Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 01 Assistive Technology Guidelines Protocol

Total Page:16

File Type:pdf, Size:1020Kb

Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 01 Assistive Technology Guidelines Protocol Michigan Assistive Technology Guidelines for Teachers of Students Who Are Blind or Visually Impaired Low Incidence Outreach 702 W. Kalamazoo St. Grades 3-5 Lansing, MI 48915 www.mdelio.org Updated 04.20.2020 State Board of Education Michelle Fecteau, Secretary Tom McMillin, Treasurer Judith Pritchett Pamela Pugh, Vice President Lupe Ramos-Montigny Nikki Snyder Tiffany Tilley, NASBE Delegate Casandra E. Ulbrich, President Marilyn Schneider, State Board Executive Ex-Officio Gretchen Whitmer, Governor Dr. Michael F. Rice, State Superintendent Table of Contents Introduction 01 Assistive Technology Guidelines Protocol 02 Acknowledgements 02 I. Technology Operations and Concepts 03 II. Creativity and Innovation 08 III. Communication and Collaboration 10 IV. Critical Thinking, Problem Solving, and Decision Making 12 V. Research and Information Literacy 15 VI. Digital Citizenship 18 Assistive Technology Glossary 21 Assistive Technology Resources 32 Assistive Technology Tools & Applications Sample Listing 44 Assistive Technology Tools Record Keeping Chart Instructions 47 Assistive Technology Tools Record Keeping Chart 48 Introduction The Michigan Assistive Technology Guidelines for Teachers of the Blind and Visually Impaired is an expanded document to specifically guide teachers of students who are Blind or Visually Impaired (BVI) in pre-kindergarten through grade 12 with assistive technology (AT). This guide is based on the International Society for Technology in Education (ISTE) Standards to which the Michigan Integrated Technology Competencies for Students (MITECS) connects. These guidelines follow six key concepts: • Technology Operations and Concepts • Creativity and Innovation • Communication and Collaboration • Critical Thinking and Problem Solving • Research and Information Technology • Digital Citizenship Appendix: • Assistive Technology Glossary • Assistive Technology Resources • Assistive Technology Tools and Applications Sample Listing • Assistive Technology Tools Record Keeping Chart Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 01 Assistive Technology Guidelines Protocol • Use the guidelines to help develop specific Individualized Education Program (IEP) goals. • An AT Glossary, AT Resources, AT Tools, and AT Tools Table can be found after each grade-level guideline. • Use the key below to track student progress. Student Progress Key A = Formal Assessment O = Teacher Observation P = Portfolio Evidence C = 21st Century Technology Class Acknowledgments A special thanks to the following individuals for their efforts in making this document available to the educators working with students who are BVI. • Collette Bauman, Former Supervisor, MDE-LIO • Roxanne Balfour, Director, MDE-LIO • Pat Love-Sypho, Consultant for Students with a Visual Impairment, MDE-LIO • Ann McKay-Bacon, Teacher/Consultant, MDE-LIO Technology Team • Julie A. Lutz, MAET, MDE-LIO Technology Team Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 02 I. Technology Operations and Concepts: Grades 3-5 Awareness, exploration, and opportunities to experience using 21st century digital technology tools Student Progress Key Student Details A = Formal Assessment Student Name: O = Teacher Observation P = Portfolio Evidence Teacher Name: C = 21st Century Technology Class School: Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 1 Use basic input and output • Demonstrate, practice, and assess devices. For example, a printer, skills that open, save, print, emboss, scanner, Smart Board, digital close/exit, add or remove devices and/ camera, audio/video players/ or digital/electronic accessories using recorder, touch screen tablet, the appropriate Assistive Technology Braille Display, electronic Devices (ATDs) and adaptive devices augmentative communication when applicable. device, video magnifier, and a converter box. Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 03 Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 2 Describe ways technology has • Participate in activities such as changed life at school, home, viewing and listening to audio/video and within the community. presentations, tutorials, movies, and/or documentaries as found on YouTube, Google Classroom, and/or the internet. • Discuss and describe ways technology, ATDs and adaptive devices have changed life at school, home, and within the community. 3 Understand and discuss how • Share, with examples individual assistive technologies can experiences, impact, and benefits of benefit all individuals. ATDs and adaptive devices. Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 04 Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 4 Demonstrate proper care in Demonstrate, practice, and assess the: the use of digital/electronic • proper care in the use of digital/ devices, ATDs, adaptive devices electronic devices, ATDs, and including accessories and adaptive devices including electrical connections. accessories and electrical connections. • proper care, use, and storage of required digital/electronic devices, ATDs, adaptive devices. • proper personal hygiene and having a clean and clutter free work space. • proper procedure for backing up and restoring. • understanding and ability to safely locate, connect and disconnect from appropriate outlets, power strips, surge protectors, ATDs and adaptive devices. • skill and care to secure connectivity and power cords. 5 Know how to exchange files with • Demonstrate, practice and assess teachers, classmates, and peers how to save and exchange (import/ using technology (e.g., network export) files utilizing various storage file sharing, external storage devices and ATDs and adaptive devices and internet). devices when appropriate. Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 05 Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 6 Demonstrate the use of a • Practice and assess QWERTY keyboard, navigational keys, keyboarding skills with a goal of 25 mouse, touch screen devices wpm at 85% accuracy if using the and buttons/keys of ATDs and touch type method. adaptive devices, specific to the • Practice and assess accuracy of student’s needs. finger gestures using (Android’s name for screen reader) the touch screen tablet’s screen reader. • Practice and assess accuracy using ATDs and including any required adaptive devices. 7A Be able to use basic menu Demonstrate, practice, and assess: commands to perform common • navigation of icons, menu, and task operations that include keyboard bars; shortcut commands, touch • use of shortcut key commands or screen finger gestures, and touch screen tablet finger gestures required keys on ATDs including such as save, print, cut, copy, and adaptive devices. paste; • use of basic navigational keys such as arrows, tab, alt, shift, option, command, and space bar; • use of number pad and; • use of the scroll bar. Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 06 Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 7B Be able to use basic screen Demonstrate, practice, and assess reading or magnification menu proficiency in: commands in order to perform • basic operational skills to recognize, necessary keyboard commands locate, and select the correct letter, and operations, touch screen number, symbol or function key(s) finger gestures, and required using ATDs as needed; keys on ATDs including adaptive • the use of appropriate key commands devices. Be able to customize for magnification or screen reader touch screen tablets in the applications to access word settings to use screen reading, processing, spreadsheets, databases magnification, and interactive or media-rich applications using ATDs devices. and adaptive devices as needed. 8 Demonstrate the ability to • Demonstrate, practice and assess the navigate in virtual environments basic navigational skills to search the (e.g., e-books, websites, Internet using keywords, history menu, and games) using ATDs and and the desktop screen. adaptive devices as needed. • Assess skills of keying in the URL, adding and editing bookmarks, navigating within and away from sites and links, navigating e-books. • Recognize and respond to digital/ electronic device signals appropriately such as an vibrations, hourglass, pop- ups, error messages, blockers, and audio/visual alert signals including ADTs and adaptive devices alert signals. Assistive Technology Guidelines: Grades 3-5 Updated 04.20.2020 07 II. Creativity and Innovation: Grades 3-5 The design and creation of meaningful products is enhanced and extended through the use of technology Student Progress Key Student Details A = Formal Assessment Student Name: O = Teacher Observation P = Portfolio Evidence Teacher Name: C = 21st Century Technology Class School: Skill (to be completed by Suggested Teacher Activities Date Notes/ # Key Grade the end of Grade 5) To Aid The Student Achieved Equipment 1 Create a media-rich digital • Support the participation in the project aligned with the Michigan creation and presentation of a Academic Standards to produce media-rich digital project using the original works. appropriate ATDs and adaptive devices
Recommended publications
  • Managing App Sideloading Threats on Ios Whitepaper
    Whitepaper Enterprise Mobile Security Managing App Sideloading Threats on iOS Whitepaper I. Introduction II. The Path to App Sideloading Through rigorous app review Apple has lowered the risk Signing Certificates of downloading malware from its App Stores to near Apple offers two types of signing certificates for app zero. Companies, however, increasingly rely on an app- distribution outside of their App Stores and both types distribution mechanism called enterprise provisioning allow users to install and execute signed apps on that allows them to distribute apps to employees without non-jailbroken devices: Apple’s review as long as the apps are signed with an Apple-issued enterprise signing certificate. 1) A developer certificate, intended to sign and deploy test apps to a limited number of devices. Unfortunately, attackers have managed to hijack this app-distribution mechanism to sideload apps on 2) An enterprise certificate, intended to sign non-jailbroken devices, as demonstrated in the recent and widely deploy apps to devices within an Wirelurker attack. Organizations today face a real organization. security threat that attackers will continue to abuse To obtain these certificates you must enroll in one of enterprise provisioning and use it to sideload malware, Apple’s two iOS developer programs. Table 1 on the especially since: following page summarizes the enrollment requirements 1) The widespread prevalence of legitimate, for each program and their app provisioning restrictictions. enterprise-provisioned iOS apps in the workplace Both types of signing certificates expire after a year, has conditioned employees to seeing (and ignoring) whereupon developers can apply for new ones. Apple can the security warnings triggered on devices also revoke certificates if it learns of abuse and an app when installing these apps.
    [Show full text]
  • A Second Look at What High School Students Who Are Blind Should Know About Technology
    A Second Look at What High School Students Who are Blind Should Know About Technology Stacy M. Kelly, Gaylen Kapperman Visual Disabilities Program, Northern Illinois University [email protected], [email protected] Abstract This article presents an overview of mainstream and assistive technology skills and tools to be mastered by high school students who are blind in preparation for postsecondary education. It is an update to an article written on this exact topic fifteen years ago. The recommendations focus entirely on what is necessary in today’s high-tech society for high school learners who read and write braille competently (e.g., read braille tactually at a minimum rate of 30 words per minute). The number of recommendations from the original article in 2004 has more than doubled. There were only 14 recommendations in 2004. In 2018 there are more than 30 recommendations for students who are blind to relate to their use of assistive technology. The Certified Assistive Technology Instructional Specialist for People with Visual Impairments (CATIS) provides a Scope of Practice and Body of Knowledge that is sufficient for supporting the substantial growth in the assistive technology-related knowledge, skills, and tools recommended in this article. Keywords Assistive technology, blind, certification, education, visually impaired Journal on Technology and Persons with Disabilities Santiago, J. (Eds): CSUN Assistive Technology Conference © 2018 California State University, Northridge A Second Look at What High School Students Who are Blind Should Know About Technology 386 Introduction This article represents a “second look” at the issue of competence in the use of appropriate technology to be mastered by students who are blind and who may be enrolling in some type of postsecondary educational program.
    [Show full text]
  • Compromised Connections
    COMPROMISED CONNECTIONS OVERCOMING PRIVACY CHALLENGES OF THE MOBILE INTERNET The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other international and regional treaties recognize privacy as a fundamental human right. Privacy A WORLD OF INFORMATION underpins key values such as freedom of expression, freedom of association, and freedom of speech, IN YOUR MOBILE PHONE and it is one of the most important, nuanced and complex fundamental rights of contemporary age. For those of us who care deeply about privacy, safety and security, not only for ourselves but also for our development partners and their missions, we need to think of mobile phones as primary computers As mobile phones have transformed from clunky handheld calling devices to nifty touch-screen rather than just calling devices. We need to keep in mind that, as the storage, functionality, and smartphones loaded with apps and supported by cloud access, the networks these phones rely on capability of mobiles increase, so do the risks to users. have become ubiquitous, ferrying vast amounts of data across invisible spectrums and reaching the Can we address these hidden costs to our digital connections? Fortunately, yes! We recommend: most remote corners of the world. • Adopting device, data, network and application safety measures From a technical point-of-view, today’s phones are actually more like compact mobile computers. They are packed with digital intelligence and capable of processing many of the tasks previously confined
    [Show full text]
  • Development of Educational Materials
    InSIDE: Including Students with Impairments in Distance Education Delivery Development of educational DEV2.1 materials Eleni Koustriava1, Konstantinos Papadopoulos1, Konstantinos Authors Charitakis1 Partner University of Macedonia (UOM)1, Johannes Kepler University (JKU) Work Package WP2: Adapted educational material Issue Date 31-05-2020 Report Status Final This project (598763-EPP-1-2018-1-EL-EPPKA2-CBHE- JP) has been co-funded by the Erasmus+ Programme of the European Commission. This publication [communication] reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein Project Partners University of National and Macedonia, Greece Kapodistrian University of Athens, Coordinator Greece Johannes Kepler University of Aboubekr University, Austria Belkaid Tlemcen, Algeria Mouloud Mammeri Blida 2 University, Algeria University of Tizi-Ouzou, Algeria University of Sciences Ibn Tofail university, and Technology of Oran Morocco Mohamed Boudiaf, Algeria Cadi Ayyad University of Sfax, Tunisia University, Morocco Abdelmalek Essaadi University of Tunis El University, Morocco Manar, Tunisia University of University of Sousse, Mohammed V in Tunisia Rabat, Morocco InSIDE project Page WP2: Adapted educational material 2018-3218 /001-001 [2|103] DEV2.1: Development of Educational Materials Project Information Project Number 598763-EPP-1-2018-1-EL-EPPKA2-CBHE-JP Grant Agreement 2018-3218 /001-001 Number Action code CBHE-JP Project Acronym InSIDE Project Title
    [Show full text]
  • Developer Bootstrap: Good Control Essentials
    Developer Bootstrap: Good Control Essentials Last updated: Wednesday, December 21, 2016 ©2016 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BBM, BES, EMBLEM Design, ATHOC, MOVIRTU and SECUSMART are the trademarks or registered trademarks of BlackBerry Limited, its subsidiaries and/or affiliates, used under license, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. All other trademarks are the property of their respective owners. This documentation is provided "as is" and without condition, endorsement, guarantee, representation or warranty, or liability of any kind by BlackBerry Limited and its affiliated companies, all of which are expressly disclaimed to the maximum extent permitted by applicable law in your jurisdiction. 2 Developer Bootsrap: Good Control Contents Revision history 5 Introduction 6 Background and assumptions 6 Activating Your First GD Application 6 To set up your first GD application and prepare for activation 6 To set up the user's device 7 Add Users 7 Adding A Single User Account via Active Directory 7 Import Users by AD Group 8 Adding Multiple User Accounts via Active Directory 8 Adding User Accounts 9 Importing Multiple User Accounts from CSV File 10 CSV Record Layout and Limits 10 Import Process 11 Possible Error Messages 11 Adding applications 13 Adding a custom application 13 Adding BlackBerry Dynamics app IDand version only 13 Specifying app servers 14 Adding new BlackBerry Dynamics entitlement versions (BlackBerry Dynamics app versions) 14 Entitling end-users to applications or denying them 15 Sequence of app version entitling and denying: entitle, then deny 15 Activating an Application for a User 15 Action by the User 16 3 BlackBerry Dynamics documentation 17 4 Revision history Revision history Date Description 2016-12-19 Version numbers updated for latest release; no content changes.
    [Show full text]
  • Apple, Inc. Education Price List
    Apple, Inc. Education Price List April 15, 2008 Table Of Contents [More information can be found on our web site at http://www.apple.com/education] Page • Revisions to the Price List • Apple Price Lists for Education 2 • Education Solutions 2 SECTION A: HARDWARE PRODUCTS 5-14 • iMac 5 • MacBook 6 • MacBook Pro 7 • Mac Pro 8 • Xserve 9 • Macintosh Displays & Video Accessories 12 • Wireless Connectivity 13 • iBook Accessories 13 • PowerBook Accessories 13 • Xserve Accessories 14 • Miscellaneous Accessories 15 SECTION B: APPLE PROFESSIONAL SERVICES & AppleCare SUPPORT 15-23 • Apple Professional Services - Project Management 15 • Apple Professional Services - Integration Services 16 • Apple Professional Services - System Setup Services 17 • AppleCare Products 20 Purchase orders for all products may be submitted to: Apple Attn: Apple Education Sales Support 12545 Riata Vista Circle Mail Stop: 198-3ED Austin, TX 78727-6524 Phone: 1-800-800-2775 K-12 Fax: (512) 674-2992 Revisions to the March 17, 2008 Education Price List Effective April 15, 2008 PRODUCTS ADDED TO THE PRICE LIST BD624LL/A Apple Digital Learning Series: Digital Media Creation Kit 899.00 MB560Z/A NVIDIA GeForce 8800 GT Graphics Upgrade Kit 251.00 PRODUCTS REPRICED ON THE PRICE LIST MB137Z/A NVIDIA GeForce 8800 GT Graphics Upgrade Kit for Mac Pro 251.00 MB198Z/A ATI Radeon HD 2600 XT Graphics Upgrade Kit for Mac Pro 116.00 PRODUCTS REMOVED FROM THE PRICE LIST BC744LL/A Apple Digital Learning Series: Digital Media Creation Kit TM740LL/A Nike+ Armband w/ Window for nano-Black M9479LL/A AirPort Extreme Power Supply MA504G/A 750GB Serial ATA Apple Drive Module for Xserve MA598Z/A Apple MagSafe (Airline) Power Adapter Prices on this Price List supersede previous Price Lists.
    [Show full text]
  • Defendant Apple Inc.'S Proposed Findings of Fact and Conclusions Of
    Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 1 of 325 1 THEODORE J. BOUTROUS JR., SBN 132099 MARK A. PERRY, SBN 212532 [email protected] [email protected] 2 RICHARD J. DOREN, SBN 124666 CYNTHIA E. RICHMAN (D.C. Bar No. [email protected] 492089; pro hac vice) 3 DANIEL G. SWANSON, SBN 116556 [email protected] [email protected] GIBSON, DUNN & CRUTCHER LLP 4 JAY P. SRINIVASAN, SBN 181471 1050 Connecticut Avenue, N.W. [email protected] Washington, DC 20036 5 GIBSON, DUNN & CRUTCHER LLP Telephone: 202.955.8500 333 South Grand Avenue Facsimile: 202.467.0539 6 Los Angeles, CA 90071 Telephone: 213.229.7000 ETHAN DETTMER, SBN 196046 7 Facsimile: 213.229.7520 [email protected] ELI M. LAZARUS, SBN 284082 8 VERONICA S. MOYÉ (Texas Bar No. [email protected] 24000092; pro hac vice) GIBSON, DUNN & CRUTCHER LLP 9 [email protected] 555 Mission Street GIBSON, DUNN & CRUTCHER LLP San Francisco, CA 94105 10 2100 McKinney Avenue, Suite 1100 Telephone: 415.393.8200 Dallas, TX 75201 Facsimile: 415.393.8306 11 Telephone: 214.698.3100 Facsimile: 214.571.2900 Attorneys for Defendant APPLE INC. 12 13 14 15 UNITED STATES DISTRICT COURT 16 FOR THE NORTHERN DISTRICT OF CALIFORNIA 17 OAKLAND DIVISION 18 19 EPIC GAMES, INC., Case No. 4:20-cv-05640-YGR 20 Plaintiff, Counter- DEFENDANT APPLE INC.’S PROPOSED defendant FINDINGS OF FACT AND CONCLUSIONS 21 OF LAW v. 22 APPLE INC., The Honorable Yvonne Gonzalez Rogers 23 Defendant, 24 Counterclaimant. Trial: May 3, 2021 25 26 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT APPLE INC.’S PROPOSED FINDINGS OF FACT AND CONCLUSIONS OF LAW, 4:20-cv-05640- YGR Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 2 of 325 1 Apple Inc.
    [Show full text]
  • Supported Reading Software
    Readers: Hardware & Software AMIS is a DAISY 2 & 3 playback software application for DTBs. Features include navigation by section, sub-section, page, and phrase; bookmarking; customize font, color; control voice rate and volume; navigation shortcuts; two views. http://www.daisy.org/amis?q=project/amis Balabolka is a text-to-speech (TTS) program. All computer voices installed on a system are available to Balabolka. On-screen text can be saved as a WAV, MP3, OGG or WMA file. The program can read clipboard content, view text from DOC, RTF, PDF, FB2 and HTML files, customize font and background color, control reading from the system tray or by global hotkeys. It can also be run from a flash drive. http://www.cross-plus- a.com/balabolka.htm BeBook offers four stand-alone e-book reader devices, from a mini model with a 5" screen to a wireless model with Wi-Fi capability. BeBook supports over 20 file formats, including Word, ePUB, PDF, Text, Mobipocket, HTML, JPG, and MP3. It has a patented Vizplex screen and 512 MB internal memory (which can store over 1,000 books) while external memory can be used with an SD card. Features include the ability to adjust fonts and font sizes, bookmarking, 9 levels of magnification with PDF sources, and menu support in 15 languages. http://mybebook.com/ Blio “is a reading application that presents e-books just like the printed version, in full color … with …features” and allows purchased books to be used on up to 5 devices with “reading views, including text-only mode, single page, dual page, tiled pages, or 3D ‘book view’” (from the web site).
    [Show full text]
  • Infovox Ivox & Visiovoice
    Cover by Michele Patterson Masthead Publisher Robert L. Pritchett from MPN, LLC Editor-in-Chief Robert L. Pritchett Editor Mike Hubbartt Assistant Editor Harry (doc) Babad Consultant Ted Bade Advertising and Marketing Director Wayne Lefevre Web Master James Meister Public Relations and Merchandizing Mark Howson Contacts Webmaster at macCompanion dot com Feedback at macCompanion dot com Correspondence 1952 Thayer, Drive, Richland, WA 99352 USA 1-509-210-0217 1-888-684-2161 rpritchett at macCompanion dot com The Macintosh Professional Network Team Harry {doc} Babad Ted Bade Matt Brewer (MacFanatic) Jack Campbell (Guest Author) Ken Crockett (Apple News Now) Kale Feelhaver (AppleMacPunk) Dr. Eric Flescher Eddie Hargreaves Jonathan Hoyle III Mark Howson (The Mac Nurse) Mike Hubbartt Daphne Kalfon (I Love My Mac) Wayne Lefevre Daniel MacKenzie Chris Marshall (My Apple Stuff) Dom McAllister Derek Meier James Meister Michele Patterson David Phillips (Guest Author) Robert Pritchett Leland Scott Dennis Sellers (Macsimum News) Gene Steinberg (The Tech Night Owl) Rick Sutcliffe (The Northern Spy) Tim Verpoorten (Surfbits) Julie M. Willingham Application Service Provider for the macCompanion website: http://www.stephousehosting.com Thanks to Daniel Counsell of Realmac Software Development (http://www.realmacsoftware.com), who graced these pages and our website with newer rating stars. Our special thanks to all those who have allowed us to review their products! In addition, thanks to you, our readers, who make this effort possible. Please support
    [Show full text]
  • Executive Summary
    1 Executive summary Welcome to the third edition of the Mobile Security and Risk Review. This bi-annual review provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. This edition includes: Regional data Industry-specific Statistics from Australia, Belgium, France, data for financial services, on the adoption of Apple’s Device Germany, Japan, the Netherlands, government, and healthcare Enrollment Program (DEP) and Spain, the United Kingdom, and the Volume Purchase Program (VPP) United States The most popular The top blacklisted enterprise apps mobile apps Several areas saw little change or improvement over the last six months: only Less than 29% 55% 5% of companies had outdated consistently enforced deployed mobile anti-malware policies security policies To help IT organizations make risk mitigation part of their mobile security routine, we developed the Security Hygiene Priority Checklist. 2 The mobile threat landscape New Threats and Trends Almost immediately after we published the second edition of this report, high profile vulnerabilities and new malware families began appearing. The Godless malware, identified in late June 2016, managed to infect an estimated 850,000 devices.1 Initially discovered in February 2016, Hummingbad was more widely analyzed in July, and it appears it was created by Yingmob, the group behind the YiSpectre iOS malware that made headlines last year. Hummingbad succeeded in infecting nearly 85,000,000 devices.2 The apparent goal of both malware families was to drive fraudulent ad revenue. However, what is more more notable — and sinister — is that they contained exploits that attempt to “root” devices over the air without the user’s knowledge, thus giving attackers full control of an infected device.
    [Show full text]
  • Kid Pix 4 User Guide
    FOR SCHOOLS User’s Guide www.riverdeep.net © 2000–2004 Riverdeep Interactive Learning Limited, and its licensors. The Proximity/Merriam-Webster Database, © 1994 Merriam-Webster, Inc., © 1994–2004 Proximity Technology, Inc. Portions of images © 2000 Otto Rogge Photography. Includes Microsoft Agent Technology, © 2000–2004 Mi- crosoft Corporation. This product contains Macromedia Flash Player software by Macromedia, Inc., © 1995–2004 Macromedia, Inc. All rights reserved by the respective parties. DirectX is a proprietary tool of Microsoft Corporation and its suppliers and may only be used in conjunction with Microsoft operating system products. All intellectual property rights in the DirectX are owned by Microsoft Corpo- ration and its suppliers and are protected by United States copyright laws and international treaty provisions. © 2001–2004 Microsoft Corporation. All rights reserved. The Learning Company and Kid Pix are registered trademarks of Riverdeep Interactive Learning Limited. Macintosh and Mac are registered trademarks of Apple Computer, Inc. Macromedia and Flash are trademarks of Macromedia, Inc. Microsoft, Windows and the Windows logo are registered trademarks of Microsoft Corporation in the United States and/or other countries. Quick- Time and the QuickTime logo are trademarks used under license. The Quick- Time logo is registered in the U.S. and other countries. All other trademarks are the property of their respective owners. Real Time Frequency Analyzer and Fast Fourier Transform algorithm licensed from Reliable Software
    [Show full text]
  • Critical Infrastructure Cybersecurity for Mobility
    MOBILE CYBERSECURITY IN THE DIGITAL ECONOMY Modern organizations have recognized the need to embrace mobile devices and the benefits they can provide in the workplace. However, when it comes to Cybersecurity for mobile devices, most IT and security professionals have overlooked this important aspect of their environment. The thinking is that the biggest security challenges were on PCs, where employees did the majority of their work. As cloud-based services proliferate and more mobile applications are increasingly available for businesses, the vast majority of employees now rely on mobile devices for productivity, forcing IT departments to rethink device security priorities to include mobile. Mobile devices are increasingly becoming the primary method to access corporate data and resources so security professionals need to develop strategies for securing their mobile environment The mobile, demanding, and productive workforce is literally dragging companies into this new world. The way we work, live and connect is different, and over the next few years we will see a complete transformation in the way security is used to protect people and businesses where mobility and cloud access to data are requirements. We think the world is mobile today, but in fact, we’re just scratching the surface. Gartner estimates that there will be 5.3B smartphones and tablets in 2019. To give that number context: the world population to be 7.5B people by that time. Nearly every person on earth will have a smartphone or tablet by then. In Mary Meeker’s latest “State of the Internet” report, it found that time spent on mobile surpassed desktops in 2014.
    [Show full text]