Friday, May 19, 2017

Hex 6: Final project/Bibliography

For your final project for this class, you will be researching a topic on an issue within digital citizenship.

Assignment:
Step 1: 
Research an issue from within the nine elements of digital citizenship and create a bibliography using Noodletools (one person per topic).  Due Tuesday.

Sign up for your topic in the comments section of this blog post ("Final Project/bibliography"), identifying the element AND the topic--first one to post gets the topic (you must include: your first name, the element of digital citizenship, and the topic to claim the topic).  

Example: KA, Digital Health & Wellness, addiction

Other requirements:
-You MUST have at least three sources related to your topic
-You can include (but it is not required) no more than one video or audio clip on your topic
-You must use Noodletools to create your bibliography (choose MLA Lite--the free option--to create your account)


Step 2:
Create an online project on your topic, putting information into your own words.  This will be shared with the class on Thursday.

Options: Prezi, Emaze, Powtoon--any online presentation creator (but try to avoid Google Slides--boring!!!)
Possible Topics within the Nine Elements: 
1. Digital Access
-digital divide (in America or internationally)
-disabilities that prevent access (physical or mental)
-filters
-censorship
-net neutrality

2.  Digital Commerce
-buying or selling online
-cookies

3.  Digital Communication
-Cell phones in society
-Creating community through online methods
-Social media and society

4.  Digital Literacy
-Search strategies 
-Evaluation of websites
-Internet in the workplace (future of technology)
-Technology in schools 

5.  Digital Etiquette
-Appropriate use of technology in society

6.  Digital law
-Copyright and/or plagiarism
-Music and copyright
-Pirating, downloading, or file-sharing
-Hacking
-Cybercriminals and/or cybercrime divisions of law enforcement
-Cyberterrorism
-Laws dealing with cyber acts 

7. Digital Rights and Responsibilities
-Acceptable use policies (public computers, specific websites, etc.)
-Cyberbullying

8.  Digital Health and Wellness
-Physical issues (carpal tunnel, headaches, neck or eye strain, etc.)
-Psychological issues (addiction, depression, sleep issues, etc)

9.  Digital Security
-Internet safety 
-Sexting
-Predators
-Passwords
-Identity theft
-Online schemes/scams (phishing, etc)
-Malware, viruses, spyware, etc.
-Antivirus, firewalls, etc.
-Data collection by companies (big data, cookies, data mining)
-Government leaks (Wikileaks, Edward Snowden)
-Data breaches

Tuesday, May 16, 2017

Hex 6-9: Digital Safety


http://senior-learning.wikispaces.com/file/view/lesson4-art.png/278606920/645x363/lesson4-art.png

Part I: Dangers on the Internet

Activity: Are You Web Aware?

1-What are some possible dangers on the Internet?  Is the Internet a dangerous place?

2-When is it OK to share personal information online? What kinds of personal information are NOT OK to share?  What kinds of personal information are OK to share?

http://transmissionsmedia.com/wp-content/uploads/2012/11/DANGER-INTERNET-AHEAD-PROCEED-WITH-CAUTION.png

Video:  Friend or Fake

Guide to Social Networking 

Video: Think Before You Share (Top 10)

Things to Think About with Social Media:
-limit your friends list
-privacy settings/controls (check often)
-"privacy fatigue" (read privacy guidelines, know new features)
-malicious apps, phishing, malware (similar to email)
-future job hunting
   -These types of posts will impact future career plans the most: lifestyle; inappropriate materials (comments, photos, etc.) made by you OR your friends/relatives; comments criticizing your past jobs (employees, coworkers, clients, etc); membership in certain groups 
   -Positive online reputation will help
   -Do not disclose a username and password in an interview

HW: Internet Contract





Part II: Scams


http://www.planetminecraft.com/blog/minecrafr-frauds-thetruth/

1-What are some different ways that you can be digitally scammed?

2-What can you do to make sure that you are not a victim of a scam?

3-What advice would you give to adults (especially older adults) in your life that might be susceptible to scams?

Video: 
The Internet: Cybersecurity & Crime





Types: 
-malware (connected to flash drives, embedded in files, downloads, email attachments)
-pop-ups (scareware ["Your computer is infected"], malicious advertising/contests)
-spyware (record keystrokes, screenshots, video, audio, browsing)
-ransomware (hold computer hostage until you pay)
-backdoor (hidden access to computer, besides malware)
-public wifi ("listen" to others, rogue router [not the wifi you think you're connecting to], "shoulder surfing", theft [don't leave unattended])
-private wifi (piggybacking [unauthorized use on private wifi--slows speed, could be doing illegal activity or "listening", hackers share locations]; turn off if not in use [vacation])
-Identity theft


Activity: Scams and Schemes



Video: Identity theft targets kids





Defense:
Data backup
Firewalls
Software patches
Antivirus software (only trust warnings from a legitimate source)
User knowledge/education
   -Do not click on unknown links! (hover over link)
   -Do not give personal/confidential information over the phone!
   -Phishing emails may use personalization or play on your emotions



Kahoot: Digital Security 



Part III: Passwords

1-How frequently do you change your passwords?

2-What makes a good password?


Most Used Passwords
Source: Computer Security Literacy: Staying Safe in a Digital World


Source: Better Buys


 Source: Better Buys


Video: A World Beyond Passwords


Activity:  Creating a Good Password


Dice Activity
Step 1: Roll five dice all at once. Note the faces that come up without looking at the wordlist yet. 
Step 2: Your results might look like this reading left to right: 4, 3, 4, 6, 3. Write those numbers down.
Step 3: Open EFF's Long Wordlist [.txt] to find the corresponding word next to 43463.
Step 4: You will find the word "panoramic." This is the first word in your passphrase, so write it down.
Step 5: Repeat steps 1-4 five more times to come up with a total of SIX words.
When you are done, your passphrase may look something like this:
panoramic nectar precut smith banana handclap
Step 6: Come up with your own mnemonic to remember your phrase. It might be a story, scenario, or sentence that you will be able to remember and that can remind you of the particular words you chose, in order. For example:

The panoramic view, as I tasted the nectar of a precut granny smith apple and banana, deserved a handclap.
Password Tester
(just for fun)


Part IV: Digital Footprint/Misc.

1-Did you know websites/companies collect your personal information (cookies)?

2-What are some issues with leaks of government information (Wikileaks, Edward Snowden)?

3-What is a digital footprint?  What is on your digital footprint?



http://www.cybersmart.gov.au/Kids/Get%20the%20facts/~/media/Cybersmart/General%20Archive/Archive/digitalFootprint2.png

Video: Your Digital Footprint


Activity:  Privacy and Your Digital Footprint

Friday, May 12, 2017

Hex 6-8: Digital Health & Wellness

Consider:

1-What are some possible physical issues that could happen because of technology?

2-Can you think of some "danger zones" at school or at home for physical issues?  


http://internetsavvy.wikispaces.com/file/view/health.jpg/200142334/461x138/health.jpg


http://mobihealthnews.com/wp-content/uploads/2013/10/LumoBack-infographic.jpg

What can you do about them (to avoid them, to fix them, etc.)?
http://mentalfloss.com/article/75385/how-you-should-really-be-sitting-your-desk



https://gallery.mailchimp.com/7960acdb88d010a689afcc915/images/Ribbet_collage_infographic2.jpg


Stretches:

GoNoodle

3-What are some possible psychological problems that could happen because of technology?


http://blog.jammer-store.com/wp-content/uploads/2011/09/mental-health.jpg

Consider:  addiction, isolation, stress, depression, anxiety/social anxiety, sleep disorders, mental issues associated with cyberbullying, etc.


(3:15-10:23)

4-What can you do if you or someone you know is exhibiting some of these behaviors?

Video:  Internet Addiction


Site: Warning Signs of Internet Addiction

Addiction Test

Article: Dealing with the Device-Addicted Generation


Choose an activity (if time allows):
1-Choose a partner and create a short scene where one person has any digital health and wellness issue and the other person is a friend trying to help them with their issue.  Show a positive way to help them and a negative way.  Act out for the class in a 2-3 minute skit.

2-Find an article or video that talks about physical, psychological, or emotional health and technology.  Write a summary of your article, including the important points (3-5 sentences), in the comment section of this post.  Be sure to include the URL of your article or video.

Possible topics/search terms include:  technology AND addiction, isolation, carpal tunnel, posture, eye strain, lack of exercise, etc.   

3-Write a detailed plan to solve a digital health and wellness issue of someone in your life (you do not need to share names).  Try to have 4-6 steps of things they can do to solve their problem. Ideas:  a plan to help them through addiction or isolation, a map/photos with a change to help with ergonomics, best items to buy to help with carpal tunnel or other ailments, etc.  Be specific!

Thursday, May 11, 2017

Hex 6-7: Digital Rights & Responsibilities

Consider:

1-What rights (freedoms or privileges) do you have when using digital technology?

2-What responsibilities do you have when using digital technology?

3-What are some ways that you can use technology responsibly?

4-True or False:  Everyone is responsible for a positive online experience.


Part II:

Review:

1-What is plagiarism?

2-What are some consequences of plagiarism?

3-How can you avoid plagiarism?

MLA Documentation

Video:  Stopping Word Thieves



Part III:

Consider:

1-What is cyberbullying?

2-What are some examples of cyberbullying?

3-What are some consequences of cyberbullying?

4-What should you do if you are a victim of cyberbullying?

5-True or False:  Most kids do not cyberbully.

6-Do you think cyberbullying is a problem in our school?  If it is, what can we do about it?

Video:  Let's Fight It Together 


Activity: Scenarios (if time allows)

Tuesday, May 9, 2017

Hex 6-6: Digital Law

Consider:

1-Do you share music, games, movies, etc. with your friends?  

2-What are some consequences for illegal downloading, file sharing, pirating, etc?

3-What is your opinion on sharing files?




http://cloudfront.sproutfund.org/files/2014/10/pirating-music1.jpg

Part II


Consider:

1-What is copyright?

2-What does copyright protect?  Why is it important?

3-How can we obey copyright in our school work?

4-What are the consequences for breaking copyright (in school, in college, at work, etc)?


http://blog.kunvay.com/wp-content/uploads/2013/07/Copyright-CutOut2.jpg

Video:  What's Mine Isn't Yours

Video:  Music Plagiarism

Activity: Creator's Rights

Monday, May 8, 2017

Hex 6-5: Digital Etiquette

http://wallpaper.mohoboroto.com/images/892729-mobile-manners-cell-phone-etiquette-do-not-use-cell-phones-when-in.jpg

Consider:
1-Have you ever been annoyed in public by other people on their cell phones or other devices?  Give examples.  When and/or where can the use of cell phones be considered impolite, inappropriate, or illegal?



https://www.wow247.co.uk/wp-content/uploads/2013/04/popes.jpg

2-Should cell phones or other technology be banned in some places?  In what places and under what circumstances?


http://3.bp.blogspot.com/_Ty1MoTdJZYA/TK2FTqedmeI/AAAAAAAAAFw/sZqACDrcmxI/s1600/CELL+PHONE+CITATION.jpg

3-When are appropriate and inappropriate times to use cell phones in school?  

Consider texting, listening to music, answering a call, taking photos/video, social media, etc.

Side question: Should students be friends with teachers on social media?


http://www.grandhaventribune.com/sites/www.grandhaventribune.com/files/styles/large/public/cell_phone.gif?itok=-lNa-O4L

4-What are some things to keep in mind when borrowing someone else's computer? Examples: a friend, a parent, or a public computer

Consider: closing windows, changing settings, shutting down, privacy, etc.

5-What is "tech shaming" and why is it inappropriate? 

6-How can technology negatively affect your relationships?  What would be some good rules to help build relationships?
Example: no cell phones at the dinner table





http://www.techbrother.com/wp-content/uploads/2013/10/funny-cell-phone-quotes.jpg

7-Email and other technological communication is now common in school and the workplace.  What are some guidelines (things to do and not do) when writing emails or other workplace communications?  

Consider: textspeak, capitalization, spelling, jokes, subject line, closing/greeting, all caps, etc.

Always try to catch  your mistakes:











Video:


Video: Word Crimes 



Activity (if time allows):
Come up with 5 rules with your table group regarding cell phone use in public and post them in the comments section.  Be sure to include first names only of your group members.

Wednesday, April 26, 2017

Hex 6-4: Digital Literacy

Part I:

Activity:
Take notes (form provided) on the following presentations/video:

Picking the Right Search Terms 
https://docs.google.com/presentation/d/1JFaDwf3_mHVe-O0lqlGRibCD_Hv6zle58YsbUcanzDM/present?slide=id.i0

Understanding Search Results 
https://docs.google.com/presentation/d/1KQg1jH5zPK2tXP4CIHcPFyeGMhcX81mh2BpAzbWUbeg/present?slide=id.i0

Narrowing a Search to Get the Best Results 
https://docs.google.com/presentation/d/1C3Lte1CFgc4WSw8ydeEhF8BhHdXBFxGnXKpSCGsH6XE/present?slide=id.i0

Discuss:
-Boolean operators
-Advanced Searching


Evaluating Websites:  

Consider:
-What would make you suspicious of a website?

-What are some clues to help you tell if a website is trustworthy?



Part II:

Consider:

1-What are issues with using the Internet in schools?


http://blog.mindjet.com/2013/12/innovation-culture-soctech-wired/

2-What are issues with using the Internet in the workplace?  Consider legal, ethical, and productivity issues


3-What kind of skills will be necessary for jobs in the future?


4-How can the Internet be used positively in the classroom?


Assignment:
Interview a parent or trusted adult and ask them one or both of the following questions, recording their response (at least 2 sentences total) in the comment section of this blog post:

1-How/when do you use technology in your job?  For example, how do you use technology in a regular work day?

2-What do you think is the future of technology in the workplace (in your field or others)? 

Tuesday, April 25, 2017

Hex 6-3: Digital Communication

Consider:

1. Why is making a connection with other humans important?




http://hub.salesways.com/is-your-sales-team-using-social-media-effectively/

2.  How is digital communication different from face-to face?  What are the pros and cons of digital communication?


3.  How can you make positive online connections?


4.  What are some specific challenges, barriers, or misunderstandings that can happen with digital communication?


5.  What are some differences in the ways you communicate with your friends, family, teachers, boss, etc?  


6.  A Personal Learning Network (PLN) is an informal learning network that consists of people and websites that you learn from and/or communicate with.  Everyone has a PLN, whether or not they are on social media or not.  



What is in your PLN?  What could you add?  


Monday, April 24, 2017

Hex 6-2: Digital Commerce

https://digitalcitizenship-2a.wikispaces.com/Digital+Commerce

Consider:

1-What are some concerns with shopping online?

2-How can you know that you are on a secure site?  Should you use secure sites on a public computer for shopping?

3-What are some ways to make sure you can be safe when shopping online?

4-What should you (as a young adult) always do before shopping online?

5-What are some ways to stay safe when selling items online?



http://www.businessinsider.com.au/teens-digital-behavior-changes-2014-10


Some considerations:
1-identity theft/stolen financial information, scams

2-lock symbol, statements of security, encryptions, colors (none, blue [standard security], green [extended validation])

3-When using public computers, you may want to use private browsing (incognito) and "Clear All History"

4-Keep track of card activity
   -check bank and credit card statements carefully
   -check bank and card policies, but in general:
     -debit card: 2 days to dispute ($50 liability); up to 60 days,    
     liable for up to $500; after 60 days, loss not covered
     -credit card: 60 days to dispute ($50 liability); not covered after        60 days

5-Research retailers, particularly out of the U.S. (may not be covered for loss)

Handout: Cyber Consumer Safety Tip Sheet

Assignment:
Comment on this blog post with 2-3 sentences about your parents' opinions on online shopping.  You should ask your parents before responding (or even have your parents respond for you!).  Be sure to put your first name or initials on your comment, and be sure to comment on this post for Digital Commerce.

Friday, April 21, 2017

Hex 6-1: Digital Access


Consider the following questions:

1.  Why is access to technology important?  What are some things you must have technology for in today's world?

2.  What are some ways that access to technology can be limited? 


http://blog.jobsfirstnyc.org/2011/09/bridging-digital-divide-in-new-york.html

 Consider: 
-physical limitations
-financial/economic limitations
-geographic limitations (national and international)
-filters
-censorship 
-technology limitations (mobile phones vs. computers)

Video:  Internet Censorship




"Participation gap" is defined as "the unequal access to the opportunities, experiences, skills, and knowledge that will prepare youths for full participation in the world of tomorrow."
(Harlan, Mary Ann.  "Standing on a Corner: The Access Gap in Rural Communities."  Teacher Librarian.  Oct. 2014: 38-42.)

3.  What are some of the opportunities, experiences, skills and knowledge that students without access are missing?  In other words, what are they going to be missing when they graduate and go to college or into the working world?

(Communication, creation, collaboration, discovery, evaluation, innovations, networking/PLN)

(0-2:40)

http://ologie.com/2013/06/bridging-the-brand-gap/



4.  What can be done about lack of access?  Whose responsibility is it to ensure access?

Video: Net Neutrality



Activity (if time allows):
With your table group, come up with ideas about bridging the digital divide for the following factors:  physical, financial, geographic, filters, or censorship.  Type several short paragraphs on your ideas in the comment section, using the limitations assigned to your group.  

Try to include:  
-Specific problems with access to technology for your group 
-Specific ideas to bridge the digital divide for your group.  Think about specific things that you and people you know can do, as well as big ideas.  Use your own ideas, but you can do some quick research as well.
-Write a short response on how it felt to use technology with your limitations.  How did it feel?  How did you compare your groups to other groups?  Did it feel fair?

Thursday, April 20, 2017

Hex 6: Digital Citizenship (overview)

In this class, we will be focusing on 9 Elements of Digital Citizenship.  


http://cohort21.com/garthnichols/action-plan/digital-citizenship-curriculum/

Video: Living in a Digital World

Consider the following questions:

1.  What does it mean to be a citizen of a community (school, city, state, national, etc.)?

2. What are some rights and responsibilities of a citizen?

3.  How is being a digital citizen similar and different to other kinds of citizens?

4. Where can you find policies of different websites?  Why is looking at policies important?


http://www.edudemic.com/first-five-days-of-digital-citizenship-at-your-school/

Next, you will be creating rules of conduct for being a responsible, positive citizen online, with your table groups.  

Group roles:
-Facilitator (you like to take charge and can keep everyone on task)
-Recorder (you can write and type quickly)
-Spokesperson (you like to talk)

Everyone should contribute ideas!

Come up with five rules for proper behavior when using the Internet.  

Share your five rules in the comment section of this post.  Comment as Anonymous, but be sure to put the first names or initials of your group members.







Wednesday, April 19, 2017

Hex 6: Blog Expectations


For this class, you will participating in a class blog several days a week.  The blog will contain questions for discussion, information, short assignments, etc. 

Remember that what you write online could be seen by others in this class, in our school, in our community, and possibly even around the world.  Keeping that in mind, here are several expectations when participating in our class blog:
  • Be respectful to others
  • Be academic in your writing (spelling, grammar, etc.)
  • Stay on topic (no random posts)
  • Be mindful of who can/should read this (feel free to share with your parents)
  • Respond in the comment section for the correct day/post
  • Use your first name or initials ONLY (no name or initials=no credit)

Discussion of issues related to digital citizenship will be important in this class.  You may be asked to respond in writing to what we have discussed, so be sure to pay attention!  If discussion isn't working out, additional assignments may be necessary.  While we are discussing issues, be sure to:
  • Pay attention and listen to others (don't repeat the same answers)
  • Participate in the discussion, if you have something meaningful to add to the topic
  • Be considerate--do not interrupt or put down what someone else has to say


IF YOU ARE ABSENT:
Look first on the blog to see what you missed that day. Look at the information and videos, consider the discussion questions, and respond to any assignments for the day. Then check with Mrs. Arrants for any additional activities you missed.

Tuesday, April 11, 2017

Hex 5: Annotated Bibliography

For your final project for this class, you will be researching a topic on an issue within digital citizenship.

Assignment: Research an issue from within the nine elements of digital citizenship and create a bibliography using Noodletools (one person per topic).  

Sign up for your topic in the comments section of this blog post ("Final Project"), identifying the element AND the topic--first one to post gets the topic (you must include: your first name, the element of digital citizenship, and the topic to claim first rights).  Let me know if you have any ideas that are NOT on the list (but fit within one of the nine elements).

Other requirements:
-You MUST have at least three sources related to your topic
-You can include (but it is not required) no more than one video or audio clip on your topic
-You must use Noodletools to create your annotated bibliography
-Include a 2-3 sentence annotation for each source, which can be a summary or reflection of what you learned from the source


Possible Topics within the Nine Elements: 
1. Digital Access
-digital divide (in America or internationally)
-disabilities that prevent access (physical or mental)
-filters
-censorship
-net neutrality

2.  Digital Commerce
-buying or selling online
-cookies

3.  Digital Communication
-Cell phones in society
-Creating community through online methods
-Social media and society

4.  Digital Literacy
-Search strategies 
-Evaluation of websites
-Internet in the workplace (future of technology)
-Technology in schools 

5.  Digital Etiquette
-Appropriate use of technology in society

6.  Digital law
-Copyright and/or plagiarism
-Music and copyright
-Pirating, downloading, or file-sharing
-Hacking
-Cybercriminals and/or cybercrime divisions of law enforcement
-Cyberterrorism
-Laws dealing with cyber acts 

7. Digital Rights and Responsibilities
-Acceptable use policies (public computers, specific websites, etc.)
-Cyberbullying

8.  Digital Health and Wellness
-Physical issues (carpal tunnel, headaches, neck or eye strain, etc.)
-Psychological issues (addiction, depression, sleep issues, etc)

9.  Digital Security
-Internet safety 
-Sexting
-Predators
-Passwords
-Identity theft
-Online schemes/scams (phishing, etc)
-Malware, viruses, spyware, etc.
-Antivirus, firewalls, etc.
-Data collection by companies (big data, cookies, data mining)
-Government leaks (Wikileaks, Edward Snowden)


-Data breaches

Tuesday, April 4, 2017

Hex 5-9: Digital Security


http://senior-learning.wikispaces.com/file/view/lesson4-art.png/278606920/645x363/lesson4-art.png

Part I: Dangers on the Internet

Activity: Are You Web Aware?

1-What are some possible dangers on the Internet?  Is the Internet a dangerous place?

2-When is it OK to share personal information online? What kinds of personal information are NOT OK to share?  What kinds of personal information are OK to share?

http://transmissionsmedia.com/wp-content/uploads/2012/11/DANGER-INTERNET-AHEAD-PROCEED-WITH-CAUTION.png

Video:  Friend or Fake

Guide to Social Networking 

Video: Think Before You Share (Top 10)

Things to Think About with Social Media:
-limit your friends list
-privacy settings/controls (check often)
-"privacy fatigue" (read privacy guidelines, know new features)
-malicious apps, phishing, malware (similar to email)
-future job hunting
   -These types of posts will impact future career plans the most: lifestyle; inappropriate materials (comments, photos, etc.) made by you OR your friends/relatives; comments criticizing your past jobs (employees, coworkers, clients, etc); membership in certain groups 
   -Positive online reputation will help
   -Do not disclose a username and password in an interview

HW: Internet Contract





Part II: Scams


http://www.planetminecraft.com/blog/minecrafr-frauds-thetruth/

1-What are some different ways that you can be digitally scammed?

2-What can you do to make sure that you are not a victim of a scam?

3-What advice would you give to adults (especially older adults) in your life that might be susceptible to scams?

Video: 
The Internet: Cybersecurity & Crime





Types: 
-malware (connected to flash drives, embedded in files, downloads, email attachments)
-pop-ups (scareware ["Your computer is infected"], malicious advertising/contests)
-spyware (record keystrokes, screenshots, video, audio, browsing)
-ransomware (hold computer hostage until you pay)
-backdoor (hidden access to computer, besides malware)
-public wifi ("listen" to others, rogue router [not the wifi you think you're connecting to], "shoulder surfing", theft [don't leave unattended])
-private wifi (piggybacking [unauthorized use on private wifi--slows speed, could be doing illegal activity or "listening", hackers share locations]; turn off if not in use [vacation])
-Identity theft

Video: Identity theft targets kids








Defense:
Data backup
Firewalls
Software patches
Antivirus software (only trust warnings from a legitimate source)
User knowledge/education
   -Do not click on unknown links! (hover over link)
   -Do not give personal/confidential information over the phone!
   -Phishing emails may use personalization or play on your emotions


Activity: Scams and Schemes

Kahoot: Digital Security 


Part III: Sexting

1-What is sexting?  Why would someone do it?

2-What are some consequences of sexting?  
Consider child pornography before forwarding.

3-Do you think teens today feel pressured to sext?

4-What should you do if you receive an unwanted sext?




Part IV: Passwords

1-How frequently do you change your passwords?

2-What makes a good password?


Most Used Passwords
Source: Computer Security Literacy: Staying Safe in a Digital World


Source: Better Buys


 Source: Better Buys


Video: A World Beyond Passwords


Password Tester
(just for fun)


Dice Activity
Step 1: Roll five dice all at once. Note the faces that come up without looking at the wordlist yet. 
Step 2: Your results might look like this reading left to right: 4, 3, 4, 6, 3. Write those numbers down.
Step 3: Open EFF's Long Wordlist [.txt] to find the corresponding word next to 43463.
Step 4: You will find the word "panoramic." This is the first word in your passphrase, so write it down.
Step 5: Repeat steps 1-4 five more times to come up with a total of SIX words.
When you are done, your passphrase may look something like this:
panoramic nectar precut smith banana handclap
Step 6: Come up with your own mnemonic to remember your phrase. It might be a story, scenario, or sentence that you will be able to remember and that can remind you of the particular words you chose, in order. For example:

The panoramic view, as I tasted the nectar of a precut granny smith apple and banana, deserved a handclap.

Activity:  Creating a Good Password

Part V: Digital Footprint/Misc.

1-Did you know websites/companies collect your personal information (cookies)?

2-What are some issues with leaks of government information (Wikileaks, Edward Snowden)?

3-What is a digital footprint?  What is on your digital footprint?



http://www.cybersmart.gov.au/Kids/Get%20the%20facts/~/media/Cybersmart/General%20Archive/Archive/digitalFootprint2.png

Video: Your Digital Footprint


Activity:  Privacy and Your Digital Footprint