Blog Posts

Digital Self Defense for Technical Communicators, Part Two

Digital Self Defense for Technical Communicators was first published in the Society for Technical Communication's Intercom magazine in November 2010.  Best Practices for Safer Social Networking Organized crime is increasingly targeting users of social networking sites. Many computer criminals uses these sites to distribute viruses and malware, to find private information people have posted publicly, and to find targets for ...

Digital Self Defense for Technical Communicators, Part One

Digital Self Defense for Technical Communicators was first published in the Society for Technical Communication's Intercom magazine in November 2010. I'll be reproducing the article in several parts over the next few days. What do technical communicators need to know about information security? How do they protect both their private information and professional assets, including work they may be doing ...

Secure Mobile-an Oxymoron? (Redux)

Responses to the #1 topic on IdeaScale, "Consumers dictate device usage, not IT," indicate that MANY of you believe consumers will drive smartphone adoption in Higher Education, while the sentiment around the topic, "Get rid of the walls around your enterprise data," indicates that quite a few of you believe that core university data should be accessible to smartphone users ...

Mobile Devices: Paradigm Shift or Just Another Content Delivery Mechanism?

I'm curious about whether you think the integration of mobile devices into curricula is a "game changer/paradigm shift" or whether you regard it as just another content delivery mechanism. As a technical communicator, I've looked at the mobile device primarily as an additional delivery vehicle; a channel that can be used to reach others. As an educator, I'm thinking of ...

Apps for Integrating Mobile Devices into Classroom Use and Campus Communications

How many of you are integrating mobile devices into classroom work? In addition to my role as Policy and Awareness Analyst, I teach a couple of classes, Cyber Self Defense and Effective Technical Communication. We discuss secure use of mobile devices in the Cyber Self Defense class. We've also talked about potential attacks on mobile device users, especially as the ...


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner