ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (7) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (8) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (8) 19 :
13) Evaluate the impact of digital globalization on public perception and ways Internet censorship can affect free and equitable access to information.

[DLIT] (9-12) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Bot or Not? How Fake Social Media Accounts Could Influence Voting
URL: https://www.pbslearningmedia.org/resource/ccabb2b1-491f-4efe-9590-6302f70899e9/lesson-plan-bot-or-not-how-fake-social-media-accounts-could-influence-voting/
Description:

The invention of social media has provided us with a wide range of opportunities to become more informed on key issues and engage in the democratic process. However, it has also created space for individuals to try to influence public opinion around a particular political agenda through the creation of thousands of phony social media accounts, or computer-generated ‘bots.’

In this PBS NewsHour lesson, students will examine how the invention of the bot on social media websites like Twitter plays a role in influencing public opinion. Students will then invent their own bot to spread awareness about an issue they care about.



   View Standards     Standard(s): [DLIT] (9-12) 3 :
R3) Assess the validity and identify the purpose of digital content.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: The Big Data Dilemma
URL: https://www.commonsense.org/education/digital-citizenship/lesson/the-big-data-dilemma
Description:

Many of us are aware that we're being tracked when going online. It's one of the ways our favorite websites and apps know how to recommend content just for us. But how much information are companies actually collecting? And what are they doing with it? Digging into the details can help us make smart decisions about our online privacy and how to protect it.

Students will be able to:
  • Define online tracking and describe how companies use it.
  • Identify the benefits and drawbacks of online tracking to both companies and users.
  • Analyze specific examples of online tracking and take a position for or against them.

Users will need to create a free account to access this resource.



   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Curated Lives
URL: https://www.commonsense.org/education/digital-citizenship/lesson/curated-lives
Description:

Social media gives us a chance to choose how we present ourselves to the world. We can snap and share a picture in the moment or carefully stage photos and select only the ones we think are best. When students reflect on these choices, they can better understand the self they are presenting and the self they aim to be.

Students will be able to:
  • Describe how their curated self may or may not represent their real self.
  • Analyze the benefits and drawbacks of representing different parts of their real self online.
  • Create an avatar that represents both their real and curated selves.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (9-12) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Who's Looking at Your Digital Footprint?
URL: https://www.commonsense.org/education/digital-citizenship/lesson/whos-looking-at-your-digital-footprint
Description:

Our digital footprints can have a powerful impact on our future. This can be a scary thought, given that what's in our digital footprint isn't always in our control. Teach students that digital footprints are an opportunity to showcase their best selves and craft a footprint that leads to future success.

Students will be able to:
  • Learn that they have a public presence online called a digital footprint.
  • Recognize that any information they post online can help or hurt their future opportunities (college admission, employment, etc.).
  • Create a vignette that shows how a positive digital footprint can help someone take advantage of an opportunity.

Users will need to create a free account to access this resource.



   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: The Change You Want to See
URL: https://www.commonsense.org/education/digital-citizenship/lesson/the-change-you-want-to-see
Description:

Research shows that happiness in life is less about what you do and more about why you do it. When your actions have purpose they lead to positive results -- both for you and the world. Help students use the power of the internet to turn their personal passions into positive impact.

Students will be able to:
  • Explain what it means to find your purpose and why it is beneficial.
  • Consider different ways that people have used their digital footprint to make a positive impact on the world and whether you would do something similar.
  • Reflect on what your own purpose might be, including a problem you want to solve and how you might go about solving it.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Your Information Footprint is Larger Than You Think
URL: https://teachingprivacy.org/module-1-youre-leaving-footprints/
Description:

The lesson elements in this module teach students about the privacy principle “Your information is larger than you think”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student lesson is available at https://teachingprivacy.org/youre-leaving-footprints/.

Summary of Learning Objectives: Students can enumerate ways their online and offline activities contribute to their information “footprint”; students can use privacy settings and critical thinking skills to limit the exposure of their footprint.

Target Age: High school, college undergraduate.

Learning Objectives: 
  1. Students can give examples of ways their online and offline activities generate digital footprints, within each of the following broad categories: intentional posting/online activities, metadata attached to posts, information transmitted by devices, and others collecting or posting information about them.
  2. For at least one example of an activity that generates digital footprints, students can explain (at least in non-technical terms) how that activity generates those footprints.
  3. Students can enumerate some factors that affect how many people or entities can see the data in their information footprint, including (minimally) privacy settings and third-party data sharing, and give examples of potential negative consequences of exposure.
  4. Students can explain how the amount of information available about them, and how many people have access to it, is affected by the mining of data from different sources to form a picture of each person and can give examples of inferences that can be drawn by data-mining.
  5. Students can give examples of available privacy settings for apps, online services, and devices they use frequently, and explain why they would choose particular settings based on their information-sharing preferences.
  6. Students can suggest some potential uses apps and online services might have for particular types of personal data they typically request access to and evaluate whether those uses would likely be beneficial, neutral, or harmful to the student.


   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 20 :
14) Compare ways to protect devices, software, and data.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: There’s No Anonymity
URL: https://teachingprivacy.org/module-2-theres-no-anonymity/
Description:

The lesson elements in this module teach students about the privacy principle “There is no anonymity on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/theres-no-anonymity/.

Summary of Learning Objectives: Students can explain (in general terms) how data tracked by online services can be used to identify them; students can use tools and techniques to reduce the effectiveness of tracking.

Target Age: High school, college undergraduate.

Learning objectives:

  1. Students can explain (in general terms) how data aggregation, data mining, and inference are carried out and can give examples of how these techniques can be used to match “anonymous” users to their real identities.
  2. Students can explain what online behavioral tracking is, can give examples of what types of information can be gathered about them, and can give examples of how personal devices can be used to track and collect that information.
  3. Students can give examples of what types of information can still be collected by websites when they are using their browser’s “private browsing” or “incognito” mode.
  4. Students can explain how the amount and type of information available about them online affects the likelihood that someone can connect their online personas with their offline identities.
  5. Students can give examples of effective tools and techniques that reduce the ability of websites, apps, and services to track their online behavior, explain (in general terms) how they work, and enumerate some of their limitations.


   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 18 :
12) Describe how sensitive data can be affected by malware and other attacks.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Information is Valuable
URL: https://teachingprivacy.org/module-3-information-is-valuable/
Description:

The lesson elements in this module teach students about the privacy principle “Information about you on the Internet will be used by somebody in their interest — including against you”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/information-is-valuable/.

Summary of Learning Objectives: Students can give examples of how their data may be used to benefit others; students can investigate and evaluate how different online services use data, in order to make informed choices.

Target Age: High school, college undergraduate.

Learning Objectives:
  1. Students can give examples of personal data that services or sites may share with other services or companies, and examples of how those “third parties” may use that data. Examples should include both information they explicitly post and supposedly hidden information.
  2. Students can give examples of how having their personal data might benefit any of the following: friends/family, acquaintances, businesses, institutions, governments, and cybercriminals.
  3. Students can explain the business model that allows companies that provide free or cheap online services to make money by selling consumer data to advertisers and/or data brokers.
  4. Students can explain the difference between “opt-in” and “opt-out” models for information sharing, and relate those models to the lack of comprehensive laws regulating data sharing by companies, institutions, or governments.
  5. Student can investigate how online services use data and who they share it with, and explain how they would use this information in choosing which services to use and which data to give those services access to.
  6. Students can identify potential consequences of choosing particular privacy settings on apps, sites, and devices, in terms of how their data could be used by the parties who can see it — and whether those uses would likely be beneficial, neutral, or detrimental to themselves.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 18 :
12) Describe how sensitive data can be affected by malware and other attacks.

[DLIT] (9-12) 19 :
13) Compare various security measures of a computer system.

Examples: Usability, security, portability, and scalability.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

[DLIT] (9-12) 35 :
29) Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

[DLIT] (9-12) 36 :
30) Evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing.

Examples: Client server, peer-to-peer, cloud computing.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Someone Could Listen
URL: https://teachingprivacy.org/module-4-someone-could-listen/
Description:

Unencrypted communication over the Internet works a lot like sending a postcard: it can be read by anybody along the delivery route. Communication is routed through intermediary computers and systems, which are connected to many more computers and systems. Encryption, or encoding information so it appears scrambled to anyone who doesn’t know the key, is a way to wrap a postcard in an envelope. While it can never be 100% secure, stronger encryption makes it harder for people to get to the contents.

The lesson elements in this module teach students about the privacy principle “Communication over a network, unless strongly encrypted, is never just between two parties”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/someone-could-listen/

Summary of Learning Objectives: Students can articulate how the multi-step, multi-party pathways of networked communication affect users’ privacy; students can identify and use more secure communication options.

Target Age: High school, college undergraduate.

Learning Objectives: 

  1. Students can describe how intermediary devices, and the services that provide them, are involved in transmitting information from point A to point B on the Internet.
  2. Students can explain how the interconnected, many-layered structure of the Internet affects the security and privacy of online communication.
  3. Students can identify the difference between a private network and a shared network and can describe some of the potential risks of using a shared network.
  4. Students can describe how encryption decreases the chances of outside parties infiltrating private communications and accessing private information.
  5. Students can explain why their security depends (in part) on their own decisions and behavior.
  6. Students can give some examples of common encryption protocols, identify what layer of an electronic communication each of those protocols protects, and describe how they would verify that those protocols were being used.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 18 :
12) Describe how sensitive data can be affected by malware and other attacks.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Sharing Releases Control
URL: https://teachingprivacy.org/module-5-sharing-releases-control/
Description:

Any time you interact online, that information is recorded in the network. And, as with in-person communication, once you’ve shared something, you can’t control what happens to it — or how people will interpret it. Other people can repost or forward content to any audience without your permission, websites can sell information to other businesses, and data can be legally subpoenaed. Websites and search engines automatically pick up and duplicate content, making it impossible to “unshare” — the Internet never forgets!

The lesson elements in this module teach students about the privacy principle “Sharing information over a network means you give up control over that information — forever”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/sharing-releases-control/

Summary of Learning Objectives: Students can enumerate ways their information may be recorded, re-shared, and reinterpreted once it is online; students can use privacy settings and imaginative self-inquiry to limit potentially harmful sharing.

Target Age: High school, college undergraduate.

Learning Objectives: 

  1. Students can explain that once any type of content is shared online, it can be instantly available to anyone. As a result, students can make more informed decisions about the type of content they choose to share.
  2. Students can list examples and elaborate on ways in which shared content may be stored online forever, disseminated, and potentially used to harm them.
  3. Students can list some factors that might lead to an online communication being misinterpreted.
  4. Before sharing a piece of information online, students can imagine potential negative consequences of that information becoming public knowledge.
  5. Students are aware of privacy settings, can explain what they do, and can apply these skills to aid them in better controlling what information they release and to whom.
  6. Students are able to articulate how their behavior significantly affects the privacy of others, and can apply this knowledge by asking others about unspoken sharing preferences.


   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Search Is Improving
URL: https://teachingprivacy.org/module-6-search-is-improving/
Description:

Every day more data is being put online. Search engines are getting better, allowing “deeper” the searching of more types of data. Techniques for extracting and connecting information from different sources are getting more powerful. Furthermore, information that is not retrievable today may be retrievable tomorrow due to changes in terms of service, public policy, law, and technical privacy settings.

The lesson elements in this module teach students about the privacy principle “Just because something can’t be found today, doesn’t mean it can’t be found tomorrow.” They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/search-is-improving/

Summary of Learning Objectives: Students can explain how changes in technology and regulations can affect who has access to their data; students can use techniques to monitor and limit the exposure of their data.

Target Age: High school, college undergraduate.

Learning Objectives:

  1. Students can describe (in general terms) how a search engine works, including that results are constantly being refreshed to include new information and that the search engine itself is continually updated to deal with newer types of information.
  2. Students can provide examples of offline data that can be digitized and put online.
  3. Students can give example scenarios describing how changes to laws and regulations could affect the availability of personal information.
  4. Students can briefly summarize the purpose of privacy policies and the effects that their ever-changing nature has on users’ privacy.
  5. Students can investigate what information about them is available online, and assess which types of information — social, financial, etc. — are currently available to different entities.
  6. Students can monitor changes in privacy policies and default privacy settings and evaluate how those changes might affect who can see what information about them.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Online Is Real
URL: https://teachingprivacy.org/module-7-online-is-real/
Description:

Your online activities and communications are as much a part of your life as your offline activities and communications; they are interconnected and can affect your life and relationships in the same way.

The lesson elements in this module teach students about the privacy principle: “The online world is inseparable from the ‘real’ world”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/online-is-real/

Summary of Learning Objectives: Students can give examples of how online and offline activities affect each other; students can think imaginatively about the potential consequences of their posts for themselves and others.

Target Age: High school, college undergraduate.

Learning Objectives:

  1. Students can critically examine the relationship between online and offline activities. They can outline example scenarios in which information originating online could affect their offline interactions and vice versa.
  2. Students can explain how their online presence (both their intentional posts and other parts of their information footprint) might have a larger audience than that of which they are aware, and give examples of who might be in that larger audience.
  3. Students can identify privacy settings on a particular app or site they use regularly and edit their settings according to their preferences.
  4. Students can explain how interacting with privacy settings allows them to minimize who can see their personal information and posts.
  5. Students reflect on the content that they choose to post, and can discuss the impact a post might have, or the reaction it might evoke, in a greater offline audience — not just within their circle of friends or followers.
  6. Students can describe how they might approach a friend or family member to discuss privacy preferences.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 18 :
12) Describe how sensitive data can be affected by malware and other attacks.

[DLIT] (9-12) 20 :
14) Compare ways to protect devices, software, and data.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 23 :
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Identity Isn’t Guaranteed
URL: https://teachingprivacy.org/module-8-identity-isnt-guaranteed/
Description:

Creating an identity on the Internet or impersonating somebody else is often just a matter of a few clicks. Currently, there is no foolproof way to match a real person with their online identity. This means that you can never be sure with whom you are communicating and that someone could steal your online identity and impersonate you!

The lesson elements in this module teach students about the privacy principle: “Identity is not guaranteed on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/identity-isnt-guaranteed/.

Summary of Learning Objectives: Students can explain why it is difficult to be sure who one is communicating with online; students can investigate and evaluate the legitimacy of services that want their personal information.

Target Age: High school, college undergraduate.

Learning Objectives: 

  1. Students can give examples of potential consequences of disclosing information online if the entity they’re sharing it with isn’t who they say they are.
  2. Students can give examples of “weak points” that might allow someone to steal their identity, and examples of what that person could do with the stolen identity to compromise their privacy.
  3. Students can explain how “phishing” works, and describe how they should respond to messages they suspect of phishing.
  4. Students can give examples of methods they could use to verify someone’s identity online and can explain the shortcomings of those methods.
  5. Students can give examples of methods they could use to verify the authenticity of apps, sites, and services that request their personal information, and can explain the shortcomings of those methods.
  6. Students can describe some of the basic precautions they can take to keep their accounts secure from hackers and identity thieves.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 20 :
14) Compare ways to protect devices, software, and data.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: You Can’t Escape
URL: https://teachingprivacy.org/module-9-you-cant-escape/
Description:

Even if you’re not actively using the Internet, someone else may be sharing information about you — intentionally or unintentionally. So, avoiding the Internet does not guarantee privacy.

The lesson elements in this module teach students about the privacy principle: “You can’t avoid having an information footprint by not going online”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/you-cant-escape/

Summary of Learning Objectives: Students can enumerate ways their offline activities generate data that is stored and shared online; students can communicate effectively with others about everyone’s information-sharing preferences.

Target Age: High school, college undergraduate.

Learning Objectives:

  1. Students can explain why abstaining from online activities is not an effective strategy for maintaining online privacy.
  2. Students can give examples of how someone’s information footprint could be impacted by the online activities of others, including how information about someone’s offline activities might end up online.
  3. Students can give examples of ways that information in someone’s digital footprint that was not created by them could still be used against them.
  4. Students can describe how they would apply privacy tools provided on social networking sites to minimize unwanted posts by others about their activities.
  5. Students can investigate what information is being shared about them online by devices and services they use and organizations they participate in, and use privacy settings or opt-out mechanisms to limit that sharing.
  6. Students can describe how they would approach discussing their privacy preferences with their friends and family to minimize unwanted information-sharing.


   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Privacy Requires Work
URL: https://teachingprivacy.org/module-10-privacy-requires-work/
Description:

Most Internet technology is not designed to protect the privacy of those who use it; in fact, most technology providers make money by leveraging your private information. “Privacy policies” are generally written to protect those providers from lawsuits, not to protect users’ privacy. Laws and regulations cover only certain aspects of privacy and vary from place to place — and enforcement is even more varied. So, like it or not, your privacy is your own responsibility and requires your constant attention.

The lesson elements in this module teach students about the privacy principle: “Only you have an interest in maintaining your privacy”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/privacy-requires-work/. 

Summary of Learning Objectives: Students can articulate why technology design, laws, and business policies do not inherently protect their privacy; students have the capacity to acquire new privacy-management skills as technology and policies change.

Target Age: High school, college undergraduate.

Learning Objectives:

  1. Students can describe the user’s personal role in protecting their own online privacy.
  2. Students can explain the purpose of a privacy policy.
  3. Students can describe some of the limitations of privacy policies.
  4. Students can describe some limitations of the laws protecting privacy.
  5. Students can explain why it is important to periodically check privacy settings.
  6. Students can give examples of effective actions they can take towards improving online privacy protections in general, including actions that can affect business practices and government regulations.


ALEX Classroom Resources: 15

Go To Top of page