SlideShare a Scribd company logo
More Resources: Cybersecurity and Identity
Theft
Deborah Kozdras
USF Stavros Center
http://tinyurl.com/StavrosCybersecurity
In This Section You Will Learn:
• All about Internet Safety
• How to create a good Password
• How Freemium apps work
• How Digital Footprints created
• Strategies to reduce your Digital Trail
• How to avoid Identity Theft
• What to do if your identity is stolen
What is your digital footprint?
What are the benefits and costs of the sites you use
that contribute to you digital footprint?
Real or Fake?
Stop and Think before you Share
Who created the page? Is there an “about us” section? What are
their credentials? Contact information?
What information are you getting? Are there multiple points of
view? Is there a bias? Does the author use opinion words? What
is the tone? Can the information be verified through other
sources?
When was the article posted? Is the article current? Has the
website been updated?
Where is the page located? Look at the URL. Is it a personal
page/blog? What is the domain (.com, .org, .gov, .edu, etc.)?
What does the home page tell you?
Why would I use this site as a source of information? Can I verify
the source? Why was the site published? Will people think it is a
valid source?
Answering Quizzes
• Your friend sends you a link to a quiz: Which
superhero are you? The quiz asks questions
about your favorite food, colors, name,
address, and email. What are the risks of
taking the quiz?
Posting Selfies
Have you ever posted a selfie? Did you know that when
you use photo-sharing apps, each time you post an image
on social media, you automatically give companies
permission to share and use your content? Read the
policies of social media accounts and always stop and
think before you post!
Another problem with selfies is geotagging: when you
take a photo, smart phones automatically add locations
to uploaded content. For example, if you are at a concert,
the photo can be geotagged to share your location. What
are the risks of sharing your location?
Like Farming
• "Like farming" on
Facebook takes advantage
of users' good intentions to
make posts go viral
• Making a page more
popular with likes and
shares makes it show up
for more users
• Owners can then use the
popular page to advertise,
or sell it to someone else
• Often, images and videos
are used without
permission of their owners
Other Click Bait
Clickbait continued
• Can you name a
*From Smash.com.
some questionable content on site so I included images in the following pages
Cybersecurity additional activities
Cybersecurity additional activities
Cybersecurity additional activities
Cybersecurity additional activities
Cybersecurity additional activities
Cybersecurity additional activities
Cybersecurity additional activities
Identity Theft
Identity Theft
An identity thief does not need to be a genius. It
is actually very simple to steal an identity. All an
identity thief requires is your:
1) name,
2) date of birth
3) social security number.
Scamming
– Monetary Spam Scams. These include investment schemes,
debt relief, pay-in-advance, or check overpayment schemes.
One popular monetary spam scam was the Nigerian Email
Scam (a.k.a. Nigerian Letter or “419” Fraud), where individuals
claiming to be government officials wrote that they needed a
place—your account—to store some of the money. Do not
open these and never click on the links.
– Phishing occurs when Internet crooks send email or pop ups
to try to obtain personal and financial information. Many of
these appear legitimate, so always STOP and THINK, before
you CONNECT.
– Product Spam Scams: There are a variety of other spam scams
for a variety of products, such as: weight loss claims, cure-all
products, and medical advice. Furthermore, avoid “work-from-
home” spam mail that involves get rich quick scams.
Hacking and Tracking
– Clone Debit Cards: There are small devices that attach to
debit machines and record data. These are usually insider
jobs. In order to avoid this problem, do not let someone
walk away with your card. Observe them as they scan your
card into the official machine.
– Spyware: You also need to beware of spyware, which is
software that is installed into your computer without your
consent. Spyware monitors or controls your computer use.
Clues that you are infected by spyware include: pop-ups, a
browser that takes you to unwanted sites, and unexpected
toolbars or icons.
– Gypsy ATM’s: These are ATM machines that are not
connected to a network. You can put in a debit card and
most often withdraw small amounts of money. However,
these are not con- nected to a bank and while your card is
inside, they track or record all of your data. In order to
avoid these, find your own bank machine. It will be more
secure. If a bank machine looks suspicious: DON’T USE IT!
Avoid Identity Theft
• First Defense: Safe Passwords
• Superman – 26 Seconds
• SupermanFlies – 300 Years
• SupermanFlies! 6,000 years
• Superman5Flies! – Over a Million Years
• Using these criteria, create a password for
your favorite star (sports, music, or movie).
Mnemonic Passwords
Mnemonic Passwords: Another way of making a
password is to create a mnemonic password. Select the
first letter of each word of a secret sentence. For example
My Friend Jane Eats 2 Apples Every Day to Stay Very
Healthy would become MFJE2AEDTSVH.
Create your own mnemonic password:
______________________________________________
______________________________________________
________
•
Shopping Online
• Know the seller. What is their address and phone
number in case you have problems?
• Know the product. Read the description closely,
examine the product on other sites, and read the fine
print.
• Know the expense. What is the price? What are
shipping and handling costs? What are the refund
policies and delivery dates?
• Pay and Print. Pay by credit card for maximum
consumer protection. Print and save all of your financial
online transactions.
Buying Apps
Buying apps usually requires using credit or pre-paid cards.
When you set up an account, you are required to submit a
credit card or other form of payment. Once you have an
account, many apps are free. However, most commercial free
apps have optional purchases where you can buy extra
characters, settings, and other items. Many apps offer
freemium options; they start with a free version, but offer
upgrades to premium levels. You can also be prompted to pay
for faster time or less advertising. Be a wise consumer. Before
you download an app, visit Common Sense Media app
reviews, which provides consumer education about criteria
like: ease of play, consumerism, language, and other adult
content. https://www.commonsensemedia.org/app-reviews
Banking Online
• Online Security: Never use your Social Security number
as a password or username, change your password
frequently, protect your answers to security questions.
To find more tips visit: http://
www.handsonbanking.org/financial-
education/military/stay-safe-while-banking-online/
• Mobile Banking Security: Frequently delete text
messages from your financial institution, lock your
phone when not in use, avoid storing passwords, keep
your operating system/security up to date, download
mobile apps only from reputable sources, and be
cautious when using public hotspots.
What to do if your identity is stolen
• Report the incident to the fraud department of the three
major Consumer Reporting Agencies, CRA’s (Equifax,
Trans Union, Experian) Ask them to place a “fraud alert”
on your credit reports. Re- quest a victim statement.
Keep a log that notes with whom you talked and what
you told them.
• Contact the fraud department of your creditors.
The Federal Trade Commission provides an
Identity Theft Affidavit, a standardized form used
to report new accounts fraudulently opened in
your name. Phone the Federal Trade Commission
at 1-877-IDTHEFT (438-4338) Request: "Identity
Crime: When Bad Things Happen to Your Good
Name."
Why do we participate in risky online behavior?
http://www.behavioraleconomics.com/BEGuide2016.pdf
Classic Economics
• People choose.
• All choices involve costs.
• People respond to incentives in predictable ways.
• People create economic systems that influence
choices and incentives.
• People gain when they trade voluntarily.
• People’s choices have consequences for the
future.
Behavioral Economics & Behavioral Finance
http://www.cs.unibo.it/~ruffino/Letture%20TDPC/Kahneman.%20am.ec.rev.,%205,%202003.pdf
System 1 and System 2
http://morecustomersfaster.com/branding-advertising/the-science-of-online-branding-and-the-lazy-brain-part-1/
Why do we participate in risky online behavior?
http://www.behavioraleconomics.com/BEGuide2016.pdf
Digital Footprints
Online Cybersecurity Quiz
Essential Questions:
Privacy and Digital Footprints
Buy Red a New Hoodie
Email from Red
Hi Students,
This is Red again. Remind your parents or other
adults about the story of my grandma: Little
Red Riding Hood. There are a lot of crazy
versions of that story out there. Do you want to
know the true ending? The Big Bad Wolf was
arrested and my grandma was fine! All my life,
I’ve been warned about the Big Bad Wolf and I
NEVER talk to strangers in real life!
You did a really great job of explaining how I can
help my friends to stop and think about safe
decisions before they connect. Now I need
another favor. You know that my grandma used
to wear those old fashioned riding hoods. Well,
I prefer wearing red hoodies and my grandma
wants me to pick one out to buy. But I want to
try to shop with her online. Please work with
your parents to find me the perfect hoodie!
Sincerely,
Red
StopThinkConnect.org
• Using advice from the tip sheet,
search online for red hoodies.
• Pick the top three choices.
• Make a decision for the top choice
and write an email/text back to Red.
Who Protects You When You Use a Credit Card?
How Can You Protect Yourself Online?
Appily Ever After: Common Sense
Media
• https://www.commonsensemedia.org/blog/1
6-apps-and-websites-kids-are-heading-to-
after-facebook
Appily Ever After
Cybersecurity additional activities
Dear Students,
My name is Ella. Cinderella and Prince Charming are my
parents. I would like to ask your help in choosing some new
apps for my mobile device. My mom said that I could only
download free apps. She also said that the apps needed to
have at least good educational value and no violence. I want
apps that are fun and easy to use. I prefer princess apps but
am willing to try other new apps.
I have attached a decision table with some of my top choices.
Can you please help me by ranking the choices? Can you tell
me the costs and benefits of each choice so I can share this
information with my mom? Before I make a decision, I have to
show my mom that I did research and I have to show evidence
for my choices. Can you please send me an email with your
decisions and reasons?
Thanks!
Ella
Decision Table 1
Hi Students,
Thanks so much for your recommendations on apps but
before I download new apps, my Fairy Godmother taught me
about some new criteria that I should use so I don’t get in
trouble again. She told me I should choose an app where the
developer does not share my personal information. Also, she
told me to read about the costs of the apps. Some are free but
they offer in-app purchases. She told me I should make sure
the apps I choose have parent gates so I don’t spend more
money on these in-app purchases. However, she also said that
some educational apps don’t need parental gates, because
there are no in-app purchases.
I included an attachment where I found some reviews of the
apps. Please use this information when making your decision.
Can you please use information in the reviews to help me
make a final decision on the top three apps I should
recommend to my mom?
Thanks,
Ella
App Reviews
• Sing Star Sim: The game was created by famous singers. It is a
simulation game that teaches kids how to create singing videos.
There are some sarcastic responses from the audience. Users can
access all of the app features for free but they make in-app
purchases to get more rewards and to make the game go faster.. It
is fun but there are a lot of annoying ads and in-app purchases.
There is no parent gate. The developer does not say if they share
information or not.
• Princess Adventures: This game lets kids interact with six different
princesses. Each princess is on an adventure. The free download
includes everything the user needs to interact with one princess. In-
app purchases can unlock the games for the five other princesses.
Kids can also collect charms to make a bracelet. Some charms are
free and others are available for purchase. . A parent gate protects
purchase. The developer states they do not share information with
other companies.
Cybersecurity additional activities

More Related Content

PPTX
Spam & Phishing
PPT
Online Security & Privacy: Updated
PDF
Internetsecurity
PPT
Cyber peace for youth tanta
PPTX
Risky business cybersecurity 1
PDF
Guide to facebook security
PPT
PDF
IWC - Phishing and Internet Scams
Spam & Phishing
Online Security & Privacy: Updated
Internetsecurity
Cyber peace for youth tanta
Risky business cybersecurity 1
Guide to facebook security
IWC - Phishing and Internet Scams

What's hot (20)

PDF
10.a guide-to-facebook-security
PPTX
Internet safety and security
PPTX
Shopping and banking online
PPTX
Internet Safety for Parents presentation 2017
PPTX
September 2014 cyber safety presentation
PDF
Online Security
PDF
Busting Myths: Intellectual Property and Blogging by Mark Patterson
PPTX
Internet safety presentation 2012
PDF
Student book key unit3
PPTX
Mobile Security for the Modern Tech Mogul
PPTX
Online safety 101
DOCX
Jonathan cullishpuma
PPTX
Internet safety presentation 2013
PPTX
Online Safety
PPT
Building Trust in the Digital Age
PPT
Week 5 protect yourself from cyber threats
DOCX
Tips to shop online
PPTX
Social groups for awareness
PPT
Internet Privacy and Safety
PPTX
Internet safety presentation 2014
10.a guide-to-facebook-security
Internet safety and security
Shopping and banking online
Internet Safety for Parents presentation 2017
September 2014 cyber safety presentation
Online Security
Busting Myths: Intellectual Property and Blogging by Mark Patterson
Internet safety presentation 2012
Student book key unit3
Mobile Security for the Modern Tech Mogul
Online safety 101
Jonathan cullishpuma
Internet safety presentation 2013
Online Safety
Building Trust in the Digital Age
Week 5 protect yourself from cyber threats
Tips to shop online
Social groups for awareness
Internet Privacy and Safety
Internet safety presentation 2014
Ad

Similar to Cybersecurity additional activities (20)

PPT
5 a module online privacy
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Lesson 2 rules of netiquette
PDF
Center for Identity Webcast: The Internet of Things
PPTX
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
PDF
Canadian Consumer Handbook
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
PPT
10 online privacy module samedit1
PPT
10 online privacy module samedit1
PPT
How to Prevent ID Theft
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PPTX
Internet security
PPTX
Protect Your Computer From Viruses, Hackers,.pptx
PDF
IT Security Awareness Posters
PDF
Securityguide
PPTX
ISSA - Security Awareness 2016-1
5 a module online privacy
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Lesson 2 rules of netiquette
Center for Identity Webcast: The Internet of Things
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
Canadian Consumer Handbook
EMPOWERMENT TECHNOLOGIES LESSON 2
Rules of Netiquette Empowerment Technologies Lesson
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
10 online privacy module samedit1
10 online privacy module samedit1
How to Prevent ID Theft
Judy Taylour's Digital Privacy Day 2014 Presentation
Internet security
Protect Your Computer From Viruses, Hackers,.pptx
IT Security Awareness Posters
Securityguide
ISSA - Security Awareness 2016-1
Ad

More from Yumonomics (20)

PPT
Toys: Sustainability superheroes
PPTX
Fake news polk
PPTX
Constitution: Checks and balances
PPTX
Night at the virtual museum
PPTX
Problem Solving and Decision Making
PPT
Pinellas k sustainability superheroes
PPTX
Sustainablity superheroes recycle bins
PPTX
Sustainability superheroesseaturtletextset
PPT
Use text sets other sustainability superheroes
PPTX
Sustainability superheroesadopta road
PPT
Anchoring phenomena sustainability superheroes
PPTX
Sustainability superheroes design thinking
PPT
Sustainability superheroes manufacturing
PPTX
Sustainability superheroesinthesharktank
PPT
Earthdayeveryday sustainabilitysuperheroes
PPT
Earth day every day sustainability superheroes
PPTX
Sustainability Superheroes Celebrate Earth Day 2nd grade
PPTX
Sustainability Superheroes Celebrate Earth Day 1st grade
PPTX
Sustainability Superheroes Celebrate Earth Day Kindergarten
PPTX
Sustainability Superheroes Celebrate Earth Day 3rd grade
Toys: Sustainability superheroes
Fake news polk
Constitution: Checks and balances
Night at the virtual museum
Problem Solving and Decision Making
Pinellas k sustainability superheroes
Sustainablity superheroes recycle bins
Sustainability superheroesseaturtletextset
Use text sets other sustainability superheroes
Sustainability superheroesadopta road
Anchoring phenomena sustainability superheroes
Sustainability superheroes design thinking
Sustainability superheroes manufacturing
Sustainability superheroesinthesharktank
Earthdayeveryday sustainabilitysuperheroes
Earth day every day sustainability superheroes
Sustainability Superheroes Celebrate Earth Day 2nd grade
Sustainability Superheroes Celebrate Earth Day 1st grade
Sustainability Superheroes Celebrate Earth Day Kindergarten
Sustainability Superheroes Celebrate Earth Day 3rd grade

Recently uploaded (20)

PDF
advance database management system book.pdf
PDF
IGGE1 Understanding the Self1234567891011
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
20th Century Theater, Methods, History.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Computing-Curriculum for Schools in Ghana
PDF
Weekly quiz Compilation Jan -July 25.pdf
advance database management system book.pdf
IGGE1 Understanding the Self1234567891011
History, Philosophy and sociology of education (1).pptx
AI-driven educational solutions for real-life interventions in the Philippine...
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
20th Century Theater, Methods, History.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
Unit 4 Computer Architecture Multicore Processor.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
What if we spent less time fighting change, and more time building what’s rig...
Introduction to pro and eukaryotes and differences.pptx
HVAC Specification 2024 according to central public works department
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Computing-Curriculum for Schools in Ghana
Weekly quiz Compilation Jan -July 25.pdf

Cybersecurity additional activities

  • 1. More Resources: Cybersecurity and Identity Theft Deborah Kozdras USF Stavros Center http://tinyurl.com/StavrosCybersecurity
  • 2. In This Section You Will Learn: • All about Internet Safety • How to create a good Password • How Freemium apps work • How Digital Footprints created • Strategies to reduce your Digital Trail • How to avoid Identity Theft • What to do if your identity is stolen
  • 3. What is your digital footprint?
  • 4. What are the benefits and costs of the sites you use that contribute to you digital footprint?
  • 5. Real or Fake? Stop and Think before you Share Who created the page? Is there an “about us” section? What are their credentials? Contact information? What information are you getting? Are there multiple points of view? Is there a bias? Does the author use opinion words? What is the tone? Can the information be verified through other sources? When was the article posted? Is the article current? Has the website been updated? Where is the page located? Look at the URL. Is it a personal page/blog? What is the domain (.com, .org, .gov, .edu, etc.)? What does the home page tell you? Why would I use this site as a source of information? Can I verify the source? Why was the site published? Will people think it is a valid source?
  • 6. Answering Quizzes • Your friend sends you a link to a quiz: Which superhero are you? The quiz asks questions about your favorite food, colors, name, address, and email. What are the risks of taking the quiz?
  • 7. Posting Selfies Have you ever posted a selfie? Did you know that when you use photo-sharing apps, each time you post an image on social media, you automatically give companies permission to share and use your content? Read the policies of social media accounts and always stop and think before you post! Another problem with selfies is geotagging: when you take a photo, smart phones automatically add locations to uploaded content. For example, if you are at a concert, the photo can be geotagged to share your location. What are the risks of sharing your location?
  • 8. Like Farming • "Like farming" on Facebook takes advantage of users' good intentions to make posts go viral • Making a page more popular with likes and shares makes it show up for more users • Owners can then use the popular page to advertise, or sell it to someone else • Often, images and videos are used without permission of their owners
  • 10. Clickbait continued • Can you name a *From Smash.com. some questionable content on site so I included images in the following pages
  • 19. Identity Theft An identity thief does not need to be a genius. It is actually very simple to steal an identity. All an identity thief requires is your: 1) name, 2) date of birth 3) social security number.
  • 20. Scamming – Monetary Spam Scams. These include investment schemes, debt relief, pay-in-advance, or check overpayment schemes. One popular monetary spam scam was the Nigerian Email Scam (a.k.a. Nigerian Letter or “419” Fraud), where individuals claiming to be government officials wrote that they needed a place—your account—to store some of the money. Do not open these and never click on the links. – Phishing occurs when Internet crooks send email or pop ups to try to obtain personal and financial information. Many of these appear legitimate, so always STOP and THINK, before you CONNECT. – Product Spam Scams: There are a variety of other spam scams for a variety of products, such as: weight loss claims, cure-all products, and medical advice. Furthermore, avoid “work-from- home” spam mail that involves get rich quick scams.
  • 21. Hacking and Tracking – Clone Debit Cards: There are small devices that attach to debit machines and record data. These are usually insider jobs. In order to avoid this problem, do not let someone walk away with your card. Observe them as they scan your card into the official machine. – Spyware: You also need to beware of spyware, which is software that is installed into your computer without your consent. Spyware monitors or controls your computer use. Clues that you are infected by spyware include: pop-ups, a browser that takes you to unwanted sites, and unexpected toolbars or icons. – Gypsy ATM’s: These are ATM machines that are not connected to a network. You can put in a debit card and most often withdraw small amounts of money. However, these are not con- nected to a bank and while your card is inside, they track or record all of your data. In order to avoid these, find your own bank machine. It will be more secure. If a bank machine looks suspicious: DON’T USE IT!
  • 22. Avoid Identity Theft • First Defense: Safe Passwords • Superman – 26 Seconds • SupermanFlies – 300 Years • SupermanFlies! 6,000 years • Superman5Flies! – Over a Million Years • Using these criteria, create a password for your favorite star (sports, music, or movie).
  • 23. Mnemonic Passwords Mnemonic Passwords: Another way of making a password is to create a mnemonic password. Select the first letter of each word of a secret sentence. For example My Friend Jane Eats 2 Apples Every Day to Stay Very Healthy would become MFJE2AEDTSVH. Create your own mnemonic password: ______________________________________________ ______________________________________________ ________ •
  • 24. Shopping Online • Know the seller. What is their address and phone number in case you have problems? • Know the product. Read the description closely, examine the product on other sites, and read the fine print. • Know the expense. What is the price? What are shipping and handling costs? What are the refund policies and delivery dates? • Pay and Print. Pay by credit card for maximum consumer protection. Print and save all of your financial online transactions.
  • 25. Buying Apps Buying apps usually requires using credit or pre-paid cards. When you set up an account, you are required to submit a credit card or other form of payment. Once you have an account, many apps are free. However, most commercial free apps have optional purchases where you can buy extra characters, settings, and other items. Many apps offer freemium options; they start with a free version, but offer upgrades to premium levels. You can also be prompted to pay for faster time or less advertising. Be a wise consumer. Before you download an app, visit Common Sense Media app reviews, which provides consumer education about criteria like: ease of play, consumerism, language, and other adult content. https://www.commonsensemedia.org/app-reviews
  • 26. Banking Online • Online Security: Never use your Social Security number as a password or username, change your password frequently, protect your answers to security questions. To find more tips visit: http:// www.handsonbanking.org/financial- education/military/stay-safe-while-banking-online/ • Mobile Banking Security: Frequently delete text messages from your financial institution, lock your phone when not in use, avoid storing passwords, keep your operating system/security up to date, download mobile apps only from reputable sources, and be cautious when using public hotspots.
  • 27. What to do if your identity is stolen • Report the incident to the fraud department of the three major Consumer Reporting Agencies, CRA’s (Equifax, Trans Union, Experian) Ask them to place a “fraud alert” on your credit reports. Re- quest a victim statement. Keep a log that notes with whom you talked and what you told them. • Contact the fraud department of your creditors. The Federal Trade Commission provides an Identity Theft Affidavit, a standardized form used to report new accounts fraudulently opened in your name. Phone the Federal Trade Commission at 1-877-IDTHEFT (438-4338) Request: "Identity Crime: When Bad Things Happen to Your Good Name."
  • 28. Why do we participate in risky online behavior? http://www.behavioraleconomics.com/BEGuide2016.pdf
  • 29. Classic Economics • People choose. • All choices involve costs. • People respond to incentives in predictable ways. • People create economic systems that influence choices and incentives. • People gain when they trade voluntarily. • People’s choices have consequences for the future.
  • 30. Behavioral Economics & Behavioral Finance http://www.cs.unibo.it/~ruffino/Letture%20TDPC/Kahneman.%20am.ec.rev.,%205,%202003.pdf
  • 31. System 1 and System 2 http://morecustomersfaster.com/branding-advertising/the-science-of-online-branding-and-the-lazy-brain-part-1/
  • 32. Why do we participate in risky online behavior? http://www.behavioraleconomics.com/BEGuide2016.pdf
  • 35. Essential Questions: Privacy and Digital Footprints
  • 36. Buy Red a New Hoodie Email from Red Hi Students, This is Red again. Remind your parents or other adults about the story of my grandma: Little Red Riding Hood. There are a lot of crazy versions of that story out there. Do you want to know the true ending? The Big Bad Wolf was arrested and my grandma was fine! All my life, I’ve been warned about the Big Bad Wolf and I NEVER talk to strangers in real life! You did a really great job of explaining how I can help my friends to stop and think about safe decisions before they connect. Now I need another favor. You know that my grandma used to wear those old fashioned riding hoods. Well, I prefer wearing red hoodies and my grandma wants me to pick one out to buy. But I want to try to shop with her online. Please work with your parents to find me the perfect hoodie! Sincerely, Red StopThinkConnect.org • Using advice from the tip sheet, search online for red hoodies. • Pick the top three choices. • Make a decision for the top choice and write an email/text back to Red.
  • 37. Who Protects You When You Use a Credit Card?
  • 38. How Can You Protect Yourself Online?
  • 39. Appily Ever After: Common Sense Media • https://www.commonsensemedia.org/blog/1 6-apps-and-websites-kids-are-heading-to- after-facebook
  • 42. Dear Students, My name is Ella. Cinderella and Prince Charming are my parents. I would like to ask your help in choosing some new apps for my mobile device. My mom said that I could only download free apps. She also said that the apps needed to have at least good educational value and no violence. I want apps that are fun and easy to use. I prefer princess apps but am willing to try other new apps. I have attached a decision table with some of my top choices. Can you please help me by ranking the choices? Can you tell me the costs and benefits of each choice so I can share this information with my mom? Before I make a decision, I have to show my mom that I did research and I have to show evidence for my choices. Can you please send me an email with your decisions and reasons? Thanks! Ella
  • 44. Hi Students, Thanks so much for your recommendations on apps but before I download new apps, my Fairy Godmother taught me about some new criteria that I should use so I don’t get in trouble again. She told me I should choose an app where the developer does not share my personal information. Also, she told me to read about the costs of the apps. Some are free but they offer in-app purchases. She told me I should make sure the apps I choose have parent gates so I don’t spend more money on these in-app purchases. However, she also said that some educational apps don’t need parental gates, because there are no in-app purchases. I included an attachment where I found some reviews of the apps. Please use this information when making your decision. Can you please use information in the reviews to help me make a final decision on the top three apps I should recommend to my mom? Thanks, Ella
  • 45. App Reviews • Sing Star Sim: The game was created by famous singers. It is a simulation game that teaches kids how to create singing videos. There are some sarcastic responses from the audience. Users can access all of the app features for free but they make in-app purchases to get more rewards and to make the game go faster.. It is fun but there are a lot of annoying ads and in-app purchases. There is no parent gate. The developer does not say if they share information or not. • Princess Adventures: This game lets kids interact with six different princesses. Each princess is on an adventure. The free download includes everything the user needs to interact with one princess. In- app purchases can unlock the games for the five other princesses. Kids can also collect charms to make a bracelet. Some charms are free and others are available for purchase. . A parent gate protects purchase. The developer states they do not share information with other companies.

Editor's Notes

  • #5: What did you include on your digital footprint? Every time you are online information can be tracked: websites you visit, what you say in emails and posts, how much money you spend, what is said about you, your location and IP address, the search and location words you use, and where you live. Did you know that the information you share online could become a permanent part of your digital footprint?
  • #19: This meme started as a cartoon by Peter Steiner, published in the New Yorker in 1993. In the cartoon, a dog is sitting on a chair in front of a computer. He is talking to another dog and the caption reads: on the Internet, nobody knows you are a dog. What do you think this means?
  • #34: Students spend many hours online so it is important to inform them about the risks. Risks are unavoidable parts of daily life. Educators should help students protect themselves against online risks by educating them about how to avoid or reduce risky behaviors. When individuals work online, they leave a digital footprint: a trail or history that is left behind when people interact in digital environments. For example, when you use the Internet or mobile devices for emailing, social media, and texting – there is a history of interactions that can often be permanent. There is a wide variety of information that can be tracked: websites you visit, what you say in email and posts, how much money you spend, what is said about you, your location and IP address, the search and location words you use, and where you live. This information is collected through search words, browsers, forms and surveys you fill in, information you post, purchases, and logging into sites. In addition, it can be used to affect your digital reputation and create opportunities for invasive attacks on your privacy through hacking, cyber attacks, malware, and spyware  . This information becomes part of your digital footprint. http://www.teachinctrl.org/lessons/yourdigitalfootprint.php  It may not be age appropriate but the next logical step in such a conversation would be a talk about browser history and cookies. How do markteters use cookies to track your browsing activity. Another one, (though it may irritate some parents) is to talk about browser anonymizers such as incognito mode in the Chrome browser.  Would you also explain the concept of “LIKE” farming and comment farming on social media? https://www.consumeraffairs.com/news/like-farming-facebook-scams-look-before-you-like-042215.html