"Technology has been shaping our society in different ways since time immemorial. Today, staying connected has become an integral part of our work and personal lives. We extend our presence through personal devices like laptops and mobile phones which are connected to the Internet all the time. We share pictures, thoughts, messages using various online tools and platforms with our friends and, sometimes, even the whole world. By using services like Email, Social Networking, Document & Media Sharing we have all started existing virtually in today’s world." Ajay Kuman, The Internet Never Forgets & Digital Zombies
Did you know that Facebook turned 15 years old back in 2019? Basically nothing is private these days and Americans, don't seem to care all that much. The internet has a long memory. But what if the pictures, data and personal information that it can pull up about you appear unfair, one-sided or just plain wrong? More and more people are claiming they have a "right to be forgotten" and are even trying to delete themselves from the web. The issue appears poised to generate legal, technological and moral wranglings for years to come.
As web companies strive to tailor their services (including news and search results) to our personal tastes, there's a dangerous unintended consequence: We get trapped in a "filter bubble" and don't get exposed to information that could challenge or broaden our worldview. Eli Pariser argues powerfully that this will ultimately prove to be bad for us and bad for democracy. Watch the Ted Talk by Eli Pariser on Beware online "filter bubbles".
Click on the picture to watch the video
Directions: Google yourself! Read the article Google Yourself and complete the 9 Google searches following the bulleted point search suggestions in the article using your personal information. Prepare a paragraph summarizing what you found and how public your information is. Prepare a paragraph of your findings and post to the assignment box (do not attach a separate document) in itsLearning.
Directions: "Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?" What do you think? Support your answer with a good argument for or against. Post your thoughts to the discussion board. Be sure you read other class member's posts.
Phishing, Trojans, Spyware, Trolls and Flame Wars! Oh my! If the idea of these threats lurking around online makes you nervous, then you can now be at ease. Read the Internet Safety lessons from Goodwill Community Foundation, Inc.
Click on the picture to read the Web site
What is your computer password? I hope you didn't answer that question because your passwords should be a secret. I hope your password is not the world's worst password 12345 or the second worst password 123456. You should create passwords that are considered strong password because weaker passwords are more susceptible to brute-force attacks, where hackers attempt to access accounts through rapid guessing. You should avoid common words and phrases, and replacing letters with similar-looking numbers (such as “1” instead of “L) is not an effective strategy.
According to Forbes, in Ranked: The World's Top 100 Worst Passwords, the top ten worst passwords, were:
Goodwill Community Foundation, Inc. provides a great infographic explaining common password mistakes like using the same password for every account, using family names or words that are easily identifiable to you. The strongest passwords are random, include letters, numbers, and symbols. There are a number of password generators that can help you figure out a strong password that doesn't come from the dictionary. If you need to write down your passwords in order to remember them, keep your password log in a safe place.
While you are innocently surfing the Web, you may not realize that you could be picking up spyware, downloading malware, or even visiting fraudulent Web sites. Read the Staying Safe While Browsing lesson by Goodwill Community Foundation, Inc.
Requires Flash player
Directions: Open the assignment in itsLearning and follow the instructions.
Just because something (text, pictures, video, songs) is on the Internet, does not mean they are free or can be freely used. Read the lesson Using Information Correctly - Avoiding Plagiarism by Goodwill Community Foundation, Inc.
Every thing that is posted to the Internet is covered under copyright protection (even when you don't see the copyright symbol). Some items are placed in public domain and other items have a Creative Commons copyright which makes them okay to use (with some restrictions). Learn more about Copyright and Fair Use by reading Goodwill Community Foundation, Inc.'s lesson.
When is it okay to use copyrighted material? Watch the video that explains why the Code for Fair Use in Online Video was created, and how the Code can help you create online videos that employ fair use of copyrighted material.
Directions: Do you know your rights as a user of electronic media? You should! Gather information from the resources provided in the lesson and prepare a response. In a paragraph (at least 5 sentences), give your thoughts on Electronic Privacy and how it affects you. Post your response in the assignment textbox (do not attach a separate document) in itsLearning.
Directions: Answer the questions in itsLearning.
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. Identity theft is a serious crime. Identity theft can be stressful, but there are steps you can take to minimize the long-term impact on your finances. "If you’ve had your identity stolen, you know the problems it can cause. Even a simple unauthorized use of a credit or debit card can cost you hours upon hours of frustration, sometimes tying up needed funds. The U.S. Department of Justice says about 18 million people per year are victims of at least some form of identity theft. While many of these thefts are conducted on a massive scale, others are much more targeted. We may have a vision that these hackers are sophisticated technological wonder-kids or they originate from Nigeria but often the story is much closer to home and individualized. In some cases, it’s not all that complicated. In a recent highly publicized case, hackers obtained confidential data through a server using a default "admin" username and password that was never changed (Lodbrok, 2017)." Read the rest of Ragnar Lodbrok's blog article Stop! Thief! Online Identity Theft.
Directions: Create a poster using Word, PowerPoint (single slide) or Canva to define “identity theft” and showcase 5 tips that avoid identity theft. Your poster must resemble a “poster” and is not a paragraph, report, presentation, or list. Further instructions are in itsLearning.
If you are having problems viewing this page, opening videos, or accessing the URLs, the direct links are posted below. All assignments are submitted in itsLearning. If you have having problems, contact Mrs. Rush through the itsLearning email client.
The Right to be Forgotten video: http://www.youtube.com/watch?v=iJNxKI0K4_Mv=g7xVhjblXt8
Filter Bubbles Ted Talk: http://www.ted.com/playlists/26/our_digital_lives
Internet Safety Lesson: http://www.gcflearnfree.org/internetsafety/1
Staying Safe While Browsing: http://www.gcflearnfree.org/internetsafety/5
Copyright video: http://www.gcflearnfree.org/useinformationcorrectly/copyright-and-fair-use"
Fair Use video: http://www.youtube.com/watch?v=tCpBhU16TzI
What is Identify Theft video: https://www.youtube.com/watch?v=wvS9HrKW5ic
Victims of ID Theft: 5 steps to take: https://www.youtube.com/embed/QizfpGI7acE?rel=0
Stop! Thief! Online Identity Theft: https://www.orangewebsite.com/articles/online-identity-theft/
Password Infographic, Goodwill Community Foundation, Inc.: http://www.gcflearnfree.org/internetsafety/2