RSS

Category Archives: Mac Botnet

SID2020: Safer Internet Day 2020-Participation

SID2020: Safer Internet Day 2020-Participation

.


Safer Internet Day 2020 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020, with the strapline of ===> “Together for a better internet” <=== following the success of last year’s campaign.

 

 

Learning IT-Security


My participation for the SID2020

programmerman-animatedWHAT is special this year with my participation on SID2020? 

I created a ===> #GlobalCollaboration blog in 2017 <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitiZENship <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitiZENship (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from AustraliaUSAFranceLuxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2020 in Luxembourg/Europe:

Contributions de Gust MEES:   Publications sur le Blog de Gust MEES (in English) avec 202K (202.000) views
Digital Citizenship Global Education Collaboration Blog (in English),
Publications sur le Blog von Gust MEES (auf Deutsch),
Twitter Hashtag ===> #FSCD (Friday Security Check Day)
.
ALL the participation from BEESECURE for the SID2020 in Luxembourg:

 


Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2020 with my FREE courses here:

My English contributions:

Advice for Smart-Home:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2020 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2020 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

.

 

 
4 Comments

Posted by on January 6, 2020 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Advisory Board, Apple Malware, Awareness, Better Learning about ICT, Better Teaching, Botnet, Browser Vulnerabilities, Collaboration, Collaborative Learning, Collective Intelligence, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Global, Global Collaboration, growth mindset, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, Interviews, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Luxembourg and CyberSecurity, Mac Botnet, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Open Mind, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2020, Skills, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, understanding, Understanding the internet, Updates, Visual IT-Security, Vulnerabilities, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2016: Safer Internet Day 2016-Participation

SID2016: Safer Internet Day 2016-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2016 – Save the date!

.

SID16-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2016 starts to take shape.

.

SID2016-Poster

.

 

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2016

programmerman-animatedWHAT is special this year with my participation on SID2016

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2016 in Luxembourg/Europe.

.

BEESECURE-SID-Gust MEES-18-01-2016

.Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2016 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
Leave a comment

Posted by on January 18, 2016 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Analyzing, Andragogy, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Autodidact, Awareness, Backdoors, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Device Theft, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, European Cyber Security Month, Facebook, FAQ, Feedback, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Interviews, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Motivation, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, PC Cleaning, PC Maintenance, Personal Learning Network (PLN), Personal profit, Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Project Based Learning, PUPs, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Self-directed Learning, Seniors, SID2016, Skills, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Third Party Applications, Tracing, TU-DRESDEN, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

.

Learning basics of IT-Security and Cyber-Security

.


CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

We are ALL responsible for the internet

.

Internet safety is the responsibility of EVERYONE! It isn’t actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes… Let us call them <===> CyberHygiene <===> as they are about care anyway.

WHAT do WE have to take care about!? Check below please:

.

 

  • Updates about our “Operating System” (OS)
  • Updates about so-called “Third Party Programs”
  • Back-up from our files and/or the whole Hard Disk
  • Installation of protection-software, anti-malware, anti-spyware tools included…
  • Protection of our privacy
  • Encryption
  • Secure Passwords

MOST of the above mentioned are automated tasks, SO NO way to NOT use THEM 😉 GET used to IT! GET the reflexes!

For more in depth knowledge, check below please (more theory):

Check ALSO about the How-To from the EU (Europe):

.

eSkills map_0

Click the above image please to access the article.

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

Learn more:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter, catalyst, amplifier, Modern Edu, Twitter Chat’s, Social Media, curation, blogging, Multimedia, LEARNing To LEARN, Life-Long LEARNing, PLN, PKM, Twitter, Updates, third party applications, BYOD, malware, botnets, mobile security, CyberSecurity, community feeling, community responsibility,

Stay tuned for next blog posts 😉

 

.

.

 

 
Leave a comment

Posted by on December 20, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Autodidact, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, Free courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, HowTo, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

.

 

We are ALL responsible for the internet

 Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Visual Walk On The Internet

programmerman-animatedLet us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer, Smartphones, tablets through YOUR browser…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

EDUcation and Schools RESPONSIBILITY: a safe place for the LEARNers, students! Because of the internet there are NOT ANYMORE walls in the schools and SO the safe place is ALSO the internet!

.

Related links, learn more:

 

.

Online Safety Redefined

Click the above image, please, to access the article.

 

.

WHY CyberSecurity Starts At Home

Click the above image, please, to access the article.

 

Learn more:

 


 Cybercrime

 

cybercrime-$400 billion-2013

 

.

Learn more:

.


Wearables, Watchables, Internet of Things, Internet of Everything

 

Wearables-CyberSecurity-2015

Click the above image, please, to access the article.

 

.

 

InternetofThings means Internet of Threats-2015

Click the above image, please, to access the article.

 

Learn more:

.

Personal Data-cisco-IoT

 

.

.

After having read this and YOU are STILL NOT convinced about THE MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, YOU SHOULD ask YOURSELVES if YOU are on the ===> NAIVETY STATUS <=== OR already on the ===> MATURITY STATUS <===, thus meaning if YOU take YOUR RESPONSIBILITY for the future of OUR kids 😉

This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===

« Good habits formed at youth make all the difference. » Aristotle

YOU are STILL feeling YOUNG, aren’t YOU 😉

.

 

First Steps When Kids Go Online

Click the above image, please, to access the article.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Keywords necessary for me to create this blog post: RESPONSIBILITY, what is the internet?, comparison Virtual World and Real World, highway, Internet of Things, Internet of Everything, Social Media, PracTICE, Learning to learn digital citizenship, CyberAttacks interactive maps, REALITY,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 7, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital CitizenShip, Education, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, Facebook, Free courses, FREE-courses, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Synthesizing Mind, Third Party Applications, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

.

We are ALL responsible for the internet

 

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

sharing-iconWE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!

.

WHY CyberSecurity Starts At Home

 Click the above image to access the article, please.

.

Guidelines for securing your home

 Click the above image to access the article, please.

.

Learn more about the “Internet of Things“:

 

 


How To Take OUR Responsibility!? Let’s make CyberHygiene!

Well, that’s actually NOT that difficult, it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉

========> WE call it CyberHygiene. <=========

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.

SO, let’s go for it, check below please:

.

Top 5 Questions	Parents	Have	About	Cybersecurity

Click the above image to access the article, please.


Global Impact Of CyberSecurity

Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.


THE HowTo For BEST Protection

programmerman-animatedPlease find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:

.

.

 1.What are the biggest security threats to kids?

1.What are the biggest security threats to kids?

Learn more about: 1.What are the biggest security threats to kids?


2. How do I talk with my child about security?

2. How do I talk with my child about security?

Learn more: 2. How do I talk with my child about security?

  • to be updated… Will get discussed in detail in my new blog post…

3. How do we protect our family’s computers?

3. How do we protect our family's computers?

Learn more: 3. How do we protect our family’s computers?


4. How do we protect our mobile devices?

4. How do we protect our mobile devices?

Learn more: 4. How do we protect our mobile devices?


 5. Why do we always hear “Never share your passwords”?

5. Why do we always hear "Never share your passwords"?

Learn more: 5. Why do we always hear “Never share your passwords”?


AND Don’t Forget About Privacy!

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.

Learn more in my blog post: ===> Digital CitizenShip: Social Media AND Privacy <===

 

.

book-question-markLearn more:

.

.

Keywords necessary for me to create this blog post: #FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 
8 Comments

Posted by on November 18, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Europe, Facebook, FAQ, FBI, For a Better World, Free courses, FREE-courses, Future Work Skills, Global, Home-Work, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Can Education Help To Lower Cybercrime?

How Can Education Help To Lower Cybercrime?

.
Evolution of Education: Wordle Logo
.


.

SID15_Banner_anim

.

How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOODDigital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!

.

« Good habits formed at youth make all the difference. » Aristotle

.

.

.

We are ALL responsible for the internet

 Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <===

Here below the main links about WHAT to learn about:

TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!

The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!

 

Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, 

Read below please, for more detailed instructions and information, thanks.

.


THE Facts

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.


Awareness And Naivety, WHAT!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:

.

.

.

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======

.

Cyberattacks the greatest threat to nations

A MUST READ:

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:


How To Protect To NOT Become A Zombie!?

programmerman-animatedAs already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:

.

.


TOR And Anonymity!???

.

 

TOR-2014-cybercrime

 

.

Learn more:

It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet! 

.


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

 


WHAT Actions Could Get Taken WHO Are Student Centered?

sharing-iconWHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:

.


 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on November 4, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Competency, Connected Educators, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Europe, European Cyber Security Month, Free courses, FREE-courses, Future Work Skills, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Jail, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Updates, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

.

screenhunter_03-aug-05-15-24 (1)

.


.

SID15_Banner_anim

.

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

WE are participating ALSO on “Safer Internet Day 2015“, called #SID2015.

.

SID2015-BEESECURE

Click the above image, please, to access the organization to know more about it (in English).

.

This blog post is a ===> #GlobalCollaboration #blog <=== from & &  for  about .

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter  <===. Here WE go, check the infographic below, please.

.

Digital-Citizenship-infographic-620x965

[GM] Please check my blog posts below, who explain in detail:

When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking <===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:

.

NOT FAILURE-positive words

 Click the above image, please, to access the article.

.

[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.

[MK] Mindy KIM (USA)

[MK] What changes could be made to improve the overall message?

[MK] You made a strong point here, where else could you apply the same idea?

[MK] Who is your audience?

[MK] Could you say the same thing using less words? Would your message be understood?

[DK] Great archived twitter chat on Digital Citizenship (07/05/2015) via @mrkempnz & @BevLadd curated on storify. 

[DK] The Challenges of raising a Digital Native ==> via Devorah Heitner 

[DK] Teaching Digital Citizenship 

.

[ICTPHMS] Patrick Henry Middle School ICT (USA)

Greetings from Patrick Henry Middle School in Sioux Falls, SD. We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.  

The following link  http://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2 is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.

.

ICTPHMS Digital CiticenShip Blogs

.

Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!


Post: 04/28/2015 

The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 02/06/2015 (Updated) 

Learning about Digital Citizenship through comic strip creations. See an example below, please.

.Pixton-CyberBullying-Example

.

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The link below is a storify showcasing my students reflections on Digital Citizenship. This was a “lead-up” activity to the comic strips (above).


Post: 16/01/2015

Sample of my 8th grade Blog Prompt for next week. Check Below.. 

Who owns information?

Objective:

After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism.  Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.

Rationale:

In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online.  They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.

Focus question:

When you buy a song, is it really yours to use how you want?  Are all images online available to use however you want?

Should creators of information, images, songs etc. be paid for their work?

Something to think about was you blog about your reflections of information security and digital citizenship:

Should everything online be available to use for free?  What responsibilities do we have to the creators of information?

Addition from [GM]: some resources about copyright and Creative Commons


Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics). 

This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use is chogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂 

  • Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
  • In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
  • Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere.  Once the project is completed examples will be provided.

Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:

“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?

How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”


Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts). 

Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another. 


Post: 1/12/2014:  How to Use Storify

What is Storify?

Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information.  Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.


Post: 25/11/2014

Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.”  The link is provided below: 


Post: 18/11/2014

Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:


Post: 12/11/2014

The following link is directly from my class blog: http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy. 


[GM] Gust MEES (Luxembourg/Europe)

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉

Added on 03/12/2014: 

Added on 27/11/2014: Privacy is ALSO IMPORTANT, please check below:


 In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.

.


 Global Digital Citizenship Education (GCE)

UNESCO-Global-Digital-Citizenship-Education-2013

Click the above image, please, to access the article.

.

UNESCO-Global-Digital-Citizenship-Education-2013-2

Click the above image, please, to access the article.

.

Are there differences between Europe and the USA and the rest of the world?

sharing-icon.

Here below WHAT the EU is doing:

.

.

eSkills-EU-EPALE

Click the above image to access the article, please.

.

Here below a good approach from the USA:

Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉

.

5 Minds For The Future

.

By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.

Learn more:

.


How Did This Blog Post Start?

Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.

.

digcit-twitter-collaboration-1

digcit-twitter-collaboration-1

.

Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.

Learn more:


THE Authors, The Team

globe-pc[GM]

The authors [GM], [MK], [ICTPHMS]  will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.

[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:

Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.

This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?

Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)! TIP: read ONLY the bold text to understand it quickly 😉

Check ALSO these links, please, who explain about “International Collaboration”:

The authors are from Europe (Luxembourg) and the USA, please check below:

.

The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor) will be represented by THEIR initials such as:

.

Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.

.

Please click this link first before STARTING ===> Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.

.


Student Centered Initiatives

programmerman-animated[GM] Well, that’s WHY I was inviting  as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet. 

[MK] My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.

Learn more:

.

.Digital CitizenShip

.

Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.

We begin lessons by learning important vocabulary and learning basic knowledge:

.

shapes-discussion-2.

.

.

This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:

1). Why do circles have no sides?

2). How many squares make up a box?

.

.

.

.


WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?

[ICTPHMS]

TagxedoOnline is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.

Two Sides of the Coin

The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.

Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.

These scholarships can be easily lost if students post inappropriate profiles on various sites like

  • Twitter
  • Facebook
  • MySpace

Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.

Google Search to Screen Students

In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.

Air-Tight Online Profile

How can students make sure they are squeaky clean online?

  • Do not post anything to your site that would be morally or ethically questionable.
  • Never post personal information such as your address, daily schedule, or phone number.
  • Make your profiles private so only a selected group can view your information.
  • Don’t add “friends” you don’t personally know.
  • Ask friends to remove any photos of you that could be seen as unflattering.
  • Make sure they never use your name when they add you to their site.

.

Our projects and curation: 


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

.


WHY is Privacy so important?

[GM] Just think on George ORWELL… Phishing and Spear-Phishing To be updated by [GM]…

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand

.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1.

According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

Learn more:

[MK] Online perceptions, everyone can “learn” about who you are.

[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.

[MK] Beware what you share, share what you would not mind the whole world knowing.

.

.

.

.

.


How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:

To be updated by [GM]… 

.

Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,

.

.

.

.


A NEVER Ending Story Which WE MUST Be Prepared For, But How!?

sharing-iconTechnology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.

Team, YOUR collaboration is required, please propose YOUR questions:

.

  • [MK] Mindy KIM (Editor)
    • Q: How will this help my child in school?
      • A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
    • Q: Can my child do this?
      • A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
    • Q: How can I access the blog?
      • A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
  • [ICTPHMS]  (Editor)
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…

.

[GM] Together with [MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:

.


How Will WE Handle This Blog Post To Stay Up-To-Date?

sharing-icon[GM] Well, that isn’t THAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:

.

.

Curation, authors blog posts, explaining curation, blogs


Author’s Portfolio, Curation And Blogs

sharing-icon

.

[GM] Please check below to find out about WHAT the authors realized already:

.

.

[GM] Please check below, please:

.

[MK] Please check below, please:

.

[ICTPHMS] Please check below, please:

.

.

..


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.

.

You can find me also on:

.

Stay tuned for next blog post(s) 😉

.

 
22 Comments

Posted by on October 11, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Comics, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Digital Citicenship, Digital CitizenShip, Education, Engagement, Europe, European Cyber Security Month, FAQ, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Social Engineering, Social Media, Spam, Storify, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Is My Professional Development Up-To-Date?

Is My Professional Development Up-To-Date?

.

Evolution of Education: Wordle Logo


Rise Of The Professional Educator

.

rise of the professional educator

Rise of the professional Educator

.


Is your Professional Development Up-To-Date?

programmerman2I think that “Is MY Professional Development Up-To-Date?” is the first question which you need to ask yourselves! You can ONLY give BEST and QUALITY courses when knowing about the latest knowledge in a 21st Century Education. But ===> HOW TO know this? <===

That’s a question I am getting asked very often from Teachers and Teacher-Students around the world through my Social Media presence on Twitter and I must say what I see on a global base doesn’t make me feel really happy! Lots of teachers around the globe are tweeting, which I encourage to do as much as possible by joining ALSO a so called “PLN“, a “Personal Learning Network“, but ONLY a few shows a real understanding, competencies, about what they are doing; even the so called “Edu-Stars” in certain countries! So, to take away some misunderstanding from the above said, I don’t make teacher-bashing! I ONLY will show how difficult it is to follow to be up-to-date ==> Nobody Is Perfect! <==, me neither! It’s an analyzing from my daily Social Media connections… The CHANGE is very quick and ALL of us have problems to follow that quick ALSO! That is WHY it is so IMPORTANT to learn on a daily base to be still able not missing the train 😉 [my advice]! ===> Life Long Learning! <===

.

THE ADDRESS to know and to follow:

 

.

.


The Main Skills of a 21st Century Learner and Teacher

The quest to be a modern teacher or student is in full swing. First though, figure out if you have these important 21st century skills.

  • Develop proficiency and fluency with the tools of technology;
  • Build intentional cross-cultural connections and relationships with others so to pose and solve problems collaboratively and strengthen independent thought;
  • Design and share information for global communities to meet a variety of purposes;
  • Manage, analyze, and synthesize multiple streams of simultaneous information;
  • Create, critique, analyze, and evaluate multimedia texts;
  • Attend to the ethical responsibilities required by these complex environments.

First of ALL, please check these images as on my point of view they show BEST:

.

21st Century Skills

Image credits: Edudemic

.

.

education 3.0

Image Credit to: http://www.teachthought.com/learning/8-characteristics-of-education30/

Here is my selection of  BEST articles, my own view and Curation of  HOW TO find out:

.

Very IMPORTANT:

.

Future Work Skills

Future Work Skills Needed (A MUST Read!)

.

And YOU SHOULD ALSO know this about all the NEW technical expressions in Education, check the Infographic below, please:

.

EdTech Cheat Sheet

EdTech Sheet Cheat, put it in your Office, click to download it!

.

And didn’t WE forget something in the above mentioned!? YES, WE did! When working with computersSmartphonesTablets and any device connecting to the Internet WE have to consider ALSO the aspect of Cyber-Security and Internet-Safety! And what about “Bring Your Own Device“, called also “BYOD ===> Twitter Hashtag = #BYOD <===

Sounds strange to YOU!? It shouldn’t as YOU have to accept that any Technology present and certainly also in the future requires Safety and Security knowledge! Especially the Technology who is connecting to the Internet! 

Why!???

sharing-iconOnline learning, e-Learning, m-Learning and BYOD are interconnected in many ways with the Real-World, both are influencing each other! By sharing information with others WE  must also take care about WHAT WE are sharing! 

This MUST be known, especially concerning Cyber-Security! I will explain in a different course (in depth) ===> why Cyber-Security is a MUST in 21st Century Learning and Teaching <===, for the moment feel free to visit my following FREE courses to get an overview:

.

Coding and CyberSecurity

 

.

and check this Infographic who will show you most important!

.

Europe's First Security Maturity Risk

Click here to go to the article where the Infographic is.


Do YOU know What Effective Teaching is!?

Measuring Effective Teaching (MET)

Read the full article and report here:

.


Ideas for “Professional Development”

.

thumbs upRecently WordPress introduced a new Plug-In. [Start Text from EDUDEMIC] The new WordPress plugin from WooThemes (a popular WordPress premium theme provider) lets you start up your own online school with ease. It’s as simple as installing a WordPress plugin. The actual content and other school-y stuff is, of course, up to you. But the technical stuff is taken care of by this new plugin. [End Text from EDUDEMIC]

.

.

SO, my idea behind that NEW plugin is that teachers with a good knowledge HELP other teachers with their “Professional Development” by creating such a platform! THINK about it and use the “Social Learning” factor in spreading the word on Twitter 😉

BTW: Did You Know that WordPress is providing ALSO a Template called “WordPress Annotum” with which it is possible to collaborate with multi-authors, even on an academic way!? Check out the link(s) below to learn more:


You Need To Be An Expert On Learning Before Teaching!

.

A Curator Is An Expert Learner-L2L

.

The BEST teachers are the teachers who are the BEST LEARNERS, that is NOT a secret anymore and it is the TRUTH! Somebody who knows about “Learning To Learn” is able to forward ALSO that precious knowledge, as in my eyes Learning To Learn” is the MOST IMPORTANT knowledge!

Important quotes about the above:

  • The object of teaching a child is to enable him to get along without a teacher. Elbert Hubbard (1856-1915) American author, editor and printer.
  • It is not because things are difficult that we do not dare; it is because we do not dare that they are difficult.” (Seneca the Younger)
  • I cannot teach anybody anything, I can only make them think. – Socrates
  • Education is what remains when we have forgotten all that we have been taught. 

    George Savile, Marquis of Halifax (1633-1695) English statesman and author.

  • The whole object of education isto develop the mind. The mind should be a thing that works. Sherwood Anderson (1876–1941) American novelist and short story writer.
  •  Education … has produced a vast population able to read but unable to distinguish what is worth reading. 

    G. M. Trevelyan (1876-1962) British historian

  • You can lade a man up to th’ university, but ye can’t make him think.  Finley Peter Dunne (1867—1936) U.S. author, writer and humorist.
  • Teachers open the door, you enter by yourself  Chinese proverb.

How To Become a Great Teacher

.

I will present you some great articles where you could get inspired, as well as some Infographics who will guide you:

.

.

Great Teachers

Click here for the download in full size

.


I don’t have that much time to update my Professional Development!?

.

That is probably the phrase I hear the most and which is a big EXCUSE of NOT wanting the CHANGE, the change from OLD teaching methods to 21st Century Learning and Teaching!

First of ALL, let’s play a bit music about “Time” 😉

.

.


.

.

SO, HOW can I manage BETTER my Time? Check the link below to find out FREE tools who will HELP you to manage your time! BUT don’t forget: some less on some tasks to get more for Education 😉

.


Are You Committed Enough to Invest in Yourself?

sharing-iconThat’s a question which you have to ask yourself, read the following for more information: [Start Text from Are You Committed Enough to Invest in Yourself?]  ===> A 9-to-5 career, if that is your model, is a recipe for career failure. <===

Because of the constant change that is swirling around all of us and our organizations, it does not matter where you are. We are all in the middle of the storm. And by the way, when I mention the negatives of being a 9-to-5 person, I am not talking about having to be a workaholic instead. I am talking about being committed to what YOU chose as a profession.   [End Text from Are You Committed Enough to Invest in Yourself?]

.

Read the full article, a MUST:

.


I Have Too Much Stress To Learn!?

That is ALSO again a phrase I hear too often and I am wondering that intelligent people as Teachers don’t know the solution, but anyway; have a look on above Topic “Time Management” to find out which FREE tools will help you to manage BETTER your time and I advise you to check the below “Infographic“:

.

Stress (Infographic)

Check the Infographic here: Stress

.


Any Other Resources Than Mine To Make YOU An Overview?

book-question-markOf course, I will provide YOU ALSO some other resources where YOU will be able to create yourselves a much deeper view of it! In this FREE course I give YOU what I think is the most important knowledge and to give YOU the ability to use YOUR critical thinking, I will provide to YOU the following links:

.


Why Letting Go of the Past is So Difficult

globe-pcMost of us, so called OLDIES Teachers, I am one of them (BTW: I am 58 by writing this [2013]), have big problems to adapt to the NEW! I don’t know at ALL, why!? I am a Life Long Learner and so I am prepared for ALL of what is NEW and I don’t fear to learn more, actually I love to learn to give my BEST knowledge to my learners!

SO, this told, I invite YOU to read this psychological article, which I think is very important for YOU to understand a bit he “hidden” behind, do so please, thanks!

..

.


SO, What is THE Real Change!?

In preparation… Actually ONLY key phrases, will go deeper later…

1) Practice, NOT anymore ONLY Theory, but more Practice is a MUST in the 21st Century while using devices with a computer included!

2) Collaboration with the learners and ALSO with other teachers and principals is required!

3) Win-Win Situation between teachers and learners…

4) Less of Hierarchy, where it means the fear of some teachers to lose power over the students when being a coach…

5) Go away from Linear-Learning, NOT A-Z while using A-B-C-D-E…-Z, use A-Z-K-B and so on as with ICT one can combine different knowledge in one course by time…

.

KEYWORDS FOR THIS FREE COURSE and what you will learn:

“Knowledge is a treasure, but practice is the key to it.”

.

YOU will learn about WHAT YOU should know to become a great teacher: 

===> All the possible quality resources where YOU can learn on YOUR OWN pace as a self-learner (autodidact), some ideas to think about for a BETTER and quickest way to get the teachers on the TOP of “Professional Development” Up-To-Date” Level! <===

AND: THE MOST IMPORTANT when working with ICT ===> basic knowledge of Cyber-Security!

Basics of Cyber-Security Practice, Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


Poll, Your FeedBack Is Welcome

.

 

.


Frequently Asked Questions – FAQ’s

.

..to be continued

.

..


.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.
.

 
51 Comments

Posted by on January 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Books, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Coaching, Collaboration, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-War, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, FAQ, For a Better World, Free courses, FREE Photos, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Games, Gaming, Get smart with 5 minutes tutorials, Global, Global Collaboration, Health, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, MakerSpace, Mobile Botnet, Mobile Security, Motivation, Multicultural Articles, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Parents Partnership, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Control, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Safer Internet Day 2013, Search engines PracTICE, Searching, Secure Surfing, Security in Schools, Skills, Social Engineering, Social Media, Spam, Staff's Health, Stalking, Student Centred, Sustainability, Technology Integration, Tracing, Tutorials, Twitter, Twitter Chat, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Naivety in the Digital Age? Social Engineering and OTHER human false beliefs, fails…

Learning basics of IT-Security and Cyber-Security.


 .

sid2014-anim-banner

.

.

Learning from the fails of others for a BETTER more secure Internet!

Keywords for this free course:

.

programmerman-animatedNaivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.


Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!

.

programmerman2What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvetynaïveté, etc.), is the state of being naive—having or showing a lack of experienceunderstanding or sophistication, often in a context where one neglects pragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]

.

.

Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…

Some go even further and call it: The Internet Plays Role of Stupidity Amplifier

.

Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…

.

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

Smile: Your Selfie Is A Mugshot For The NSA | Naivety

.


Wearables and the Army

GHCQ-WEARABLES-HEATMAP-FITNESS TRACKING

Image Credit: Click image please to access the article

Strava fitness app divulges heatmap of secretive British SAS base

A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.

A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.

Read more:

.


Terms Of Service: Do YOU READ THEM!?

.

NAIVETY-First Born Child-2014

Click the above image, please, to access the video explaining in detail.

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

.

People Willing to Give Up Firstborn Child For Free Wi-Fi

 Click the image to access the full article, please.

.

I recommend STRONGLY to READ my article below, please:

.


Social Engineering

.

Social Engineering Infographic

 

Click the above image, please. to access its source.

.

Learn more about Social Engineering:


TOR And Anonymity!???

.

TOR-2014-cybercrime

Click the image above to access the article AND LEARN that ===> Anonymity DOESN’T exist!!! <===

.

Learn more:

.


Looks Like WE MUST Include Apple! 😉

.So, what does that mean? Analyzing what Wikipedia says, that’s meant for IT-Security and Cyber-Security:

mac-before-after-animated

.

Apple-first-automated-update-2014

Click the above image, please, to access the article.

.

August 2015

Mac-2015-Apple

Click the above image, please, to access the article.

.

Learn more:

 


WHAT about GOOGLE!?

Google-Router-NAIVETY.

.

.

.

Well, I didn’t expect that one, OH SHAME!!! Read the article below please:

.

.

.

.

.


More examples on NOT TO DO!

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.


WHAT’S YOUR PASSWORD!?

A PASSWORD should NEVER getting shared with others! A PASSWORD should be very STRONG! Check below the ===> NOT TO DO!!! <===

.

.

Read ALSO (in German) below, please.

.

NAIVETY-PASSWORDS

 

Click the above image, please, to access the article.

.

 

Army and PassWords

. prince-william-army . Find full story here: Prince William photos accidentally reveal RAF password .


Football (Soccer) WM2014

.

And the World Cup Security Centre’s WiFi password is…

.

WM2014-Football-Brazil

.

Check the article here:

.


Normal Users and PassWords

55% of net users use the same password for most, if not all, websites. When will they learn?

dunce-hat-170[START Text from SOPHOS] According to Ofcom’s “Adults’ Media Use and Attitudes Report 2013” report, a poll of 1805 adults aged 16 and over discovered that 55% of them used the same password for most – if not all! – websites.

Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!

If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]

.


Photos and GeoTagging

Army

.

Army-Photos-Geotagging

Credits to: http://gizmodo.com/5892054/us-soldiers-are-giving-away-their-positions-with-geotagged-photos

.


Jailed cybercriminal hacked into his own prison’s computer system after being put in IT class

. programmerman2 . .

.

What sounds like a joke isn’t one, that’s the truth! Read the full story here: .

.

.


Encryption:

Encryption-SecurityScore-before-after

Encryption-SecurityScore-before-after

. . . .

.

.

. . . .

.

.

.

..

. .


Lost USB-Sticks, External Hard Disks and Laptops

External Hard DiskAn external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.

This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.

.


Calif. Health vendor laptop stolen; nearly 70K affected

.

Encryption-SecurityScore-before-after

.

.

.

.

An unencrypted laptop belonging to a California health care vendor was stolen, leaving the sensitive information of thousands of patients at risk.

===> How many victims? More than 68,000. <===

.

.

.

.


US-Confetti-Scandal

.

US-Confetti-Scandal

US-Confetti-Scandal

.

[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.

“I’m just completely in shock,” said Finkelstein, 18. “How could someone have this kind of information, and how could it be distributed at the Thanksgiving Day Parade?” [End Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story]

.

.


Potentially Life-Threatening Apple Maps Flaw

Apple Map-potentially life-threatening issue . . . . .. .

.

.

.

.

[Start Text from FORBES]  Embarrassing defects in Apple‘s new Maps app may be inconvenient for some, but for others in Australia they could be deadly. [End Text from FORBES]

.

.

.

.

.

.


The VISA CARD Scam

.

VISA CARD Scam

.

The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:

.


Downloading from not trustful websites

programmerman2Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]

.

.

.


Game Hacks are dangerous

[Start Text from AVG]

programmerman2

.

In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.

==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==

While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.

===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===

.

[End Text from AVG]

.

Learn more:

.


Windows Users: check your PC for better Security

Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.

.

.

Find a detailed report about this fantastic tool from PC-MAG http://securitywatch.pcmag.com/none/305013-what-s-your-security-score.

===> Is there a FREE tool for encrypting my files and even the whole hard disk? YES, I suggest to install the OpenSource program TrueCrypt: <===


Apps, privacy and security

. Apps, privacy and security . Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:

Good example on how an App accesses your data below . apps thinglink

.

This App from ThingLink is one of the best examples of good practice as it doesn’t  access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage

===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===

.

Bad App Example

.

Read also:

  • Mobile app downloads doubling, privacy & identity risks rise
    • Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.

As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===

Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:


Be concerned about your Privacy while using Smartphones

Chat iconWhile using your Smartphone you probably send out more private data as you know, would like to and shouldn’t do! Read this story who should make you aware [Start Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101

Antivirus pioneer John McAfee, wanted for questioning as a person of interest in the murder of his neighbor in Belize, has been on the run from authorities ever since the incident occurred. Oops. Perhaps, when allowing reporters to taunt your pursuers with a headline like, “We are with John McAfee right now, suckers,” you should request that the Location Data is turned off on the phone[End Text from http://www.techrepublic.com/blog/security/john-mcafee-tripped-up-by-the-smartphone/8766?tag=nl.e101&s_cid=e101]

Here below some interesting links guiding you through on how to preserve your Privacy:

.


Naivety in the Digital Age, a Fact

Chat iconNaivety in the Digital Age means not realizing and accepting the dangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinking skills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!

.

.

.

Concerning download sites, here are the trustful download websites:

.

One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!

It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!

But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:

  • IT-Security and Cyber-Security:

===> Naif means ALSO thinking that a certain Operating System is secure and perfect! Nobody is perfect: <===

Check out also my curation here:

. .

In 21st Century Internet-Safety ALONE isn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!

Would YOU like to get called a naif because not having those skills?

Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…

Stay also tuned and follow my blog here to get the news:

.


Are You Safe From Cybercrime?

.

Cyber-Criminals[Beginning Text from Mashable] In our Cybercrime Series, presented by NortonMashable explores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]

Find out more:

.. .

Not so clever after all…man falls victim to IQ test scam

programmerman2A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.

After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.

Read the whole story here, you will get a big laugh:


And WHAT about Social Media publishing!???

.

It took me a really a while before I took the courage to post the following now:

Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudes from people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!

.

Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:

  • Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
  • SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((

..

A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉

.


 The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!


.Anything else which is important? YES, ICT Awareness!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:

.


KEYWORDS FOR THIS FREE COURSE AND WHAT YOU WILL LEARN:

Check out:

.

comp6_e0

YOU will learn NOT to be a naif and to see the reality!

Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. Aristotle <===

.   Take your time, please! There are a lot of information for some to learn; take it easy ;) .

.

 


..

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

. .

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 
28 Comments

Posted by on November 5, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Education, eLearning, Encryption, Europe, European Cyber Security Month, FAQ, FBI, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Worksheets, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Safer Internet Day 2014, Secure Surfing, SID2014, Skills, Social Engineering, Social Media, Students 21st Century Survival Guide, Technology Integration, TOR-Anonymat, Tracing, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,