Presentation takes you through what it means to be a native, if there really are digital natives and then turns to information literacy covering a few specific areas such as passwords, digital will, and some impressive tricks to gain you some credibility with any want to be natives.
Growing Your Next Generation of Patrons 1MadPubLib
This is the slideshow for the presentation Growing Your Next Generation of Patrons: How to Stay Relevant in the Network Society by Lexie Robinson and Beth Locy. Presented at the Alabama Library Association Conference in Mobile, AL on April 18, 2007.
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
Christopher Sibona Ph.D. is the Principal Software Engineer at Oracle Corp. Christopher obtained his Ph.D. at the University of Colorado Business School in 2011. His study on why people unfriend on Facebook has helped hundreds of corporations and individuals understand what encourages engagement and what turns people off when marketing on Facebook. This is Christopher’s talk at the January 2011 Emerging Media Conference in San Francisco, CA.
Growing Your Next Generation of Patrons 1MadPubLib
This is the slideshow for the presentation Growing Your Next Generation of Patrons: How to Stay Relevant in the Network Society by Lexie Robinson and Beth Locy. Presented at the Alabama Library Association Conference in Mobile, AL on April 18, 2007.
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
Christopher Sibona Ph.D. is the Principal Software Engineer at Oracle Corp. Christopher obtained his Ph.D. at the University of Colorado Business School in 2011. His study on why people unfriend on Facebook has helped hundreds of corporations and individuals understand what encourages engagement and what turns people off when marketing on Facebook. This is Christopher’s talk at the January 2011 Emerging Media Conference in San Francisco, CA.
Pôžička s ručením nehnuteľnosťou od Úver4you - 123 Pôžičky123 Pôžičky
Ak potrebujete väčšiu sumu peňazí a môžete založiť nehnuteľnosť, prípadne ak hľadáte úver bez overovania registrov, skúste Úver4you. Viac o tomto úvere sa dozviete v našej prezentácii.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
This talk outlines ways to make yourself known effectively on the Internet and create the image you want rather than the one that is built by your friends or your travels.
Norton's Internet Safety Advocate with a presentation on internet safety, online privacy, viruses and malware, for 8th grade students (13 years and up)
Coverage of the following topics: Tech growth, social media, Internet of things, how business are using social media in HR, how people expose their information online, privacy, the ramifications of your online life, how criminals, terrorist, governments and organizations use your online information, cyberbullying, data breaches, and Hacktivisim.
Selfish Accessibility: WordCamp Toronto 2014Adrian Roselli
We can all pretend that we’re helping others by making web sites accessible, but we are really making the web better for our future selves. Learn some fundamentals of web accessibility and how it can benefit you (whether future you from aging or you after something else limits your abilities). We’ll review simple testing techniques, basic features and enhancements, coming trends, and where to get help. This isn’t intended to be a deep dive into ARIA, but more of an overall primer for those who aren’t sure where to start nor how it helps them.
An introduction so various technologies for parents. Included are: Home Computers, Viruses, Safe Web Surfing, Social Networks, Cell Phones and Texting, and Reputation Management.
Originally designed for a workshop - adapted for use here. Include lots for links to resources appropriate for youth and adults who are just stepping into the online space.
Presented at Diana Initiative, Queercon 16, and DEFCON 27 Recon Village 8/9-10, 2019.
When we think of the process for attacking an organization, OSINT comes to the front and center of our minds. This presentation takes a presenter with experience in applying OSINT to effective penetration testing and social engineering and reverse engineers the process to determine what steps can be taken to further complicate their efforts. This is a presentation that talks about online deception, decoy accounts, canary data, encryption, maintaining one’s social media in a secure manner, and protecting one’s identity as much as possible. While nothing is absolute, this is a presentation that will leave attendees more aware of techniques to make it harder for attackers to collect accurate OSINT, either by removal or deception.
Humorous discussion presenting some of the kids of risks that face public facing Web sites for corporations ranging from hacking to legal to social media scares. Slides are illustrative in nature and the aim of the talk is more awareness than anything else.
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
Webinar - Libraries As Innovation Hubs - 2017-05-31TechSoup
Public libraries are hubs for innovation and community engagement. Library workers must listen closely to community needs to design programs and services responsive to continuous changes in technology and fluctuations in funding. This free webinar showcases two examples of collaborative design events used in public libraries to generate ideas, build community, and solve problems.
Chris Kyauk talks about the Alameda County Library’s Innovation Fest, a collaborative team challenge for public library staff. The Innovation Fest was designed to help library staff become more comfortable with design processes and risk taking to better create solutions to serve library patrons.
Sarah Washburn shares Caravan Studio’s process for community centered design to develop technology solutions that solve real problems. This process has been successfully applied to projects with libraries as a key strategic collaborator, most recently in Indianapolis (IN).
Similar to Digital Natives? Basics of Information Literacy (20)
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Thesis Statement for students diagnonsed withADHD.ppt
Digital Natives? Basics of Information Literacy
1. Digital Natives? :
Basics of Information Literacy
Sarah Uthoff, Oxford Public Library
ILOC is sponsored by
Iowa Library Services
2. Find links on my blog on the
“Information Literacy Presentation” post:
https://trundlebedtales.wordpress.com
3. Information Literate:
ACRL – Association of College and Research
Libraries have a whole page for long
definition. Find it http://tinyurl.com/6pkx49a
Being able to identify, find, evaluate,
and use information well
4. Information Literacy - Why Is It Important?
• Helps with school work
• Helps in the workplace
• Helps in life decisions
(which car should I buy?)
5. That means information literacy covers a
variety of things.
Today I’m going to focus on:
• The Myth of Digital Natives
• Basic Technology Skills That Need Support
• Importance of stopping to think things through
• Strong Passwords
• Website Evaluation
• Echo Chamber of Beliefs
• Organizations You Should Know
6. When are you a native?
Education and Immigration by Grace Kao, Elizabeth Vaquera, and Kimberly Goyette
First Generation:
• Born in Old Country
• Usually doesn’t speak new language or at
least doesn’t speak it very well
• Don’t know or understand rules
• Dependent on Second Generation
7. When are you a native?
Education and Immigration by Grace Kao, Elizabeth Vaquera, and Kimberly Goyette
Second Generation:
• Born in New Country
• Usually doesn’t speak new language well,
but better than parents, Learned it at school
• Will know some rules, but will make up what
some are when don’t know
• Has to create own knowledge map of world
and role reversal with parents know more
than they do
Green means GO
Red means STOP
Yellow Means Go VERY FAST
-Starman
8. When are you a native?
Education and Immigration by Grace Kao, Elizabeth Vaquera, and Kimberly Goyette
Third Generation:
• Born in New Country
• Speaks language
• Grew up with rules and follows them, but
some are the rules their parents made up
• Very sensitive about not knowing things
• Strongly adheres to mainstream group
9. When are you a native?
Education and Immigration by Grace Kao, Elizabeth Vaquera, and Kimberly Goyette
Fourth Generation:
• Born in New Country
• Speaks language
• Grew up with rules
• Wants to learn knew things, admits when
they don’t
• Often proud of their heritage
• Basically indistinguishable from rest of
population
10. Our Digital Natives sound
a lot more like second or
third generation
immigrants to me
So there will be things
you can teach them, but
they might not think so
and may not listen
12. Big Skills are social media, texting, and games
Often unable to break down what steps they
took or why
More rote or muscle memory than knowledge
13. People are online a lot
According to Pew Research
http://tinyurl.com/PROnlineConstantly
• 73% of Americans go online on a daily basis
14. People are online a lot
Including:
• 21% who go online almost constantly
• 42% go online several times a day
• 10% go online about once a day
• Some 13% go online several times a week or less
Only 13% of adults say they do not use the internet
at all
- Pew Research http://tinyurl.com/PROnlineConstantly
25. Passwords
Gizmodo and Splashdash collected the most common
Passwords from stolen password collections used in 2015
1.123456
2.password
3.12345
4.12345678
5.qwerty
6.123456789
7.1234
8. baseball
9. dragon
10. football
26. A good password contains:
• At least 8 characters
• A mix of alphabetic numeric upper and
lower case and special (#$*&$(*&)
characters, but sometimes what you can
use is determined by website
From Password Advice Kirkwood Community College
http://tinyurl.com/KirkwoodPasswords
27. A good password contains:
• Security experts now recommend using
an acronym for a sentence For example
My new TV is from 03 = MnTif03
From Password Advice Kirkwood Community College
http://tinyurl.com/KirkwoodPasswords
32. • Death Hoaxes
• Like Farming
• Click Bait
http://tinyurl.com/DeathHoaz
33. Echo Chamber of Beliefs
An article from the May 1, 2013 issue of
Wired explains this Echo Chamber:
Personalization of everything, from
Google Search to Facebook, works to keep
your interactions with things, topics, and
people you already know and like
34. Same article … Echo Chamber
“you surround yourself with voices that
echo similar opinions to those you're
feeding out…they will be reinforced in your
mind as mainstream, to the point that it can
distort your perception of what is the
general consensus… “
35.
36. Echo Chamber article …Chamber
Trolling, while a genuine problem, has
also created a mindset where any
dissenting voice must be just stirring up
trouble or generally being a terrible person
37. Only hearing your own community of like
minded responses means facing “opposite
responses, [causes] causing each party to
retreat within their own personal echo
chamber for reassurance” rather than open
minded debate
Echo Chamber article …Chamber
38. What lives Online
• Your Contacts
• Your Photos
• Your Words
• Your Records
• Your Financial Records
40. Digital Will
Online Bills –
Can someone else pay?
Without paper copy coming will they even
realize they exist?
http://tinyurl.com/DWSlate http://tinyurl.com/DCBarWill
41. Digital Will
Loss of Data –
Photos, Videos
E-mails and other contacts
Recordings of favorite songs playlists
Money information
Memberships
Find a longer discussion of the hazards and what you can do to plan ahead in this piece from the District of
Columbia Bar Association:
http://tinyurl.com/DWSlate http://tinyurl.com/DCBarWill
42. Digital Will
Losing Control of Your Personal Legacy –
What will happen to what you’ve placed online?
Without access to accounts that is up to the
websites (Facebook, YouTube, Twitter, Google,
etc.) that you’ve dealt with.
Find a longer discussion of the hazards and what you can do to plan ahead in this piece from the District of
Columbia Bar Association:
http://tinyurl.com/DWSlate http://tinyurl.com/DCBarWill
43. Create Digital Will
1. Take Inventory – What do you have?
2. What do you want to happen to your digital stuff?
3. E-mail is the key –
both filing cabinet and master key
4. There are companies set up to help
Find a longer discussion of the hazards and what you can do to plan ahead in this piece from the District of
Columbia Bar Association:http://tinyurl.com/DWSlate http://tinyurl.com/DCBarWill
44. Create Digital Will
Write down account information and share with
selected person
Attorney, Executor, Family Member or
online representative
Do NOT put in actual will. They are public documents.
Find a longer discussion of the hazards and what you can do to plan ahead in this piece from the District of Columbia
Bar Association:
http://tinyurl.com/DWSlate http://tinyurl.com/DCBarWill
49. • Provides free Securing the Human security
awareness training to public library staff
• Each staff member needs individual account
• Security awareness handouts (bookmarks
and brochures) available to libraries at no
charge
Alison Radl, MPA, MS-InfAs
State of Iowa
Information Security Office
SecurityAwareness@iowa.gov
515-725-2019