Figshare for institutions - Jisc Digifest 2016Jisc
In May 2015 the EPSRC policy framework on research data came into effect. Salford University partnered with figshare to not only answer the mandate but to enhance the visibility of the research generated at the institution. All public facing research outputs are freely available to the wider public at salford.figshare.com.
Learn more about University of Salford’s approach and get a high level overview of the latest figshare functionality.
Curating the Scholarly Record: Data Management and Research LibrariesKeith Webster
Presentation at the National Data Service Conference "New Frontiers in Data Discovery: Collaboration with Research Libraries.", Pittsburgh, 20 October 2016
High-level Meeting & Workshop on Environmental and Scientific Open Data for Sustainable Development Goals in Developing Countries. Madagascar, 4-6 December 2017
Apo presentation research librarians day feb 2017SusanMRob
Engagement & Impact through Open Access policy and Practice research & Resources via Australian Policy Online by Amanda Lawrence - presented at the Research Support Community Day 2017
Enabling and enhancing student learning and support through technologyJisc
A presentation from Connect More 2020 by Peter Francis, deputy vice-chancellor, Northumbria University.
In recent months universities have rapidly implemented significant and often unplanned changes to the ways in which education is delivered. In large part, the nature of such changes will be temporary, although the significance of such changes may be longer lasting.
But this has also allowed universities to explore opportunities that otherwise may not have been considered. One can foresee that many universities will need to focus more time and energy on their approach to technology for student learning, and as a result their digital leadership. Yet technology on its own is not the solution; it is an enabler.
In this session Peter will reflect briefly on his own institution's journey towards technology-enhanced learning and support, one that encompasses a broad array of technological developments, and involved many colleagues and students, the aim of which is the delivery of a high-quality and inclusive student experience for all.
Figshare for institutions - Jisc Digifest 2016Jisc
In May 2015 the EPSRC policy framework on research data came into effect. Salford University partnered with figshare to not only answer the mandate but to enhance the visibility of the research generated at the institution. All public facing research outputs are freely available to the wider public at salford.figshare.com.
Learn more about University of Salford’s approach and get a high level overview of the latest figshare functionality.
Curating the Scholarly Record: Data Management and Research LibrariesKeith Webster
Presentation at the National Data Service Conference "New Frontiers in Data Discovery: Collaboration with Research Libraries.", Pittsburgh, 20 October 2016
High-level Meeting & Workshop on Environmental and Scientific Open Data for Sustainable Development Goals in Developing Countries. Madagascar, 4-6 December 2017
Apo presentation research librarians day feb 2017SusanMRob
Engagement & Impact through Open Access policy and Practice research & Resources via Australian Policy Online by Amanda Lawrence - presented at the Research Support Community Day 2017
Enabling and enhancing student learning and support through technologyJisc
A presentation from Connect More 2020 by Peter Francis, deputy vice-chancellor, Northumbria University.
In recent months universities have rapidly implemented significant and often unplanned changes to the ways in which education is delivered. In large part, the nature of such changes will be temporary, although the significance of such changes may be longer lasting.
But this has also allowed universities to explore opportunities that otherwise may not have been considered. One can foresee that many universities will need to focus more time and energy on their approach to technology for student learning, and as a result their digital leadership. Yet technology on its own is not the solution; it is an enabler.
In this session Peter will reflect briefly on his own institution's journey towards technology-enhanced learning and support, one that encompasses a broad array of technological developments, and involved many colleagues and students, the aim of which is the delivery of a high-quality and inclusive student experience for all.
Speakers:
David Lewis, senior analytics consultant, Jisc
Martin Lynch, learning systems manager, University of South Wales
An opportunity to find out about how an institution has been implementing learning analytics to support the student journey with and opportunity to discuss issues and possibilities that the use of learning analytics may create.
Data driven innovation for student success (Studiosity Symposium 2017)Studiosity.com
Empowering cross-institutional collaboration to drive holistic approaches to student success that leverage the power of student centered analytics and prepare our graduates for the new world of work
Keynote:
Associate Professor Jessica Vanderlelie
Innovative Research Universities Vice Chancellors’ Fellow, Australian Learning & Teaching Fellow
Developing a technology enhanced learning strategySarah Knight
This presentation was presented jointly with Sarah Davies at University of East London on the 15th January 2014 as part of the Changing Learning Landscapes programme of support.
Mol, S.T. (2014, November). Learning Analytics: The good, the bad, the ugly. Presentation delivered as part of the UvA Faculty of Economics and Business Educational Innovation Seminar Series. University of Amsterdam, the Netherlands.
Speakers:
Steve Hoole, senior analytics consultant, Jisc
Karl Molden, senior planning analyst, University of Greenwich
An opportunity to find out about how an institution has been implementing learning analytics to support the student journey with and opportunity to discuss issues and possibilities that the use of learning analytics may create.
Digital Dinosaurs: MOOCs and Digital Strategies at the University of AlbertaJennifer Chesney
Presented by Jennifer Chesney, Associate Vice President, University Digital Strategy and Jonathan Schaeffer, Dean of the Faculty of Science, to the Canadian Bureau of International Education’s 47th Annual Conference, November 19th, 2013
Similar to Data education and skills initiatives (20)
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1. African Open Science
What are the data skills requirements and how
initiatives scale to meet the need?
2016-12-07
Magdalena Eriksson, PhD
Director, Academic Development
African Institute for Mathematical Sciences-Next Einstein Initiative
University of Cape Coast, Ghana
www.nexteinstein.org
2. Data – basic perspective
15%
Datum (pl. data) – a record of a raw, untreated fact
Information – set of data, which is at least partially related by
subject or nature of the data. Implies some level of real or
conceptual homogeneity
Knowledge – body of information that has been evaluated with
reference to a particular circumstance, e.g. level of education in
a country
Source: Prof. FKA Allotey
3. Data – Education perspective
15%
Information – basis for research -> knowledge
Knowledge – necessary/desirable for
• Decision making (knowledge is evaluated)
• Teaching (knowledge is shared)
• Learning (knowledge is acquired)
• Common understanding (culture)
4. Data today
15%
Growing capacity to generate, store and process data ->
we can more easily go back to the ‘basics’ (access large data
sets)
This puts requirements on data training/usage:
• Scientific and technical skills for handling and using data
• Versatility in applications of data usage, e.g.
– Modelling of disease spread
– Modelling of migration
– Modelling of climate effects
5. Data today, ctd
15%
Requirements on data training:
• Responsibility
– Use data correctly
– Use data for valid purposes
– Report conclusions responsibly
6. AIMS Vision
15%
To lead the transformation of Africa through
innovative scientific training, technical
advances and breakthrough discoveries,
that benefit the whole of society.
7. Data Education and Skills –
AIMS as an example
15%
AIMS (African Institute for Mathematical
Sciences):
• Training at Master’s and PhD levels
• Research
• Community engagement
• Teacher training
• Next Einstein Forum (NEF)
• Partnerships – local international
9. AIMS Master’s Programmes ~ 300 students/yr
Pan-African student body
- at least 1/3 women (men)
World class faculty
Resident tutors
24/7
environment
10. The academic year at AIMS
Skills Review Research
• Skills, review and research phases
• Each block 3 weeks
• Computing
• Problem solving
• Spread of topics
• Theoretical
• Applied
• Individually
supervised projects
• Thesis defense
Grad.
11. AIMS Curriculum
15%
• Skills emphasis
– computer use (primarily open source
environments and software!)
– problem solving, versatility
– learning by doing
• Blend of courses in theoretical and applied subjects
offered
• Current – develops from one year to the next
• Accredited programs
13. Big Data specialization
15%
• In partnership with The MasterCard Foundation,
AIMS Senegal offers a pilot track of its MSc that includes
Work Integrated Learning (Coop version)
• 18 months in total, including two industry periods
• Research project done at industry
• Two focus areas: Big Data and Computer Security
• Courses and seminars in focus areas
• Selected students do internships with local partner
industries as part of training
• 12 students enrolled in first batch
• 20 in the second batch
• Program will be ‘cloned’ at other AIMS sites
14. Big Data training
15%
Intro course learning objectives include:
• Understand the techniques and challenges in
loading and cleaning large datasets
• Understand how algorithms for analytics interface
to databases
• Load, clean and interrogate large data sets
Further, important learning from
• Seminars on Big Data (at AIMS)
• Internships at companies
15. Big Data internships
15%
Host of student interns include:
• Multinational company in digital services
• Startup company in advertising services
• Ministry of Higher Education and Research
Feedback from pilot at several stages
• Course work
• Internships at companies
• Student readiness
16. Research
15%
• Each AIMS centre has a research facility
• Chairs - senior and junior – increasing number
• Funded (e.g. by Humboldt Foundation, IDRC)
• Researchers visit – short or long term
• Some work in open data fields (astronomy, genome
analysis, immunology, finance...)
• Publish >100 papers/year together
18. Focused research
15%
• Quantum science research centre, QLA,
in Kigali (2017)
• Climate change research (Canadian IDRC support)
with 2-year Master’s training programme planned
19. Conclusions
15%
• AIMS has a multi-faceted approach to Open Science
– Training – general
– Training – specialization (e.g. Big Data)
– Research – advancing science
– Research training – PhD, Master’s programmes
– Research with special focus (Climate Change)
• Graduates well trained in data science ready to
participate in Open Science at various levels
• AIMS as a network keen to contribute to Open
Science in Africa
20. Conclusions
15%
Skills Requirements?
• Technical skills? Yes
• Versatility? Yes, by various contexts
• Responsible use of open resources? Yes, inculcate
values, adopting standards etc by examples and
discussions
Scale?
• Today’s initiatives probably not enough
• Much can happen in a few years
• A common platform can facilitate the process