learning from the past mistakes and mistakes from OTHERS to avoid THE SAME AGAIN!, learning to learn, Modern EDUcation, ICT, IoT, Everybody is NOW an Admin!, WE ALWAYS did it that way!, eSkills, SoftSkills,

.

 

 

 

Tags: , , , , , , , , , , , , , , , , , , , , , ,

If I Would OWN a Company, WHAT Skills Would I Expect From MY Workers In 21st Century!?

If I Would OWN a Company, WHAT Skills Would I Expect From MY Workers In 21st Century!?

.

Evolution of Education: Wordle Logo

.


If I Would OWN a Company, WHAT Skills Would I Expect From MY Workers In 21st Century!?

programmerman-animatedBecause of ICT there are sooooo many NEW possibilities to use with the computers and the internet. Just imagine that a company owner should employ people for each special application, NO WAY! (S)He wouldn’t have enough money to afford it!!! So it is necessary that <===> the 21st Century worker/employee would be an all-rounder! <===> An all-rounder WHO comes straight out of school and from whom the business/workforce could profit directly!!!

WHAT would be these skills the business/workforce will need!?

First of ALL it SHOULD be an AWARENESS about the Cyber Security problems WHO could happen and WHO could destroy a company and/or a companies reputation! <===> Forewarned is Forearmed! <===> is the BEST protection as it is anchored in the mind! WE will discuss this in the next chapter in depth!

Sometimes it is necessary as well to edit some text in a Word (or else Open Source) document and to use ALSO photos in these documents: SO… WE need to have knowledge about <===> Copyright <===>, photo editing and publishing as well as the how-to to transform these documents into a PDF.

A company, to stay competitive, needs ALSO to know WHAT is going on on the global market and needs to be up-to-date with latest NEWS, WHAT would be BETTER than making <===> curation <===> about it and to share these knowledge internally in the company through an intranet!? SO, my employees SHOULD know how to make curation which THEY could use as well for THEIR OWN learning by using a PKM <===> Personal [Professional] Knowledge Management <===> https://globaleducationandsocialmedia.wordpress.com/2014/01/19/pkm-personal-professional-knowledge-management/.

AND as WE as a company need to be up-to-date by using ICT WE SHOULD ALSO being able to create a blog from where WE inform OUR customers about WHAT is NEW in OUR company and eventually report ALSO about warnings, awareness about some products, as well as through OUR blog informing OUR customers through a NEWSLETTER! Those are part of a 21st Century orientated company!

Learn more about blogs:

AND didn’t WE forgot something!? WHAT’s about <===> Social Media <===>!? WE as a competitive company SHOULD ALSO be present on Facebook AND on Twitter, isn’t it!? SO… OUR employees SHOULD know ALSO to handle it:

Related articles (worth to read and to understand):

.


Priority: My Employees SHOULD be Cyber Security Savvy

programmerman2First of ALL it SHOULD be an AWARENESS about the Cyber Security problems WHO could happen and WHO could destroy a company and/or a companies reputation! <===> Forewarned is Forearmed! <===> is the BEST protection as it is anchored in the mind! It is called <===> Proactive THINKing!

Searching on Google and/or on other Search Engines (allowed in the company or NOT) will happen and could infect the computer and EVEN the whole company IT infrastructure WHEN an employee doesn’t know WHAT s(he) is doing!!! SO… Better is that the employees know WHAT are the dangers and my company as well SHOULD have installed on ALL the computers different awareness and protection software, here my advice:

.


How Could EDUcation Teach Students To Get These skills!?

Teaching the profession that....

In a modern, very quick changing world because of ICT, EDUcation MUST follow to provide the business/workingforce with workers/employees WHO have the necessary skills, EVEN WITHOUT knowing WHAT next jobs would be! MOST say that it isn’t possible and a BIG challenge, BUT a challenge WHO actually is MORE easy by following my advice by reading my blog posts:

 

.

 

what-skills-will-you-need-to-succeed-in-the-future_5061e259a60b6_w587

.

Remember ALSO this please 😉

.

Synthesizing Mind-5 Minds for the future

.


Problems With Innovation In Schools!?

programmerman2In case IF (MOST probably have…) YOU would have problems to GET the necessary as mentioned in my posts made into action in YOUR EDU-System, read the below advice:

.


Collaboration, Team-Work AND Global Collaboration

sharing-iconAs mentioned already in the above infographic there is a need to work in a team, collaboration AND Global-Collaboration (with manufacturers, re-sellers…) are a MUST! EVEN in the schools Global-EDUcation is a MUST to make the students, learners ready to get used to it 😉

I made several Global-Collaboration on blogging for <===> LEARNing To LEARN <===> about <===> Digital CitiZENship and Cyber Security <===> with  and , check below please:

 

WHEN being involved to work in a team, WE need to get used to it as well as to THE letter “C” in ICT, which means <===> Communication <===> as BOTH are part of an efficient work relationship which is necessary for the wealth of a company!

Learn more:

 


IF EDUcation Doesn’t Give ME WHAT I Want, How Could I Coach MY Workers To LEARN

Well,as already mentioned above, my advice is STILL THE SAME, please check:

programmerman-animated.

WHAT’S my message and WHY did I create this blog post!?

Well, I will encourage all youth and also adults, seniors, oldies to become <===>Life-Long LEARNers <===> and staying Up-To-Date with their knowledge, especially concerning their skills in ICT, called NOW <===> #eSkills <===>! In the modern world YOU will change YOUR job probably +/- 12 times in YOUR working career, it is very rare to stay life-long in the same job and/or same company!!! SO… The workforce is looking for people with ICT skills which YOU mostly didn’t learn at school, right!? 

YOU won’t have (mostly) the time to learn by visiting courses, right!? START to become Life-Long LEARNers by LEARNing on YOUR OWN pace, by becoming <===> Autodidacts <===> Self-Directed LEARNers. YOU are able to, I did it, so can YOU!? 😉

I found a job because of my ICT eSkills and I am STILL LEARNing on a daily base routine for beingUp-To Date with my <===> Professional Development <===>, even being retired NOW! THE pleasure of LEARNing!

I did THE <===> ICT PracTICE <===> and THAT’S WHAT the workforce needs!!!


 Due to my eSkills I could share my knowledge AND expertise ALSO with the below mentioned as well as to a broad range of visitors from around the globe! 

Check out my blog posts:

AND check my profile below as well, please! 😉

 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.


 

Keywords necessary for me to create this blog post: Life experience, manager, competitive, competition, adapting, all-round talents, image editing, image editing for the web, websites, curation, Social Media, editing, collaboration, team-work, idea development, Social Media knowledge, learning to learn, Life-Long Learning, daily curation, integrating Global Collaboration,

 

 

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Success Story of Life-Long LEARNing | Best PracTICE | ICT eSkills For Jobs

Success Story of Life-Long LEARNing | Best PracTICE | ICT eSkills For Jobs

.

Evolution of Education: Wordle Logo

.


Success Story of Life-Long LEARNing | Best PracTICE | ICT eSkills For Jobs

First of all, this blog post is NOT made for bragging BUT shows WHAT could get obtained while being a Life-Long Learner! In a world WHO is changing quicker then WE can follow (MOSTLY), it is important to stay up-to-date about WHAT’S going on around and this on a daily base!!! I am a Life-Long Learner since +/- 45 years already (I am 60 now) and it is a pleasure for me to learn! I want to share my passion with YOU and trying to give YOU that virus ALSO 😉

.

programmerman-animatedWHAT’S my message and WHY did I create this blog post!?

Well, I will encourage all youth and also adults, seniors, oldies to become <===> Life-Long LEARNers <===> and staying Up-To-Date with their knowledge, especially concerning their skills in ICT, called NOW <===> #eSkills <===>! In the modern world YOU will change YOUR job probably +/- 12 times in YOUR working career, it is very rare to stay life-long in the same job and/or same company!!! SO… The workforce is looking for people with ICT skills which YOU mostly didn’t learn at school, right!? 

YOU won’t have (mostly) the time to learn by visiting courses, right!? START to become Life-Long LEARNers by LEARNing on YOUR OWN pace, by becoming <===> Autodidacts <===> Self-Directed LEARNers. YOU are able to, I did it, so can YOU!? 😉

I found a job because of my ICT eSkills and I am STILL LEARNing on a daily base routine for being Up-To Date with my <===> Professional Development <===>, even being retired NOW! THE pleasure of LEARNing!

I did THE <===> ICT PracTICE <===> and THAT’S WHAT the workforce needs!!!

Find out WHY and How-To.

When I was 45 years old I became unemployed (I was a manager in electronics at that time…) and I was struggling to find a new job, NOT easy at all for that age 😦 I accepted even to work for 45% less money earning (got adjusted by unemployment agency to 100%) and to change my daily suit wearing to a blue collar suit to make sure to have a job again… During that period I was following a lot of courses. In 2002 I became an ICT Course Instructor” by having followed pedagogical courses (April to July 2002) from “eLuxembourg” (certificate FORM/03/2002/017). YES, with 47 years old I studied Pedagogy for four month to give ICT courses, very hard, BUT I did it! I found my vocation, my passion, where I gave pedagogical and andragogical (Adult Learning / Andragogy) courses to people from 11 to 79 years old for 9 years before I was out of the system (because of heavy health problems) and became retired.

Learn more about Andragogy (and my story):

NOW, even being retired I STILL give online courses and I am very active on Social Media Twitter, with blogging  on WordPress and with Curation.

Here below my addresses:

Concerning Social Media Twitter: 

.

Twitter-Gust MEES-13-07-2015

Click above image, please, to access my Twitter Profile

.

On Twitter I reached a “Google Page Rank of 5/10” which is very high!

WHAT is a “Google Page Rank?”:

.

Learn more about Twitter:

.


How To Stay Up-To-Date On A Daily Base!?

Well, that is actually NOT THAT DIFFICULT as most would think! I advice YOU to make <===> Curation <===> and to create YOUR <===> [PKM] Personal [Professional] Knowledge Management <===> to LEARN on a very quick way.

I advice YOU to read the following, please:

.


WHAT About Challenges AND Contests To Show YOUR Expertise!? 

I encourage YOU to get some courage AND show WHAT YOU are capable to do! Maybe YOU don’t know HOW GOOD YOU are!? YOU have NOTHING to lose, ONLY to win! Personally I won an international contest (German speaking countries) in 1979 about electronics which gave me a new job, a higher paid job, a publication in an “Electronics Magazine (ELO)” and a NEW career which was THE beginning of my career path as you actually know now! At the time WE called it <===> Do It Yourself <===> TODAY there is a NEW name for it, it is called <===> The Maker Movement <===>, ONLY the name changed but it existed already more than 40 years ago 😉

Actually, there is a NEW Contest (I love challenges) where I applied and got accepted! Check the video below please and if YOU love it, give me a “Like” please as “Like’s” are part of it as well as views on the video, the winner will be the one WHO has most “Like’s” and page views!

Here are the rules from the contest:

.

.

For the votes, BEST is to go directly to my YouTube Channel <===> YouTube Channel Gust MEES or here <===> eSkills for jobs YouTube Channel

.

programmerman-animated.

WHAT’S my message and WHY did I create this blog post!? Part 2

 Due to my eSkills I could share my knowledge AND expertise ALSO with the below mentioned as well as to a broad range of visitors from around the globe! 

Check out my blog posts:

AND check my profile below as well, please! 😉

 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 

 

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

LEARNing To LEARN | Preparation For BETTER Learning | How To?

LEARNing To LEARN | Preparation For BETTER Learning | How To?

.

Evolution of Education: Wordle Logo

.


LEARNing To LEARN-Where To Start!?

In previous posts WE were discussing about the design of LEARNing for ===> DigitalCitizenShip <===, the different possibilities. Now WE will see about the How-To on where to start, my advice by PracTICE. Let us remember what was taught on previous posts.

.

PracTICE-21st-Century-Assessment-Flowchart-Page3-screenshot

Click the above image, please, to access the article.

.

Let us ALSO remember the MOST important, see below, please.

.

Synthesizing Mind-5 Minds for the future

.

SO, NOW where to start?

WE will use the following design to make sure to NOT FORGET something. The main topics are ===> Proactive THINKing <=== together with ===> Critical THINKing <=== AND ===> CyberSecurity <===. Remember the word ===> together <===, as it is part of an effective and efficient 21st Century EDUcation! More text explaining…+++++++++++++++++++++++++++++++

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

YOU are STILL feeling YOUNG, aren’t YOU 😉

.

In ONLY ONE course YOU will LEARN about WHAT YOU need for 21st Century EDUcation, the way on How-To by using PracTICE, of course YOU will need to UPDATE as certainly there will be NEW techniques evolving 😉 ===> Professional Development <===.

.

By applying the here learned, YOU will know THE way for ===> LEARNing-To-LEARN <=== and being able to forward it to YOUR LEARNers.

In ONLY ONE course YOU will LEARN about WHAT YOU need for 21st Century EDUcation, the way on How-To by using PracTICE. WHEN getting used about the mentioned PracTICEs YOU can apply THEM on each course(s) YOU give…

.

.

FlowChart-Final-Version

Click the above image, please, to enlarge it.

programmerman-animatedALL the above in the design Flowchart will get used for the LEARNing about ===> DigitalCitiZENship <===.

My advice is to start first with OUR AND OTHERS protection (Proactive THINKing AND CyberSecurity) as WE need to stay secure  and safe before WE surf the world wide web, OR as one can say actually now the ===> wild wild web <===. It’s similar to sex, first the condom before the action 😉 OR first the vaccine before traveling to countries where WE know that there are serious risks to get infected! 

WE will use my FREE courses below, it’s 100% PracTICE:

.

sharing-iconSecond would be the curation and I suggest the following topics:

.

Lots of stuff I learned.

.

WHY is curation so IMPORTANT!? Through curation YOU will build YOUR ===> “PKM” (Personal [Professional] Knowledge Management <===, check below, please for deeper LEARNing:

Thus meaning, through curation and by having build YOUR OWN PKM, YOU have created YOUR OWN database corresponding to YOUR way of LEARNing, YOUR choice of resources!

.

.

THE above mentioned are NOT ONLY promises, it is working well as it was made in PracTICE ALSO by @ICTPHMS, Mr. Dan KIRSCH. See ALSO OUR ===> Global-Collaboration <=== below, please:

The students (LEARNers) will acquire the following eSkills:

.

Synthesizing Mind-5 Minds for the future

.

PracTICE TIP

LEARNing from websites without having an internet connection:

Thought that YOU can’t access websites without an internet connection? THINK twice 😉

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.

It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site’s relative link-structure. Simply open a page of the “mirrored” website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

Personal TIP: I used it to copy my online courses onto a USB-Stick, SO even when during a course there isn’t any internet connection (YES, that can happen…) YOU have every time YOUR backed-up version 😉 NO break of the courses!

.

students-workforceAND there are also the “Apps“, BUT don’t forget that THEY are ONLY facilitators, they are NOT the change in 21st Century EDUcation; THE change is applying the pedagogy and the 21st Century techniques together. In 21st Century EDUcation it is NOT anymore about the teaching, BUT about the LEARNing and the ===> LEARNing-To-LEARN <=== to give OUR LEARNers, students the necessary knowledge and skills for a ===> Life-Long-LEARNing <=== Once out of school THEY will need constantly to learn to adapt to a very quick changing world!

I suggest to make ===> Coaching <=== with YOUR LEARNers, students where YOU walk through the rows in the classroom by observing THEM and to interact with them ONLY when they need it, learn together with them and create a ===> win-win situation <===, NO hierarchy, BUT a trustful partnership with them. I have done this since 2002 and it works perfect, best results! Find out more below:

In the above mentioned links YOU will see how WE learned together in OUR ===> Global Collaboration Blog <=== by ===> Coaching <=== through using the “DM” (Direct Messages) from Twitter, YES WE used Twitter, it works perfect 😉 The same as WE used OUR blogs to communicate and to show OUR LEARNing to others, so that THEY could learn also from us.

Check ALSO the image below and read the “HORIZON REPORT: “2014 Higher EDUcation Edition“:

.

Innovative pedagogical practices

Click the above image, please, to access the “Key Trends Accelerating Higher Education Technology Adoption” in pdf.

YOU certainly will get a NEW view about modern EDUcation 😉

Here some useful links:

.

Recommendation-Gust MEES-LinkedIn

Click the above image, please. to access the article.

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

Keywords as a reminder for me to realize this blog post: adding different digcit courses (Common Sense, etc) to the above, curation, PLN, PKM, Social, Social Media, Collaboration, coaching, sharing, Learning from each other, catalyst, amplifying learning, quicker learning, accelerated learning, better learning,

.

Stay tuned for next blog post(s) 😉

.

 
11 Comments

Posted by on March 4, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Coaching, Collaboration, Comics, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Digital Citicenship, Digital CitizenShip, Digital Footprint, Education, eLeadership, eLearning, Engagement, eSkills, Ethical Mind, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global Collaboration, How To stay organized, HowTo, HTTrack, ICT Awareness, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Reality, Respectful Mind, Responsibility, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Social Media, Storify, Student Centred, Students 21st Century Survival Guide, Synthesizing Mind, Technology Integration, Twitter, Twitter Chat

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Valuable Tools For The Learners (Students) AND Teachers (Educators, Instructors) For Preparation

Valuable Tools For The Learners (Students) AND Teachers (Educators, Instructors) For Preparation

.

Evolution of Education: Wordle Logo

.


Introduction For Courses-Different Tools Applied-Preparation

programmerman-animatedBefore starting a course it is very important to make a GOOD preparation. First the preparation of the educators, teachers, instructors for themselves to acquire the necessary knowledge and/or to update their existing knowledge for the given topic and THEN the preparation for THEIR learners (students) preparation; THE WAY how the course will get given and ALSO some HELP for the learners. HELP for the learners (students)!? YES! WHY and HOW?

Learners (students) NEED to know WHAT will get taught, WHY is it necessary to learn it?, WHAT are the “EdTech Tools” used?, how many time will be necessary for that course?, are the used tools necessary for the 21st Century workforce?, will I need these tools for my eSkills portfolio?…

Learn more:


Some quotes about preparation: Well begun is half done. [Aristotle], “Give me six hours to chop down a tree and I will spend the first four sharpening the axe.” ― Abraham Lincoln, “A man prepared has half fought the battle.”, “The beginning is half of the whole.” [Hesoid] ,


Knowing Everything From Start To Destination, Intermediate Stations Included

METRO-DigitalCitizenShip-Gust MEES-2015

Click the above image, please, to see it in action

.It is important THAT the learners (students) know the how-to about the course from Start to destination, intermediate stations included. I suggest (advice) ALSO to give THEM up from the beginning of the course(s) (or even when You announce a NEW course weeks before…) the necessary links WHERE the learners could download and/or create an account online (in case of an online platform). Play the “curiosity” card 😉 Some (most?) will try it out already before the course(s) start and so having ALREADY some knowledge and skills, more easy for the course; YOU will save time which YOU could spend for deeper learning later 😉

.

.More about “Curiosity“, good to know:

.


Valuable Tools For The Learners (Students) AND Teachers (Educators, Instructors) For Preparation

ruotadentata2architet01First of all, let me tell YOU that I still use handwritten preparation first before I use an EdTech tool later. I advice YOU to do the same (NOT mandatory…). WHY!? As YOU start with an idea in YOUR head, let it GO, let it FLOW. AND THAT goes BEST while using a pen and a piece of paper; NO need to concentrate about the how-to with the EdTech tool, just writing and drawing and/or sketching. YES, sketching or “Sketchnoting” are wonderful “tools” for preparation and for bringing down ideas on cold print. THEY boost ALSO and/or amplify creativity thinking! WE will discover now, below, WHAT different tools WE could use.

.

Gust MEES’s Tools Selection
Best HTML Tutorials & TIPS
Web Resources

programmerman-animated

 

.

.

Dan KIRSCH’s Tools Selection
Best HTML Tutorials & TIPS
Web Resources

programmerman-animated

 

.

.

.


 Some tools to enrich your blog

While creating your blog you certainly need images, FREE and without a copyright on them as well as tools to make look your blog more creative and professional, here my selection:

 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.

Keywords necessary for me to create this blog post (my Leitfaden): badges, design of badges, design of FlowCharts, deisgn of mindmaps, mindmaps, rubrics, Synthesizing Mind, using different tools to reach the goal, how to reward the learners as a motivation, sketchnoting, webquests,

.

Stay tuned for next blog post(s) 😉

 

 

Tags: , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Digital CitizenShip: Social Media AND Privacy

Digital CitizenShip: Social Media AND Privacy

.

Evolution of Education: Wordle Logo

 

.


.

SID15_Banner_anim

.

Digital CitizenShip: Social Media AND Privacy

programmerman-animatedI wrote already about “Privacy” on my blog posts Privacy In The Digital World-SHOULDN’T We Talk About It!?Smartphone pictures pose privacy risks and Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?, BUT I didn’t get enough into it to show YOU the How-To get protected MORE! That is what I will do here, so let’s GO for it 😉 As YOU know me, I will go for the BETTER solutions! I am online since 1998, got awarded in my country (for CyberSecurity & InternetSafety) and I am a very active person on Social Media twitter and facebook. Follow my experience and advice below, please, thanks.

Social Media is about sharing, right!? That’s WHAT it is mostly, BUT there are the HIDDEN commercial intents which MOST people don’t see (OUR Privacy is sold and OUR friends one too…) and there is ALSO OUR responsibility about it WHEN WE share, WE will discuss in detail here…

First of ALL, there isn’t ANYTHING for FREE in this world, even the death costs the life and a lot of money for the funerals 😉

SO… Let us analyse WHY WE get Social Media and other services on the internet for “FREE“. BTW: there isn’t anything for FREE, WE pay with OUR information which the companies are gathering!

.


WE Are The Product

It is important to know how tech companies generally track your data and what you’re agreeing to in those terms of service agreements. Check the infographic below, please to understand.

.

Infographic_Big_Brother_Tech_Company_06192013

Click the above infographic to access the article, please.

.

Social Media And Privacy, learn more:

 


How can WE get protected about an overuse of OUR Privacy!?

First of all, please read the article below.

How can you limit the privacy you give away?

Click the image above, please, to access the article.

 

SO, by knowing now a bit more YOU certainly ask if there are some Apps and/or software who help us to protect OUR PRIVACY, here WE go (non-exhaustive list…):

.

AVG PrivacyFix

 Click the image above, please, to access the article.


AVIRA SocialShield

.

.

AVIRA SocialShield

 Click the image above, please, to access the article.

.


BitdefenderSafego

.

Bitdefender Safego

.

Bitdefender-Safego

Click the above images to access the articles, please.

.


F-Secure Safe Profile

.

.

More to come, stay tuned…

.


WHAT’S About Privacy With Apps In General!?

I wrote about it already in my blog post Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?, where YOU could grab some more information. I will present to YOU a FREE App what checks about the permissions, for iOS and Android, check below please:

.

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.


Facebook Apps AND Privacy

Chat icon.

.

WHAT YOU probably don’t know, check links below, please:

.

.

.


Stay Informed About Apps, Privacy And CyberSecurity

Things are changing THAT QUICK on the internet, so check my resources and curation below, please, to stay up-to-date:

book-question-markRead ALSO these articles to use at home AND in schools:

.

Keywords necessary for me to create this blog post: Apps and privacy, Bitdefender, Avast secure.me, AVG Privacyfix, Avira Socialshield, ESET Social Media Scanner, Bitdefender Safego, F-Secure Safe Profile, Privacy, CyberSecurity,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

.

We are ALL responsible for the internet

 

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

sharing-iconWE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!

.

WHY CyberSecurity Starts At Home

 Click the above image to access the article, please.

.

Guidelines for securing your home

 Click the above image to access the article, please.

.

Learn more about the “Internet of Things“:

 

 


How To Take OUR Responsibility!? Let’s make CyberHygiene!

Well, that’s actually NOT that difficult, it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉

========> WE call it CyberHygiene. <=========

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.

SO, let’s go for it, check below please:

.

Top 5 Questions	Parents	Have	About	Cybersecurity

Click the above image to access the article, please.


Global Impact Of CyberSecurity

Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.


THE HowTo For BEST Protection

programmerman-animatedPlease find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:

.

.

 1.What are the biggest security threats to kids?

1.What are the biggest security threats to kids?

Learn more about: 1.What are the biggest security threats to kids?


2. How do I talk with my child about security?

2. How do I talk with my child about security?

Learn more: 2. How do I talk with my child about security?

  • to be updated… Will get discussed in detail in my new blog post…

3. How do we protect our family’s computers?

3. How do we protect our family's computers?

Learn more: 3. How do we protect our family’s computers?


4. How do we protect our mobile devices?

4. How do we protect our mobile devices?

Learn more: 4. How do we protect our mobile devices?


 5. Why do we always hear “Never share your passwords”?

5. Why do we always hear "Never share your passwords"?

Learn more: 5. Why do we always hear “Never share your passwords”?


AND Don’t Forget About Privacy!

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.

Learn more in my blog post: ===> Digital CitizenShip: Social Media AND Privacy <===

 

.

book-question-markLearn more:

.

.

Keywords necessary for me to create this blog post: #FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 
8 Comments

Posted by on November 18, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Europe, Facebook, FAQ, FBI, For a Better World, Free courses, FREE-courses, Future Work Skills, Global, Home-Work, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Can Education Help To Lower Cybercrime?

How Can Education Help To Lower Cybercrime?

.
Evolution of Education: Wordle Logo
.


.

SID15_Banner_anim

.

How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOODDigital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!

.

« Good habits formed at youth make all the difference. » Aristotle

.

.

.

We are ALL responsible for the internet

 Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <===

Here below the main links about WHAT to learn about:

TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!

The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!

 

Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, 

Read below please, for more detailed instructions and information, thanks.

.


THE Facts

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.


Awareness And Naivety, WHAT!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:

.

.

.

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======

.

Cyberattacks the greatest threat to nations

A MUST READ:

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:


How To Protect To NOT Become A Zombie!?

programmerman-animatedAs already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:

.

.


TOR And Anonymity!???

.

 

TOR-2014-cybercrime

 

.

Learn more:

It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet! 

.


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

 


WHAT Actions Could Get Taken WHO Are Student Centered?

sharing-iconWHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:

.


 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on November 4, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Competency, Connected Educators, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Europe, European Cyber Security Month, Free courses, FREE-courses, Future Work Skills, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Jail, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Updates, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

.

screenhunter_03-aug-05-15-24 (1)

.


.

SID15_Banner_anim

.

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

WE are participating ALSO on “Safer Internet Day 2015“, called #SID2015.

.

SID2015-BEESECURE

Click the above image, please, to access the organization to know more about it (in English).

.

This blog post is a ===> #GlobalCollaboration #blog <=== from & &  for  about .

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter  <===. Here WE go, check the infographic below, please.

.

Digital-Citizenship-infographic-620x965

[GM] Please check my blog posts below, who explain in detail:

When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking <===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:

.

NOT FAILURE-positive words

 Click the above image, please, to access the article.

.

[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.

[MK] Mindy KIM (USA)

[MK] What changes could be made to improve the overall message?

[MK] You made a strong point here, where else could you apply the same idea?

[MK] Who is your audience?

[MK] Could you say the same thing using less words? Would your message be understood?

[DK] Great archived twitter chat on Digital Citizenship (07/05/2015) via @mrkempnz & @BevLadd curated on storify. 

[DK] The Challenges of raising a Digital Native ==> via Devorah Heitner 

[DK] Teaching Digital Citizenship 

.

[ICTPHMS] Patrick Henry Middle School ICT (USA)

Greetings from Patrick Henry Middle School in Sioux Falls, SD. We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.  

The following link  http://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2 is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.

.

ICTPHMS Digital CiticenShip Blogs

.

Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!


Post: 04/28/2015 

The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 02/06/2015 (Updated) 

Learning about Digital Citizenship through comic strip creations. See an example below, please.

.Pixton-CyberBullying-Example

.

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The link below is a storify showcasing my students reflections on Digital Citizenship. This was a “lead-up” activity to the comic strips (above).


Post: 16/01/2015

Sample of my 8th grade Blog Prompt for next week. Check Below.. 

Who owns information?

Objective:

After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism.  Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.

Rationale:

In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online.  They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.

Focus question:

When you buy a song, is it really yours to use how you want?  Are all images online available to use however you want?

Should creators of information, images, songs etc. be paid for their work?

Something to think about was you blog about your reflections of information security and digital citizenship:

Should everything online be available to use for free?  What responsibilities do we have to the creators of information?

Addition from [GM]: some resources about copyright and Creative Commons


Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics). 

This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use is chogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂 

  • Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
  • In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
  • Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere.  Once the project is completed examples will be provided.

Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:

“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?

How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”


Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts). 

Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another. 


Post: 1/12/2014:  How to Use Storify

What is Storify?

Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information.  Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.


Post: 25/11/2014

Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.”  The link is provided below: 


Post: 18/11/2014

Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:


Post: 12/11/2014

The following link is directly from my class blog: http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy. 


[GM] Gust MEES (Luxembourg/Europe)

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉

Added on 03/12/2014: 

Added on 27/11/2014: Privacy is ALSO IMPORTANT, please check below:


 In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.

.


 Global Digital Citizenship Education (GCE)

UNESCO-Global-Digital-Citizenship-Education-2013

Click the above image, please, to access the article.

.

UNESCO-Global-Digital-Citizenship-Education-2013-2

Click the above image, please, to access the article.

.

Are there differences between Europe and the USA and the rest of the world?

sharing-icon.

Here below WHAT the EU is doing:

.

.

eSkills-EU-EPALE

Click the above image to access the article, please.

.

Here below a good approach from the USA:

Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉

.

5 Minds For The Future

.

By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.

Learn more:

.


How Did This Blog Post Start?

Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.

.

digcit-twitter-collaboration-1

digcit-twitter-collaboration-1

.

Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.

Learn more:


THE Authors, The Team

globe-pc[GM]

The authors [GM], [MK], [ICTPHMS]  will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.

[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:

Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.

This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?

Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)! TIP: read ONLY the bold text to understand it quickly 😉

Check ALSO these links, please, who explain about “International Collaboration”:

The authors are from Europe (Luxembourg) and the USA, please check below:

.

The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor) will be represented by THEIR initials such as:

.

Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.

.

Please click this link first before STARTING ===> Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.

.


Student Centered Initiatives

programmerman-animated[GM] Well, that’s WHY I was inviting  as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet. 

[MK] My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.

Learn more:

.

.Digital CitizenShip

.

Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.

We begin lessons by learning important vocabulary and learning basic knowledge:

.

shapes-discussion-2.

.

.

This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:

1). Why do circles have no sides?

2). How many squares make up a box?

.

.

.

.


WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?

[ICTPHMS]

TagxedoOnline is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.

Two Sides of the Coin

The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.

Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.

These scholarships can be easily lost if students post inappropriate profiles on various sites like

  • Twitter
  • Facebook
  • MySpace

Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.

Google Search to Screen Students

In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.

Air-Tight Online Profile

How can students make sure they are squeaky clean online?

  • Do not post anything to your site that would be morally or ethically questionable.
  • Never post personal information such as your address, daily schedule, or phone number.
  • Make your profiles private so only a selected group can view your information.
  • Don’t add “friends” you don’t personally know.
  • Ask friends to remove any photos of you that could be seen as unflattering.
  • Make sure they never use your name when they add you to their site.

.

Our projects and curation: 


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

.


WHY is Privacy so important?

[GM] Just think on George ORWELL… Phishing and Spear-Phishing To be updated by [GM]…

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand

.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1.

According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

Learn more:

[MK] Online perceptions, everyone can “learn” about who you are.

[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.

[MK] Beware what you share, share what you would not mind the whole world knowing.

.

.

.

.

.


How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:

To be updated by [GM]… 

.

Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,

.

.

.

.


A NEVER Ending Story Which WE MUST Be Prepared For, But How!?

sharing-iconTechnology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.

Team, YOUR collaboration is required, please propose YOUR questions:

.

  • [MK] Mindy KIM (Editor)
    • Q: How will this help my child in school?
      • A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
    • Q: Can my child do this?
      • A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
    • Q: How can I access the blog?
      • A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
  • [ICTPHMS]  (Editor)
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…

.

[GM] Together with [MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:

.


How Will WE Handle This Blog Post To Stay Up-To-Date?

sharing-icon[GM] Well, that isn’t THAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:

.

.

Curation, authors blog posts, explaining curation, blogs


Author’s Portfolio, Curation And Blogs

sharing-icon

.

[GM] Please check below to find out about WHAT the authors realized already:

.

.

[GM] Please check below, please:

.

[MK] Please check below, please:

.

[ICTPHMS] Please check below, please:

.

.

..


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.

.

You can find me also on:

.

Stay tuned for next blog post(s) 😉

.

 
22 Comments

Posted by on October 11, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Comics, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Digital Citicenship, Digital CitizenShip, Education, Engagement, Europe, European Cyber Security Month, FAQ, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Social Engineering, Social Media, Spam, Storify, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,