Thinking different. Exploring technology in different use cases Technology in Education How we are using it, and how it could be used better. Historically speaking... Technology in the classroom has changed a lot as the people in charge began to think different. [advance slide] Some early uses of modern technology from 1977 are seen here. These Commodore PET computers are considered part of the first generation of personal computers. Other ubiquitous of the time include [advance slide] the famous Apple II, and [advance slide] the commoner’s Tandy Radio Shack Model 80. These simple computers, which had capability to perform basic actions such as math, typing documents, and programming in a language called BASIC. For many people, these computers were the first taste of the future. [advance slide] The Next Generation of computers began with the Apple Lisa, [advance slide] and the more competitively priced Macintosh, which was advertised to schools. These computers featured this little futuristic gimmick called... [advance slide] the mouse. Shortly after the Macintosh’s release, Microsoft released the Windows system based on MS-DOS for IBM PCs which also utilized the mouse. [advance slide] The third generation of personal computers truly began with the legendary iMac, which may have been some students’ first look at the internet in its early form. This was followed by modern versions of Windows, including 95, XP, and 7. These computers led the way for today’s answer to modern computing, [advance slide] which includes laptops and netbooks, such as Google Chromebooks. [advance slide] The Present ● Chromebooks and other netbooks used in schools ● Cheap access to the internet and cloud storage ● Gives schools a modern learning tool with minimal technical knowledge required [advance slide] Advance to the present now. The modern age has come in quick with rapidly developing mobile device technology, from smartphones to tablets, from wearables to laptops, everything has advanced so far. Now in schools, we have devices for students to use [advance slide] like chromebooks, or other netbooks, [advance slide] which gives us cheap access to the internet and offers cloud storage for schoolwork and other assignments, [advance slide] and these devices offer schools a modern learning tool that requires minimal technical knowledge from both staff and students. These laptops have revolutionized how schools work, and after just a few short years, much of our daily classwork is completed digitally. [Advance slide] Sounds perfect, doesn’t it? Sounds perfect, doesn’t it? [Advance slide] What’s wrong? Unfortunately, no. This platform offers much for the classroom, but can easily take away more than it may be worth. [advance slide] Bugs, [advance slide] lack of internet connection, [advances slide] and off-task interventions take away from learning time in the classroom. [advance slide] Many of these problems are not uncommon, and can be extremely problematic to a class or block of digital learning. Solutions? Solutions! - Contingency Plans -- Contingency Plans Student engagement -- Student engagement engagement -- Student Better Monitoring Better Monitoring Don’t let all those problems get you down, though! [advance slide] We do have solutions for these! A major piece is [advance slide] contingency plans. However, when administration heres For the future? ● Virtual Reality ● Augmented Reality ● Self-Serve Education Now, looking forward? What do I see? I see a bright future involving technology in education. Many technologies of today that are seen as futuristic and unique may have their place in the classroom in 10, 15 years! What I see? Virtual and Augmented reality, and self-led education. [advance slide] Virtual reality technology has advanced tenfold in the last five years, [advance slide] and companies like ClassVR, a division of Avantis Systems, are keeping pace, nudging this tech into the classroom. The standalone ClassVR headset offers so much to education. For instance, it allows classes to visit and experience things that are simply not possible under certain circumstances at their schools. [advance slide] The headset technology features a lot of things that can help streamline the experience for students and teachers. [advance slides] Now, other technologies like augmented reality offer schools a more subtle approach to use of technology in schools. Google Expeditions has just that! Their app for modern smartphones offers explorations What can you do? there’s no better time to get to the future than the present. Teachers, many new systems could add to your teaching experience; don’t be afraid to try them, since they’re not replacing you. Students, introduce your teachers and administrators to these new technologies as well! Who knows? Maybe you can single handedly move your school into the world of the future! Technology Addiction What we can do about it Bryce Kubas Background Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games, despite negative consequences to the user of the technology. https://virtual-addiction.com/digital-distraction-test/ What can technology addiction do to you? These are some following symptoms that are characteristic of someone who uses the computer for a very long period of time: Backache, headaches, weight gain or loss, disturbances in sleep, carpal tunnel syndrome, and blurred or strained vision. ... Mental or Emotional Side Effects A study by psychologist Jean Twenge found that heavy users of digital media are 56% more likely to say they are unhappy and 27% more likely to be depressed. Benefits of Technology ● Can you keep connected with others ● Information at your fingertips ● Facilitates independence ● Can keep you organized How you can figure out your time on screens How you can help There are a few things that you can do to prevent this from happening. You can limit screen time by using tech tools like Apple’s Screen Time and the setting on instagram. Also you can be more aware of how your using it, and trying to balance your time. Digital Privacy: How businesses could take our data We can’t let people take our personal info and sell it. Background ● ● In this topic though I focus on the concept of data brokers (people who steal your data for a living) stealing your data and selling it to businesses. “It is estimated that 99 percent of online consumer data is never analyzed; however, it remains available.” Online privacy ● “Random bits of information can be pieced together to determine things like religion, political views. These are all available to your employer if they choose to purchase it.” Le VPN ● ● ● ● “Your privacy has been taken, chopped up into packets of data, and circulated through commercial transactions beyond your view.” (Silverman). In this topic though I will focus on the concept of data brokers (people who steal your data for a living) stealing your data and selling it to businesses. People find a way to bust into your home and see or hear what you do or what you do on your computer. Home assistants ● ● As long as assistants are plugged in, they will collect data about your private conversations. Home assistants don’t need you to give an command to do it, they can do it anything they want themselves. ● ● ● “However, the voice assistants are making cyber-attackers' jobs easier as well.” Five ways digital assistants pose security threats in home. “Even when a voice assistant is not taking an action on your behalf, it continues to listen for commands. Like mobile phones, home voice assistants are sensors that know a lot about you. This gives the companies behind the devices a privileged place in your home, and your life, making them an ideal target for attackers.” Five ways digital assistants pose security threats in home. According to the article “Five Ways Digital Assistants pose Security Threats in Home, Office”(3), “In an attack presented in 2017, six researchers from Zhejiang University showed that they could use sound inaudible to humans to command Siri to make a phone call or to take other actions. Hiding commands inside other audio are not the only way to create a covert way to manipulate voice assistants”. Home assistants can help a lot in the home They can: ● ● ● Control lights and thermostats Tell you jokes and play games Cast movies on to your TV(if you have chromecast or amazon fire stick) ● ● ● You can search things up and get quick answers without getting your phone or computer out. You can play music Serve as a great speaker( especially the homepod) But like us, they have a dark side. They secretly without you knowing hear every word you say and people can access these audio files. How people get your data ● ● ● ● People use cookies, fingerprinting and tracking beacons to get your data Cookie are 4 kilo byte files that help the website recognize you and keep track of your preferences. Tracking beacons are 1x1 pixel images that are on websites or emails that monitors the behavior of a person on an website Fingerprint tracking is “Rather than storing a file in your browser or on your computer to identify you, it’s done by checking your browser configurations and settings.” 1. 2. 3. ● ● ● ● ● Cookies are tiny files that contain info about your website preferences like say you go into amazon and put a bunch of stuff into your shopping cart. That stuff is stored into a cookie so if you press a different link in amazon, it will still be there. These things are helpful but businesses use this info to make targeting ads. Like for example say that you were looking for shoes and ties then this info will go into a cookie and businesses will access this cookie to give ads about shoes and ties. Web beacons are images that are 1x1 pixel which is so small and can be used to track people's behavior on the web like if there was a web beacon on an email then it would track if you opened it or not. Fingerprint tracking is when a website uses advanced HTML5 canvas info storage that can store lots of info including cursor position. ● ● Why businesses want your data ● Businesses defend their actions by noting that they are providing convenience - giving your the information they think you want but they are in the end just taking our data which is a breach of privacy. ● To succeed as a retailer, you have to know which products to stock for your likely customers, which entails keeping track of data about inventory, prices, advertising, and customers’ buying habits.” (Weigend). This quote tells you why they are doing this. ● ● Customers data=money Amazon became famous by taking people’s data along the way They only try to get your data so that they can make money off you and be successful. Social media ● ● ● This picture shows how we do nothing to stop facebook from taking our data because they don’t know that they are. “In 2011, Max Schrems, an Austrian law student, requested and received a copy of his data file from Facebook; and it was 1,222 pages and contained information that Schrems hadn’t intended to turn over to the social network., such as geographic coordinates of where he logged in from, people he had unfriended and other data he had deleted.” (Silverman). Have you heard of Cambridge Analytica? This is a company that sells data to Facebook about their users. This company also did something in the 2016 presidential election. Cambridge analytica is a company that gives facebook data. They collect a lot of data about you. Apparently(as you see on the board) there was a guy that found 1,22 pages of info about geographic coordinates of where he logged in from, people he unfriended and other data he had deleted. Cambridge analytica was hired by donald trump to see the personalities of american voters on more then 50 million users. How to prevent the collection of data ● ● ● ● “It is impossible to go online without having some form of information collected about you.” (6). You could use tracker blockers which prevent tracking from tracking cookies and fingerprinting. You can use VPNs so you can’t be tracked by the private network. Don’t track on your web browser only works for some sites but not all of them. You can use tracker blockers to prevent tracking from cookies and fingerprinting. Firewalls to prevent anti malware and antivirus. You can use VPNs which are private networks which you can’t be tracked from. You might think the do not track thing works but it doesn’t. Call to action Boycott any product targeted ad. “It is estimated that 99 percent of online consumer data is never analyzed; however, it remains available.” Thank you! Thanks for putting up with us! Hope you’ve enjoyed it!