RSS

Tag Archives: digital citizen

CitiZEN-Science: The PracTICE

CitiZEN-Science: The PracTICE

.

.


CitiZEN-Science: The PracTICE

Through the Maker-Movement and IoT (Internet of Things) there is already a LOT happening and different Networks are collecting Data through Sensors and make them available for everybody to have access and study them! Such sensors are e.g.:

  • Air Quality
  • Meteo
  • Street traffic
  • Radiation
  • People (counter) traffic
  • Water Quality
  • Wind velocity
  • Radar for excess of car speed
  • Inundation prevention
  • Observations on:
    • Nature (birds, etc.)
    • Archaeology discovering

Those, above mentioned  applications can even be assembled together and so being a precious source for communes and Governments! Mostly such projects are done with an ARDUINO and/or Raspberry PI based micro controller and a mini computer: The main difference between them is Arduino is microcontroller board while Raspberry PI is a mini computer.

Thus meaning: that fits perfect for the Maker-Movement and could GET integrated easily into STEM projects! 

Well, after following for a long time different possibilities on the How-To to get globally access to such IMPORTANT Big-Data for everyone, I found out THAT “The Things Network” is a perfect way! Please find below the address and the projects:

It is based on the “LoRaWAN“, check below, please, for more information:

Blog post will GET updated and/or new ones will get posted as it is a very interesting Movement! Stay tuned 😉

Meanwhile check the beginning of this blog post, please:

 

 


.

Key words necessary for me to create this blog post: CitiZEN-Science, STEM, MakerED, Maker-Spaces, PracTICE, LEARNing-By-Doing, TTN, The Things Network, Arduino, Raspberry PI, LoraWAN, SigFox (Low Power consumption…)

.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

 

 
1 Comment

Posted by on January 13, 2020 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Analyzing, Arduino, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Big Data, CitiZEN Science, Coaching, Coding, Collaboration, Collaborative Learning, Collective Intelligence, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Design Learning, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Electronics, Electronics Tutorials, Engagement, Entrepreneurship, Environment, EQ, eSkills, ESP8266, Ethical Mind, ethics, Europe, For a Better World, Free courses, Future Work Skills, Global, Global Collaboration, growth mindset, Holistic view of EDUcation in the future, Home-Work, HowTo, Innovation, Internet Of Things, IoT, Key Instructors, Leadership, Learning By Doing, Learning to Learn, LoRaWAN, Luxembourg, maker, Maker PracTICE, MakerED, MakerSpace, MakerSpaces, Modern EDU, Motivation, NodeMCU, Not ONLY rights but also responsibilities, Often Asked Questions, Open Mind, Personal profit, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Project Based Learning, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Science, Skills, STEM, Student Centred, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, The Things Network, TTN, understanding, Understanding the internet

 

Tags: , , , , , , , , , , , , , , ,

SID2020: Safer Internet Day 2020-Participation

SID2020: Safer Internet Day 2020-Participation

.


Safer Internet Day 2020 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020, with the strapline of ===> “Together for a better internet” <=== following the success of last year’s campaign.

 

 

Learning IT-Security


My participation for the SID2020

programmerman-animatedWHAT is special this year with my participation on SID2020? 

I created a ===> #GlobalCollaboration blog in 2017 <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitiZENship <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitiZENship (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from AustraliaUSAFranceLuxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2020 in Luxembourg/Europe:

Contributions de Gust MEES:   Publications sur le Blog de Gust MEES (in English) avec 202K (202.000) views
Digital Citizenship Global Education Collaboration Blog (in English),
Publications sur le Blog von Gust MEES (auf Deutsch),
Twitter Hashtag ===> #FSCD (Friday Security Check Day)
.
ALL the participation from BEESECURE for the SID2020 in Luxembourg:

 


Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2020 with my FREE courses here:

My English contributions:

Advice for Smart-Home:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2020 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2020 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

.

 

 
4 Comments

Posted by on January 6, 2020 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Advisory Board, Apple Malware, Awareness, Better Learning about ICT, Better Teaching, Botnet, Browser Vulnerabilities, Collaboration, Collaborative Learning, Collective Intelligence, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Global, Global Collaboration, growth mindset, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, Interviews, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Luxembourg and CyberSecurity, Mac Botnet, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Open Mind, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2020, Skills, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, understanding, Understanding the internet, Updates, Visual IT-Security, Vulnerabilities, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Luxembourg and Cyber-Security: HOW did it START?

Luxembourg and Cyber-Security: HOW did it START?

.

Evolution of Education: Wordle Logo

 

.


Luxembourg and Cyber-Security: HOW did it START?

HACKATHON LUXEMBOURG-2016.

Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.

.

Learn more:

First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:

 

1996: Creation of the CLUSSIL

Just a few months after the publication of the European Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) the CLUSSIL (CLUb de la Sécurité de Systèmes d’Information – Luxembourg) was created by 13 IT Security Specialists:
Jean-Marc Buchet, Jean-Marie Déom, Francis Durigneux, Hans-Werner Eiden, Sandrine Gallouédec, Carlo Harpes, Anne Hendrick, Claude Lenert, Bruno Mamer, August Mordijck, Yves Reding, Stephen Purser, Marc Schintgen.

1998: Gust MEES

First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).

2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.

2002: CASES

Personnes :

  • Serge Allegrezza – Directeur Direction de la Propriété Intellectuelle
  • Jean-Marie Reiff – Responsable OLAS
  • Henri Grethen – Ministre de l’Économie
  • François Biltgen – Ministre délégué aux Communication
  • Alexandre Dulaunoy – Consultant serveurs du monde du libre
    • Organisateur Hack.lu
    • Plus tard responsable CIRCL
  • Yves de Pril et William Robinet – CONOSTIX
    • Développeur du premier managed security system pour SME

 

2004-2007: MySecureIT 

Gust-MySecureIT

Click image to enlarge, please.

.

Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7ème” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.

2004: Gust MEES created the website http://www.internetmonitor.lu

2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)

04.02.2005: Lancement officiel de CASES

Le site web de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur. 

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

2005

Personnes

  • Etienne Schneider
  • Angélique Joyeux – rédaction français
  • Cyril Pierre-Bausse
  • Pour Telindus
    • Carlo Harpes
    • Cédric Mauny
    • Thierry Zoller

Le site de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

La version beta de l’outil de communication CASiX développée par CASES a été présentée et délivré à plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communauté et pour la communication avec le nœud national CASES. CASES a lancé une étude d’analyse des risques basée sur la méthode française EBIOS dans le Ministère de l’Économie et du Commerce extérieur, et ce en vue de formaliser une politique de sécurité pour le Ministère.

Lancement officiel de cases 04.02.2005

Première Hack.lu dans la chambre des métiers

Conférence sécurité pour PME dans la chambre des métiers

Début des formations MySecureIt

2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI

2006: Gust MEES

In February 23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

2006

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 4 octobre 2006, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectué sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.

Le Ministère de l’Économie et du Commerce extérieur a signé pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de Montréal dans le domaine de la sensibilisation des PME aux risques informatiques.

Les relations avec la Direction Centrale de Sécurité des Systèmes d’Information en France ont été intensifiées en vue de pouvoir conclure une entente de collaboration en 2007.

Le Ministère de l’Économie et du Commerce extérieur a, dans un effort commun avec le Ministère de l’Éducation nationale et de la Formation professionnelle, continué sa campagne de sensibilisation pour les enfants des classes de septième des lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une trentaine de classes.

2007-LUSI:

.

2007

Présentations et participation aux conférences

  • Au cours de l’année 2007, l’équipe de CASES a fait plus de quarante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le « Internet Security Day » , et à l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es écoles primaires et secondaires luxembourgeoises.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale HACK.lu. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants. À cause des attaques de type phishing, CASES a organisé un workshop tenu par l’organisation hautement renommée AntiPhishingWorkingGroup.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministèrede l’Économie et du Commerce extérieur, du Centre Informatique de l’État, de la Représentation Permanente du Luxembourg à Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a organisé un stand à la Belle Étoile pour le Safer Internet Day, une initiative de la Commission européenne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a été accueillie et plusieurs classes d’école sont venues faire leur permis web.

  • Une campagne contre le cyberbullying (harcèlement via les nouvelles technologies de l’information et de la communication) a été lancée en forme de projet pilote dans un lycée du Luxembourg. CASES a réussi à motiver tous les opérateurs de téléphones mobiles, le ministère de l’Éducation nationale, la Police grand-ducale, le Parquet, l’Université de Luxembourg ainsi que le projet www.lusi.lu à s’investir dans le projet et à trouver une réponse à ce nouveau fléau.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations expliquant comment faire du commerce électronique sécurisé. Grâce aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invité sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).

Le site Internet www.cases.lu

  • De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont été publiés sur le site de CASES. Plus de quatre-vingt alertes ont été mises sur le site pour avertir les internautes de vulnérabilités critiques ou importantes. La version allemande du site a également été lancée en 2007. CASES est aujourd’hui un des portails publics les plus visités au Luxembourg.

  • Deux permis web ont été conçus et mis en ligne. Le premier http://pwws.cases.lu est destiné aux enfants et vérifie leur savoir-faire dans plusieurs domaines du cyber-mode. Après avoir passé le test avec succès, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vérifiant les bons reflexes nécessaires pour faire du commerce électronique en toute sécurité a été publié sous l’adresse http://epass.cases.lu.

  • -Des conseils spécifiques pour le commerce électronique sécurisé ont été publiés sur le site de CASES. Un “flyer”commerce électronique a été rédigé et sera mis à disposition dans les guichets de banques dès début 2008.

Les collaborations de CASES

  • CASES, ensemble avec le CERT luxembourgeois, a aidé plusieurs banques de la place ainsi que l’ABBL à réagir de façon coordonnée contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin août 2007. PREMIERES attaques de type physhing.au Luxembourg.

Un projet pilote qui a pour but d’établir de bonnes pratiques sécuritaires au cœur des maisons de jeunesse a été lancé en collaboration avec le Service National de la Jeunesse et le ministèrede la Famille. Le but est de sécuriser le réseau informatique des maisons de jeunesse et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour adolescents.

  • CASES a contribué à l’élaboration d’un guide de bonnes pratiques pour la mise en place de réseaux sans fil dans des locaux publics. Le but de ce guide est de sécuriser le réseau sans fil et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour les clients. WiFi sécurisé

  • CASES a entamé une coopération avec le nouveau service de la DCSSI française en matière de sensibilisation du grand public.

  • CASES a été élu parmi les projets phares du domaine de la sensibilisation en Europe et a été invité pour la troisième fois de suite par l’European Network and Information Security Agency (ENISA) à faire une présentation sur le fonctionnement du projet.

  • CASES a, au cours des dernières années, su acquérir plusieurs partenariats avec des organisations étatiques étrangères ayant les mêmes missions de sensibilisation.

Projet CIP – Critical Infrastructure Protection La Direction du Commerce extérieur et de la Sécurité informatique a lancé, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont été élaborées. Des principes d’établissement du glossaire contenant les définitions et abréviations utilisées à travers tous les documents du projet ont été définis et un glossaire a été rédigé. Un schéma de classification selon trois dimensions (confidentialité, intégrité, disponibilité) avec plusieurs classes par dimension et règles de sécurité a été conçu et publié sur le site de CASES. Ce schéma servira de base pour un schéma de classification interne aux organisations. Il est destiné en premier lieu à créer un cadre pour l’échange d’informations entre le ministère de l’Economie et du Commerce extérieur et les opérateurs CIP. Finalement une cartographie des menaces a été rédigée.

Projet de mise en place d’un CSIRT gouvernemental

La Direction du Commerce électronique et de la Sécurité informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sécurité de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sécurité informatique fournira les services suivants aux entités gouvernementales:

  • gestion et réponse sur incidents,

  • veille technologique,

  • bulletins d’alertes et d’avertissements,

  • point de contact et de coordination national pour toutes questions du domaine de la sécurité de l’information.

Dans le cadre du projet CSIRT, la Direction du Commerce électronique et de la Sécurité informatique a participé aux réunions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de développer des partenariats importants pour la suite du projet.Démontrant sa forte implication dans le domaine CSIRT, le ministère a co-organisé et hébergé la formation TRANSITS (formation spécialisé CSIRT, effectué par TF-CSIRT, et unique dans sons genre) au Luxembourg.

Projet Politique de Sécurité

La Direction du Commerce extérieur et de la Sécurité informatique a commencé à rédiger une politique de sécurité basée sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sécurité des systèmes d’information. Une vingtaine de politiques ont été rédigées, les procédures y référant sont rédigées au cours de l’année 2008. Ce projet vise premièrement à réaliser une politique de sécurité pour le ministère de l’Économie et du Commerce extérieur et, deuxièmement, à donner aux autres Ministères et administrations intéressées un guide de mise en place.

2008.

2008: LISA Stopline started 2008

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((

Knol-Author-of-the-week

Through the way-back-machine web.archive.org I found back some stuff:

2008

Au cours de l’année 2008, l’équipe de CASES a fait plus que cinquante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et à l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministères et administrations luxembourgeoises.

  • CASES a su réaliser l’exploit de former dans l’année scolaire 2007-2008, les enfants des lycées classiques et techniques fréquentant les classes de 7 ème au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont été réalisées. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet.CASES a aussi réalisé une dizaine de soirées d’informations pour parents d’élèves.CASES sensibilise aussi aux risques d’arnaques sur Internet.

  • CASES a participé au salon de l’éducation organisé par la Ville de Luxembourg et à la journée “Summer –Spill a Spass” organisée par la Ville de Dudelange, aux ateliers pédagogiques du Lycée Marie Consolatrice à Esch/Alzette. CASES est intervenu lors des journées pédagogiques de la Banque de Luxembourg et a participé à la “e-City roadshow” organisée par la Ville de Luxembourg. CASES a activement participé au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” à Contern et aux “Journées du livre” à Bascharage.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale “HACK.lu”. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministère de la Fonction Publique et de la Réforme administrative, Trésorerie de l’État, Centre de Logopédie, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a su réaliser un partenariat avec “Le Luxemburger Wort”. CASES a publié chaque semaine un article de sensibilisation dans ce journal de très grande couverture. Ainsi plus de quarante articles de presse ont été publiés.- Dans le cadre de la coopération avec le “Luxemburger Wort”,

  • un test de “Wardriving” a été réalisé dans la Ville de Luxembourg. Ce test a démontré que la sécurité dans le domaine des réseaux sans fil est déplorable.

  • – CASES a contribué à une dizaine d’émissions radio sur 100,7.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sécurité a été proposé avec un très grand succès. Lors de la foire d’automne, une campagne de sensibilisation aux risques liés à “Bluetooth” a été réalisée.

  • Une enquête sur les performances du social engineering a été réalisée en partenariat avec l’Université de Luxembourg. Lors de cette enquête, il a été essayé d’inciter les personnes questionnées à donner leur mot de passe. Plus de 1000 personnes ont été questionnées. Un rapport détaillé a été publié sur le site de CASES.

  • – CASES a lancé le label “suivant les réflexes CASES”. Une première déclinaison de ce label a été réalisée avec le label “WiFi sécurisé” qui a été attribué, après audit, à 3 sociétés sur 6 sites

Projet Politique de Sécurité

  • CASES a, ensemble avec le ministère de la Famille et le SNJ, réalisé un projet d„envergure pour mettre en sécurité les Maisons de Jeunes. Une politique de sécurité ainsi que des guides de bonnes pratiques ont été réalisés.

  • En collaboration avec le ministère de l’Éducation, un projet pour la mise en sécurité des Écoles primaires a été entamé. Deux projets pilotes ont été entamés.

  • Un projet de mise en place d’une politique de sécurité a été lancé en 2008 au sein d’une administration gouvernementale

 

2009

CASES a su réaliser l’exploit de former dans l’année scolaire 2008-2009, tous les enfants des lycées classiques et techniques fréquentant les classes de 7èmeau Luxembourg. Beaucoup de classes primaires ont été formées, et ce à partir de l’âge de 9 ans. En tout CASES a sensibilisé les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet. CASES a aussi réalisé une vingtaine de soirées d’informations pour parents d’élèves.

CASES a participé au «Kannerstaat» de la ville de Junglinster.

CASES a publié un support scolaire, destiné aux instituteurs et aux parents. Ce livre vise à fournir les informations nécessaires pour pouvoir éduquer les enfants dans différents domaines liés à la sécurité de l’information. LEITFADEN

Collaboration avec le DNR

NACKT im NETZ

2010

  • Campagne brosses à dents
  • Création de smile GIE

 

2010: BEESECURE

Le ministre de l’économie Jeannot Krecké a présenté le 8 novembre 2010 BEE SECURE, un projet commun du Ministère de l’Economie et du Commerce extérieur, du Ministère de la Famille et de l’Intégration et du Ministère de l’Education et de la Formation Professionnelle.

5 Jahre sind im Internetzeitalter ganz schön lange und für BEE SECURE auf jeden Fall Grund genug, Partner und Unterstützer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.

So versammelten sich am 9. Oktober rund 100 geladene Gäste im Forum Geesseknäppchen, wo allerhand „Requisiten“ der letzten fünf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.

Annual Reports BEESECURE – Starting 2010

 

2011

Analyse des risques

2012

Stopline

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2012

My.cases.lu

 

May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com

 

2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD <===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.

2013

higher-education-tech-blogs-2013-Doug PETERSON.

Gust MEES got interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.


More to come here, lots of research necessary… Meanwhile follow the following articles (curation) and links:


2017: 

Cybersecurity week in October:

 

.


2016: WHAT is done in the country!? WHICH actors are helping to boost Cyber-Security!?

There are more and more companies and organisations offering courses about Cyber Security, such as:

 


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

.

 

.

Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,

.

 

 

 
Leave a comment

Posted by on November 22, 2017 in 21st Century Skills, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, European Cyber Security Month, History, History of the web, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning about Social Medias, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Phishing, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, PUPs, Quality Courses, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2014, SID2015, SID2016, SID2017, Skills, Skype insecurity, Smart TV's, Social Engineering, Social Media, Spam, Synthesizing Mind, Teacherpreneurs, Third Party Applications, TOR-Anonymat, TU-DRESDEN

 

Tags: , , , , , , , , , , ,

PracTICE: Learning To Learn-Digital CitizenShip

PracTICE: Learning To Learn-Digital CitizenShip

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Authentic PracTICE Through Global Collaboration

GUST-AVRIL2014-800px-2[GM] The authors of this blog post “@ICTPHMS (Dan KIRSCH‘s Blog)” and “@knolinfos (Gust MEES‘s Blog)” have met each other on Social MediaTwitter” and decided one day to work together on a common blog about “Digital CitizenShip“, a “Global Collaboration” from authors of the USA and Luxembourg (Europe) was born. Find below, please, OUR collaboration blog:

.

[GM]: below, part of the discussed on twitter

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style whereTHEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <===

.


WHY do WE use a bunch of different so-called tools to LEARN about Digital Citizenship?

Please check the below picture, who explains 😉

.

Synthesizing Mind-5 Minds for the future

.

I will let “Dan KIRSCH” explain to YOU in detail about WHAT WE were working together

.

[DK] Dan KIRSCH‘s insight

Dan KIRSCHI have utilized the collaboration with Gust via twitter on the topic of Digital Citizenship within my 8th grade ICT classes. Currently, I am teaching 3 classes with approximately 30 students in each. One of our curriculum standards is to teach Digital Citizenship/Internet Safety. I began to investigate different ways of teaching this to my 8th graders where it could be authentic and actually “practice what is being taught“. Through collaboration with Gust and other social media colleagues on twitter I began to utilize blogging (Edublogs) as a platform to teach Digital Citizenship.

Each student has their own blog, which is contained under my class blog. In this platform, we treat our blogs as our “social network” where students comment on blog prompts given by me or themselves containing information on Digital Citizenship, real-life scenarios, and social media. It is also used to teach other “edtechskills; such as inserting media, using embed code, and RSS Feeds. This is the fourth year I have used edublogs and I enjoy reading what my students produce; especially the reflections and connections they make with one another.

It’s amazing to see how students communicate via the technology “more” than they would face to face; especially on how to become a positive Digital Citizen! Recently, I have begun to archive their posts on to storify (with no last names) to use for future classes you can access this via my edublog: http://mrkirsch.edublogs.org


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


New Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 18/02/15

.

Understanding what your digital footprint says about you. The following blog post (prompt) ==> check link here <== was given to my 8th grade students as a more interpersonal digital citizenship reflection. The previous posts have been more focused on the “broad” perspective of Digital Citizenship and what it is ==> what it means. <== The objective was for students to take an interpersonal “look” at themselves and reflect on the ==>HOW TO<== become & maintain a positive digital footprint as they progress through their high school years,  and into college. My goal as their ICT instructor is to make students  realize that once they enter college and are “away” from parents/guardians peer pressure can and often times does involve them in negative way. The point is ==> teaching students to be aware of this now they will be able to think twice before they “make the choice” to share/post negative material on the internet/social media, which in return could damage their “digital footprints.”


Post: 06/02/15

capture

Student example as seen on mrkirsch.edublogs.org of Digital Citizenship.

Teaching Digital Citizenship Through Comics

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students created comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The following link is a curate blog reflections from my students on Digital Citizenship/Internet Safety. This was a “lead-up” activity to the comic strips seen above. The curation tool I utilized for this is Storify.


Teaching with Content Curation (added February, 3, 2015)

Content curation is the “…process of collecting, organizing and displaying information relevant to a particular topic. Teacher content curation can be used by students and students can be asked to show expertise with examples of curation.” In my 8th grade ICT class we will be completing webquests on content curation as a teach method of introducing students to “Content Curation.” The following text reviews what content curation is and it’s purpose, along with several content curation platforms, what a webquest is, and followed by a lesson plan I will use in my classes. 


Storify:

  • create stories or timelines using social media such as Twitter, Facebook and Instagram.

Flipboard: 

  • Flipboard.
  • .
  • Flipboard is your personal magazine.
  • It’s a single place to discover, collect and share the news you care about.
  • Add your favorite social networks, publications and blogs to stay connected with topics and people closest to you.
  • .

.

Scoop.it!

  • Build engaged audiences through publishing by curation.
  • Think of it as a way to build content.
  • You can bookmark and share your sources.
  • Can be used to increase your authority on a topic. 

Paper.li

  • Automatically find, publish & promote engaging articles, photos and videos from across the web
  • Display Content Marketing Information.
    Capture

Introduction into Content Curation

What is Content Curation?

Content curation is the “…process of sorting through the vast amounts of content on the web and presenting it in a meaningful and organized way around a specific theme.  The work  involves  sifting, sorting, arranging, and publishing information.”  A content curator picks the best content that is “…important and relevant to share with their community (in the case our class community). It isn’t unlike what a museum curator does to produce an exhibition:   They identify the theme, they provide the context, they decide which paintings to hang on the wall, how they should be annotated, and how they should be displayed for the public.”

Content curation is not about collecting links or being an information pack rat, it is more about “…putting them into a context with organization, annotation, and presentation. Content curators provide a customized selection of the best and most relevant resources on a very specific topic or theme” (in this case ours will be on Digital Citizenship, ICT, and Educational Technology). A content curator “…continually seeks,  makes sense of,  and shares the best and most relevant content on a particular topic online.”

Why is Content Curation Valuable?

Individuals and organizations are making, sharing media, and content all over the social web.   For example, on Facebook the average user creates 90 pieces of content each month.  If you “…multiply that by the 800 million Facebook users,  it isn’t surprising that  data or content on the Internet is  measured in billions of gigabytes.” Essentially, we are living an era of content overload!!! A content curator offers high value to anyone looking for quality content because finding that information (and making sense of it) requires more and more time, attention, and focus.

For individuals and organizations, content curation can help establish their “thought” leadership and capture attention in today’s information “overloaded” world.    Content curation can “…help your organization become the go-to authority on an issue or topic area.”   It can be done as simply as writing a blog post (this is excatly what we will be doing with our edublogs in my classes) with links or sharing annotated links on Twitter around your topic.

capture

.

Getting Started

This questionnaire (citation on pic) can help you think through a plan for content curation before you dive into the curation tools.  There has been an explosion of tools and you can distracted by useless features.    Even better, “… perhaps focus on the skills with the tools you know how to use already.”   You might want to integrate the process of content curation into a channel you’re already using (in my class students will be including this within a category on their blogs).

Citation:
Kanter, B. (n.d.). Beth’s Blog. Retrieved January 14, 2015, from http://www.bethkanter.org/


[DK] Please check the link ==> Content Curation Lesson Plan  to access my recently created content curation lesson plan for my 8th grade students.  This lesson plan is posted for colleagues in my PKM to access. 

[DK] Great twitter chat archive on Digital Citizenship via @mrkempnz & @BevLadd (7/5/2015) curated on storify.

[GM] Through curation one can build up ALSO its own “Personal [Professional] Knowledge Management” (PKM), please check below:

Through curation and using Twitter one builds up ALSO a “PLN” (Personal Learning Network), please check below:

.


 Creating a Webquest

programmerman-animatedWebquests are useful teaching tools for educators. An imaginative webquest can capture the attention of a student as he or she learns about any number of topics. For instance, I have chosen to use my classes edublogs as our webquest platform where we can incorporate curated content on Digital Citizenship.

A teacher who wants to bring his or her own webquest ideas to life must make a detailed plan. Some teachers begin by choosing a web quest template. There are online resources available that outline the specific elements of a webquest. For example, a webquest has an introduction that explains its purpose to students. A webquest also includes a task that lets students know what they are expected to do. Next, the process sets out a path for students to follow that leads them to relevant information. Those are just a few of the steps that a teacher needs to fulfill in order to make an effective webquest.

==> Mr. Kirsch’s Sample Content Curation Webquest <==


Teaching with Content Curation Lesson Plan

  • Focus Question: Do students know where to get quality information from the Internet?
  • Additional Questions: 1. What resources do teachers need to find quality information on the Internet (i.e., content curation)?
  • 2. How should the Internet be used in the classroom?

Lesson Goals/Objectives: To get students to think how to best use the Internet in their classroom.

Activity Description:

  • Spend time discussing the basics of Internet searches (e.g., have students with more experience help others). See Evaluating Websites from the University of California Berkley in Resources. Talk about Search engines and other ways to find information (2nd and 3rd tier investigation).
  • Create a webquest (using our edublogs) and have students write about what sites they come up with using our “curated content.”
  • Have the students support why their “curated content” was appropriate for this lesson within their blog posts.
  • Students will then be assigned a topic (social media, educational technology, digital citizenship, and/or online security) to begin their curated content. Once content as been established and shared via WordPress or social media the students will then blog (webquest) about their thoughts on curated content.

In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.


How To Design A Course About Digital CitizenShip?

Please check below, on How-To YOU could create YOUR own course, based on PracTICE AND student centered:

.

METRO-DigitalCitizenShip-Gust MEES-2015

.

.


 THE Whole FREE Course On ONLY One Interactive Image

Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉

.

ScreenHunter_07 Feb. 09 00.15

.

.


Using A Flowchart To Design The Course

Check below, please, to find out the how-to.

.

FlowChart-Final-Version

Click the above image, please, to display it larger.

.


THE Whole FREE Course Using FlowCharts On ONLY One Interactive Image

Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉

.

FlowChart-Final-Version-ThingLink-Version

.

.


 Related links

.

Sci-Tech Today

↑ Grab this Headline Animator

.

book-question-markPlease find below related links to the discussed above, such as:

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.

.

Keywords necessary to create this blog post: @ICTPHMS, @Knolinfos, collaboration, Global Collaboration, Education, Global Education, TRUST, #digcit, Digital CitizenShip, digital citizen, Cyber-Security, Internet-Safety, Best Practices, Learning To Learn, Learning By Doing, Student centered, Coaching, #EdTech #tools, #esafety, #blogging, ICT, #edblogs, authentic practice.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge to be on my school districts ICT curriculum committee. We are rewriting and updating our ICT curriclulum in grades 6-8 for the 2015-2016 school year.

.

You can find me also on:

.
.
Stay tuned for next blog posts 😉
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphonestablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

.

Evolution of Education: Wordle Logo

.

This is the second blog about “Blogging” and in the first one ===> PracTICE: Using Blogs for Critical Thinking and Proactive Thinking <=== WE were talking about WHAT would be the BEST way to introduce the students (learners) to blogging. NOW, lets go for a practical example where the teachers (educators) tell the students (learners) to create a blog on a specific topic. It should be a topic WHERE there will be a lot of engagement from the students and from WHAT they would get a maximum out of ICT SKILLS, creativity, use of the technology (camera, smartphone, photo camera…), Social Media knowledge, communication, Social Learning, preparation knowledge, privacy knowledge (not publishing blog…), working in a team, collaboration

.

SO… WHAT could that be for a topic? Well, I think that something everybody could do is to write a blog about WHAT any single person makes probably different, ===> WHAT are WE eating at home? <===

sharing-iconOf course, if someone of YOUR students (learners) OR parents don’t WANT and allow to use that topic, leave it FREE to them to chose another topic! Make sure ALSO that the parents sign a paper that they agree with such an action as it goes into PRIVACY!

Other possibilities could be: pet, sport activities, reading (my books…), games (games which I play…), my hobbies (some have more than one hobby…), my friends hobbies… Talk to YOUR responsible psychological person in YOUR school, in case if YOU have kids with problems to find out WHAT could be the BEST way to get THEM also ===> engaged in that learning process <===

.

OR perhaps about an excursion which YOU made with the students, I recommend to visit my following blog to find out about the possibilities:

.

Have a look below, please, how this could look. I prepared myself a blog about what’s served on a table in Luxembourg (Europe), to give YOU an idea:

.

Depending in which country and/or state YOU are living, this could cause problems as well because of social status and privacy and certain parents wouldn’t allow such actions (NO one needs to know what’s happening in our family…)… Feel FREE to prepare a form which YOU handle out to the parents to hear THEIR opinion about it and tell THEM that THEIR kids (students, learners) are NOT forced to apply to it and could use another topic as already mentioned above… YOU will NEVER get a 100% agreement, BUT YOU could make the project a worth way to create together a project THAT shows the different ways HOW people THINK and HOW to show THAT it is STILL possible to create a COMMON project WHERE people are working together!

YOU will face the problems of REALITY from the REAL-WORLD by using the possibilities of the VIRTUAL-WORLD and YOU will be able to discuss these problems as well with YOUR students (learners) ===> Critical-Thinking and Proactive-Thinking… <=== Do YOU have this courage!???

Explain THEM also WHY it would be a good idea to agree to that project because of:

  • Students would work together to exchange about life, about the REAL-WORLD…
  • Students will learn from each other about different ways of life…
  • Students will learn how to use their smartphones and how to blog, learning about Social Media, blogging, getting 21st Century skills, how to combine smartphones, tablets, using THEIR creativity, working in a team, how to edit and correct photos for BETTER quality
  • Students will learn how to stay private while using blogs, securing their privacy so, because the teacher (educator) WILL FIRST HAVE A LOOK ON IT AND GIVE ADVICE before publishing the final version…
  • Students will learn to accept each other whatever their social status is…
  • Students prepare first THEIR own blog and than later a selection of the photos from each student will get used on THE COMMON COMMUNITY BLOG, where the students write also THEIR experience to document it…

.


The needed Tools And Services-The Preparation

.

ruotadentata2architet01First of all, WE need a FREE blogging service. I recommend WordPress as it is very easy to use and as it allows the students to chose from a variety of templates, so each student could use its own template to show its creativity. Then WE need ALSO an easy to use and a multi-platform (any OS compatible) PHOTO-EDITOR, where I recommend PHOTOSCAPE for Windows users ONLY, and GIMP (Windows, Linux, Mac) see below the links:

.


Keep It Private Till Everything Is Checked In Depth

.

Private publishing in WordPress.

.

As already mentioned above, students blogs should get kept private, WordPress offers this (check left hand screenshot) till the teacher(s) checked them in depth to make sure that their isn’t any privacy problem such as:

                    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
                    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
                    • WHAT is Geotagging?

.

.

.

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data!

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.


Useful Tips For Creating Blogs

.

book-question-markTo make sure for NOT loosing the topic of the created blog(s), I suggest to add at the bottom some reminder, the keywords which explain about WHAT the blog should be and ALSO the guideline for the students (learners), as shown below.

.

===> create blogs private, teacher checks blog & discusses with learners in a group, photos will get later ALL published in one blog as a TEAM blog, blog will get used with other students on a global view, like Skype, global exchange of habits to know each one better, social global approach… <===

.

This blog was created to make YOU THINK, to know about possible problems, to make YOU Critical-THINKing persons and Proactive-THINKing persons, use it as such, please 😉

.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SO, What’s THE CHANGE For Teachers In 21st Century Education!?

SO, What’s THE CHANGE For Teachers In 21st Century Education!?

.

Evolution of Education: Wordle Logo

.


SO, What’s THE Change For Teachers In 21st Century Education!?

.

sharing iconThis is a general overview only to explain in simple words:

I get asked very often and get also a lot of discussions with people and also teachers about what’s THE real CHANGE in 21st Century Education and especially for teachers, even that MOST people tell me that “THE CHANGE” is very difficult to understand! BUT it’s actually very easy to understand, BUT it needs to get accepted from the teachers! This is my point of view, let me explain, please:.

What really changed for teachers is the way they will teach the students, THEY are NOT anymore “THE BOSS” in the classroom, ===> THEY are NOW a coach! <=== Someone who is guiding the students (learners) in THEIR way of learning and showing THEM how to learn and to deal with the BIG DATA on the Internet! It is NOT anymore a classroom of silence, it is a classroom where learners sit together in groups to solve problems in a team, solving the problems and learning together with the skills THEY acquired through previous teaching lessons.

It’s NOW ===> Us and THEM <===, WE try to work as a team for getting BEST results, it is NOW learner-centered! WE as teaching persons are NOT anymore THE most important one, BUT WE change THE way how WE are TEACHING and WE focus on what OUR mission is: giving OUR learners (students) the BEST Education to face the REAL WORLD outside of the “School-Cocoon“, thus meaning: WE need to know what the skills are that the REAL WORLD needs!

.

students-workforce

Image source: Prepare Learners for the Global Workforce

The teacher is NOT anymore in front of the class, BUT s(he) is together with the learners in the classroom. WHERE the term CLASSROOM needs to get redefined!

=> THE CLASSROOM is not anymore inside the schools, ===> NO “School-Cocoon” anymore! <=

 ===> THE WALLS are broken and Teaching and Learning takes part everywhere, outside the “OLD definition of CLASSROOM”! <===

It is ALSO the WE as WE are looking for a win-win situation between OUR learners and us as teachers, WE try to get out the BEST “Team-Work” as it is that skills are needed in the REAL WORLD from the employers! Students (Learners) should know about “Team-Work” as they will face it once out of school and being employed!

The biggest mistake teachers actually make is thinking that by using the newest educational ICT tools and technical devices will make them a 21st Century teacher, NO ===> NOT AT ALL!

[Start Text from: Don’t Confuse Technology With Teaching] Educators are coaches, personal trainers in intellectual fitness. The value we add to the media extravaganza is like the value the trainer adds to the gym or the coach adds to the equipment. We provide individualized instruction in how to evaluate and make use of information and ideas, teaching people how to think for themselves. [End Text from: Don’t Confuse Technology With Teaching]

THIS ALL needs a serious up-to-date of Professional Development! Check below for more information about PD, please:

.

21tCentury-Pedagogy-Assessment

Image credit ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Simple+%28Not+Easy%29+Pedagogy+Assessment

.

.

Learn more:

.

Check out ALSO these SlideShare examples, great stuff:

..

Check out this Infographic, please, which explains BEST for understanding:

.

Morphing into a 21st Century Teacher

Infographic credits: http://edudemic.com/2013/04/27-tips-for-becoming-a-digital-teacher/

.


Important to know: The Difference Between Contemporary And Traditional Learning

Check the infographic below who explains very well, please:

.

teaching-learning-style-comparison

Click image to enlarge! Image credits: http://edudemic.com/2013/03/contemporary-and-traditional-learning-difference/

.


How to know which skills the market needs!? 

.

book-question-markThat is also something I get very often asked: WE don’t know about the future jobs as every day NEW ones getting created emerged by the ICT and especially because of “Social Media“, so how to know about what to teach!?

That is certainly a well founded question and needs to get answered a bit differently by applying Howard GARDNER‘s view in his book “5 Minds For The Future“, see screenshot below, please.

.

5 minds 4 the future

.

By reading the above, I think the question is answered very well and with your pedagogical background you will know how to adapt your courses to it! OR??? Perhaps ALSO revising what you learned before you got your diploma, a little refresh of knowledge helps also…

Check out also my multilingual book selection (EN, FR, DE):

.


It’s about the learning, not the tools

.

iste-standardsLots of teachers have misunderstood what a 21st Century teacher should be and are doing nothing else as using the new educational tools, which is NOT the right way, sorry! The tools ONLY help making the courses more engaging and also more fun for the learners when well applied. They are necessary, BUT it is STILL the updated pedagogical knowledge of the teacher who is more important!

[Start Text from EDUDEMIC] However, if teachers change their approach to focus on transferable technology skills (i.e. the NETS-S) it will make the integration of technology more meaningful and prepare our students with skills they can take with them in the future.

The International Society for Technology in Education (ISTE) has developed a set of “standards for learning, teaching, and leading in the digital age that are widely recognized and adopted worldwide.” Those standards, known as the National Education Technology Standards (NETS), have several benefits including:

  • Improving higher-order thinking skills, such as problem solving, critical thinking, and creativity
  • Preparing students for their future in a competitive global job market
  • Designing student-centered, project-based, and online learning environments
  • Guiding systemic change in our schools to create digital places of learning
  • Inspiring digital age professional models for working, collaborating, and decision making.

[End Text from EDUDEMIC]

Read the complete article here, please:

.

And as I was talking ALSO about the “updated pedagogical knowledge“, known also as “Professional Development“, check here, please, to find out if YOUR PD is up-to-date:

..

Another BIG mistake is to focus ONLY on Apple devices and Apple resources in schools, such as iPad and iPhone Apps and more… Teachers like to play with them and students certainly also, BUT:

  • There are more employers who use Windows machines than Apple machines worldwide and the students need first the knowledge and the skills to work with that “Operating System” (OS)!
  • Once out of school and applying for a job, these “Windows Skills” are a ===> MUST to get a job!!! <===
  • NOT every employer allows a “Bring Your Own Device” (BYOD) strategy inside its company for different reasons, mostly for Cyber-Security reasons!

.

Check also these articles, please:

..


Social Media As Well Is NOW Included For Teaching And Learning

.

First of all, let us take a look about what “Social Media” is, watch the video below, please:

.

.


Why Social Media Should be Taught in Our School Systems

.

sharing-iconSocial Media (Twitter, Facebook and…) is part already of commercial strategies in most companies worldwide and if not yet it will be as companies must follow this trend to stay competitive! SO, the students (learners) need to have these “Social Mediaskills as well to be able to use them later in their future working place(s)!

.

I think the BEST way to explain it is to check my curation of professional articles, read them, please:

.


What are the trends in 21st Century Education?

.

As a good introduction, I think it would be good to watch first this video:

.

.

What are the learning futures? Check below:

.


BUT How Could I Follow With My Professional Development!?

.

sharing-iconFirst of all check out what is offered from your Education Ministry and then you might check my blog to find out what is needed to complete your PD:

.

If you are a self-learner, an autodidact, I suggest to you to use Twitter together with Curation and trying to build up a “Personal Learning Network” (PLN) and to participate on Twitter-Chats.

A very good practice would be ALSO to invite teachers who are NOT YET ready for the 21st Century Education in a classroom as an observer for learning together with an experienced teacher and giving him ALSO the right to teach, the moment s(he) wants to say something when the experienced teacher is giving the course(s)! This needs to get briefed before the course(s) start… This would made him (her) feeling part of it and encourage also…

.

Watch the video below to listen what the experts say:

.

..

Find the explications here:

.


What are the barriers to overcome for that THE CHANGE happens?

.

1ibdy1vf6wghd-n05dgl-aigainformation1Without a lot of talking myself, I invite you to read the following articles which explain  at its BEST:

.

Quote from [https://twitter.com/kimgarst] “If you don’t leave your past in the past, it WILL destroy your future. Live 4 what today has to offer, not for what yesterday has taken away.

.


Final Word

.

This is what I see as THE CHANGE with my actual knowledge, but if YOU dear reader have some more information, feel free to leave constructive comments, suggestions and even constructive critics…

Of course there are ALSO the Parent-Teachers meetings and other changes, BUt I wanted to show ONLY the changes for the teachers who are THE CHANGE for the mind… Once accepted these changes in the mind, it will take some time to adapt

.

.

Stay tuned for next posts 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

. .

Learning IT-Security

.

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn…

.

.

.

Keywords for this free course:

.

motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.

.


WHAT is The Pedagogy Of Education 3.0 And WHY Should WE Embrace It?

To make it very short, WE SHOULD embrace it as “mLEARNing” has more positive aspects as negative ones, please check below…

.

Education 3.0 and the pedagogy of Mobile-Learning

 

Click here to go to the original article ===> http://fr.slideshare.net/jgerst1111/education-30-and-the-pedagogy-of-mobile-learning <===

.

Check also my “Curation” about Mobile-Learning (mLearning):

.


What Teachers + Educators should learn about BYOD

TeacherMost of articles, blogs and Tweets written by educational people are showing the advantages of “Bring Your Own Device” (Hashtag for Twitter = #BYOD) and they embrace very well BYOD, which I do also; but…

.

There are some more things to consider such as:

  • A BYOD Policy in the campus, school…
  • Prepare for BYOD in your organization, thus meaning: training for ALL!
  • MDM: Mobile Device Management
  • Internal IT-Security Infrastructure
  • A special IT-Security Insurance

Read my complete curation about BYOD it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD where you will find also best articles and blogs who describe at it best what BYOD is as well as blogs from teachers who explain the benefits for Education…

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

Responsability as eCitizen (Digital Citizen) for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

.

.

Principals: did you also think about your Schools, University reputation!? Imagine that there will be a data-breach, the Press would talk about and your reputation then!? You need to get protected by having a strong BYOD-Policy and a strong IT-Security infrastructure, think on that please…

Read more:

.

.

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST 😉 <=== 


Suggestions for a good BYOD Policy

.

BYOD

.

..

.

We need to know and to understand first that “Nobody Is Perfect”, no OS (Operating System) is 100% secure and there are vulnerabilities present, which need to get updated asap! This is not ONLY the IT-Admin’s task and responsibility, but our own responsibility!

.

.

Read also:

.

 

 

BYOD is becoming a prevalent Information Security and IT Focus

Image source

..

.

===> There is a need to for a healthy Cyber-Culture, a Cyber-Hygiene introduction for a more secure Internet! Read more: Cyber-Hygiene <===

.


Why our responsibility?

.

Question mark iconThe IT-Admin’s responsibility is to keep secure the School’s Network and to keep it safe from Malware and attacks; if it’s a good IT-Admin with good IT-Security knowledge he will even block infected devices to access the school network, that’s his good right! So imagine that you give courses with BYOD Infrastructure and some devices are infected and the IT-Admin blocks those, your course couldn’t get held as not all of your learners can access the school network, not funny at all that situation, isn’t it?

.

Check the complete slideshow here

My suggestions to prevent this is to organize a weekly security day in school for any class where the learners together with the teachers control their devices for latest updates and antivirus updates to make sure that they all are secure and don’t represent a danger and risks for the school network! Check the image below and read also the complete report from McAfee…

.

Total Mobile Malware Samples in the Database

McAfee Threats Report: Second Quarter 2012 

I suggest also that some teachers with good IT-Security knowledge create a “Security Club” in school where they train the learners about “IT-Security” to become “Security Scouts“, people with good IT-Security knowledge who can help others to stay secure. You will build up a secure community and the “Security Scouts” will be proud about their title and their responsible function. YES, responsibility that’s the right word which needs to get spread! In 21st Century Learning IT-Security and Internet-Safety are a MUST and should get maintained! Give a help to create the new 21st Century Heroes, the “IT-Security Scouts“!

Find below my blogs and other resources on How-To:

.

  1. IT-Security Scouts
  2. 5 minutes tutorials on How-To get smart about IT-Security
  3. BYOD in education–TechNet Jump Start training to help your planning
  4. MDM: Mobile Device Management
  5. 6 Keys To A Flexible MDM Strategy
  6. BYOD-Security-Becomes-a-Pervasive-Issue
  7. Is BYOD a Nightmare for IT-Security
  8. Apple, Mac, iOS4, iPad, iPhone and (in)security…
  9. UK govt encourages insurers to reward good IT security

The Internal Security of the School Network

.

Attention iconText from Higher Education-Data Breach [Start]Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without. [End]

A School Network has also data bases where the information of the learners are stored and which needs to kept private! Most countries have even laws about Privacy where the head of school could get taken responsible by court for a data breach, thus meaning: the principal would face severe punishment by law if the private data of the school staff and the learners would be made public by a data breach due to no IT-Security Policy in School’s.

Best way is that the Principal and his staff talks together with the IT-Admin on How-To build up best protection, especially when using BYOD, as BYOD could be dangerous and security risks are present in the School NetworkThere is also to consider supplement costs because of new staff for IT-Security and the costs of the whole IT-Security Infrastructure…

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

UneducatedEmployees_IG_554

Click image to go to source and to learn more…

.

Read also and stay always informed about news of Cybersecurity:

.


Tips for the IT-Admin

.

Chat iconLot of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

.

.

.


Recommendations

.

sharing iconIt is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!

Parents could help their kids to achieve a weekly security task, reminding them about to do it by rewarding them and also by “punishing” them with a “Task-List“, check my FREE Online Google docs here:

.

Worksheets on Google Docs: 


What did we learn and what we must follow and respect!

..

 WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01

.

        • Automatic Windows Update must be enabled
        • For Apple devices: ALL the updates must be installed also!
        • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
        • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next course and tutorial…

.


Search Engine Submission – AddMe

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Not ONLY rights but also responsibility!?

Not ONLY rights but also responsibility!?


Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. One very important knowledge who needs to get taught is “Critical Thinking“; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!

.

Teaching “Critical Thinking” to your students and learners is a MUST for a world who is changing very fast (sometimes too fast…) so that a lot of people can’t follow anymore… But by knowing “Critical Thinking” people would be catching up more quick, so very important!!!

.

===> Critical Thinking is a catalyst when well used together with Social Medias! <===

.

.
When talking about Critical-Thinking then automatically we should talk also about responsibilities! Find out more below…
.

.

sid2014-anim-banner

.

What should get be taught and learned more in 21st Century while using ICT?

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

.

HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities fom students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU 😉

.


So, what does this show us!?

Attention Logo

        1. There isn’t enough information from Education (or too theoretical) around about how to get protected
          • Why? Perhaps teachers and educators are Mac users and not prepared for such a serious task!? Lack of REAL knowledge about IT-Security!
          • Lack of IT-Security knowledge in general, so how can one be able then to bring over the right knowledge!?
          • Learners don’t feel it necessary, why? Bad teaching, sorry! Not ONLY a society problem as some say! A teacher doesn’t give up till he finds the right way that it will get understood even that he must learn himself some new stuff to make it more interesting for the learners!
        2. There isn’t enough information from Government to adults and seniors around about how to get protected (or too theoretical)
        3. When courses are giving from Education and Government they are too theoretical and don’t give the necessary practice to learners for protecting their computers
        4. IT-Security can ONLY have best results when done with practical workshops!
          • ===> Confucius, Tell me, and I will forget. Show me, and I may remember. Involve me, and I will understand. – Confucius, 450 B.C.
        • Education and Government are publishing with 21st Century Technology but still doing it with 20th Century knowledge! They have to improve and to employ people with the necessary practice knowledge and skills!
        • There is a need to prepare learners more to the dangers of Internet! Especially against Scam!
        • Learners and adults need to know the laws in Internet!
        • There is a need to create so called “IT Security Help Points (Places)” where people with practice knowledge and skills are available to give advice on the place and wherevisitors can bring their computers to check for vulnerabilities and infections, as I did as a volunteer, but these people should get payed for it!
      1. Ideas for a more secure Internet (in English)
      2. IT-Security Scouts (in English)

Critical Thinking Questions and memes

Questions to make everybody awake for Critical-Thinking and responsibilities as also laws and hopefully to see one day practical courses and workshops:

.

question mark logo

        • What do YOU think about people who are walking door by door and trying if a door is open and enter into the house!? And worth, who are looking for other holes were they can enter into the house!?
          • Port Scanning and scanning web sites where YOU are not the owner of it are not allowed and punished by laws!
        • Imagine YOU would have an exhibition of your talented pictures, drawings, books, texts, sculptures and… in a big exhibition place (Internet); someone is visiting this exhibition and takes your talented work away with him!? Of course without paying YOU for this nor to tell YOU that he did so and that later on this person would make his own exhibition somewhere else pretending that it is his own work and even earn money with it!? What would be YOUR reaction!?  Do YOU know that this is what is called “Copyright“!?
        • Do YOU educate YOUR children and learners at home about bad and good? Do YOU educate them not to steal and not to break in other houses? Do YOU explain YOUR children and learners the laws and also the terms “prison” + “jail”? In virtual life (Internet) there are also laws and rules, explain them also to YOUR children and learners!
        • Do YOU educate YOUR children and learners to become good citizen? Do the same in #virtuallife (Internet) so that they will become good eCitizen, called also Digital Citizen!
        • Someone who doesn’t have the knowledge to use his computer (the vehicle in virtual life/Internet) is a potential danger for the COMMUNITY!!!
        • Protect YOUR children and learners by telling them the laws in Internet to avoid that they will become Cyber-criminals! Show them some practical examples about arrested people who thought that they would be invisible on Internet such as:
        • Do YOU know who is profiting from such a lack of knowledge and naivety!? Cyber-crime is, they use YOUR computer to earn money, funny isn’t it!??? Wake up!!!
.

Learning and teaching how-to stay secure and get protected

.
I suggest to YOU to follow my FREE courses here:
.
programmer man (color)
.
.
.
.
.
Educate parents and kids to become good e-Citizens, Digital Citizens; here some help:
.

Laws in different countries, mostly in Europe

.

balance

.

The French version http://gustmeesfr.wordpress.com/ (en français) includes already a big collection of francophone country laws, such as from:

.

luxembourg flag Luxembourg

.

Liens connexes :


French Flag icon France

.

.

Liens connexes :

Vos contributions sont les bienvenues
.

Canada flag icon Canada

.

.

Belgium


Ceci étant les lois que je connais, si vous en connaissiez d’autres lois de pays francophones , veuillez utiliser les commentaires pour me les communiquer et je les intègrerais afin de faire de ce blog un document collaboratif francophone, merci d’avance.

.

Germany flag icon Germany

.
.

Copyright Laws in certain countries

.
.

Your Rights Online in Europe

.

eYouGuide European Commission

Click image to access the web site!


THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


globe-pc

.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

.

The main keywords concerning this course:

eCitizen, digital Citizen, respect, laws, community, responsibilities, rights, real world, virtual world, real life, virtual life, awareness, education, eLearning, mLearning, BYOD, IT-Security, Internet-Safety, Online-Safety, digital reputation, prison, jail, society, 

.
.

.

blueman20401Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next courses and tutorials 😉

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,