The invention of social media has provided us with a wide range of opportunities to become more informed on key issues and engage in the democratic process. However, it has also created space for individuals to try to influence public opinion around a particular political agenda through the creation of thousands of phony social media accounts, or computer-generated ‘bots.’
In this PBS NewsHour lesson, students will examine how the invention of the bot on social media websites like Twitter plays a role in influencing public opinion. Students will then invent their own bot to spread awareness about an issue they care about.
Many of us are aware that we're being tracked when going online. It's one of the ways our favorite websites and apps know how to recommend content just for us. But how much information are companies actually collecting? And what are they doing with it? Digging into the details can help us make smart decisions about our online privacy and how to protect it.
Users will need to create a free account to access this resource.
Social media gives us a chance to choose how we present ourselves to the world. We can snap and share a picture in the moment or carefully stage photos and select only the ones we think are best. When students reflect on these choices, they can better understand the self they are presenting and the self they aim to be.
Our digital footprints can have a powerful impact on our future. This can be a scary thought, given that what's in our digital footprint isn't always in our control. Teach students that digital footprints are an opportunity to showcase their best selves and craft a footprint that leads to future success.
Research shows that happiness in life is less about what you do and more about why you do it. When your actions have purpose they lead to positive results -- both for you and the world. Help students use the power of the internet to turn their personal passions into positive impact.
The lesson elements in this module teach students about the privacy principle “Your information is larger than you think”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student lesson is available at https://teachingprivacy.org/youre-leaving-footprints/.
Summary of Learning Objectives: Students can enumerate ways their online and offline activities contribute to their information “footprint”; students can use privacy settings and critical thinking skills to limit the exposure of their footprint.
Target Age: High school, college undergraduate.
The lesson elements in this module teach students about the privacy principle “There is no anonymity on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/theres-no-anonymity/.
Summary of Learning Objectives: Students can explain (in general terms) how data tracked by online services can be used to identify them; students can use tools and techniques to reduce the effectiveness of tracking.
Learning objectives:
The lesson elements in this module teach students about the privacy principle “Information about you on the Internet will be used by somebody in their interest — including against you”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/information-is-valuable/.
Summary of Learning Objectives: Students can give examples of how their data may be used to benefit others; students can investigate and evaluate how different online services use data, in order to make informed choices.
Unencrypted communication over the Internet works a lot like sending a postcard: it can be read by anybody along the delivery route. Communication is routed through intermediary computers and systems, which are connected to many more computers and systems. Encryption, or encoding information so it appears scrambled to anyone who doesn’t know the key, is a way to wrap a postcard in an envelope. While it can never be 100% secure, stronger encryption makes it harder for people to get to the contents.
The lesson elements in this module teach students about the privacy principle “Communication over a network, unless strongly encrypted, is never just between two parties”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/someone-could-listen/.
Summary of Learning Objectives: Students can articulate how the multi-step, multi-party pathways of networked communication affect users’ privacy; students can identify and use more secure communication options.
Learning Objectives:
Any time you interact online, that information is recorded in the network. And, as with in-person communication, once you’ve shared something, you can’t control what happens to it — or how people will interpret it. Other people can repost or forward content to any audience without your permission, websites can sell information to other businesses, and data can be legally subpoenaed. Websites and search engines automatically pick up and duplicate content, making it impossible to “unshare” — the Internet never forgets!
The lesson elements in this module teach students about the privacy principle “Sharing information over a network means you give up control over that information — forever”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/sharing-releases-control/.
Summary of Learning Objectives: Students can enumerate ways their information may be recorded, re-shared, and reinterpreted once it is online; students can use privacy settings and imaginative self-inquiry to limit potentially harmful sharing.
Every day more data is being put online. Search engines are getting better, allowing “deeper” the searching of more types of data. Techniques for extracting and connecting information from different sources are getting more powerful. Furthermore, information that is not retrievable today may be retrievable tomorrow due to changes in terms of service, public policy, law, and technical privacy settings.
The lesson elements in this module teach students about the privacy principle “Just because something can’t be found today, doesn’t mean it can’t be found tomorrow.” They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/search-is-improving/.
Summary of Learning Objectives: Students can explain how changes in technology and regulations can affect who has access to their data; students can use techniques to monitor and limit the exposure of their data.
Your online activities and communications are as much a part of your life as your offline activities and communications; they are interconnected and can affect your life and relationships in the same way.
The lesson elements in this module teach students about the privacy principle: “The online world is inseparable from the ‘real’ world”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/online-is-real/.
Summary of Learning Objectives: Students can give examples of how online and offline activities affect each other; students can think imaginatively about the potential consequences of their posts for themselves and others.
Creating an identity on the Internet or impersonating somebody else is often just a matter of a few clicks. Currently, there is no foolproof way to match a real person with their online identity. This means that you can never be sure with whom you are communicating and that someone could steal your online identity and impersonate you!
The lesson elements in this module teach students about the privacy principle: “Identity is not guaranteed on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/identity-isnt-guaranteed/.
Summary of Learning Objectives: Students can explain why it is difficult to be sure who one is communicating with online; students can investigate and evaluate the legitimacy of services that want their personal information.
Even if you’re not actively using the Internet, someone else may be sharing information about you — intentionally or unintentionally. So, avoiding the Internet does not guarantee privacy.
The lesson elements in this module teach students about the privacy principle: “You can’t avoid having an information footprint by not going online”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/you-cant-escape/.
Summary of Learning Objectives: Students can enumerate ways their offline activities generate data that is stored and shared online; students can communicate effectively with others about everyone’s information-sharing preferences.
Most Internet technology is not designed to protect the privacy of those who use it; in fact, most technology providers make money by leveraging your private information. “Privacy policies” are generally written to protect those providers from lawsuits, not to protect users’ privacy. Laws and regulations cover only certain aspects of privacy and vary from place to place — and enforcement is even more varied. So, like it or not, your privacy is your own responsibility and requires your constant attention.
The lesson elements in this module teach students about the privacy principle: “Only you have an interest in maintaining your privacy”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/privacy-requires-work/.
Summary of Learning Objectives: Students can articulate why technology design, laws, and business policies do not inherently protect their privacy; students have the capacity to acquire new privacy-management skills as technology and policies change.