Introduction Incoming cohorts of uni students are computer literate

Slides:



Advertisements
Similar presentations
They’re Computer Savvy, Right? Well, Maybe…
Advertisements

An Integrated Approach to Computer and Information Literacy Linda Ehley Alverno College Associate Professor CS EDUCAUSE 2003 Copyright – Linda Ehley 2003.
ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.
Mickey Hair Salon Cuong Le MSIT 588 Web Site Design & Management.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Educational Technology CFD 3890 Module information Contact Hours:6 per week for 7 weeks in first semester, 3 per week for 14 weeks in second semester,
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Internet & for Learning The ICT in Schools Initiative of the Department of Education and Science 1 Internet & for Learning Course Overview.
Session 11: Security with ASP.NET
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
LIS Program Expectations of Incoming Student Technology Knowledge and Skills Bill Kules and Jennifer McDaniel 2010 SLIS Symposium - Bridging the Spectrum.
NACEP Conference 2004 Capturing them in the Web: Using Web- Based Surveys to Increase Response Rates for College Freshman Debbie.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Ohio Technology Standards August 9, 2005 Why Standards in Technology? No Child Left Behind Technology Literacy requirement Computer and Multimedia Literacy.
Internet & for Learning The ICT in Schools Initiative of the Department of Education and Science 1 Internet & For Learning Objectives - Modules.
Blogging as a thinking tool Building Home/School Relationships.
Level 1 ECDL Award Day 1 – Introduction to your Programme of Learning.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
COMPUTER STUDIES Introduction. What is Computer Studies?  Many workplaces today utilise computers competencies  When applying for employment you may.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Digital Skills Award Day 1 – Introduction to your Programme of Learning.
The Web Web Design. 3.2 The Web Focus on Reading Main Ideas A URL is an address that identifies a specific Web page. Web browsers have varying capabilities.
Introduction to FOSS. Classes of software  Operating System (OS)  Software that manages all the application programs in a computer  Manages the computer.
CS457 Introduction to Information Security Systems
Architecture Review 10/11/2004
Essential Attributes of Faculty Professional Development: The Excellence in Online Education Initiative Carol McQuiggan, D.Ed. Senior Instructional Designer,
Contact Jessica Stumpff at for questions
Data Transfer between Institutions and ……..
KNOWLEDGE MANAGEMENT (KM) Session # 32
Internet Business Associate v2.0
COMP532 IT INFRASTRUCTURE
Information and Communication Technologies
Virtual Private Network
To the ETS – Accounts Setup and Preferences Online Training Course
Data and database administration
Good Morning  Please be sure to take care of your belongings.
ORACLE ADF ONLINE TRAINING BY TEKSONIT IN INDIA
Section 12.1 Section 12.2 Discuss the functions of a Web site
Setting up and Optimizing VLRCs
Building and Strengthening Upper Level
RUBRICS.
Information Security Seminar
CS 580 Human-computer interaction Lecture 01 Introduction
A Brief Introduction to the Internet
Chapter 12: Automated data collection methods
The Virtual Classroom Manager (NPAC Grading System)
Information Technology (IT)
Item 1: This task required students to evaluate search results to choose the most appropriate one for a specified topic. This task illustrates achievement.
Our Environment Staff at the university Policy and strategy
The Internet An Overview.
Information Literacy – where we are at
The Web Based Teaching Tool
IS4680 Security Auditing for Compliance
Finding Great Resources on the Internet
Activity Theory and Web-based Student Portfolio
An Introduction to Cloud Computing
Pima Medical Institute Online Education
Communications & Computer Networks Resource Notes - Introduction
BIS 221 Great Wisdom/tutorialrank.com. BIS 221 All Assignments For more course tutorials visit BIS 221 Week 2 Assignment Business.
Internet Protocols IP: Internet Protocol
Diana CSORBA - Lector Dr
Pima Medical Institute Online Education
To the ETS – Accounts Setup and Preferences Online Training Course
Cloud Computing LegalRun Solutions Why It’s Right for You!
Presentation transcript:

Introduction Incoming cohorts of uni students are computer literate Computer literacy defined by task-related checklists Web and internet skills defined by ability to use email client and browser

What is ICT literacy? Basic application skillset plus An ability to evaluate information retrieved from web An understanding of security, data integrity, privacy and ethics An understanding of information architecture, data encoding, data transfer and data storage

ICT and social context Understand ownership vs location of data Understand relationship between personal identity, current role and authentication Understand “people issues” in computer security

SHARED HOME COMPUTER Staff VPN Staff login to LMS privileged access to info? logged internet access? Staff login to LMS saved passwd? cached data? assessment info? student data? Whose email? Browser window to admin systems saved passwd? cached data? Whose MSN?

ICT and pedagogy Use of specific ICT applications may not by itself confer generalisable ICT skills Appropriate use of ICT in professional practice requires a deeper examination of ICT in the context of a particular discipline

ICT and LMSes At least 85% of unis use LMSes Online learning resources Communication tools Assessment tools No transition path to ICT options which can support sustainable online communities of practice

user / role authentication Proprietary systems create barriers to generalisable, transferable ICT literacy Application Layer Database Layer Course web pages webserver discussion email chat quiz more tools … more tools… user / role authentication LMS

Conclusions Identify discipline-specific ICT skills Identify how skills will be acquired Focus particularly on Evaluating information from internet Using communication tools effectively Understanding implications of various protocols for privacy, security, data integrity and confidentiality Understanding social context of ICT use