This instruction follows on from the online instruction Information Literacy 1, in …
This instruction follows on from the online instruction Information Literacy 1, in which you learned how to find, evaluate and use information. Today’s instruction is intended for advanced users.
The Information Literacy User’s Guide introduces students to critical concepts of information …
The Information Literacy User’s Guide introduces students to critical concepts of information literacy as defined for the information-infused and technology-rich environment in which they find themselves. This book helps students examine their roles as information creators and sharers and enables them to more effectively deploy related skills. This textbook includes relatable case studies and scenarios, many hands-on exercises, and interactive quizzes.
This resource was created by Allison Kittinger, a library science master’s student …
This resource was created by Allison Kittinger, a library science master’s student at UNC-Chapel Hill, and Jennifer Solomon, an adjunct instructor at UNC-Chapel Hill. Allison and Jennifer are passionate about fostering bibliodiversity in scholarly communications and want to increase awareness of bibliodiversity among library science graduate students and early-career scholarly communications librarians. After engaging with this resource, learners will: gain an understanding of bibliodiversity, its urgency, and its importance; be able to articulate the concept of bibliodiversity in their own words/apply it in their work; and gain additional tools to apply DEI concepts in scholarly communications.
More background is available at https://lisoer.wordpress.ncsu.edu/2021/04/13/bibliodiversity-and-oer-a-student-perspective/.
Library and Information Science (LIS) is the academic and professional study of …
Library and Information Science (LIS) is the academic and professional study of how information and information carriers are produced, disseminated, discovered, evaluated, selected, acquired, used, organized, maintained, and managed. This book intends to introduce the reader to fundamental concerns and emerging conversations in the field of library and information science.
A secondary goal of this book is to introduce readers to prominent writers, articles, and books within the field of library science. The book originated as a collection of annotations of important LIS articles. Though these citations are being developed into a fuller text, we hope that this book remains firmly rooted in the literature of LIS and related fields, and helps direct readers toward important resources when a particular topic strikes their fancy.
With raised awareness and accessibility laws emerging around the world, understanding what …
With raised awareness and accessibility laws emerging around the world, understanding what inclusive access to the Web means is becoming necessary knowledge for anyone who produces digital content. Much of the current information on Web accessibility requires some technical understanding, and may be difficult to consume for the average person. The instruction here will “interpret” the W3C Web Content Accessibility Guidelines (WCAG 2.1), to make it easier to understand for a general audience. You will have an opportunity to experience barriers firsthand, then experience that content with the barriers removed, developing a practical understanding of web accessibility.
The aim of this practical guide is to introduce learning analytics to …
The aim of this practical guide is to introduce learning analytics to educators in higher education. To this end, we define learning analytics, provide some background to how learning analytics work, explore successful learning analytics implementations, and present findings from an exploratory study of perceptions of the users of learning analytics—educators, students, and advisors—of common metrics and visualizations from learning management system analytic tools at an Ontario university to provide a practical guide to learning analytics.
Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access …
Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #12 for the course: CS 3550: Cybersecurity - "Network & Endpoint …
Lecture #12 for the course: CS 3550: Cybersecurity - "Network & Endpoint Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #13 for the course: CS 3550: Cybersecurity - "Patching & Vulnerability …
Lecture #13 for the course: CS 3550: Cybersecurity - "Patching & Vulnerability Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #14 for the course: CS 3550: Cybersecurity - "Business Continuity & …
Lecture #14 for the course: CS 3550: Cybersecurity - "Business Continuity & Disaster Recovery". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #15 for the course: CS 3550: Cybersecurity - "Application Security". Delivered …
Lecture #15 for the course: CS 3550: Cybersecurity - "Application Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #16 for the course: CS 3550: Cybersecurity - "Mobile Devices & …
Lecture #16 for the course: CS 3550: Cybersecurity - "Mobile Devices & Wireless Connectivity". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #17 for the course: CS 3550: Cybersecurity - "Cloud Security". Delivered …
Lecture #17 for the course: CS 3550: Cybersecurity - "Cloud Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #18-19 for the course: CS 3550: Cybersecurity - "Anatomy of a …
Lecture #18-19 for the course: CS 3550: Cybersecurity - "Anatomy of a Breach". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #1 for the course: CS 3550: Cybersecurity - "Introduction & State …
Lecture #1 for the course: CS 3550: Cybersecurity - "Introduction & State of Cybersecurity". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #20 for the course: CS 3550: Cybersecurity - "Enterprise Audit & …
Lecture #20 for the course: CS 3550: Cybersecurity - "Enterprise Audit & Compliance". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #21 for the course: CS 3550: Cybersecurity - "Hacking Democracy: Election …
Lecture #21 for the course: CS 3550: Cybersecurity - "Hacking Democracy: Election Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #2 for the course: CS 3550: Cybersecurity - "Cybersecurity Fundamentals". Delivered …
Lecture #2 for the course: CS 3550: Cybersecurity - "Cybersecurity Fundamentals". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Lecture #3-4 for the course: CS 3550: Cybersecurity - "Networking Fundamentals". Delivered …
Lecture #3-4 for the course: CS 3550: Cybersecurity - "Networking Fundamentals". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.