Can we really trust our perception? This post outlines some common ways …
Can we really trust our perception? This post outlines some common ways that our brains perceive or interpret information in a way that does not produce accurate knowledge.
Learn how to evaluate medical information as a non-medical expert using information …
Learn how to evaluate medical information as a non-medical expert using information literacy principles such as currency, noting research questions and methods and verifying claims with multiple sources.
Word Count: 2714 (Note: This resource's metadata has been created automatically by …
Word Count: 2714
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
Students need to understand systems and the systems concept, and they need …
Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the like). Knowing the characteristics of good systems will permit students to demand well designed systems and to suggest how existing systems should be changed. Students need to understand the affordances, directions, and limits of hardware, software, and networks in both personal and organizational dimensions. They also need to appreciate that, as technical capabilities change and new ones arise, more opportunities to apply ICT for efficiency, effectiveness, and innovation are afforded. They need to understand the process for developing and implementing new or improved systems and the activities of IS professionals in this process.
This book is written as an introductory text, meant for those with …
This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a little bit technical, every effort has been made to convey the information essential to understanding a topic while not getting bogged down in detailed terminology or esoteric discussions.
Peer-reviewed articles in this special issue: - “Responsible AI Practice in Libraries …
Peer-reviewed articles in this special issue:
- “Responsible AI Practice in Libraries and Archives: A Review of the Literature” by Sara Mannheimer, Natalie Bond, Scott W. H. Young, Hannah Scates Kettler, Addison Marcus, Sally K. Slipher, Jason A. Clark, Yasmeen Shorish, Doralyn Rossmann, and Bonnie Sheehey. The authors explore the existing literature to identify and summarize trends in how libraries have (or have not) considered AI’s ethical implications. - “It Takes a Village: A Distributed Training Model for AI-based Chatbots” by Beth Twomey, Annie Johnson, and Colleen Estes, discusses the steps taken at their institution to develop and implement a library chatbot powered by a large language model, as well as lessons learned. - “‘Gimme Some Truth’ AI Music and Implications for Copyright and Cataloging” by Adam Eric Berkowitz, details modern developments in AI-assisted music creation, and the resultant challenges that these surface regarding copyright and cataloging work. - “Adapting Machine Translation Engines to the Needs of Cultural Heritage Metadata” by Konstantinos Chatzitheodorou, Eirini Kaldeli, Antoine Isaac, Paolo Scalia, Carmen Grau Lacal, and Mª Ángeles García Escrivá provides an overview of the process used to hone general-use machine translation engines to improve their outputs when translating cultural heritage metadata in the Europeana repository from one language to another. - “Exploring the Impact of Generative Artificial Intelligence on Higher Education Students' Utilization of Library Resources: A Critical Examination” by Lynsey Meakin applies the Technological Acceptance Model to higher education students’ perceptions and adoption of tools using generative AI models.
Recurring content: - Public Libraries Leading the Way: “Activating Our Intelligence: A Common-Sense Approach to Artificial Intelligence” by Dorothy Stoltz
- ITAL &: “The Jack in the Black Box: Teaching College Students to Use ChatGPT Critically” by Shu Wan
Information visualization is concerned with the visual and interactive representation of abstract …
Information visualization is concerned with the visual and interactive representation of abstract and possibly complex datasets. As we encounter growing datasets in various sectors there is an increasing need to develop effective methods for making sense of data. Information visualization relies on computational means and our perceptual system to help reveal otherwise invisible patterns and gain new insights. Across various fields, there is great hope in the power of visualization to turn complex data into informative, engaging, and maybe even attractive forms. However, it typically takes several steps of data preparation and processing before a given dataset can be meaningfully visualized. While visualizations can indeed provide novel and useful perspectives on data, they can also obscure or misrepresent certain aspects of a phenomenon. Thus it is essential to develop a critical literacy towards the rhetoric of information visualization. One of the best ways to develop this literacy is to learn how to create visualizations! The tutorials offer a practical approach to working with data and to create interactive visualizations.
The tutorials require basic familiarity with statistics and programming. They come as Jupyter notebooks containing both human-readable explanations as well as computable code. The code blocks in the tutorials are written in Python, which you should either have already some experience with or a keen curiosity for. The tutorials make frequent use of the data analysis library Pandas, the visualization library Altair, and a range of other packages. You can view the tutorials as webpages, open and run them on Google Colab, or download the Jupyter notebook files to edit and run them locally.
Deb Baker created this after consulting with faculty, librarians, and colleagues from …
Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.
A presentation on Institutional Repositories and Open Access Movement by Rupesh Kumar …
A presentation on Institutional Repositories and Open Access Movement by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Tumakuru, Karnataka, India.
Knowledge of learners and learning is an essential priority for Library Media …
Knowledge of learners and learning is an essential priority for Library Media Specialists. As the demand for meeting the needs of all learners increases, LMSs are uniquely positioned to observe and support learners across the range of their strengths and challenges. Not only are they able to provide a variety of resources for gathering, processing, and producing information, LMSs are often afforded the opportunity to observe learner strengths that may go overlooked in classroom settings.Personalizing learning is a shift from facilitating implementation of a curricular program to developing a repertoire of instructional resources and strategies to support learner variability. In bridging the disciplines of information and learning, the LMS stays abreast of developments in each, curating and accessing exceptional OER materials and integrating evidence-based mind, brain, and education science (MBES). This module will take a look at the concept and science of learner variability, and investigate and apply two models for designing instruction for learner variability. Students are asked to build on their knowledge of Guided Inquiry Process (see Resources) and OER materials to leveraging learner profiles for effective instructional design.This unit specifically addresses NH ED 614.11.A.1.a and 614.11.A.1.b.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.