Updating search results...

Search Resources

311 Results

View
Selected filters:
  • Information Science
Helsinki Initiative on Multilingualism in Scholarly Communication
Unrestricted Use
CC BY
Rating
0.0 stars

The signatories of the Helsinki Initiative on Multilingualism in Scholarly Communication support recommendations to keep research international and multilingual to be adopted by policy-makers, leaders, universities, research institutions, research funders, libraries, and researchers. This initiative helps to support bibliodiversity, protect locally relevant research, and promote language diversity in research evaluation. Signatories, events, media, and more information can be found at https://www.helsinki-initiative.org/

Subject:
Arts and Humanities
Computer, Networking and Telecommunications Systems
Education
Higher Education
Information Science
World Cultures
World Languages
Material Type:
Reading
Date Added:
04/05/2023
Histology Laboratory Drawings
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

The Histology Laboratory Drawings resource contains 104 hand drawn sketches by Dr. Christensen for the laboratory sessions he conducted in the Medical Histology Course for first year medical students. The drawings were done with felt markers on a white board in the lab during the morning of the day a particular topic was being studied in the course. When the laboratory session began, the drawings were briefly discussed, and they could be seen by the students throughout the laboratory period.You can view the drawings individually on flickr, or you can download the full collection of drawings by navigating to the materials tab.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Diagram/Illustration
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
A. Kent Christensen
Date Added:
03/12/2012
How Can Models Be Used To Study Climate Change?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students utilize ice core data to develop a simple climate model, test it and then analyze, through reading IPCC materials, what other variables might need to be included in a model that more accurately predicts climate response to forcings. They are then asked to reflect on the use of models in scientific inquiry and on climate skeptics view of climate models.

(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)

Subject:
Applied Science
Atmospheric Science
Biology
Computer, Networking and Telecommunications Systems
Earth and Space Science
Environmental Science
Information Science
Life Science
Material Type:
Activity/Lab
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
01/22/2019
How do we respond to generative AI in education? Open educational practices give us a framework for an ongoing process
Unrestricted Use
CC BY
Rating
0.0 stars

With the release of ChatGPT in November 2022, the field of higher education rapidly became aware that generative AI can complete or assist in many of the kinds of tasks traditionally used for assessment. This has come as a shock, on the heels of the shock of the pandemic. How should assessment practices change? Should we teach about generative AI or use it pedagogically? If so, how? Here, we propose that a set of open educational practices, inspired by both the Open Educational Resources (OER) movement and digital collaboration practices popularized in the pandemic, can help educators cope and perhaps thrive in an era of rapidly evolving AI. These practices include turning toward online communities that cross institutional and disciplinary boundaries. Social media, listservs, groups, and public annotation can be spaces for educators to share early, rough ideas and practices and reflect on these as we explore emergent responses to AI. These communities can facilitate crowdsourced curation of articles and learning materials. Licensing such resources for reuse and adaptation allows us to build on what others have done and update resources. Collaborating with students allows emergent, student-centered, and student-guided approaches as we learn together about AI and contribute to societal discussions about its future. We suggest approaching all these modes of response to AI as provisional and subject to reflection and revision with respect to core values and educational philosophies. In this way, we can be quicker and more agile even as the technology continues to change.

We give examples of these practices from the Spring of 2023 and call for recognition of their value and for material support for them going forward. These open practices can help us collaborate across institutions, countries, and established power dynamics to enable a richer, more justly distributed emerging response to AI.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Education
Higher Education
Information Science
Material Type:
Reading
Author:
Anna Mills
Lance Eaton
Maha Bali
Date Added:
04/05/2024
How to Use OSF as an Electronic Lab Notebook
Unrestricted Use
CC BY
Rating
0.0 stars

This webinar outlines how to use the free Open Science Framework (OSF) as an Electronic Lab Notebook for personal work or private collaborations. Fundamental features we cover include how to record daily activity, how to store images or arbitrary data files, how to invite collaborators, how to view old versions of files, and how to connect all this usage to more complex structures that support the full work of a lab across multiple projects and experiments.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Center for Open Science
Date Added:
04/11/2023
I Bacini Culturali e la progettazione sociale orientata all’Heritage-Making, tra Politiche giovanili, Innovazione sociale, Diversità culturale
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Il volume rappresenta la tappa finale della prima stagione di implementazione del Progetto ABACUS (giugno 2019 - settembre 2020), sostenuta dal finanziamento pubblico garantito dalla Regione Siciliana e dalla Presidenza del Consiglio dei Ministri. In tal senso, la pubblicazione raccoglie sia una sezione di materiali di discussione critica sul percorso progettuale e sui primi esiti maturati, sia una ricca parte di contributi tematici offerti da referenti istituzionali, studiosi ed esperti, docenti accademici e ricercatori, professionisti e rappresentanti di organismi del Terzo settore Sono state così affrontate ed esaminate differenti tematiche e problematiche socio-culturali e socio-economiche, e prospettive e approcci metodologico-operativi tra loro affini e convergenti, che si sviluppano a cavallo delle politiche sociali, giovanili e culturali, della progettazione sociale e culturale, dell'innovazione sociale e della diversità culturale, in differenti contesti socio-territoriali siciliani e italiani, con una particolare attenzione per quelle iniziative che rappresentano casi paradigmatici in cui le istanze istituzionali, della ricerca, dell'educazione e della formazione si incontrano con le aspettative dei pubblici differenziati e, specialmente, delle giovani generazioni, anche sull'orizzonte della innovazione dell'occupazione giovanile.

Subject:
Agriculture and Natural Resources
Anthropology
Applied Science
Archaeology
Architecture and Design
Art History
Arts and Humanities
Business and Communication
Career and Technical Education
Communication
Computer Science
Computer, Networking and Telecommunications Systems
Culinary Arts
Cultural Geography
Earth and Space Science
Ecology
Education
Educational Technology
English Language Arts
Environmental Studies
Ethnic Studies
Graphic Arts
Higher Education
History
Hospitality, Tourism and Social Service Careers
Hydrology
Information Science
Languages
Law
Life Science
Management
Marketing
Mathematics
Measurement and Data
Performing Arts
Philosophy
Political Science
Psychology
Public Relations
Social Science
Social Work
Sociology
Special Education
Visual Arts
Visual Arts and Design
World Cultures
World Languages
Material Type:
Activity/Lab
Assessment
Case Study
Diagram/Illustration
Primary Source
Teaching/Learning Strategy
Textbook
Date Added:
04/05/2023
Ice Core Exercise
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students access the ice core data archived at Lamont-Doherty Geological Observatory. They select a core (Greenland, Antarctica, Quelcaya), pose a working hypothesis regarding the data, import the data in an Excel-readable format, and examine the data to determine correlations between variables and cause/effect as recorded in leads and lags. They generate a written and graphical analysis of the data and, in the next lab period, discuss the similarities and differences among their group outputs in terms of demonstrated correlations, assumptions required, effects of latitude, and any other item that arises.

(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)

Subject:
Applied Science
Biology
Computer, Networking and Telecommunications Systems
Environmental Science
Information Science
Life Science
Mathematics
Measurement and Data
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
09/20/2022
Image Processing with Python
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson shows how to use Python and skimage to do basic image processing. With support from an NSF iUSE grant, Dr. Tessa Durham Brooks and Dr. Mark Meysenburg at Doane College, Nebraska, USA have developed a curriculum for teaching image processing in Python. This lesson is currently being piloted at different institutions. This pilot phase will be followed by a clean-up phase to incorporate suggestions and feedback from the pilots into the lessons and to make the lessons teachable by the broader community. Development for these lessons has been supported by a grant from the Sloan Foundation.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Date Added:
04/11/2023
Information Literacy
Read the Fine Print
Educational Use
Rating
0.0 stars

To be information literate, a person must be able to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information. By the end of this unit you will be able to Define Information Literacy, Define the four domains that fall under Metaliterate Learners, Identify a lack of knowledge in a subject area, Identify a search topic/question and define it using simple terminology, Articulate current knowledge on a topic, Recognize a need for information and data to achieve a specific end and define limits to the information need, and Manage time effectively to complete a search.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Full Course
Textbook
Provider:
Lumen Learning
Provider Set:
Candela Courseware
Date Added:
05/02/2023
Information Literacy - Basic Research Skills
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The intent of this OER is twofold: to offer a free or low cost quality text to our students in a one-unit information literacy course and to offer a starting place to anyone who wishes to develop their own class or OER. It is intentional that this text is not San Diego City College specific because the skills we teach in our LIBS 101, and are reflected in this OER, are transferable skills. This allows students to take what they learn here and apply it to any information need in any environment: academia, careers, life-long learning, bar bets, or what have you. It is not an attempt to be a comprehensive book on information literacy, but rather a brief overview in support of this one-unit class.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Textbook
Provider:
LibreTexts
Date Added:
05/02/2023
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Date Added:
05/12/2023
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Information Systems for Business and Beyond
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a little bit technical, every effort has been made to convey the information essential to understanding a topic while not getting bogged down in detailed terminology or esoteric discussions.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Textbook
Date Added:
04/11/2023