Computer Safety


Introduction to Technology | Internet Safety | Using Information Correctly | Identity Theft

Introduction to Technology

“Technology has been shaping our society in different ways since time immemorial. Today, staying connected has become an integral part of our work and personal lives. We extend our presence through personal devices like laptops and mobile phones which are connected to the Internet all the time. We share pictures, thoughts, messages using various online tools and platforms with our friends and, sometimes, even the whole world. By using services like Email, Social Networking, Document & Media Sharing we have all started existing virtually in today’s world.” Ajay Kuman, The Internet Never Forgets & Digital Zombies

Did you know that Facebook turned 10 years old back in 2014? Basically nothing is private these days and Americans, don't seem to care all that much. The internet has a long memory. But what if the pictures, data and personal information that it can pull up about you appear unfair, one-sided or just plain wrong? More and more people are claiming they have a "right to be forgotten" and are even trying to delete themselves from the web. The issue appears poised to generate legal, technological and moral wranglings for years to come.

As web companies strive to tailor their services (including news and search results) to our personal tastes, there's a dangerous unintended consequence: We get trapped in a "filter bubble" and don't get exposed to information that could challenge or broaden our worldview. Eli Pariser argues powerfully that this will ultimately prove to be bad for us and bad for democracy. Watch the Ted Talk by Eli Pariser on Beware online "filter bubbles".

Eli Pariser's Ted Talk on Filter Bubbles
Click on the picture to watch the video

Assignment: Google Yourself!

Directions: Google yourself! Read the article Google Yourself and complete the 9 Google searches following the bulleted point search suggestions in the article using your personal information. Prepare a paragraph summarizing what you found and how public your information is. Prepare a paragraph of your findings and post to the assignment box (do not attach a separate document) in itsLearning.

Assignment: Right to be Forgotten Discussion Board

Directions: "Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?" What do you think? Support your answer with a good argument for or against. Post your thoughts to the discussion board. Be sure you read other class member's posts.

Internet Safety

spam email

Phishing, Trojans, Spyware, Trolls and Flame Wars! Oh my! If the idea of these threats lurking around online makes you nervous, then you can now be at ease. Read the Internet Safety lessons from Goodwill Community Foundation, Inc.

screenshot of Internet Safety Website
Click on the picture to read the Web site

Passwords

What is your computer password? I hope you didn't answer that question because your passwords should be a secret. I hope your password is not the world's worst password 123456 or the second worst password password. You should create passwords that are considered strong password because weaker passwords are more susceptible to brute-force attacks, where hackers attempt to access accounts through rapid guessing. You should avoid common words and phrases, and replacing letters with similar-looking numbers (such as “1” instead of “L) is not an effective strategy.

According to SplashData, a leading provider of password management applications, the top ten passwords in 2013, where:

  1. 123456
  2. password
  3. 12345678
  4. qwerty (look at the q on your keyboard)
  5. abc123
  6. 123456789
  7. 111111
  8. 1234567
  9. iloveyou
  10. adobe123

Goodwill Community Foundation, Inc. provides a great infograph explaining common password mistakes like using the same password for every account, using family names or words that are easily identifiable to you. The strongest passwords are random, include letters, numbers, and symbols. There are a number of password generators that can help you figure out a strong password that doesn't come from the dictionary. If you need to write down your passwords in order to remember them, keep your password log in a safe place.

Password Infograph

Stay Safe on the World Wide Web

While you are innocently surfing the Web, you may not realize that you could be picking up spyware, downloading malware, or even visiting fraudulent Web sites. Read the Staying Safe While Browsing lesson by Goodwill Community Foundation, Inc.

hacker game
Requires Flash player

Assignment: Playing It Safe on the Internet

Directions: Open the assignment in itsLearning and follow the instructions.


Using Information Correctly

Just because something (text, pictures, video, songs) are on the Internet, does not mean they are free or can be freely used. Read the lesson Using Information Correctly - Avoiding Plagiarism by Goodwill Community Foundation, Inc.

Every thing that is posted to the Internet is covered under copyright protection (even when you don't see the copyright symbol). Some items are placed in public domain and other items have a Creative Commons copyright which makes them okay to use (with some restrictions). Learn more about Copyright and Fair Use by reading Goodwill Community Foundation, Inc.'s lesson.

When is it okay to use copyrighted material? Watch the video that explains why the Code for Fair Use in Online Video got created, and how the Code can help you create online videos that employ fair use of copyrighted material.


Assignment: Question for Thought 1.1

Directions: Do you know your rights as a user of electronic media? You should! Gather information from the resources provided in the lesson and prepare a response. In a paragraph (at least 5 sentences), give your thoughts on Electronic Privacy and how it affects you. Post your response in the assignment textbox (do not attach a separate document) in itsLearning.

Assignment: Avoiding Plagiarism worksheet

Directions: Answer the questions in itsLearning.


Identity Theft

Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. Identity theft is a serious crime.


Assignment: Identity Theft Poster

Directions: Create a poster using Word or PowerPoint (single slide)to define “identity theft” and showcase 5 tips that avoid identity theft. Your poster must resemble a “poster” and is not a paragraph, report, presentation, or list. Further instructions are in itsLearning.


Resources

If you are having problems viewing this page, opening videos, or accessing the URLs, the direct links are posted below. All assignments are submitted in itsLearning. If you have having problems, contact Mrs. Rush through the itsLearning email client.

The Right to be Forgotten video: http://www.youtube.com/watch?v=iJNxKI0K4_Mv=g7xVhjblXt8

Filter Bubbles Ted Talk: http://www.ted.com/playlists/26/our_digital_lives

Internet Safety Lesson: http://www.gcflearnfree.org/internetsafety/1

Staying Safe While Browsing: http://www.gcflearnfree.org/internetsafety/5

Copyright video: http://www.gcflearnfree.org/useinformationcorrectly/copyright-and-fair-use"

Fair Use video: http://www.youtube.com/watch?v=tCpBhU16TzI

Transcript: http://mrsrush.net/safety/index.pdf


Credits

Password Infograph, Goodwill Community Foundation, Inc.: http://www.gcflearnfree.org/internetsafety/2


Transcript of this lesson