MOOCs and Web February 2015. MOOCs and Web 2 MOOCs and Web 2015 Jean-Charles POMEROL Professeur émérite UPMC Président honoraire UNF3S.

Slides:



Advertisements
Similar presentations
Social Service Accountability The state of the Industry JABR Software, Inc
Advertisements

The State of ICT4D in Relief and Development Carol Bothwell Catholic Relief Services March, 2013.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
Damian Leibaschoff Support Escalation Engineer Microsoft.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Bundubox ITU IOT IOT APPLICATION CHALLENGE. Proposal ▫Main idea ▫Local Communication Issues, Involved Solution ▫Bundubox: Local off the grid ip communication.
Slide: 1 3 rd WGCapD Meeting – Derhadum, India – April WGCapD e-learning Course Hilcéa Ferreira/INPE.
Gender & ICT Policy. Session Objectives Understand how gender might shape differential access and use of ICTs by men and women and why ICT policy should.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
WLMA 2010 M ICROSOFT D IGITAL L ITERACY. W HAT IS D IGITAL L ITERACY ? “The goal of Digital Literacy is to teach and assess basic computer concepts and.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
GEO Work Plan Symposium 2012 ID-05 Resource Mobilization for Capacity Building (individual, institutional & infrastructure)
Eurostat Unit B3 – Statistical Information Technologies Data transmission tools and services 15/05/ eDAMIS The standard solution for transmitting.
Project Conference October 2005, Wolfsberg (AT) - Slovenj Gradec (SLO) DIA-SPORT Association Bulgaria 1 DIA-SPORT ASSOCIATION EU-RIPIDES Improvement.
Functions of a Database Management System
Tablets Laptops PDAs Smart Phones Mobile Commerce &Wireless Network.
Harnessing the power of Peer-to-Peer technology to create a secure and low-cost distributed Filing System Pablo www. Carballude.es González.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
Bochum, June 2013 Luk Zelderloo Secretary General EASPD
Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.
Iffat Ansari ICTech Teacher In the name of Allah, most gracious, most compassionate By the educators and for the educators.
Chapter 21 Distributed System Security Copyright © 2008.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Cooperation among schools …on environmental topics at local and international level.
Africa IXP. Outline / Overview Connectivity in Africa 400’000’000.
1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,
Designing Services for Security: Information Security Management throughout the Service Lifecycle Sarah Irwin & Craig Haynal 2015 Penn State Security Conference,
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Cooperation among schools …on environmental topics Part one – Local level.
England EAAL Impact Forum Adult learning and Technology 23rd April 2015 Susan Easton Head of Digital Learning.
Wales EAAL Impact Forum Adult learning and Technology 17 th April 2015 Susan Easton Head of Digital Learning.
Create & Innovate ICTs for Education? Technology without Context lacks Purpose.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
Northern Ireland EAAL Impact Forum Adult learning and Technology 17 th June 2015 Kevin Campbell-Wright Digital Project
Ministry of Education and Higher Education (MEHE) - Lebanon EGM on ICT Indicators Adoption and Data Collection. Cairo, Egypt 13 – 15 February 2007 Cairo,
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Owen P. Hall, Jr., P.E., Ph.D. Kenneth Ko, Ph.D. March 2013 Society for Information Technology and Teacher Education Trends in Collaboration Networks Applications.
Level 1 ECDL Award Day 1 – Introduction to your Programme of Learning.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
EFFECTIVE, EFFICIENT AND ETHICAL ELECTRONIC CASE MANAGEMENT SYSTEMS Sue Tolley, Barnardos Australia Bronwen Elliott, Good Praxis P/L.
# 1 6/8/2016 CS 147- Computer Architecture Network Communication and YOU By Ali Farsio.
Group 5 Introducing an Impact Orientation: Institutions IFAD Workshop on Impact Achievement.
The Big Interview Joy Knight EDU 650 Suhad Sadik July 20, 2015.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Implementation of Electronic Health Records at Choctaw General Hospital Lisa Sims November 12, 2012.
General Principles for Phyto Ecert (day 1) Peter Johnston Plant Exports.
Presented by, Sreya G S3 EC
The Internet and the Future
Redundancy and diverse routing for data exchange
General presentation of MOOCs
Engaging Faculty in a Model of Proactive Accessibility
Presentation transcript:

MOOCs and Web February 2015

MOOCs and Web 2 MOOCs and Web 2015 Jean-Charles POMEROL Professeur émérite UPMC Président honoraire UNF3S

MOOCs and Web I - What are the future users of MOOCs ? 3 MOOCs and Web Every person seeking for new knowledge, all over the world 2- Students in countries where there is a shortage of higher education. This public needs exercises, dialog, certification; consequently they need a very important network capacity. 3- Flipped teaching for the students in developed countries 4-Continuing education everywhere. This public needs also assessment of capabilities and certification.

MOOCs and Web 4 MOOCs and Web 2015 II - Web quality of services for end users 1-For people involved in action 2 and 4, the first need is to have a very high speed internet via satellites. They cannot afford that the connection fails when the MOOCer is in the middle of an exercise. Speed, security and quality are compulsory. 2- Nobody can ensure that the person fulfilling the exercises in a MOOC is really the person who claims for the certificate of achievement. This is a real challenge for the future of the MOOCs and it has probably no simple solution even in the next generation of web. 3- Nevertheless we must think about securing the exchanges between the MOOC followers (community of MOOCers) and introduce the notion of closed group in which everybody can communicate with anybody and in which the coordinator can see all the exchanges.

MOOCs and Web 5 MOOCs and Web 2015 III- Security of data 1- FERPA (Family Educational Rights and Privacy Act) prohibits « the improper disclosure of personally identifiable information derived from education records ». It must be also true for the MOOCs. 2- As a consequence, internet must warranty that nobody, even the MOOC designer, cannot freely access to MOOCers’ data. Automatic encryption of personal identification in a MOOC can be required by the user with a key only available to him/her, with the possibility to switch from privacy for training to publicity for certification.