Discussion:Syllabus e-safety : Différence entre versions
m (→Chapter 1 - Basic knowledge on e-safety) |
m (→Chapter 1 - Basic knowledge on e-safety) |
||
Ligne 29 : | Ligne 29 : | ||
<span style="color:#FF0000"> --''(What are those web1, web2 and web3 environments? Is it necessary? </span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))'' | <span style="color:#FF0000"> --''(What are those web1, web2 and web3 environments? Is it necessary? </span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))'' | ||
+ | |||
+ | |||
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), | 1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), | ||
<span style="color:#FF0000"> --''(same here - we actually do not understand what is it about</span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | <span style="color:#FF0000"> --''(same here - we actually do not understand what is it about</span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | ||
+ | |||
+ | |||
1.3. Know about '''equity between opportunities & risks''' since [[web2]] | 1.3. Know about '''equity between opportunities & risks''' since [[web2]] | ||
<span style="color:#FF0000"> --''(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' </span> | <span style="color:#FF0000"> --''(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' </span> | ||
+ | |||
+ | |||
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) | 1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) | ||
<span style="color:#FF0000"> --''(what do you mean by "basic codes"?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | <span style="color:#FF0000"> --''(what do you mean by "basic codes"?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | ||
+ | |||
+ | |||
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) | 1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) | ||
<span style="color:#FF0000"> --'')what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about '''[[social engineering]]''' and it’s methods".[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''</span> | <span style="color:#FF0000"> --'')what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about '''[[social engineering]]''' and it’s methods".[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''</span> | ||
+ | |||
+ | |||
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) | 1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) | ||
<span style="color:#FF0000"> --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''</span> | <span style="color:#FF0000"> --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''</span> | ||
+ | |||
+ | |||
1.7. Understand the differences of '''[[formats]]''' (open, privative) | 1.7. Understand the differences of '''[[formats]]''' (open, privative) | ||
<span style="color:#FF0000"> --''(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''</span> | <span style="color:#FF0000"> --''(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''</span> | ||
+ | |||
+ | |||
1.8. Understand the notion of '''[[identity]]''' | 1.8. Understand the notion of '''[[identity]]''' | ||
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC) | maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC) | ||
+ | |||
+ | |||
1.9. '''[[eTools]]''' : Product versus function | 1.9. '''[[eTools]]''' : Product versus function | ||
<span style="color:#FF0000">--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''</span> | <span style="color:#FF0000">--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''</span> | ||
+ | |||
+ | |||
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) | 1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) | ||
− | #must be repositioned into the scam/hoax (chapter 5 or 6) | + | #must be repositioned into the scam/hoax (chapter 5 or 6) ? |
<span style="color:#FF0000">--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''</span> | <span style="color:#FF0000">--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''</span> | ||
+ | |||
+ | |||
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on). | 1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on). | ||
+ | |||
+ | |||
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access | 1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access |
Version du 9 juin 2011 à 21:08
Discussions
Here is the place to make comments on the Syllabus.
Sommaire
Todo list
- Focus map
- Define number of chapters
- Organise Items and Notions
- Find Quiz
- Discuss about chapter 4 --Rémi LEVY 7 juin 2011 à 09:04 (UTC)
- Give the rights on Mindomo --Rémi LEVY 7 juin 2011 à 09:18 (UTC)
About Items
Chapter 1 - Basic knowledge on e-safety
1.1. History : from static web1 to dynamic web2 environments
--(What are those web1, web2 and web3 environments? Is it necessary? by Mantas (Lithuania team) 8 juin 2011 à 14:58 (UTC))
1.2. Intention : web3 proposing constructive engagement in participatory society (or : security through light instead of old model of security through obscurity),
--(same here - we actually do not understand what is it aboutby Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))</span>
1.3. Know about equity between opportunities & risks since web2
--(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.4. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855)
--(what do you mean by "basic codes"?by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.5. Know about social engineering and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)
--)what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about social engineering and it’s methods".by Mantas (Lithuania team) 8 juin 2011 à 15:23 (UTC))
1.6. Understand the differences of contents (functional, factual, creative) of information (I don't understand this item --Rémi LEVY 7 juin 2011 à 07:51 (UTC)
--(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:31 (UTC))
1.7. Understand the differences of formats (open, privative)
--(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:36 (UTC))
1.8. Understand the notion of identity
maybe to be repositioned in some other chapter --Rémi LEVY 9 juin 2011 à 19:49 (UTC)
1.9. eTools : Product versus function
--(Should be clarified--by Mantas (Lithuania team) 8 juin 2011 à 15:48 (UTC) )
1.10. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving…)
- must be repositioned into the scam/hoax (chapter 5 or 6) ?
--( We recommend to leave in this chapter--by Mantas (Lithuania team) 8 juin 2011 à 16:00 (UTC) )
1.11. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).
1.12. Organizational security (school security) – or social engineering?, usage of school web pages, content publishing, access
--( social engineering is already mentioned in 1.5. We recommend "Know about Organizational security: school security, usage of school web pages, content publishing, access, etc."--by Mantas (Lithuania team) 8 juin 2011 à 15:56 (UTC))
Privacy and data management
I suggest : to begin with "Distinguish between data and information" --Rémi LEVY 7 juin 2011 à 07:49 (UTC)
Security tools and network security
see how integrate from 3.5 to 2.11 --Rémi LEVY 7 juin 2011 à 07:52 (UTC)
Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion
Have discussion.....--Rémi LEVY 7 juin 2011 à 09:05 (UTC)
Social networks and safe usage of the Internet
I suggest "5.10. Dependency and addiction to the Internet" to be develop --Rémi LEVY 7 juin 2011 à 07:46 (UTC)