CIS4 4. Privacy, Security
From WikiEducator
Apply security settings and recognize basic privacy issues
Learning Outcomes
- explore the topics of Privacy and Security through media, discussions and related assignment activities
- explore web resources associated with this topic
- consider how society - individuals, organizations are impacted by the application of computers and the Internet to Privacy and Security issues
- use spreadsheet software to create a spreadsheet with formulas
Keywords
Security issues , Malware , Phishing , Pharming , Computer protection , Anti-virus software , Privacy issues , Cookies , Opting out , Online privacy policies , Privacy settings , Computer crime , Data Encryption , Encrypting File System (EFS) , Encryption benefits , Encryption drawbacks
Learning Guide
- questions
Contents
Assignments
- Before you start the reading and the assignments, take a few minutes to think about what you already know about the topic - Privacy and Security. Write a sentence or two about this in the I know... discussion.
- Read the Reading guide for an overview for the topics that will be covered.
- Read, view, listen to several selections in the Media lists. There is no textbook for this course, so you will have to determine how many of these resources to read and watch. Use the study questions and assignments to guide your research. Have you found answers to most of the questions? If not, look for other sources of information. This is self-directed learning.
- Choose 2 words from the Keywords list. Find 1-2 resource that provides information about the words and how they relate to the course. Post the words, links to your selected resource, and a brief description about your selections, to the discussion Privacy and Security keywords.
Review 2 other resources in the discussion, and write a brief reply for each.
- Just like a tattoo, your digital reputation is an expression of yourself. It is highly visible, and hard to remove. Explore how your online identity affects you, your friends, your school and your job - for better and for worse - and how to make informed choices. Take the self-assessment at Digital Tattoo http://digitaltattoo.ubc.ca/quizzes/protect-what-would-you-do/
- Learning Literacies - Protect it - Digital Citizenship. We have already looked at a number of these issues. Here is an opportunity to review 2-3 articles in the Protect it media selections, and then search online for another good resource on the topic. Rate 2 articles. Post a link and a brief summary of the reasons for each of your selections to the Learning Literacies - Protect it discussion. Review 2 others.
- Spreadsheet - Look through the Wolfram Alpha site. Select a topic that interests you and find some information to represent in your spreadsheet. Use Spreadsheet software to create a spreadsheet with formulas. Include at minimum of 3 different formulas. For example Sum, Average, Minimum. Save your spreadsheet so that it is viewable by anyone with the web address. Post a link to your spreadsheet in the Spreadsheet with Formulas discussion. Review 3 others.
- Chapter 6: Information Systems Security
- Chapter 12: The Ethical and Legal Implications of Information Systems
PRIVACY
<rss date="" max=5>http://www.diigo.com/rss/user/vtaylor/privacy</rss>
SECURITY
<rss date="" max=5>http://www.diigo.com/rss/user/vtaylor/security</rss>
PROTECT
<rss date="" max=5>http://www.diigo.com/rss/user/vtaylor/protectit</rss>
- 2018.8 000