Remove 2016 Remove Data Remove Social Media Remove System
article thumbnail

ISTE Certification 01

Dangerously Irrelevant

I served on the initial advisory board for ISTE’s Standards for Education Leaders (back then, they were the NETS-A) and in 2016 I received ISTE’s global Award for Outstanding Leadership. Finally, I’m a strong user of social media tools and online platforms and have a large global professional learning network (so Standard 1b!).

article thumbnail

Who Else is Collecting Data About Your Children?

Securly

Digital footprints are not exclusive to online shoppers or avid social media users; everyone has one, including your 5-year-old child. However, “age limits” did not stop persistent pre-teens from joining social media and gaming sites. Regardless, 10 years later, data collection came to be mostly implicit.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who else is collecting data about your children?

Securly

Digital footprints are not exclusive to online shoppers or avid social media users; everyone has one, including your 5-year-old child. However, “age limits” did not stop persistent pre-teens from joining social media and gaming sites. Regardless, 10 years later, data collection came to be mostly implicit.

Data 145
article thumbnail

A Bored Student Hacked His School’s Systems. Will the Edtech Industry Pay Attention?

Edsurge

This week on the podcast we’re talking about cybersecurity at schools—and how secure, or in some cases how vulnerable, the tech systems in school systems are these days. Essentially these are the computer systems that store grades and the student records of his school. He says he probably could have accessed more data.

System 132
article thumbnail

Safeguarding K-12 school networks with proactive cybersecurity approaches

eSchool News

education system. schools since 2016. They hold the keys to large quantities of valuable intellectual property and sensitive PII, financial, and healthcare data that can be exploited for ransomware and monetary gain. Local K-12 schools are a top target for cybercrime.

article thumbnail

Why your young students love e-learning

Neo LMS

Social media channels provide the digital alternative for the “traditional” social life and support communication within online communities non-stop. They turn to other social media sites , like Instagram, Snapchat, Tumblr, Yik Yak, or Twitter. Gamification is all about data.

article thumbnail

A Gullible Population Is a National Security Issue

The CoolCatTeacher

While this blog is based on verifiable data, some readers may be unhappy with my interpretation. Social media has not shown an ability to “self correct” perhaps because by its very nature, the responses can only be positive and thus, there is no self-correcting mechanism built into its algorithm. Source: Wired.