Post has attachment
Hello Everyone.
Here is my final case study that involves faculty members in higher education faced with the situation where they are victims of identity theft in the form of a fake Facebook profile. My presentation is available at https://docs.google.com/a/hawaii.edu/presentation/d/1TE0mmEO85cXhHQ3j3Lnm1836nr5zQPYKMdlchwDoXnY/edit?usp=sharing

Post has attachment

Post has attachment
My case study proposal is entitled: "The Perils of Fake Social Media Profiles - A Growing Governance, Risk and Compliance (GRC) Concern)", based on the article on the Illinois Republican lawmaker's resignation due to Facebook and Twitter hacks.

Case Study Purpose: There is significant risk from the growing number of business intelligence entities readily available to scour social media profiles for information about your company, your employees, your proprietary business projects and intellectual property. Fake identities and postings listing a business’s proprietary information can be potentially damaging and may lead to legal implications and the “loss of employment”. These concepts will be looked at closer with this case study.


Here is the link to the Case Study: https://docs.google.com/a/hawaii.edu/document/d/1SGM7xCuyWl9ZyF6-jEQ7wXrq9K48AriPYP6yYwqNglY/edit?usp=sharing

Here's the link to the Presentation:
https://docs.google.com/a/hawaii.edu/presentation/d/1DHTm3AJ2CR5mK16N6dpoxVMJ3LAsrNMS3bvBVSjOE1Q/edit?usp=sharing

Aloha,
Angela

Post has attachment
Case Study Proposal: Teaching Challenges:
Ethical dilemmas in the trade offs of students using technology in class lectures. I chose to use Shirky's Why I just asked my students to put their laptops away. It seems to me a very good fit with the problems and issues facing LTEC faculty and students today. It specified the guiding role of classroom leadership that has not been discussed that much yet. With this in mind the process of thinking through these issues before even entering the classroom or beginning to write the syllabus seems significant. Aloha

Proposal:
https://docs.google.com/a/hawaii.edu/document/d/1u5v2R6IiM3vK78WG0mCmE5uw8DJYbHvrIXG19nI4A2o/edit?usp=sharing

Artifact: Google Slides
https://docs.google.com/presentation/d/1_K0EgOZ8fEtP0tkVmXkmBsdmKtj_BWh-s6-S6aZaXMw/edit#slide=id.g1620a79731_0_127

Post has attachment
With its growing popularity, tablets are being more and more incorporated in today’s classrooms. Tablets are no longer used strictly for entertainment but as powerful learning tools that can enhance and improve the educational experience of students in grades K-12. The case study focuses on identifying the benefits and challenges of tablet in the classroom.

Presentation: https://docs.google.com/a/hawaii.edu/presentation/d/1sKSqAK9oF9HHPafAyRggxRSWfkh9RJtpbuMvy1abnho/edit?usp=sharing
Commenting is disabled for this post.

Post has attachment
Final Case Study Proposal: Multitasking in the Digital Classroom

Inspired by Shirky's 'Why I Just Asked My Students to Put Their Laptops Away', my proposal centers around multitasking in the digital classroom, such as ours.

Post has attachment
The cultivation of your personal brand is a lifelong endeavor, but an random hacker has now compromised your online identity. What are the appropriate courses of action to rebuild your personal brand? How do undo the damage done?

https://docs.google.com/a/hawaii.edu/document/d/1gob8SLS3uBXUTYE3TgJz9uJZAfkaqa08s_MNi4a_l_U/edit?usp=sharing

Post has attachment
Here is my final proposal.  I decided to wrap this lesson on Cyber Security in a class I will be teaching at UHM Shidler College in Spring 2017.  Also, I provided a link to my ppt presentation for tomorrow's class meeting.  https://docs.google.com/a/hawaii.edu/presentation/d/15_OQC3pCvXk-pu_DfUX1I4YfIiH2CvTbHyr_O6kjWHk/edit?usp=sharing

Post has attachment
Here is my final case study proposal.
Imagine you have worked hard your whole life towards becoming an attorney and a politician, yet in the course of one day, you learn that another person has claimed your identity on Twitter and Facebook. What do you do?
Twitter Damage Control: “What’s the worst that could happen?”

Post has attachment
Final Case Study Proposal. Link to PPT slides in doc header.

Adapted from "Facebook & Twitter fake accounts result in lawmaker resignation" This case study focuses on fake, parody, and malicious social media accounts and their affect on you.
Wait while more posts are being loaded