Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Charlotte, NC :Information Age Publishing, Incorporated,
    UID:
    edocfu_9960177480002883
    Umfang: 1 online resource (90 pages)
    ISBN: 1-64802-352-5
    Serie: Quarterly Review of Distance Education - Journal
    Anmerkung: Front Cover -- Quarterly Review of Distance Education Editors and Editorial Board -- Anymir Orellana Editor -- Vanaja Nethi Assistant Editor -- Department Editors -- International -- Ray J. Amirault, Illinois State University -- Michelle Rogers-Estable, SUNY Oneonta -- Deborah Seepersaud, Barry University -- Editorial Board -- Contents -- Statement of Purpose -- Creating Accessible and Inclusive Online Learning -- Moving Beyond Compliance and Broadening the Discussion -- Patrick R. Lowenthal Krista Greear -- Boise State University Blackboard -- Michael Humphrey Alison Lowenthal -- Boise State University Idaho Division of Vocational Rehabilitation -- Quincy Conley Lisa A. Giacumo -- A.T. Still University Boise State University -- Joanna C. Dunlap -- University of Colorado Denver -- Accessibility is a hot topic in online education these days. Despite the increased focus on accessibility, most discussions of creating "accessible" online courses and elearning simply focus on adding alternative text to images and captions to vi... -- Introduction -- Background -- Disability Laws and Guidelines -- The Americans With Disabilities Act -- Rehabilitation Act of 1973, Section 504 & -- 508 -- Web Content Accessibility Guidelines -- 1. WCAG 2.0 Level A: "color is not used as the sole method of conveying content or distinguishing visual elements." This means that if the color represents something specific (e.g., within a map), there needs to be another way that information is... -- 2. WCAG 2.0 Level AA: web content should have a "color contrast ratio of at least 4.5:1." This becomes especially applicable in multimedia, and text and graphics are often overlayed, frequently seen in PowerPoints or Google Slides. , 3. WCAG 2.0 Level AAA: "a sign language video is provided for all media content that contains audio" (W3C, 1999, 2008, 2018). While it would be ideal for all videos to include a sign language companion, most schools do not do this as a standard p... -- Supporting All Learners -- Learners With High Needs Learning Online -- STRATEGIES FOR MAKING ONLINE LEARNING ACCESSIBLE, USABLE, AND INCLUSIVE FOR ALL -- Accessible and Usable Courses and Content -- Auditory Content That Must Be Consumed With Sight -- Visual Content That Must Be Consumed by Sound or Touch -- Table 1 -- Accessibility Checklists and Resources -- Accessible and Inclusive Pedagogy and Course Design -- Multiple Means of Engagement -- Multiple Means of Representation -- Multiple Means of Assessment -- Create Transparent Assignments -- Consistent and User-Friendly Design -- Modularize Course Content -- Improve Readability by Simplifying Language -- Attend to Social Presence and Community Building -- Accessible and Inclusive Teaching -- Get to Know Learners -- Regular and Equitable Interaction -- Timely Feedback -- Monitor Learner Progress -- Synchronous Communication -- Remaining Flexible -- Implications and Conclusion -- References -- The Effect of Distance Education on Information Literacy Case Study -- Iran -- Mohsen Keshavarz -- Department of Medical Sciences Education Development, Torbat Heydariyeh University of Medical Sciences, Torbat Heydariyeh, Iran -- Information literacy lies at the core of lifelong learning. It empowers people in all ages of life to seek, evaluate, use, and create information effectively on their personal, social, occupational, and educational goals. It is a fundamental human ri... -- Introduction -- Background and Importance of the Study -- Information Literacy and E-Learning -- The Relationship Between Information Literacy and Entrepreneurship. , 1. The role and impact of information literacy on the development of personality traits that are considered essentials for entrepreneurship, such as creativity, risk- taking, persuasive achievement, and independence. -- 2. The role of information literacy in the process of carrying out an economic activity based on new technologies in the current information society, and contributing to the realization of the concept of knowledge-based entrepreneurship. -- A Brief History of Distance Education -- Methodology -- Research Goal and Questions -- 1. What is the level of the determination of the nature of the information of distance education students at the University of Tehran? -- 2. What is the level of effective access to information about distance education students at the University of Tehran? -- 3. What is the level of critical assessment of distance education students at the University of Tehran? -- 4. What is the level of targeted use of Information on distance education students at the University of Tehran? -- Instruments and Methods -- Figure 1 -- Findings -- Table 1 -- Distribution of the Participants Based on Their Gender -- 23 -- 23% -- 26/16 -- 0.001 -- 77 -- 77% -- 100 -- 100% -- Table 2 -- Descriptive Statistics (Dispersion and Central Index) of Information Literacy Variable in Control and Experimental Groups -- 8/12 -- 2/11 -- 1 -- 0 -- 50 -- 0.30 -- 8/89 -- 2/31 -- 1 -- 0 -- 50 -- 0.33 -- 32/88 -- 2/76 -- 1 -- 0 -- 50 -- 0.39 -- 36/32 -- 3/15 -- 1 -- 0 -- 50 -- 0.45 -- Table 3 -- The Results of the Levene Test for Homogeneity of Variance Error -- 98 -- 1 -- 2/22 -- 0.041 -- Table 4 -- Kolmogorov-Smirnov Test -- 0.175 -- Figure 3 -- Table 6 -- The Test of the Effect of Within Variables -- 1 -- 0.001 -- 1 -- 0.857 -- 1 -- 0.001 -- 1 -- 0.001 -- 1 -- 0.001 -- 1 -- 0.857 -- 98 -- - -- - -- 98 -- - -- - -- 1 -- - -- - -- - -- 1 -- - -- - -- -. , 99 -- - -- - -- - -- 99 -- - -- - -- - -- Table 7 -- The Results of Analysis for T Test -- 0.80 -- 0.44 -- 1.45 -- 0.91 -- 49 -- 3.44 -- 0.59 -- 5.81 -- 0. 001 -- 49 -- Figure 4 -- Table 8 -- The Analysis of Factors of Information Literacy Variable -- 0.38 -- 1.90 -- Weak -- 0.10 -- 0.08 -- 2.87 -- 0.019 -- 0.75 -- 3.75 -- Strong -- 0.09 -- 0.39 -- 1.95 -- Weak -- 0.13 -- 0.48 -- 2.40 -- Weak -- 0.14 -- 0.39 -- 1.95 -- Weak -- 0.14 -- 0.07 -- 4.23 -- 0.001 -- 0.85 -- 4.25 -- Strong -- 0.10 -- 0.35 -- 1.75 -- Weak -- 0.11 -- 0.48 -- 2.40 -- Weak -- 0.21 -- 0.22 -- 1.10 -- Very weak -- 0.10 -- 0.11 -- 2.61 -- 0.038 -- 0.72 -- 3.60 -- Strong -- 0.08 -- 0.29 -- 1.45 -- Very weak -- 0.07 -- 0.42 -- 2.10 -- Weak -- 0.04 -- 0.43 -- 2.15 -- Weak -- 0.06 -- 0.06 -- 2.12 -- 0.041 -- 0.83 -- 4.15 -- Strong -- 0.10 -- 0.39 -- 1.95 -- Weak -- 0.18 -- 0.49 -- 2.45 -- Weak -- 0.14 -- 0.22 -- 1.10 -- Very weak -- 0.17 -- 0.05 -- 0.79 -- 0.75 -- 0.56 -- 2.80 -- Medium -- 0.12 -- 0.21 -- 1.05 -- Very weak -- 0.07 -- 0.52 -- 2.60 -- Medium -- 0.13 -- Conclusion and Discussion -- Research Recommendations -- Research limitations -- 1. Due to faculty entrepreneurship courses at Tehran University being nondirect, getting access to students and the data collection was very difficult and time- consuming. -- 2. The effects of intervening variables as students were completing questionnaires (internet outage during the online completing of the questionnaire) -- 3. The number of questions in the questionnaire (49 questions were a lot). -- References -- Appendix 1 -- Information Literacy Questionnaire According to the American College and Research Libraries Association standard -- SECTION I -- SECTION II -- 1. What is the most important reason for choosing your research topic (Select one option)?. , 2. If one of the lecturers asks you to write an analytical essay on "FAO" if you are not familiar with it which of the following sources gives you the best background or background information? (Select one option) -- 3. If you need to narrow down your research topic (examining the relationship between self-efficacy and organizational entrepreneurship), who is the most qualified person to consult? (You can select more than one option) -- 4. Which are the best keywords to search the following query and find the results in Word format? (Select one option) -- 5. Which of the following is relevant to the official stages of publishing an idea? (You can select more than one option) -- 6. Which of the following sources of knowledge are generally organized to facilitate access to the information? (Select one option) -- 7. Which of the following sources can be used as the most appropriate source for identifying journal articles? (Select one option) -- 8. Management Knowledge Research Journal is a publication of the Institute of Public Administration. In this work, research papers on the topic of public administration are published. Specify the type of this work. (Select one option) -- 9. Which of the following sources selects, arranges, and presents relevant information from texts in a particular field? (Select one option) -- 10. If you need a book that only has one copy in the library and one copy has been borrowed into another someone, how can you borrow another copy? (Select one option) -- 11. If the book you want is borrowed by someone else and you need bibliographic information. What works best at this time? (Select one option) -- 12. To help you with your search on the topic of "Strategic Planning" there are many articles that cover different aspects of this topic. What is the best thing at this time? (Select one option). , 13. Which of the following tools should you choose when identifying valid journal articles on the subject of EFQM? (Select one option).
    Weitere Ausg.: ISBN 1-64802-351-7
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    W. W. Norton & Company
    UID:
    kobvindex_ZLB35025195
    ISBN: 9780393866674
    Inhalt: " It's not just computers8212 hacking is everywhere.Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities,we call them loopholes. We call exploits tax avoidance strategies. And there is an entire industry of black hat hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else. Once you learn how to notice hacks, you'll start seeing them everywhere8212 and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you. Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker8212 at inhuman speed and scale8212 the results could be catastrophic. But for those who would don the white hat, we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world. "
    Inhalt: Biographisches: " Bruce Schneier is a renowned security technologist, called a security guru by the Economist . He has written more than one dozen books, including the New York Times bestseller Data and Goliath (2014) and Click Here to Kill Everybody (2018). He teaches at the Harvard Kennedy School and lives in Cambridge, Massachusetts." Rezension(2): "〈a href=http://www.publishersweekly.com target=blank〉〈img src=https://images.contentreserve.com/pw_logo.png alt=Publisher's Weekly border=0 /〉〈/a〉: Starred review from November 28, 2022 “Hacking is something that the rich and powerful do, something that reinforces existing power structures,” contends security technologist Schneier ( Click Here to Kill Everybody ) in this excellent survey of exploitation. Taking a broad understanding of hacking as an “activity allowed by the system that subverts the... system,” Schneier draws on his background analyzing weaknesses in cybersecurity to examine how those with power take advantage of financial, legal, political, and cognitive systems. He decries how venture capitalists “hack” market dynamics by subverting the pressures of supply and demand, noting that venture capital has kept Uber afloat despite the company having not yet turned a profit. Legal loopholes constitute another form of hacking, Schneier suggests, discussing how the inability of tribal courts to try non-Native individuals means that many sexual assaults of Native American women go unprosecuted because they were committed by non–Native American men. Schneier outlines strategies used by corporations to capitalize on neural processes and “hack... our attention circuits,” pointing out how Facebook’s algorithms boost content that outrages users because doing so increases engagement. Elegantly probing the mechanics of exploitation, Schneier makes a persuasive case that “we need society’s rules and laws to be as patchable as your computer.” With lessons that extend far beyond the tech world, this has much to offer. " Rezension(3): "〈a href=http://www.kirkusreviews.com target=blank〉〈img src=https://images.contentreserve.com/kirkus_logo.png alt=Kirkus border=0 /〉〈/a〉: December 1, 2022 A cybersecurity expert examines how the powerful game whatever system is put before them, leaving it to others to cover the cost. Schneier, a professor at Harvard Kennedy School and author of such books as Data and Goliath and Click Here To Kill Everybody, regularly challenges his students to write down the first 100 digits of pi, a nearly impossible task--but not if they cheat, concerning which he admonishes, Don't get caught. Not getting caught is the aim of the hackers who exploit the vulnerabilities of systems of all kinds. Consider right-wing venture capitalist Peter Thiel, who located a hack in the tax code: Because he was one of the founders of PayPal, he was able to use a $2,000 investment to buy 1.7 million shares of the company at $0.001 per share, turning it into $5 billion--all forever tax free. It was perfectly legal--and even if it weren't, the wealthy usually go unpunished. The author, a fluid writer and tech communicator, reveals how the tax code lends itself to hacking, as when tech companies like Apple and Google avoid paying billions of dollars by transferring profits out of the U.S. to corporate-friendly nations such as Ireland, then offshoring the disappeared dollars to Bermuda, the Caymans, and other havens. Every system contains trap doors that can be breached to advantage. For example, Schneier cites the Pudding Guy, who hacked an airline miles program by buying low-cost pudding cups in a promotion that, for $3,150, netted him 1.2 million miles and lifetime Gold frequent flier status. Since it was all within the letter if not the spirit of the offer, the company paid up. The companies often do, because they're gaming systems themselves. Any rule can be hacked, notes the author, be it a religious dietary restriction or a legislative procedure. With technology, we can hack more, faster, better, requiring diligent monitoring and a demand that everyone play by rules that have been hardened against tampering. An eye-opening, maddening book that offers hope for leveling a badly tilted playing field. COPYRIGHT(2022) Kirkus Reviews, ALL RIGHTS RESERVED. " Rezension(4): "〈a href=https://www.booklistonline.com target=blank〉〈img src=https://images.contentreserve.com/booklist_logo.png alt=Booklist border=0 /〉〈/a〉: January 1, 2023 Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a hack as an activity allowed by a system that subverts the rules or norms of the system . at the expense of someone else affected by the system. In accessing the security of a particular system, technologists such as Schneier look at how it might fail. In order to counter a hack, it becomes necessary to think like a hacker. Schneier lays out the ramifications of a variety of hacks, contrasting the hacking of the tax code to benefit the wealthy with hacks in realms such as sports that can innovate and change a game for the better. The key to dealing with hacks is being proactive and providing adequate patches to fix any vulnerabilities. Schneier's fascinating work illustrates how susceptible many systems are to being hacked and how lives can be altered by these subversions. Schneier's deep dive into this cross-section of technology and humanity makes for investigative gold. COPYRIGHT(2023) Booklist, ALL RIGHTS RESERVED. "
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz