Learning Literacies - Protect It

From WikiEducator
Jump to: navigation, search

Protect It - Identity, Privacy and Copyright

  • Privacy represents an important area of society that is being impacted by computers. Just Google for your favorite recording artist or movie star. They don't have much privacy - there are pictures of them everywhere. Their personal information is very public.
  • Freedom of speech takes on new meaning in cyberspace. While it is possible for repressive regimes to control print and broadcast media, it is much more difficult to control online publication. This is especially true when the source of the information is outside the jurisdiction of those endeavoring to control speech.


Your personal information may not be so public, but it could be. See how easy it is to find your phone number and address using one of the online services. While this great if old friends are trying to reach you, it could be a problem if the interested is unwanted. In this topic, we will look at issues surrounding privacy and how to protect your personal information. The "worst case" is identity theft - a growing problem that is extremely hard for the victim to recover from. Being aware of these issues is an important first step.



Learning outcomes

  • understand human, cultural, and societal issues related to using digital tools, strategies, and resources to enhance my learning, and practice appropriate legal and ethical behavior.
  • explore the topic of Privacy through reading, media and related assignments
  • practice appropriate and legal behavior
  • cite the work of others
  • support own learning and intellectual rights
  • respect the views, information, and opinions of others
  • use a process to read college text chapters



Keywords

  • privacy, risks, data collection, surveillance, Fourth Amendment, personalization, privacy regulations, public records, communications interception, encryption, freedom of speech, media, spam, offensive speech, censorship, anonymity, net neutrality


Study questions

  • How do you feel about your own privacy when you are using technology? Are you more or less concerned than transacting in other media?
  • How safe is your personal information?
  • Do you think "big brother" is watching you?
  • Should we have a National ID system? What difference would it make?
  • If more health data was collected, researchers could cure more health problems. Do you agree? Would you allow you health records to be shared with researchers if your personal identity were hidden?
  • Is there a right to privacy? How far should that extend? What limits are necessary?
  • Should anonymity be allowed? Encouraged? Protected?
  • To what extent can new communities develop over the internet? Are these "real" communities? What makes them special?
  • Who am I if someone steals my identity?


Icon multimedia.gif

Media



Identity theft, privacy

  • PrivacyGrade Grading The Privacy Of Smartphone (Android) Apps from a team of researchers from Carnegie Mellon University. assigned privacy grades to Android apps based on some techniques developed to analyze to their privacy-related behaviors.
  • Twelve Really Useful Links You Need to Know to Stay Safe on the Internet - a collection of articles that will help you understand the tricks and tactics used by malware writers and that explain how to set up some powerful computer defenses.
  • You Can Create The Perfect Password. Here's How - useful tips for creating and keeping track of your passwords, to better protect your personal information online
  • *Passwords - comic illustrates the problems with rules for passwords
  • *11 Tips For Students To Manage Their Digital Footprints - Digital Footprint - the record or trail left by the things you do online. Your social media activity, the info on your personal website, your browsing history, your online subscriptions, any photo galleries and videos you’ve uploaded — essentially, anything on the Internet with your name on it.
  • *You're Being Watched - even if someone isn't trying to steal your identity, they still want to know everything about you so they can place advertising where you are likely to see it.
  • *Here's How Easily Someone Could Hack Into Your Life (Infographic) - If you're reading this, there's 69 percent chance you will become a victim of hacking at some point in your lifetime. And if you think protecting yourself is as easy as changing a couple passwords and installing some anti-virus software, you're 100 percent wrong.
  • SciFri 12jul podcast - With the NSA conducting surveillance on our data and Google scanning our email, how can we protect our personal information? Jon Xavier, digital producer at Silicon Valley Business Journal, discusses the services that you can use to make your information more secure and private.
  • Cloudsweeper email tools - Safeguarding your cloud based storage.] - tools to help users understand and control their risks online while also conducting research to better understand those risks at a systemic level.
  • *DuckDuckGo - Search anonymously. Find instantly. - search engine that does NOT save your search history and share it with the government.
  • Ghostery - user-friendly privacy tool to understand and control more than 1,800 trackers that are tracking them when they browse.
  • Steal this blog - "Oversharing might result in more risk and unintended consequence than on might think, especially in the long run. If you’re comfortable being a human homing beacon, that’s fine, we just want you to be fully aware of what that means and the potential risk it might involve."
  • Three types of online attack: Mikko Hypponen on TED.com - Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data — and only two are considered crimes.
  • Identity Theft Information - approximately 15 million United States residents have their identities used fraudulently each year, about $50 billion loss, approximately 7% of all adults have their identities misused, $3,500 losses each. each year 100 million personal identifying information placed at risk when government and corporate databases are lost or stolen.


Copyright, citation, plagiarism

  • Did I Plagiarize? - infographic
  • Can I Use That Picture? - infographic
  • Plagiarism: How to Avoid It (video 2:50) - good overview of plagiarism, what it is and how to avoid it.
  • Why It’s Time To Change How Students Cite Their Work - Without readily available sources to review, the audience cannot truly evaluate the validity of the project. They are left with what might be a beautiful and elegant project (the product) without knowing the sources used to construct it (the process).
  • Citing Sources - Finding the information for your research paper and determining whether that information fits what you need is just the first part of the process. Next, when you’re using this information in your own work, you’ll need to cite your sources to avoid plagiarism. Ethical standards require that you give credit to all published authors for their ideas.
  • Plagiarism - Most cases of plagiarism can be avoided by citing sources. Simply acknowledging that certain material has been borrowed and providing your audience with the information necessary to find that source is usually enough to prevent plagiarism.


Reading

  • DeAnza Student Success - Reading - resources, reading strategies, practice articles
  • Reading College Texts - preview, ask questions, read for details, review
  • Reading Skills - strategies for reading for college
  • How to do a Close Reading - developing a deep understanding and a precise interpretation of a literary passage that is based first and foremost on the words themselves. But a close reading does not stop there; rather, it embraces larger themes and ideas evoked and/or implied by the passage itself.


Social media, Twitter

  • Newbie's guide to Twitter - Twitter is an interesting and practical real-time messaging system for groups and friends. It's just not completely obvious how to get started.


Financial literacy


Also see...

Report: A Trustmark for IoT – ThingsCon
"Consumers have little insight into what any one connected product does, what it even might be capable of, or if the company employs...
The future of the Internet of Things depends on this (Opinion) - CNN
"Right now, the Internet of Things is at an inflection point. It's pervasive but also still in its infancy. Rules have yet to be...
Password-dos-and-donts-POSTER-Edublogs-K-Morris-23glzt1-1xu1p33.pdf
Dos and Don’ts. Display the poster below in your classroom and consider sending a copy home with students. Alternatively, why not have...
Updated Password Advice: What Teachers and Students Need to Know – The Edublogger
"The advice around passwords has recently been updated and while there are varying opinions, this post will help you learn about the...
The Murky World of Third Party Web Tracking - MIT Technology Review
"How do these companies use the data they acquire, where is it stored and who has access to it? The law covering this kind of activi...
Reminder: Check If Your Email Address Has Been Stolen Or Hacked | Gizmo's Freeware
"Have I Been Pwned. You'll find it at www.haveibeenpwned.com and it's basically a searchable database of stolen email addres...
The Internet: Cybersecurity & Crime - TeacherTube
Video created by Code.org to help understand what is cybersecurity on how to protect ourselves from hackers.
<p class=&qu...
The Internet: Cybersecurity & Crime - TeacherTube
"Video created by Code.org to help understand what is cybersecurity on how to protect ourselves from hackers."
<...
Identity Theft Information: Guide to ID & Credit Fraud | Equifax
"Are You At Risk for Identity Theft? Even the most careful consumers can fall victim to identity theft. To enhance your identity the...
Traces by Mike Caulfield #3: This Week In Webo-plasmosis
"webo-plasmosis: a sign of being infected is ceasing to realize you have been affected. Here's a partial list of symptoms: Do...
How to clean up your online presence before job hunting - YourStory.com
"In this age of social media and digital footprints, your online presence or online reputation is an important part of your personal...
Some password-manager apps that store data centrally get it right | Macworld
"You might be concerned from recent attacks that hosted secrets stored by 1Password and LastPass are at risk. The details say they&#...
Identity theft can hit children too | SafeKids.com
"One thing that may not be obvious is that children are at risk. Even very young children can be victims of identify theft. One reas...
Identity Theft Services Offer Some Benefits
United States Government Accountability Office (GAO) Report:"Identity Theft Services Offer Some Benefits but Are Limited in Preventi...



Assignments

  1. Before you start the reading and the assignments, take a few minutes to think about what you already know about the topic - Privacy and Freedom of Speech. Write a sentence or two about this in the I know... discussion.

  2. Read the Study notes for an overview for the topics that will be covered.

  3. Identity theft, privacy - Scan 2-3 articles listed in the selected Media above, or research to find others online. Which of the articles about identity theft did you read? What did you learn? What precautions can you take to prevent someone from stealing your identity? In the Identity theft discussion, post the link to the article you selected and a brief description of what your learned.
    Review the posts of 2 others.

  4. Citing sources - College writing requires that you understand the rules for academic research and reference to your sources of information. Citation is the practice of saying where you found the information you are quoting or using ideas and information from. Review 1-2 articles in the selected Media section. Which of the articles about citing sources did you read? What did you learn? In the Citing sources discussion, post the link to the article you selected and a brief description of what your learned.
    Review the posts of 2 others.

  5. Reading - You think you already know how to read? You may be surprised. Review 1 of the articles about reading. Which of the articles about reading did you read? What did you learn? In the Reading discussion, post the link to the article you selected and a brief description of what your learned.
    Review the posts of 2 others.

  6. Financial literacy - Many financial transactions now take place online - bill paying, buying shoes and books, making reservations, applying for college,... so it is important to understand both the financial aspects as well as the internet technologies. Review the topics in the Financial Topics for College Students and pick one to review. Write a summary of the article and post it along with a link to the articles you reviewed to Financial literacy discussion.
    comment on the work of 3 others.

  7. Scams, fraud - To gauge your personal risk, and find tips for lowering it, take the nifty 10-question safety quiz at IDsafety.net. http://idsafety.net/

  8. Online identity, digital footprint - Digital Footprint - the record or trail left by the things you do online. Your social media activity, the info on your personal website, your browsing history, your online subscriptions, any photo galleries and videos you’ve uploaded — essentially, anything on the Internet with your name on it. Just like a tattoo, your digital reputation is an expression of yourself. It's highly visible, and hard to remove. Explore how your online identity affects you, your friends, your school and your job - for better and for worse - and how to make informed choices. Take the self-assessment at Connect Quiz: What Do You Think?
    In the Digital footprint discussion, post a brief note about what you learned from taking the quiz. Will you do anything differently based on what you now know?

  9. Textbooks - This course doesn't have a specific textbook, but it does require a lot of reading. Is reading from web resources different than reading from a textbooks? Which do you prefer and why? In the discussions Textbooks and resources, post a brief description of your preferences. Include 2-3 questions about your concerns.
    Review the posting of 2 other students and respond to their questions. Your reply can be more questions.

  10. Test drive - Twitter - Twitter is a social media communication network that allows messaging and comments. However, "Tweets" are limited to 140 characters. Review the inforgraphic - A Simple Acronym For Encouraging Digital Citizenship and the guide to using Twitter. Find some interesting hashtags and authors who tweet about a subject of interest to you. Have you used Twitter? What was your experience? Do others you know use Twitter? In the Test drive - Twitter discussion, post a brief description of the topic of interest, the hashtags and authors and 2-3 examples of tweets that were particularly interesting.
    Review the posts of 2 others and provide feedback.



2014.09.25 644.