Free book on the Future of Reputation on the Web and the importance of Understanding Privacy
JULY 28, 2010
Daniel Solove has written a new book on the Internet and Privacy, it is called: " Understanding privacy " (yes, not a catchy, but indeed a very clear title). In this world where privacy is challenged by every imaginable company (and government), the tendency is that privacy should no longer matter for everything is out in the open anyway.
Monitoring informal learning with a Learning Record Store
Joitske Hulsebosch eLearning
JANUARY 17, 2016
Below in the graph you see an example where the data is collected in one place. practical example: children in a museum Ben Betts shared a few practical examples The first is the Ann Arbor museum , a children's museum in the US. The teacher may use this information to adapt his class teachings. Privacy and consent is an important issue on Learning Record Stores.
#LAK11 what about #privacy when using #data analytics to create #knowledge?
JANUARY 11, 2011
LAK11 , the course on learning analytics and knowledge has started and immediately discussions touch a sensitive and complex issue: privacy. While talking about educational data mining, the issue of privacy was raised by many participants. The only thing is, how do you cope with the privacy issues? crowdsourcing research semantic identity lak11 analytics privacy
How to revamp your learning model
SEPTEMBER 7, 2010
and The ILE and the FLE in harmony , I advocate the development of a virtual Informal Learning Environment (ILE) to work in tandem with the Formal Learning Environment (FLE) to support both the learning process and its administration. Informal learning. believe in the power of informal learning. Informal Learning Environment. Self-directed, informal learning is great.
eLearning Cyclops: Informal learning. Maybe I Can Informally.
MARCH 6, 2011
Less Trainers; More Community Managers and Curators
MARCH 5, 2013
Information changes quickly – and often we need information, not training. When privacy IS a concern, there are tools for that as well – enabling companies to keep content behind their own walls. The eMagazine shared as part of Trend #3 is a good example of a tool that curates content and makes it. Here is Trend 7: Lots of us are already curating content for others.
2016 Top 10 LMSs
FEBRUARY 9, 2016
43 profiles, whereas each vendor responded to 12 questions – covering everything from setup fees to data centers to latest features to support/training to security/privacy. . c. Here is a brief Sample_Summary – Sample_Pages_EL247Report. it does not include an example of every page in the report nor does the summary include everything in it. . The solution is extremely slick with the marketplace built into the system – so when you buy a course for example, it is the “click” and whalla it is in the LMS. Based on 690 vendors.
How to Grab and Keep Interest in Any Presentation
AUGUST 2, 2016
The topics are tedious, dense, and dry by nature, so creating and retaining interest throughout presentations is trying, but of paramount importance – if our students don’t engage with the lessons, they won’t attach to the crucial information we’re covering. Snagit enables me to grab, create and share the information and media that matters most in a fun, approachable way.
Google Course Builder: Initial Review
SEPTEMBER 1, 2013
With so much information, it’s a bit hard to know where to start. It’s clear that Google has a specific target in mind with this page: developers (or at least very web-savvy). In other words, if you are relatively new to setting-up online training programs, then you will likely find the Google Course Builder page is not user-friendly. Data Privacy and Security.
Google Plus – its really all about *you*
Adventures in Corporate Education
JULY 10, 2011
Filtering information : You are responsible for scanning and filtering the firehose of information that comes at you from the people you follow. Connecting to everyone: Depending on how you have your Google account privacy set up – anyone can talk to you, and you can talk to anyone.One of the first times I fired up a Hangout, Michael Dell was the first one to join me. For example, I have a circle called education, and a circle called chatty education. GooglePlus Uncategorized circles filtering information google plus hangout social networks
5 quick ways to pull learners into a course
MAY 20, 2014
If the title of the course is “Data Privacy,” then you can trust learners to understand that it concerns keeping data private. In my sacrilegious opinion, the best use for a narrator is to talk about a graphic that isn’t already self-explanatory, not to deliver information that could be more concisely and quickly delivered through text. What are some alternatives? 1.
Are YOU HIPAA (TX HB 300) Compliant in Texas?
NOVEMBER 3, 2014
Federal and state laws require patient medical information be protected and secured. . Protecting sensitive medical information can be challenging with today’s security breaches. Anyone who has contact with protected health information must be trained on how to keep that information protected and out of the hands of a potential fraudster. Your Texas organization must know how to protect and secure sensitive medical information. Covered entities must ensure that employees have a signed statement verifying that they were trained on HIPAA Privacy and Security.
Interesting Information via eLearning Learning
DECEMBER 8, 2008
As an example, I can see that eLearning 2.0 Again, I'll be curious to see if people find patterns in this information. Mel Aclaro - Business Casual Mel has a lot of interesting topics, but clearly a lot around social topics ( Social Media , Social Networks , LinkedIn , Twitter , RSS , Social Network , Facebook ), but keep him in mind for Streaming , Privacy , and Internationalization. David Fair - Learning Journeys Talk to him about graphics ( PNG , JPG ) and staying organized ( Tagging , Information Overload ). I've listed a few of the terms that I saw.
unesco: opportunities, threats & challenges of #mLearning #mlw2013
FEBRUARY 19, 2013
Title of her presentation is: Aligning migration with mobility: female immigrants using smart technologies for informal learning show the way What follows are my live blogging notes, based on the slides shared by Agnes. Which formal and informal ways are there, badges, certificates, credits for learning overall. And I will try and get hold of the slides and add a link when possible.
eLearning Cyclops: Wicked, Cool Example of Augmented Reality
SEPTEMBER 29, 2011
Here’s What You Need to Know About Informal Learning
MARCH 31, 2010
For example, the current rage in the training industry is informal learning. In turn, they will be unleashing a horde of ignorant and pesky co-workers who will be seeking you out for information. You’ll need a device like the Toot-N-Scoot™ to maintain your privacy and personal space so that you can remain productive. Is there anything that you can share with us today?
AUGUST 31, 2016
This of course, has caused there to be a lot of legal issues of ownership and privacy of data along with companies trying to discover ways to capitalize on utilizing their servers as “clouds.”. Google apps, for example, has your standard apps (like Microsoft Office Suite) that you once had installed onto your Mac or PC solely accessible from online. The “Cloud”. Benefits.
“Learning should be fun!” But what’s “fun?”
SEPTEMBER 2, 2013
” “Let’s have them explore a haunted museum, clicking on silly things to learn about data privacy.” ” All of the above are examples of smearing “fun” lipstick on the pig of an information presentation. Many people will say that exploring the museum to reveal all the bullet points about data privacy is gamelike and therefore “fun.”
Big Learning Data
DECEMBER 23, 2013
• Variety : Big learning data connects the dots on a variety of information from talent, performance, demographics and business metrics. Collecting data through interviews with learners’ managers, for example, costs more but yields more data. • Privacy, security and transparency issues : Strategic, legal and codes of conduct elements. • Values sensitive : Alignment to an individual’s beliefs about privacy, openness and individuality. • Privacy : Organizations may want to define areas where privacy levels are different.
Four Basic Skills for 2020
Learning and Working on the Web
JULY 13, 2014
The report identified six drivers of change. I’ve added links to examples of each, three years later. New media, that pervade every aspect of life – Online Privacy. For example, I am constantly following/unfollowing on Twitter in an attempt at optimal filtering; an impossible but worthwhile goal. It reminded me of the need to develop new workplace disciplines.
How to Create Rollovers, Pop-ups and Branching for Lectora e.
AUGUST 5, 2012
Tin Can: My First impressions from mLearnCon 2012
JUNE 21, 2012
Summary: Tin Can is designed to provide a common data storage for learning experiences across a number of devices/platforms/media/information systems. Also, going back to the point of Tin Can not being SCORM, this example very clearly explains that. What about data privacy? I attended a session by Aaron Silvers, Community Manager at Advanced Distributed Learning (ADL).
xAPI, LRS – The Interview
JANUARY 12, 2015
Part of the problem though is that there is a lot of information out there, some of it erroneous in nature and honestly, equally confusing. In early December, I decided to present the real facts, the real insight and eradicate the confusion. This work informed the conversations with several current and former ADL friends. My next questions are related to privacy and security.
Compliance Training: Doing Something About the Least Popular Training on Earth
MAY 10, 2013
Once she had hard-fought answers to those questions, she turned to technology, assessments, pathways and branching to deliver both universal and personalized training, information and support. As Charles Jennings wrote in a blog post rich with examples, “The list of non-compliance incidents in highly regulated industries could go (on) almost ad infinitum.”. Meet the panel. It should.
Top 11 Disruptive E-Learning Technologies For 2013
AUGUST 14, 2013
Big Data analytics can help us make well-informed decisions about the learning programs that we develop. It allows track informal learning experiences such as playing games and simulations, and also real-world activities (such as visiting web sites, attending conferences, etc.) ” ~ Forbes Magazine. INTRODUCTION. THE TOP 11 LIST. BIG DATA. TIN CAN API. and not just digital ones!
10 Social Media Tools For Learning
The eLearning Coach
NOVEMBER 16, 2009
Do you have a training or information need that could benefit from a social media strategy? Each tool fulfills at least one of these criteria: encourages collaboration; enables user-generated content or input; provides a way to share; and facilitates informal or formal learning. For example, there is a Moodle module for starting a Dimdim session directly from within Moodle.
To BYOD or not to BYOD at work? That is the question
JULY 7, 2016
The mobile worker needs instant access to information and uses more than one device during the day in order to always stay connected. This keeps people more focused when looking for new information, which positively influences their productivity. How can data privacy of employees can be protected? This is called BYOD — Bring Your Own Device — at work. Why is that? Go BYOD!
Tips for Lectora e-Learning Software Screen Recordings
AUGUST 20, 2012
Sample Courses. Examples of Lectora Titles. -->. Helpful Information. -->. The best way to communicate detailed information with an audience is usually via video. Use these tips for screen recordings to highlight important information for learners: Title clips. Help learners pinpoint key details by marking the important information with a circle or box.
Presidential Thoughts on Innovation and Technology
AUGUST 28, 2008
Gordon Synder of Gordon's Information and Communications Technologies (ICT) Blog has a great post titled Obama on Technology and Innovation where Gordon summarizes Obama's policy. Ensure the full and free exchange of information among Americans through an open Internet and diverse media outlets: - Protect the Openness of the Internet. Improve America's competitiveness.
Owning our data
Learning and Working on the Web
JULY 8, 2014
Individual control over data may be a more robust way to to ensure some level of privacy. The Respect Network is an early example of this move, providing a secure network to share private data. Meanwhile, the IoE is seen by some active players in the field as a way to trade data for information. Who will own it and who will control it? “In real life, things go wrong.
ASTD #TK11 – Opening Keynote Kara Swisher
FEBRUARY 2, 2011
issues you need to be aware of (if you’re involved in delivery of information): Social Computers have traditionally been hard to use… Google is like giant yellow pages. Information is ever-changing When you apply social tools to information, it makes it more useful Quora as an example of information with social Everybody becomes a producer of content (people make Facebook useful by posting pictures, text, links, etc. People filter it, they provide good information. Once people can’t be anonymous, they stop saying bad/dumb things…) Privacy?
January 2010 Informal Learning Hotlist
Jay Cross's Informal Learning
JANUARY 29, 2010
Top Informal Learning links for the first month of 2010. This is an example. Facebook’s Zuckerberg Says The Age of Privacy is Over - ReadWriteWeb , January 9, 2010. The End of the Industrial Training Era - Informal Learning , January 2, 2010. Informal learning is like that. Tags: Informal Learning Yesterday’s #lrnchat was on crowdsourcing. The crowd picks this list, not I. Networking Reconsidered - HarvardBusiness.org , January 4, 2010. Tonight On CrunchGear: Live At CES - TechCrunch , January 7, 2010. Skinner Box?
Twelve Ways to Add Value to Open Source LMS Systems
Vikas Joshi on Interactive Learning
NOVEMBER 29, 2011
Here we deal with problems such as grade data privacy, activation and deactivation of users for business reasons, and protecting sensitive business information arising from learning systems from prying eyes. 2. Examples include news, events, calendar, assignments, course list etc. Better structuring of information to be shown on landing page to facilitate users to quickly see needed updates and get access to other areas of the system 3. User Management User management is the starting point in making Moodle successful. What questions are learners failing consistently?
Making Sense of Research
MARCH 17, 2015
And low and behold, a massive example was revealed last week. The possibility is to use analytics that combine the power of large numbers with a bunch of other descriptive data to be able to investigate things at scale. In general, research like this is hard since it’s hard to get large numbers of subjects, but large numbers of subjects is a much better basis for study (for example, the China-Cornell-Oxford Project that was able to look at a vast breadth of diet to make innovative insights into nutrition and health). So, smartphones have lots of sensors. mobile technology
Terms and Conditions May Apply
Dont Waste Your Time
OCTOBER 24, 2014
In the film they highlight one example, the UK shop ‘GameStation’ changed their T&Cs, for only a very short time, to include the text that you are signing away your immortal soul’ ! In the first days of the Internet I remember the articles and books written about online privacy and how protective we need to be of our details. But how can we do so safely?
Do students understand their ‘digital footprint’ and how it can affect their employability?
Dont Waste Your Time
OCTOBER 28, 2011
While the topic(s) and reflective activity the students are presented with are the same (including the majority of the responses given) the examples have been updated and improved … there are far more examples to choose from for a start! Here are a few of the examples/links I use in the presentation: I am blowing the airport sky high! Click to view. Fingered!
Book Review: “Always On”
Dont Waste Your Time
JULY 24, 2014
’, ‘Disconnected’, and ‘iSpy: The End of Privacy’ this book is a comprehensive look at not only the technology but our own willingness to embrace it and include it in all aspects of our daily activities. What are Microsoft or Google going to do, for example, with all these photos people posted everywhere?