Moocs and k12 Cloud: Privacy regulations and Risk Management
Upcoming SlideShare
Loading in...5
×
 

Moocs and k12 Cloud: Privacy regulations and Risk Management

on

  • 2,360 views

P

P

Statistics

Views

Total Views
2,360
Slideshare-icon Views on SlideShare
1,412
Embed Views
948

Actions

Likes
5
Downloads
10
Comments
0

11 Embeds 948

http://www.scoop.it 592
http://www.downes.ca 279
http://opencursoscom.blogspot.com.ar 34
http://opencursoscom.blogspot.com.es 20
http://opencursoscom.blogspot.com 7
https://twitter.com 5
http://opencursos.com 3
http://opencursoscom.blogspot.mx 3
http://www.copyscape.com 2
http://www.itafe.net 2
http://opencursoscom.blogspot.it 1
More...

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Moocs and k12 Cloud: Privacy regulations and Risk Management Moocs and k12 Cloud: Privacy regulations and Risk Management Presentation Transcript

    • Moocs and K12 CloudPrivacy regulations and Risk ManagementDiscovery Education Canada(Dean Shareski), BD&P(Jim Swanson), Alberta Distance Learning Centre(Verena Roberts), National Research Council Canada(Stephen Downes)
    • What are MOOCs•Massive – by design•Open – gratis and libre•Online – vs. blended and wrapped•Courses – vs. communities, websites, videocollections, etc
    • cMOOCs vs xMOOCs•xMOOCs – the Big Elite Universities Way•Collections of centralized resources•Mass events (like videos, live events)•Automated grading etc.•cMOOCs – the Connectivist Way•Based on community, conversation, culture•Most importantly, are distributed
    • The Connected Applicationhttp://x28newblog.blog.uni-heidelberg.de/2008/09/06/cck08-first-impressions/
    • Privacy & Security:the Centralized Version•Downloading and Reuse – copyright implications,tracking, and phone calls from large corporations•Data collection – “all your student records are belongto us”•Data breaches – password reuse, identity information•Spam, marketing and other unwanted messaging
    • Privacy & Security:the Decentralized Version•Downloading and Reuse – copyright implications,tracking, and phone calls from large corporations•Introduction of untested resources in to the network•Bullying and abuse in hidden nooks and crannies•Information policies of third party applications, suchas Facebook