21st Century Learning and Teaching
586.6K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: '2016', 'Privacy at danger!'. Clear
Scooped by Gust MEES
Scoop.it!

Onion Pi TOR Proxy | #Maker #RaspberryPI #ICT #Privacy 

Onion Pi TOR Proxy - Tor Onion Router which gives you opportunity to create secure network wherever you are

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 

 

Gust MEES's insight:
Onion Pi TOR Proxy - Tor Onion Router which gives you opportunity to create secure network wherever you are

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Raspberry+Pi

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Alle Mails gescannt: Yahoo arbeitete für Geheimdienste | #Privacy 

Alle Mails gescannt: Yahoo arbeitete für Geheimdienste | #Privacy  | 21st Century Learning and Teaching | Scoop.it
Yahoo soll für US-Dienste neue Software geschrieben, sie hinter dem Rücken der eigenen Security-Abteilung installiert und damit alle Kundenmails gescannt haben. Juristische Gegenwehr gab es offenbar keine. Ob die Überwachung andauert, ist nicht bekannt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Yahoo...

 

Gust MEES's insight:
Yahoo soll für US-Dienste neue Software geschrieben, sie hinter dem Rücken der eigenen Security-Abteilung installiert und damit alle Kundenmails gescannt haben. Juristische Gegenwehr gab es offenbar keine. Ob die Überwachung andauert, ist nicht bekannt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Yahoo...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Opera holt VPN an Bord | #Privacy #Browser

Opera holt VPN an Bord | #Privacy #Browser | 21st Century Learning and Teaching | Scoop.it
Es wird eng fürs Geoblocking. Opera ist der erste Browser mit nativer VPN-Unterstützung.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

Gust MEES's insight:
Es wird eng fürs Geoblocking. Opera ist der erste Browser mit nativer VPN-Unterstützung.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

‘Pokémon Go’: Why You Should Play BUT be careful about #Privacy

‘Pokémon Go’: Why You Should Play BUT be careful about #Privacy | 21st Century Learning and Teaching | Scoop.it

Niantic Labs, partnering with Nintendo and Pokémon Co., released “Pokémon Go,” a free game for iPhones and Android phones. When you launch it, you see the game franchise’s world famous “pocket monsters” as if they existed in your backyard or bathtub. The point? To “catch ’em all,” as the kids say.

This is augmented reality, or AR, where your smartphone’s camera, GPS and position sensors tell the game what to display and where. It’s a digital world layered over the real one. Unlike virtual reality, which transports you to another universe, you play in your own.

Pikachu is the most well known Pokémon.
The technology isn’t new. Smartphones have had AR games for years, and even Nintendo previously released similar features for its 3DS hand-held device. This isn’t even especially good execution of AR. Which is why perhaps not even Nintendo predicted what happened next.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

http://www.scoop.it/t/la-realite-augmentee-augmented-reality-ar

 

 

Gust MEES's insight:

Niantic Labs, partnering with Nintendo and Pokémon Co., released “Pokémon Go,” a free game for iPhones and Android phones. When you launch it, you see the game franchise’s world famous “pocket monsters” as if they existed in your backyard or bathtub. The point? To “catch ’em all,” as the kids say.

This is augmented reality, or AR, where your smartphone’s camera, GPS and position sensors tell the game what to display and where. It’s a digital world layered over the real one. Unlike virtual reality, which transports you to another universe, you play in your own.

Pikachu is the most well known Pokémon.
The technology isn’t new. Smartphones have had AR games for years, and even Nintendo previously released similar features for its 3DS hand-held device. This isn’t even especially good execution of AR. Which is why perhaps not even Nintendo predicted what happened next.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

 

http://www.scoop.it/t/la-realite-augmentee-augmented-reality-ar

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Use Public Wifi? Here’s Why Snooping On You is Way Easier Than You Think | #VPN #Privacy #CyberSecurity 

Use Public Wifi? Here’s Why Snooping On You is Way Easier Than You Think | #VPN #Privacy #CyberSecurity  | 21st Century Learning and Teaching | Scoop.it
Hacking is so easy these days, even non-hackers can do it. Some kinds of hacking, that is. Like public wifi, for example. To spy on people's Internet browsing while they're sipping a cup of brew, you don't need to be a pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Gust MEES's insight:
Hacking is so easy these days, even non-hackers can do it. Some kinds of hacking, that is. Like public wifi, for example. To spy on people's Internet browsing while they're sipping a cup of brew, you don't need to be a pro.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is a VPN, and why should you be using one? | Graham Cluley | #Privacy #CyberSecurity #WiFi #ICT #eSkills

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Gust MEES's insight:

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Pam Huff's curator insight, March 20, 2016 10:36 AM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Frederic GOUTH's curator insight, March 20, 2016 3:01 PM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Fernando de la Cruz Naranjo Grisales's curator insight, March 23, 2016 8:24 AM

Find out the benefits of running a VPN on your laptop and smartphone, especially if you are in the habit of connecting to public Wi-Fi hotspots. 

 

Learn more / En savoir plus / Mehr erfahren::

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN

 

Scooped by Gust MEES
Scoop.it!

What are your digital rights? | Why do digital rights matter? | Privacy | Cyberespionage

What are your digital rights? | Why do digital rights matter? | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
Why do digital rights matter?

As we increasingly conduct our lives online – shopping, socializing and sharing information – our digital rights, particularly the rights to privacy and freedom of expression, are becoming more important. We need to understand how our data is being used by companies, governments and internet giants such as Facebook and Google. Is it being handled fairly and scrupulously, or sold or shared without our consent?

Revelations about surveillance programmes and digital hacking have sparked political and diplomatic wrangles. National Security Agency (NSA) whistleblower Edward Snowden has called for new international laws to protect data privacy, arguing that now we know about mass data surveillance it is time to “assert our traditional and digital rights so that we can protect them”.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

Gust MEES's insight:
Why do digital rights matter?

As we increasingly conduct our lives online – shopping, socializing and sharing information – our digital rights, particularly the rights to privacy and freedom of expression, are becoming more important. We need to understand how our data is being used by companies, governments and internet giants such as Facebook and Google. Is it being handled fairly and scrupulously, or sold or shared without our consent?

Revelations about surveillance programmes and digital hacking have sparked political and diplomatic wrangles. National Security Agency (NSA) whistleblower Edward Snowden has called for new international laws to protect data privacy, arguing that now we know about mass data surveillance it is time to “assert our traditional and digital rights so that we can protect them”.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Shane McGurk's curator insight, March 10, 2016 1:24 AM
Why do digital rights matter?

As we increasingly conduct our lives online – shopping, socializing and sharing information – our digital rights, particularly the rights to privacy and freedom of expression, are becoming more important. We need to understand how our data is being used by companies, governments and internet giants such as Facebook and Google. Is it being handled fairly and scrupulously, or sold or shared without our consent?

Revelations about surveillance programmes and digital hacking have sparked political and diplomatic wrangles. National Security Agency (NSA) whistleblower Edward Snowden has called for new international laws to protect data privacy, arguing that now we know about mass data surveillance it is time to “assert our traditional and digital rights so that we can protect them”.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Tony Guzman's curator insight, March 10, 2016 9:48 AM
In light of the recent Apple v. FBI discussions, it is important we start to understand what digital rights are.
Fernando de la Cruz Naranjo Grisales's curator insight, March 14, 2016 3:15 PM
Why do digital rights matter?

As we increasingly conduct our lives online – shopping, socializing and sharing information – our digital rights, particularly the rights to privacy and freedom of expression, are becoming more important. We need to understand how our data is being used by companies, governments and internet giants such as Facebook and Google. Is it being handled fairly and scrupulously, or sold or shared without our consent?

Revelations about surveillance programmes and digital hacking have sparked political and diplomatic wrangles. National Security Agency (NSA) whistleblower Edward Snowden has called for new international laws to protect data privacy, arguing that now we know about mass data surveillance it is time to “assert our traditional and digital rights so that we can protect them”.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Scooped by Gust MEES
Scoop.it!

Big data privacy must be fixed before the revolution can begin | Digital CitiZENship | eSkills

Big data privacy must be fixed before the revolution can begin | Digital CitiZENship | eSkills | 21st Century Learning and Teaching | Scoop.it


There won't be a 'big data revolution' until the public can be reassured that their data won't be misused.

Big data is an asset which can create tens of thousands of jobs and generate hundreds of billions for the economy, but the opportunity can't be taken until concerns about privacy and security have been overcome.

The Power of IoT and Big Data

We delve into where IoT will have the biggest impact and what it means for the future of big data analytics.

That's according to the newly released The Big Data Dilemmareport which is based on evidence from technologists, open data enthusiasts, medical research organisations and privacy campaigners.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...



Gust MEES's insight:

There won't be a 'big data revolution' until the public can be reassured that their data won't be misused.



Big data is an asset which can create tens of thousands of jobs and generate hundreds of billions for the economy, but the opportunity can't be taken until concerns about privacy and security have been overcome.


The Power of IoT and Big Data

We delve into where IoT will have the biggest impact and what it means for the future of big data analytics.


That's according to the newly released The Big Data Dilemmareport which is based on evidence from technologists, open data enthusiasts, medical research organisations and privacy campaigners.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Get smart on government surveillance | Privacy | Human Rights

Get smart on government surveillance | Privacy | Human Rights | 21st Century Learning and Teaching | Scoop.it



Decide where you think the line should be – and keep others from crossing it. Get smart on government surveillance.



Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:

Decide where you think the line should be – and keep others from crossing it. Get smart on government surveillance.



Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Initiative „Datenschutz geht zur Schule“ veröffentlicht Arbeitsmaterialsammlung für Lehrer | #DigitalCitiZENship

Initiative „Datenschutz geht zur Schule“ veröffentlicht Arbeitsmaterialsammlung für Lehrer | #DigitalCitiZENship | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

VeraCrypt | #Encryption #Privacy #ICT #EdTech

VeraCrypt | #Encryption #Privacy #ICT #EdTech | 21st Century Learning and Teaching | Scoop.it
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

Gust MEES's insight:
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Shining a Light on Digital Tracking in Education - From crisis to opportunity | #Privacy #digcit 

Shining a Light on Digital Tracking in Education - From crisis to opportunity | #Privacy #digcit  | 21st Century Learning and Teaching | Scoop.it

A third of U.S. middle and high school students use mobile devices issued by their schools. Many others use their own devices for their schoolwork, using software such as the widely adopted Google Apps for Education. If you have children in school, chances are good that people and organizations you don’t know are collecting massive quantities of information about your children and using this information for purposes you know nothing about.

 

We don’t know much about how children’s information is used, or by whom, or for what purpose

 

Once data is collected and the company that collected it uses it for its stated purpose, there is little in law or policy that prevents the company from also using the information for other purposes, such as “product development.” It may also sell the information to others for their use or archive it for possible later use. Many bills bearing on student privacyhave been introduced in the past several years in Congress and state legislatures, and several of them have been enacted into law. However, protection of student privacy remains limited.

Our recent report explores how corporate entities use their involvement with schools to gather student data and how those data may be used for marketing and other non-school-related purposes. Although most people probably know that digital marketers targetand track children on the devices they use, many would be surprised to learn that schools now serve both as a portal to and reinforcer of digital marketing messages to children. In so doing, they lend companies that collect, sell, analyze, and buy data both enhanced credibility and access to vast amounts of education-related data.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

Gust MEES's insight:

A third of U.S. middle and high school students use mobile devices issued by their schools. Many others use their own devices for their schoolwork, using software such as the widely adopted Google Apps for Education. If you have children in school, chances are good that people and organizations you don’t know are collecting massive quantities of information about your children and using this information for purposes you know nothing about.

 

We don’t know much about how children’s information is used, or by whom, or for what purpose

 

Once data is collected and the company that collected it uses it for its stated purpose, there is little in law or policy that prevents the company from also using the information for other purposes, such as “product development.” It may also sell the information to others for their use or archive it for possible later use. Many bills bearing on student privacyhave been introduced in the past several years in Congress and state legislatures, and several of them have been enacted into law. However, protection of student privacy remains limited.

Our recent report explores how corporate entities use their involvement with schools to gather student data and how those data may be used for marketing and other non-school-related purposes. Although most people probably know that digital marketers targetand track children on the devices they use, many would be surprised to learn that schools now serve both as a portal to and reinforcer of digital marketing messages to children. In so doing, they lend companies that collect, sell, analyze, and buy data both enhanced credibility and access to vast amounts of education-related data.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Pokémon Go unter der pädagogischen Lupe | #ScavengerHunt #AugmentedReality #AR #RA #Privacy

Pokémon Go unter der pädagogischen Lupe | #ScavengerHunt #AugmentedReality #AR #RA #Privacy | 21st Century Learning and Teaching | Scoop.it

Heute ist die begehrte App offziell in den deutschen Stores für Android und iOS erschienen. Was steckt hinter dem Pokémon-Hype? Der Spieleratgeber - NRW hat sich näher mit dem Phänomen befasst und informiert mit pädagogischem Blick.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Pok%C3%A9mon+Go

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Pok%C3%A9mon+Go

 

https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

Gust MEES's insight:

Heute ist die begehrte App offziell in den deutschen Stores für Android und iOS erschienen. Was steckt hinter dem Pokémon-Hype? Der Spieleratgeber - NRW hat sich näher mit dem Phänomen befasst und informiert mit pädagogischem Blick.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Pok%C3%A9mon+Go

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Pok%C3%A9mon+Go

 

https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/

 

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Better Internet for Kids - Luxembourg: That data, actually OUR data, in the Cloud | #Privacy 

Better Internet for Kids - Luxembourg: That data, actually OUR data, in the Cloud | #Privacy  | 21st Century Learning and Teaching | Scoop.it
Nowadays, the Cloud is everywhere. For most users, this technology is assimilated to some sort of a digital extension of their technology-related hardware. If from a technical standpoint the Cloud is not a revolution but a mere evolution of online services, the Cloud nonetheless changes the relationship between us, as users, our computer equipment, our data and our Internet Service Provider (ISP).

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security

 

Gust MEES's insight:
Nowadays, the Cloud is everywhere. For most users, this technology is assimilated to some sort of a digital extension of their technology-related hardware. If from a technical standpoint the Cloud is not a revolution but a mere evolution of online services, the Cloud nonetheless changes the relationship between us, as users, our computer equipment, our data and our Internet Service Provider (ISP).

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security

 

 

Fernando de la Cruz Naranjo Grisales's curator insight, April 2, 2016 7:06 AM
Nowadays, the Cloud is everywhere. For most users, this technology is assimilated to some sort of a digital extension of their technology-related hardware. If from a technical standpoint the Cloud is not a revolution but a mere evolution of online services, the Cloud nonetheless changes the relationship between us, as users, our computer equipment, our data and our Internet Service Provider (ISP).

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cloud-Security

 

 

Scooped by Gust MEES
Scoop.it!

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption | 21st Century Learning and Teaching | Scoop.it
Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 


 

Gust MEES's insight:

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

michel verstrepen's curator insight, March 4, 2016 7:09 PM

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Scooped by Gust MEES
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 2016 4:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Scooped by Gust MEES
Scoop.it!

'I have nothing to hide' is killing the privacy argument

'I have nothing to hide' is killing the privacy argument | 21st Century Learning and Teaching | Scoop.it
We all have something to hide.
The problem with the “nothing to hide” argument is: we’ve all got plenty to hide.


Just today, did you pick your nose? Change clothes? Have sex? Take a shower? Go to the bathroom? Sing off-key in the car on the way to work? Or, maybe you sent an email or text message, a racy photo on Snapchat, or said something inflammatory about your boss.

I bet, if pressed, you’d prefer that most, if not all, of these actions remained private.

And that’s okay. 

Privacy is a key part of all our lives. But now that our lives are drifting into the online space, and more with each passing year, why the disconnect between offline and online privacy? The former is desired and expected, while the latter is lauded as wrong and sometimes even criminal.

Separating the desire for privacy from the desire to do something illegal is where it all starts. Too often the two are interwoven into a blanket statement that all those who desire privacy online are doing so out of the necessity to hide nefarious actions.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:
We all have something to hide.
The problem with the “nothing to hide” argument is: we’ve all got plenty to hide.


Just today, did you pick your nose? Change clothes? Have sex? Take a shower? Go to the bathroom? Sing off-key in the car on the way to work? Or, maybe you sent an email or text message, a racy photo on Snapchat, or said something inflammatory about your boss.

I bet, if pressed, you’d prefer that most, if not all, of these actions remained private.

And that’s okay. 

Privacy is a key part of all our lives. But now that our lives are drifting into the online space, and more with each passing year, why the disconnect between offline and online privacy? The former is desired and expected, while the latter is lauded as wrong and sometimes even criminal.

Separating the desire for privacy from the desire to do something illegal is where it all starts. Too often the two are interwoven into a blanket statement that all those who desire privacy online are doing so out of the necessity to hide nefarious actions.


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


No comment yet.