Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.
Safer Internet Day 2019 will be celebrated on Tuesday 05 February 2019, with the strapline of ===> “Together for a better internet” <=== following the success of last year’s campaign.
.
Check the video below, please, who explains about it.
.
My participation for the SID2019
WHAT is special this year with my participation on SID2019?
I created a ===> #GlobalCollaboration#blog in 2017 <=== from @knolinfos (my pseudo on twitter) & @ICTPHMS& @kimmindy7 for #LEARNing about #DigitalCitizenShip. The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.
Well, there is a lot of different views about ===> Digital CitiZENship <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitiZENship (hashtag on Twitter is #digcit).
How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):
Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===>OUR responsibility to build up the future for OUR kids, learners and students!<===
WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!
.
======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======
.
.
That is why I am participating on SID2019 with my FREE courses here:
MOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2019 on their blogsand/or websites
People who are on Twitter may use the hashtag #SID2019 to promote that Event, thanks for Helping to make the Internet a more secure place!
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.
Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.
This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.
For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.
Keep checking back for the latest news as the SID 2016 starts to take shape.
.
.
Click the above image to access the article, please.
.
Check the video below, please, who explains about it.
.
.
.
.
My participation for the SID2016
WHAT is special this year with my participation on SID2016?
I created a ===> #GlobalCollaboration#blog <=== from @knolinfos (my pseudo on twitter) & @ICTPHMS& @kimmindy7 for #LEARNing about #DigitalCitizenShip. The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).
How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):
Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===>OUR responsibility to build up the future for OUR kids, learners and students!<===
WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!
.
======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======
.
.
That is why I am participating on SID2016 with my FREE courses here:
MOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015on their blogs and/or websites
People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.
Andragogy, Adult Teaching!? WHAT Is Different From Normal Student Teaching!?
It is a question which I get asked very often “Andragogy, Adult Teaching!? WHAT Is Different From Normal Student Teaching!?“. Well, first remember that adults and seniors are OUT of the <===> #SchoolCocoon <===> since long or very long, THEY are NOT used anymore for learning! That is a very important fact to consider first before YOU start teaching adults and seniors. ALSO, adults and seniors are NOW (as out of school) mostly more focused on the benefits THEY could have in their private life and are willing to learn stuff which fits to their needs in private life!
Another very important point to consider is that a lot of adults, seniors have a FEAR against schools and school-teaching, they made bad experiences with teachers AND still thinking on the stress with tests! AND they are used to an OLD outdated EDUcation System which told them that learning is finished once reached the degree (the diploma in the pockets)! BTW: a RETHINKING of EDUcation for <===> Life-Long Learning is a MUST! As well as how the diplomas are getting handled and valued: e.g. A diploma today doesn’t show any professional development made!!! My proposition is to create the diplomas as: first diploma after school is “A, B,C etc…”, then the professional development (followed courses) should get added such as e.g. A1-2015-1: first professional development made in 2015, one course. A1-2015-5 first professional development made in 2015, five courses, and so on…
This would make the diplomas more valuable as the workforce would recognize them much more than normal ones where they don’t see straight on if a person has followed courses after school or not…
THE factor time is ALSO very important, as said already above, adults and seniors need MORE time to learn as NOT used anymore for learning! Prepare YOUR courses by considering longer sessions!
And as (already) MOST of YOU know me, a music video, related to the TOPIC 😉
.
.
Chose ALSO a room who doesn’t look sterile (white color) as it would remind them school again! And of course DON’T give the courses in a school! Sounds strange!? Think on the psychological background of fear 😉 Make the learners feel comfortable!
And last but not least, DON’T teach adults, seniors with a normal pedagogy, as THEY won’t accept it to get treated as 12 year old persons!!! THEY ARE OUT OF SCHOOL and they want to get treated as adult, <===> mature persons<===>!
SO… How To Teach Adults, Seniors!?
First of all, I mentioned it already above, DON’T let them feel like being in school and that YOU are a teacher, educator! Tell them that YOU will be THEIR coach who is guiding them and NOT teaching them and that THEY have a certain autonomy in the “Learning Room” (NOT Classroom!) They are allowed to move around in the “Learning Room”, searching help among their peers by respecting the noise level, copying from each other <===> YES, copying is allowed, OH WHAT FUN <===> everything which was forbidden in the <===> #SchoolCocoon <===> is allowed here, hey that makes engaging them and they have fun as well 🙂
As THEIR coach YOU take care of an individual learning, YOU assist the persons in their learning, DON’T FORGET about the learning rhythm, one size doesn’t fit all!Some persons need more time…
YOU may use a beamer (or a digital whiteboard, depending on YOUR budget…) to introduce first about WHAT the learners will attend to learn where YOU show ALSO the <===> Learning Path <===> which YOU have prepared for them, so they will know up from the beginning where the destination goes with ALL the different “stations“, they will feel comfortable as they can visualize it, they will know as well WHAT skills they will acquire, less unknown stuff to think about…
An example below:
.
The learners will learn about any station in the “Learning Path” AND ALSO know about WHAT skills they will acquire! Click the above image, please, to enlarge it.
.
.
Click the above image, please, to access the article.
Motivation for adults and seniors… NO excuses for NOT willing to learn 😉
.
Click above image, please, to enlarge.
Click above image, please, to enlarge.
Click above image, please, to enlarge.
Course participants may print the above images and keep it with them, so they remember how young their brain is <===> 18 years <===>!
.
Facts to consider and advice:
Adults and especially seniors are NOT anymore used toLEARNing! By knowing this YOU need to take care about it: YOU SHOULD explain that to YOUR LEARNers and tell THEM that they shouldn’t fear, that they should tell YOU when being in trouble, YOU should tell them that YOU take ALL the necessary time so that THEY will understand it, YOU should encourage them at any moment so that they will find the pleasure to LEARN 😉 YOU SHOULD use Empathy, observing them and find out WHO are those who are shy; the ones WHO won’t tell you when there is a problem. YOU SHOULD interact with them, looking over their shoulders and finding out WHERE the problem is.
That is the hardest part BUT the MOST IMPORTANT one as when they understood that they could find confidence in YOU, then they will advance in their LEARNing, THEY NEED confidence in YOU and in THEMSELVES!
Thus meaning: make the LEARNing individual! Take care of each person till they have understood it. It is like <===> differentiated instruction <===> EDUcation, BUT more coaching than teaching.In one phrase, differentiated instruction is primarily suiting instructional means to meet individual learning needs.
As mentioned already, make sure that the room isn’t sterile, NOT white! Consider the psychology of colors as it works, my 9 years experience with adults and seniors (NOT teaching) coaching. I used a pastel yellow color in the “Learning Room“, why!?
Yellow adds optimism to your home, prompting feelings of happiness in all who enter. Yellow activates memory, stimulates the nervous system, promotes communication and sparks creativity. And THAT is WHAT WE want in learning, isn’t it 😉
Make ALSO sure that there is an extra room available, where the adults, seniors can jump in to drink a beverage and eventually have some chatting with other participants, make them feel relax…
.
SO… WHAT To Teach THEM And How!?
Click the above image, please, to enlarge it.
As mentioned already, adults and seniors learn differently and slower (consider the time fact); they want stuff which they can use in their private life! SO… WHAT could be those interests!? Did I say interests, YES, it is exactly this WHERE YOU need to focus when giving courses to adults and seniors! Before starting a course I do every time an introduction session where myself and others present themselves, after the introduction I ask everybody to come in front to me and writing with capital letters on a Flipchart their interests, they could use ALSO 4 different colors (red, green, blue, black).
WHY this!? First of all, there is a bit action as they have ALL to move from their places which is different from <===> #SchoolCocoon <===> and the color they chose is ALSO a sign of their character and mood… By the way: I ask them later also WHY they were choosing that color, just to open a discussion and to make them curios about next steps; they will be aware ALSO that I observe what is going around me and that I give THEM attention…
WE will have a look all together NOW on the Flipchart and to find out the common interests, thus meaning: there will be a lot of people probably (mostly) who have THE same interests (hobbies) and NOW everybody knows WHO has the same hobby. WE created already an interest community without knowing it as these people will later talk together and probably will make an exchange of experiences 😉 It is up from there WE will build up OUR course(s)!
YOU certainly will encounter these hobbies: cooking, traveling, festivals, photos, gardening, cinema, reading, swimming, different sports, wandering, cards playing, taking videos, music, motorcycles, cars and more… That are the most common ones by my experience over 9 years.
Some examples of blogs and curation about gardening (flowers), cooking, festivals:
NOW WE know much more about OUR course participants and WE have a starting base: as anybody mostly is proud about WHAT they are doing and easily willing to talk about it (mostly…) WE will show THEM on How-To they can do it through using ICT by explaining THEM that more people would see THEIR exploits and knowledge by using curation, blogging and Social Media. WE will explain them ALSO how it will work by examples, so that THEY can see it visually. And WHY NOT, for the creative ones, how to use “ThingLink“. By experience, women are MORE creative than men, just saying…
Learn more about Curation, Blogging, ThingLink, PLN, PKM:
SO… How Can I Say That This (The PracTICE) Is Working!?
Well, I was a pioneer in my country Luxembourg (Europe) already in 2002 where I gave pedagogical courses about ICTto a wide range of the population as up from 12 years old (even younger when together with a parent) to 79 years oldwith different nationalities. ALSO there were two days in the week reserved (booked by planing inside the school) for the primary schoolwhere they could use OUR “ICT LEARNing room” by my coaching to learn the (at that time) NEW technologies. Schools didn’t have YET computers in the classes at that time and I was working very close together with the teachers and helped also to convince the responsible people from the commune about thenecessity of computers in the classrooms, which worked 😉
SO… WHAT was that “ICT LEARNing Room“, called “Internetstuff“!? And WHY was my “Internetstuff” DIFFERENT from ALL the others in Luxembourg!?
A bit History and Story Telling: What is a “Internetstuff”? It was a project by the “European Commission” to bring the “ICT” to ALL the inhabitants in any commune in the European countries. They called it at that time “eEurope” and in Luxembourg it was a special task force, called “eLuxembourg” that was charged about it. SO, they decided to create special places where the population could learn through courses about “ICT”, which they called “Internetstuffen”.
The Government in Luxembourg was looking at the time to find competent people to give those courses about ICT and they were advertising in the newspapers, where I made my application. I was selected and had to follow a 4 months long education through special tailored courses about the How-To to give pedagogical courses with ICT, a bit hard at that time as I was 45 years old already, BUT I did it and I found my vocation!
I offered my services and skills to different communes and it was in ETTELBRUCK (North of the country and 30 km away from where I am living) that I found a new job and a new adventure as a pioneer. Apart from giving courses about and with ICT, NO ONE of the responsible persons had a clue about the How-To, so they told me “Do what You want, You should know what…“, OK, I was perplex and ALONE to do this job!
First I elaborated the opening hours, than I created a “brochure” which was sent to all the houses in that small city (8k inhabitants) to inform them about this new service offered by the commune. I created also a “member card” of a value of 25€ for a whole year who gave the participants the right to visit the place to use only the internet (very few had Internet in 2002) and/or to take part of courses. The place was open on a 5/8, 5 days from Monday to Saturday from 8h30 am to 11h30 am and from 13h30 to 17h30. Monday and Wednesday mornings were reserved for Primary School classes from 08h am to 11h30 am. Saturday and Sunday was closed.
There were also evening courses organized and I collected about 1k6 (1,600) hours of overtime work during 1 1/2 year (non payed hours)! I couldn’t do that job anymore alone, BUT I din’t get a co-worker allowed neither. NO budget for it! I decided NOT anymore giving evening courses and giving the courses on a different way:people (learners) could visit the place whenever they wanted during the opening hours (only in the day) and I would give them courses individually and on different disciplines (security, Office, Photo Editing, website building, email, Skype…).
The learners had more autonomy, I let them work by PracTICE after first having them explained about the How-To shown with a beamer and then also on their own PC (there were 10 PCs in the Learning Room). They could come WHEN they wanted and for how long they wanted. They were completely FREE, no MUST, NO STRESS… I explained them, showed them, observed them (studied their behavior…) and interacted only when needed, when I felt that they must get a bit help to continue. I encouraged them to try by error till they would have learned it and when learned I showed them some tricks by giving advice on How-To do BETTER. It was ME who adjusted and adapted to them, a win-win situation. They learned slowly but surely and once the basics understood (the most important) they learned the other stuff to learn much more quick as they felt more confident about ICT. I encouraged them to practice at home which they all did. I asked them where they still have problems when practicing at home and WE repeated it on another way when possible, otherwise same procedure…
I was also constantly updating my “Professional Development” by reading lots of books (insatiable…):
This, below, is NOT bragging BUT my pride about the feedback (which is a MUST) from my “LEARNers” who visited my courses.
.
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
Click the above image, please, to enlarge
.
The above texts are in French, Luxembourgish, Italian, Portuguese, German: if YOU are NOT used to those languages please check this App with whom YOU can translate, actually very useful when visiting other countries then yours 😉
The above text is in French, if YOU are NOT used to the language of Molière please check this App with whom YOU can translate, actually very useful when visiting other countries then yours 😉
In 2015 Coaching-Mentoring Is Seen As An Education Difference-Maker
[START Text from On Educational Coaching, Mentoring & High-Impact Learning] Coaching is a difference-maker in education. Think of the mindset evident in high-performing athletic teams, chess teams, even actors and other entertainers. Content providers are valuable, but that is not what makes learning organizations distinct, especially not those that seek to reach and provide a high-quality education to a full spectrum of learners. The same thing is true as we continue to implement things like competency-based education models. Many celebrate the way CBE can reduce the cost of college degrees, increasing access and opportunity, and addressing critical workforce needs. However, if cost reduction happens at the expense of great coaching and mentoring, I am concerned that we will make little progress in the democratization of education. The “haves and have nots” of education depend largely upon the prerequisite skills needed to take advantage of newer and emerging learning environments ranging from CBE to MOOCs, self-directed learning to self-organized learning environments. [END Text from On Educational Coaching, Mentoring & High-Impact Learning]
.
Click the above image, please, to access the article.
Learn more about my Global Collaboration and coaching on my following blog posts:
As already mentioned above, I asked a lot about WHERE some could have problems to understand and encouraged the learners to tell me, even I asked them to write down on the Flipchart questions they would have eventually. WE collected them all and when they were fit enough on the keyboard I let them create themselves (with my little help) a FAQ’s list (Frequently Asked Questions) and a glossary, see example below please.
.
Click the above image, please, to access the glossary online.
Keywords: win-win situation… honesty, straight talking, dealing with mature people, provoking could be (I do…) welcome with a bit irony and humor, dealing with humans, different characters needs to get analyzed before action, a bit courage to go out of normal,
.
Necessary Material For The Courses
Apart from the computers with internet connection here below a list of necessary material:
Flipchart
Printer All In One (with scanning function)
Camera for Photo Editing courses
USB Sticks
Head phones with micro for Skype use
Some webcams for Skype use
…
.
Is My Proposed Way Of Coaching With ICT ONLY For Adult Learning!?
There is a lot of common from the above mentioned with youth coaching and could be applied as well for them! WHEN YOU make youth feeling being accepted as adults, they will give YOU more respect and it will be a GOOD atmosphere for BETTER learning also! I had teens visiting my “Learning Room [Internetstuff]” for the ONLY purpose to listen and to observe when I gave courses with coaching to the participants. They came in their FREE time when there wasn’t school and made their homework while observing also my “style of teaching, as they said”. I got told by some of them that they learned MORE in 2 hours about ICT than they learned in a month in school. And THAT is THE difference between theory and <===> PracTICE! <===>.
Preparation, keywords necessary for me to create this blog post: EPAL, Andragogy, Heutagogy, Flowchart, cooking, nature, flowers, gardening, traveling, interests, PracTICE, profit for private life, NO THEORY!, engagement, Social Media, sharing, communication, NO FEAR, which websites to trust, which FREE services to use, which FREEWARE to use, Kursus schmackhaft machen, spice in LEARNing, quote Gust, LEARNing2LEARN, Life-Long LEARNing, blogs creating, NO STRESS, NO TIME LIMITATION, NOT FORCING, LEARNing-By-Doing, selfish, pride of something (sports, traveling…), bragging through Social Media (negative transformed to positive)…, staying in touch with (abroad) family, Skype, Facebook, Picasa, PhotoScape, Photo Editing, ThingLink, Creativity, positive Psychology, TEAM or WHO is BETTER, individualists, Streber, Alpha person and/or TEAMLEADER, community THINKing OR selfish, Empathy, NO RELIGION and NO politics allowed in courses to respect each OTHER, tolerance, Win-Win thinking amplified for course participants, win-win situation between coach and learners,
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
ICT, Internet, Internet Of Things, Internet Of Everything, Wearables And WiFi Change OUR Habits
WE are living in a very quick changing world as the internet opens NEW possibilities, NOT ONLY for searching and publishing. WE are talking actually a lot about the ===> Internet of Things, Internet of Everything <=== whereby a lot of people have it already at home without knowing WHAT it actually is! So, does ALSO EDUcation which need to adapt to it as the internet is a common right for anyone. EDUcation is STILL looking on the How-To to implement it for LEARNing and TEACHing and (like usual…) struggling and behind that evolution, an evolution that is NOT temporary but will certainly go much further when one is watching on each day (thanks to the internet) the NEW discoveries, new technology, new materials based on Nano-Technology.WHAT was true YESTERDAY isn’t anymore TODAY! Therefore it is important, actually a MUST, that in EDUcation the students, learners, will get prepared for the (not so anymore unknown) near future, they MUST get prepared for ===> LEARNing-To-LEARN <===, to be able to adapt their knowledge by daily routines, they will become ===> Life-Long-LEARNing <=== persons!
Well, there is WiFi nearly everywhere NOW, isn’t it? And WiFi is FREE in most places, right? AND nearly everybody has a Smartphone, right? SO, thus meaning: when people talk to each other (WHEN NOT using their Smartphones…) it happens sometimes (OR often…) that the persons are asking questions which couldn’t get answered instantly, so… opening the browser on the Smartphone, searching and finding it, as well as maybe sending that answer to the talking partner through the internet to get visible on their Smartphone. Got it?
.
.
AND the NEW trend to use wearables who communicate to each other by using “Bluetooth” and/or an internet connection? WE spend a lot of time by watching and using OUR NEW toys (wearables, Smartphones, tablets…), is there a NEW message on Facebook, on Twitter, on any other Social Media…? A lot of people (if NOT MOST…) are already on dependency! Ask THEM WHAT they would do without THEIR so loved toys and without the internet!?
.
Click the above image, please, to access the video and enjoy while <===> Deep-THINKing on it as well 😉
.
SO… YOU might have understood already, WE are using the internet nearly for everything in our days AND WE are sharing a lot, thus meaning: Are WE aware of WHAT WE are sharing? Is the shared NOT infected with Malware!? How many of OUR Privacy are WE sharing!? WHAT happens with infected computers, tablets, wearables, and Smartphones!? WHAT’S the reason for WHY WE get nearly any service for FREE!? Aren’t WE getting too paranoid about CyberSecurity!? Aren’t WE NOT too naif while using technology without understanding it!?
A lot of questions, isn’t it!? AND there is a reason why fore, check below, please:
This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===
« Good habits formed at youth make all the difference. »Aristotle
YOU are STILL feeling YOUNG, aren’t YOU 😉
.
HOW Could This Be Taught?
Well, it is actually NOT THAT difficult at all. Parents can start this with their kids in a very early age and EDUcation can start it ALSO up from primary school; it’s ONLY a question of ===> GOOD WILL <=== 😉
I encourage YOU to read my following blog posts to find out…
THE Whole FREE Course On ONLY One Interactive Image
Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉
.
Click the above image, please, where YOU will get directed to the interactive image.
I have a NEW blog post in preparation who shows YOU how to convince persons about the MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, which I will post later (when finished) also in this blog post, stay tuned 😉
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
Keywords necessary for me (as a reminder) to create this blog post:WiFi everywhere, discussions in cafés, Pubs, meetings etc, searching on the internet when not knowing, Internet of Things, Internet of Everything, Privacy, CyberSecurity, Digital CitizenShip, LEARNing To Learn to be prepared for the (NOT so anymore) unknown, Apple watch, wearables, dependency, PIC from Einstein, sharing, sharing with infected devices,
Let us go for an ===> Visual walk <=== on what the internet is, try to follow me please: YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer, Smartphones, tablets through YOUR browser…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!
.
EDUcation and Schools RESPONSIBILITY: a safe place for the LEARNers, students! Because of the internet there are NOT ANYMORE walls in the schools and SO the safe place is ALSO the internet!
After having read this and YOU are STILL NOT convinced about THE MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, YOU SHOULD ask YOURSELVES if YOU are on the ===> NAIVETY STATUS <=== OR already on the ===> MATURITY STATUS <===, thus meaning if YOU take YOUR RESPONSIBILITY for the future of OUR kids 😉
This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===
« Good habits formed at youth make all the difference. »Aristotle
YOU are STILL feeling YOUNG, aren’t YOU 😉
.
Click the above image, please, to access the article.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
Keywords necessary for me to create this blog post:RESPONSIBILITY, what is the internet?, comparison Virtual World and Real World, highway, Internet of Things, Internet of Everything, Social Media, PracTICE, Learning to learn digital citizenship, CyberAttacks interactive maps, REALITY,
Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.
Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.
This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.
For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.
Keep checking back for the latest news as the SID 2015 starts to take shape.
.
Click the above image to access the article, please.
.
Check the video below, please, who explains about it.
.
.
.
.
My participation for the SID2015
WHAT is special this year with my participation on SID2015?
I created a ===> #GlobalCollaboration#blog <=== from @knolinfos (my pseudo on twitter) & @ICTPHMS& @kimmindy7 for #LEARNing about #DigitalCitizenShip. The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).
How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):
Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===>OUR responsibility to build up the future for OUR kids, learners and students!<===
WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!
.
======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======
.
.
That is why I am participating on SID2015 with my FREE courses here:
MOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015on their blogs and/or websites
People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.
WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us
WE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
How To Take OUR Responsibility!? Let’s make CyberHygiene!
Well, that’s actually NOT that difficult,it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉
French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!
« Good habits formed at youth make all the difference. »Aristotle
.
SO, let’s go for it, check below please:
.
Click the above image to access the article, please.
Global Impact Of CyberSecurity
Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
THE HowTo For BEST Protection
Please find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:
.
.
1.What are the biggest security threats to kids?
Learn more about: 1.What are the biggest security threats to kids?
You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.
Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.
Keywords necessary for me to create this blog post:#FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
The first steps before the kids go online are to protect the computer and Smartphone(s) at its BEST as possible to make sure that a BAD click will NOT become a catastrophe!Second step is to talk to the kids about the dangers of the internet and related with the use of the computer and the tablets, Smartphones and about the dangers of Social Media.
.
French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!
« Good habits formed at youth make all the difference. »Aristotle
.
How To Protect The Home Network AND The Computers In This Network!?
YES, YOU have read it correctly, I mentioned “Network”. WHY!? Because just letting everybody owning ONLY his (her) own device at home wouldn’t make sense, BETTER is to connect ALL the devices (Smartphones, tablets…) together in a Network where YOU could share even together your files, photos, videos… AND this through a secured Network. Everybody will get his OWN “User Account” where one “User Account” will be the “Administrator Account“, the parents account, who will have 100% access on the main computer. ALL the others will have an “User Account” with restricted access. Check out below on the How-To create “User Accounts”.
.
Click the above image to view the video on the How-To, please.
Click the above image to access the articles, please.
.
YOU may ALSO change the Wi-Fi Password 2-3 times a week on YOUR router so that YOUR kids get ONLY access after THEY made certain tasks which YOU told THEM to achieve 😉 Thus meaning, YOU handle over the NEW Password ONLY when those tasks were achieved!
Change your Router’s Pass Word!
Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security:
.
===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===
SO, NOW YOU got a protected Network and the family members are in a technical secured home environment, what else to do!?
For whatever device (computer, tablet, Smartphone…) and/or OS (Operating System/Mac, Linux, Windows) YOUR family members own, YOU MUST install an antivirus on them. I recommend to use an “Internet Security Suite” which combines antivirus, firewall, antispyware and… Read more below what else to do…
Learn in one week how to get Best protection-The Practice
.
I will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…
Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious! “WOT” ALONE isn’t enough! My experience over years 😉
Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.
.Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!
.
As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉
.
For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:
.
.
Let Us ALSO Protect OUR Privacy
Are YOU aware of the dangers of WiFi on public places? YOU should!
.
Protect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
And NOT TO FORGET the Apps: Do YOU know WHICH permissions YOU gave YOUR #Apps? Do YOU know HOW MUCH #Privacy YOU share without knowing? Check below, please and WONDER:
By knowing NOW about the dangers and PRIVACY I suggest that YOU install a “VPN” (Virtual Private Network) application on each browser (Mozilla Firefox, Google Chrome, Safari, Opera, IE…) that YOU use, here below my selection (non-exhaustive list).
WHAT’s The Appropriate Age For Kids To Start With It AND How-To?
.
« Good habits formed at youth make all the difference. »Aristotle
.
WHAT’S THE appropriate age for kids to start learning about InternetSafety and CyberSecurity? A question I get asked very often. Well, let us say it this way: when kids understand what is BAD and GOOD, that will be the perfect timing to start to teach them about the dangers of the internetand how to get the right reflexes. YES, reflexes they can learn them easily, NO Technic of course as they wouldn’t understand it! Experts say that the right age would be 5 years old, check the link below, please:
Personally I started to teach my wife’s niece 12 years ago when she was 4 1/2 year old and that worked perfectly. I will tell YOU how I did and YOU can try it out as well, success guaranteed.
First of all ask the kid if it knows about the BAD and the GOOD in our real world and tell it that on the internet (virtual world) it is the same. Tell them that the BAD guys will infect the computer, explain them that it is similar to an infection in real world (flu, as example…). For that reason they need a protection on the computer which will get updated, that’s the vaccine. When they know about vaccine in real world, they will understand that it is a MUST!
Parents should have taught them this about vaccines! WE will remember them each day (or at any time they go online) when getting online with the computer to check if the antivirus is switched on, they will get ===> THE reflex <=== later to check about THAT action. It is actually very easy, I will explain below.
.
As YOU can see on left-hand side the antivirus, in our case “Norton Internet Security Suite” is visible (see red circle). WE see as well that there is a green checkmark. This checkmark shows us that the antivirus is switched on and updated. Tell the kids up from early age to check this every time they use the computer, they will remember it.
Install ALSO WOT and McAfee SiteAdvisor on any devices as both show what websites to trust by indicating it with three different colours (green,orange, red). The kids will recognize the colours and understand.
.
.
With the above mentioned advice your kids will learn the necessary basic reflexes to stay safe on the internet. BUT DON’T FORGET: a security by 100% doesn’t exist and the weakest link in the security chain is the human!
Learning Responsibility: Family Pledge And Passwords
.
Use a psychological trick to remember your family members about the MUST to take care about their weeklyCyberHygiene, the reflex to learn, and play the song “The Reflex-Duran Duran”. They will get used to it, and every time they hear the song they would know that there is something special to do, such as NEW “Updates“! Easy to use, isn’t it 😉
.
.
Organize a Family Weekly-Security-Day
My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…
===> Play as a team in the family to make sure that everybody respects the weeklySecurity-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===
You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL 😉
.
===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===
.
Penalties could get reset for a certain time (up to you to make the rules…)
Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
Your own ideas for motivating the team to do the tasks…
.
Create a family pledge where the members have to agree to to respect the family community responsibility. You may ALSO make one member of the family the responsible person for one week who takes care of the others and who will supervise that each member of the family respects the weekly security tasks. A spreadsheet may help, here below an example.
.
Click the above image to access the document.
.
This blog post was featured on “Cyberwise” in March 06, 2015.
Click the above image, please, to access the article
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
Necessary keywords for me to create this blog post: Family pledge: learning responsibility. password ONLY when done some tasks… Password CHANGE ALL 3 months, reflexes, showing the way, remembering the said when growing, asking questions when not comfortable, comfort zone together with parents, workstation NOT in separate room, published articles in the press, responsibility, community feeling, empathy, examples from traffic, the THREE colours (red, green, orange), WOT, McAfee Site Advisor, secure surfing, Antivirus reflex, Wi-Fi password change every day or once a week when tasks are done kids get it 😉 Router configuration for family… Passwords, sending messages over the network (#FSCD), planifying #FSCD over DOODLE, Family Safety, computer in a place who everybody is seeing; NOT in bedroom!, Install VPN on any devices as browser add-on.===> creating different accounts, ONE Administrator the others with restricted…, creating a Home-Network for sharing documents, photos, etc., tutorial from Microsoft about different accounts, links, Privacy settings, WOT, Any Friday #FSCD, family pledge, creating a sense of responsibility, Updates, 3dParty, CyberBullying Avira !!!!!!!!!!!!!!!!!!!!!!!!!! garage appointment for cars, CyberHygiene, creating sense of responsibility,
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!
.
« Good habits formed at youth make all the difference. »Aristotle
TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!
The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!
Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall,
Read below please, for more detailed instructions and information, thanks.
.
THE Facts
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Educationto teach people aboutCyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
As already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:
It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet!
.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance ofGOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉Click the image below to access the FREE game.
WHAT Actions Could Get Taken WHO Are Student Centered?
WHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter @NancyW <===. Here WE go, check the infographic below, please.
.
[GM] Please check my blog posts below, who explain in detail:
When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking<===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:
.
Click the above image, please, to access the article.
.
[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.
[MK] Mindy KIM (USA)
[MK] What changes could be made to improve the overall message?
[MK] You made a strong point here, where else could you apply the same idea?
[MK] Who is your audience?
[MK] Could you say the same thing using less words? Would your message be understood?
Greetings from Patrick Henry Middle School in Sioux Falls, SD.We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.
The following linkhttp://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.
.
.
Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!
Post: 04/28/2015
The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.
The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.
Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).
The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.
Learning about Digital Citizenship through comic strip creations. See an example below, please.
.
.
Objective: The objective of the post is for students to learn about Digital Citizenship through stories.
Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.
Sample of my 8th grade Blog Prompt for next week. Check Below..
Who owns information?
Objective:
After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism. Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.
Rationale:
In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online. They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.
Focus question:
When you buy a song, is it really yours to use how you want? Are all images online available to use however you want?
Should creators of information, images, songs etc. be paid for their work?
Students will watch short video on monkey photo and discuss what rights monkey/photographer have in this specific case:
Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics).
This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use ischogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂
Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere. Once the project is completed examples will be provided.
Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:
“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?
How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”
Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts).
Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another.
Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information. Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.
Click the blue “Create a Story” button in the top right hand corner.
Look at the right side of the new screen where the icons of your favorite social media websites reside.
Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.
Want an Example?
Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.
Post: 25/11/2014
Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.” The link is provided below:
Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:
The following link is directly from my class blog:http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy.
[GM] Gust MEES (Luxembourg/Europe)
Added on 07/01/2015:
Ideas: using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.
I created these comics with dialogues with the following online program:
If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:
The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉
Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉
.
.
By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.
Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.
.
.
Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.
The authors [GM], [MK], [ICTPHMS] will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.
[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:
Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.
This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?
Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)!TIP: read ONLY the bold text to understand it quickly 😉
Check ALSO these links, please, who explain about “International Collaboration”:
The authors are from Europe (Luxembourg) and the USA, please check below:
.
The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor)will be represented by THEIR initials such as:
Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.
.
Please click this link first before STARTING ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.
.
Student Centered Initiatives
[GM] Well, that’s WHY I was inviting @ICTPHMS as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet.
[MK]My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.
Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.
We begin lessons by learning important vocabulary and learning basic knowledge:
.
.
.
.
This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:
1). Why do circles have no sides?
2). How many squares make up a box?
.
.
.
.
WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?
[ICTPHMS]
Online is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.
Two Sides of the Coin
The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.
Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.
These scholarships can be easily lost if students post inappropriate profiles on various sites like
Twitter
Facebook
MySpace
Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.
Google Search to Screen Students
In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.
Air-Tight Online Profile
How can students make sure they are squeaky clean online?
Do not post anything to your site that would be morally or ethically questionable.
Never post personal information such as your address, daily schedule, or phone number.
Make your profiles private so only a selected group can view your information.
Don’t add “friends” you don’t personally know.
Ask friends to remove any photos of you that could be seen as unflattering.
Make sure they never use your name when they add you to their site.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance ofGOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.
Do WE Still Have Privacy Rights In The Digital World!?
.
According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.
[MK] Online perceptions, everyone can “learn” about who you are.
[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.
[MK] Beware what you share, share what you would not mind the whole world knowing.
.
.
.
.
.
How Can Education Help To Lower Cybercrime?
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Educationto teach people aboutCyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,
.
.
.
.
A NEVER Ending Story Which WE MUST Be Prepared For, But How!?
Technology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.
Team, YOUR collaboration is required, please propose YOUR questions:
A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
Q: Can my child do this?
A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
Q: How can I access the blog?
A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
Q:…
A:…
Q:…
A:…
Q:…
A:…
Q:…
A:…
[ICTPHMS] (Editor)
Q:…
A:…
Q:…
A:…
Q:…
A:…
.
[GM]Together with[MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:
How Will WE Handle This Blog Post To Stay Up-To-Date?
[GM] Well, that isn’tTHAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!
RT @Forbes: Twitter will shut down free access to its API for third party developers, the latest effort to bring in revenue at the money-st… 25 minutes ago
RT @educause: Artificial intelligence in higher education isn't without its risks. Here are three possible trouble spots for the use of AI.… 15 hours ago