Tag Archives: Security

  • 4

Mobile Devices: Paradigm Shift or Just Another Content Delivery Mechanism?

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Internet Safety,mobile device,Privacy,Social Networking Tags : 

I’m curious about whether you think the integration of mobile devices into curricula is a “game changer/paradigm shift” or whether you regard it as just another content delivery mechanism. As a technical communicator, I’ve looked at the mobile device primarily as an additional delivery vehicle; a channel that can be used to reach others. As an educator, I’m thinking of the possibilities of a course structured around mobile devices as the main education platform. As an information security practitioner, I’m wary of the privacy risks and potential cyberstalking.

Will mobile devices be a boon or a bane? Will they cause a profound change in learning? Are they just a stepping stone to the next big thing?

I’m not sure. Let’s look at a few recent game changers:

  • Personal computing has been and will continue to become ubiquitous. We have access to immense amounts of information. That has changed how we research practical information. Do any of you use printed maps? What about calling 411 for someone’s phone number?
  • The growth of E-readers may eventually sound the death knell of traditional print. Newspapers are scrambling to adapt to a digital audience as they find print circulation shrinking.
  • The transatlantic cable has been described as the Victorian Internet in the way it revolutionized communication.
  • The telephone and the elevator made modern skyscrapers possible.

What about the smartphone?

  • Access to banking is now available through smartphone apps and you either can or will be able to make payments directly from your mobile device. You can also store shopping card info and coupons.
  • Mobile devices have greatly increased the access to social networking.
  • QR codes connect mobile devices to Internet-based information

Do you agree that these are game changers? Are there mobile apps that you do consider to be game changers?

Addressing the educators in my audience, how do you see integrating mobile devices into your courses? Will you redesign your course to take advantage of their capabilities? Are they just “one more thing” to consider in your content delivery? Will you incorporate social networking with both a mobile and traditional computer interface?

I’m interested in your thoughts. I’m not an expert in this area, but I’m trying to adapt to the possibilities.

Please leave a comment so we can have a discussion! Some of you have contacted me individually. Please post here so we can learn from each other.

By the way, If we’re really lucky, maybe mobile learning will be the death of PowerPoint!

Ben Woelk
Co-chair, Awareness and Training Working Group
EDUCAUSE/Internet2 Higher Education Information Security Council

Policy and Awareness Analyst
Rochester Institute of Technology

ben.woelk@rit.edu
https://security.rit.edu/dsd.html
Become a fan of RIT Information Security at https://rit.facebook.com/profile.php?id=6017464645
Follow me on Twitter: https://twitter.com/bwoelk
Follow my Infosec Communicator blog at https://benwoelk.wordpress.com

This blog entry is cross-posted at https://www.educause.edu/blog/bwoelk/MobileDevicesParadigmShiftorJu/227783


  • 0

Irony

Category:Information Security,Infosec Communicator,Risk,Uncategorized Tags : 

I received the following notification today:

DHS Announces the Release of New Training Course Workplace Security Awareness No-Cost Critical Infrastructure Workplace Security Training

The Department of Homeland Security announces the availability of IS-906, Workplace Security Awareness, a no-cost training course developed by the Office of Infrastructure Protection Sector-Specific Agency Executive Management Office.

Access IS-906 on the Federal Emergency Management Agency Emergency Management Institute Web site: https://training.fema.gov/EMIWeb/IS/IS906.asp

The online training provides guidance to individuals and organizations on how to improve security in the workplace.  The course is self-paced and takes about an hour to complete. This comprehensive cross-sector training is appropriate for a broad audience regardless of knowledge and skill level.  The course promotes workplace security practices applicable across all 18 critical infrastructure sectors.   The training uses innovative multimedia scenarios and modules to illustrate potential security threats.  …

A certificate is given to participants who complete the entire course.

Sounds reasonable, right?

Ironically, the course asks you to provide your SSN.

Sigh…


  • 0

Technical Communicator 419 Scheme

Category:Information Security,Infosec Communicator,STC Tags : 

The STC Europe SIG has a great parody post today on a Nigerian 419 scheme with a twist: They want access to your bank account to impose penalties for not turning the writing/editing assignments around quickly enough.

DEFINITELY WORTH A READ.


  • 10

Why Professional Conferences Matter

Category:Higher Education,Information Security,Infosec Communicator,Leadchange,Social Networking,STC Rochester Tags : 

I’ve heard a lot of discussion recently that professional conferences aren’t needed anymore because of the inter-connectivity afforded by the Internet. Why is it reasonable to spend hundreds or even a couple of thousand dollars to attend a face-to-face conference?

Over the last week, I’ve been part of the leadership teams for and attended two conferences, the STC Rochester Spectrum regional technical communications conference and the EDUCAUSE Security Professionals Conference in San Antonio. It’s been an incredible experience.

Here’s what I’ve found:

  • Spectrum provided an opportunity for me to meet face-to-face with people I’ve been talking to via social networking for almost a year. This is important because I was able to have indepth conversations with key leaders about critical issues affecting our profession. These conversations wouldn’t have been viable in social media. They may have been doable through Skype or phone, but the ability to read the nuances of a conversation when you’re not together is really difficult.
  • Spectrum also provided STC Rochester an opportunity to showcase our abilities (and to have those abilities affirmed by other community and society leaders.) It was important for our chapter to understand our connections and I think our membership was “blown away” that international leadership would attend. We were truly honored.
  • Spectrum provided state of the art content in technical communications. In the sessions I facilitated, Kristi Leach was able to test a usability session with peers and gain invaluable feedback and Hannah Morgan provided a fresh look at the importance of social networking in your branding and in your career.  Other speakers presented key information about current tools and the future of our profession.

The Security Professionals conference allowed me to see (way too briefly) colleagues that I speak with on conference calls and work with, but from a distance of thousands of miles. We’ve become friends and it’s great to be able to unwind with a team that’s worked hard together all year.

  • The Security Professionals conference gave me the opportunity to present with a panel of fellow practitioners that are remediating private information at our respective universities. It gave our audience an opportunity to hear how four schools are tackling similar problems and the “unvarnished” truth of the stuggles we’ve faced and inroads we’ve made. This was invaluable to our attendees, because they could ask questions and establish the networking contacts that will save them time and dollars as they tackle similar problems. We become resources for each other.
  • The Security Professionals conference also allowed me to work in tandem with Cherry Delaney of Purdue University, my former co-chair of the Awareness and Training Working group. We were able to share with a group of ISOs, information security practitioners (and even a CIO) the steps needed to create a holistic strategic Security Awareness plan and share examples of how we’ve approached the task of educating end users. We were also able to work with them in small groups to develop specific steps and put together the beginnings of an action plan.

The interaction at a professional conference is one of the key enablers to moving forward in your profession, becoming “unstuck” when you’re out of ideas, and establishing a network of contacts to help each other.

This interaction was helped by the fact that the conferences were of a size (120 and 350) where you could actually see the same people in several venues. Large conferences don’t always allow for that.

For me, professional conferences matter.

What do you get out of them?

 

Related content


  • 0

Top Ten Ways to Shockproof Your Use of Social Media

Category:Cyberstalking,Facebook,Information Security,Infosec Communicator,Internet Safety,Presentations,Social Networking,STC,Uncategorized Tags : 

How do you stay safe online? Here are ten ways to shockproof your use of social media:

Tip #1: Use strong passwords

Tip #2: Keep your computer patched and updated

Tip #3: Use appropriate security software

Tip #4: Learn to recognize phishing and other scams

Tip #5: Use social networks safely

Tip #6: Remember who else is using social networking sites

Tip #7: Be wary of others

Tip #8: Search for your name

Tip #9: Guard your personal information

Tip #10: Use privacy settings

Top Ten Ways to Shockproof Your Use of Social Media Presentation


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,234 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner