It encompasses a wide range of fields, including computer science, engineering, and telecommunications, and is often used to describe the latest advancements in these areas.
2. Why Become Tech-Savvy?
• College students rely heavily on technology for
both academic and non-academic purposes
Laptops Netbooks MP3 Players Smart Phones
Tablets E-Readers Assistive Technology Devices
• Near-constant access to technology
• Need to accomplish many tasks online
• Skills are more than just how to use it; need to
be truly savvy about technology
3. A Double-Edged Sword
• Technology is so well-integrated into daily life
that we may not realize its extent
• Pros: convenience and efficiency
Cons: dependence and vulnerability
• Technology’s benefits usually outweigh its risks
• However, serious problems can arise if you’re
not safe and savvy when using technology
5. If You Post It, They Will Find It
• Anyone can find a lot of information about you
online.
• All it takes to find many details about you is…
–The motivation and persistence to look for them
–A small amount of prior knowledge about you
• If you are careless about online safety and
security, they may also be able to access more
sensitive or private information about you
6. What Can I Find Out About YOU?
• Where you go to school
• What kind of car you drive
• What you did last Saturday
night
• Your favorite songs
• Where you work
• What you want for your
birthday
• Where you live
• The brand of pizza you prefer
• The people you admire
• Where & when you’re going
on vacation
• What you’re looking for in
a significant other
• Who your friends are
• Where to find you on
Tuesday evenings
• Illegal activities you’ve
participated in
• Who your roommates are
and whether you get along
• Your opinion of your teachers
• Your political views
• Your sense of humor
• Where you are and what
you’re doing right now
• What you think of your boss
• Items you own and items you
want to purchase
• Your favorite sports teams
• Your sexual orientation
• Who your family members
are
• Your favorite movies
• Your birthday and age
• What causes/issues you
support
• Where you shop
• How you’re doing in school
• Which websites, books, and
magazines you read
• What you look like
• And much more…
7. Where Can I Find All This Information?
• Social networking sites
Facebook, Twitter, Google+
• Blogs
Blogger, Tumblr
• Personal websites
• Photo/video sites
YouTube, Instagram
• Dating sites
eHarmony, Match.com
• Online video games
Xbox Live, Steam
• Message boards
Any website with this feature
• Wish lists/registries
Amazon, Target, eBay
• File-sharing sites
BitTorrent
• Entertainment sites/services
Hulu, Netflix, Goodreads
• Employment-related sites
Monster, CareerBuilder
• Business sites
Craigslist, Etsy, Roommates
• Other
Can you think of additional online
resources where you may inadvertently
be sharing more than you realize?
8. Potential Consequences of Irresponsible
Technology Use
• Disciplinary action from colleges/universities
• Losing a scholarship or athletic eligibility
• Stalking
• Use of posted information as incriminating
evidence in legal matters
• Identity theft
• Being passed over for a new job or internship
• Disciplinary action from an employer, including getting fired
9. How can you deal with
the risks inherent in
using technology?
You can’t ignore the risks, but you also
can’t avoid technology entirely.
The solution is to become “web wise”
and technologically-savvy.
10. Becoming “Web Wise” and Tech-Savvy
• Understand that being tech-savvy is about more
than knowing how to use technology
• Learn about technology-related risks
• Take steps to avoid or minimize risks
• Take responsibility for your role as a member of the
online community by being a good cyber-citizen
• Apply critical thinking skills and good judgment to
all your technology-related actions
12. Keep a Clean Machine
• Use reputable security software and ensure that it
scans for threats regularly
– Anti-virus
– Anti-malware
– Anti-spyware
• Don’t bypass or disable security protocols
• Keep security software up-to-date
• Protect all devices that connect to the internet
• Don’t forget about external devices like flash drives
13. Connect with Caution
• Access Wi-Fi hotspots wisely
–Pay attention to the networks you connect to
–Set tighter privacy controls for public networks
–Don’t conduct sensitive business on public Wi-Fi
• Make sure you’re using secure sites for all
financial transactions
• Protect your accounts with strong passwords
and additional identity-verification measures
14. Create Strong Passwords
• Minimum length of 8 characters
• Include at least 3 different types of characters:
Uppercase letters (A B C) Lowercase letters (a b c)
Numbers (1 2 3) Symbols (@ & % * ? / + ~)
• NO personal information
e.g., pet’s name, significant dates, favorite teams, etc.
• NO dictionary words or names
• NO reverse-spelled words or common substitutions
e.g., regrubeseehc, LuvDaPir@tez1, 3L!z@b3t4
15. Don’t Even Think About Using These Passwords…
• password
• 123456
• 12345678
• abc123
• qwerty
• monkey
• letmein
• dragon
• 111111
• baseball
• iloveyou
• trustno1
• 1234567
• sunshine
• master
• 123123
• welcome
• shadow
• ashley
• football
• jesus
• michael
• ninja
• mustang
• password1
These are the 25 “Worst Passwords of 2012” as compiled by SplashData,
a company that makes password management software
16. More Password Tips
• Change passwords regularly
• Use a different password for each account
• Store passwords securely
–Write it down and lock it up
–Use a password manager
• Do not share your password with anyone
• Choose security questions and answers wisely
17. Take Common-Sense Precautions
• Check and customize your security and privacy
settings
• Never leave your technology unattended
• Always remember to log out of accounts on
shared or public computers
• Don’t open, download, or click on anything
that looks even remotely suspicious
• Back up your data often and store it securely
18. Share Safely on Social Media
• Consider limiting others’ access to your social
networking profiles
• Don’t rely solely on privacy settings to protect
your information
• Make decisions about what to share (and what
not to share) with a level head
• Learn to evaluate your social media presence
with a critical eye
19. Be a Good Cyber-Citizen
• Good citizenship
– Becoming well-informed and educated
– Respecting legitimate authority
– Being involved and engaged to promote the welfare of the
community and people within it
– Treating your environment, yourself, and others with
respect and helping those who need support as you are
able
• Good citizenship also applies to the global
community as accessed through the internet
20. Good Cyber-Citizenship
• Understand your potential to impact others through your
online actions
• Respect laws and rules in cyberspace as you would in
everyday life, including intellectual property rights
• Treat others in the online community with respect
– If you wouldn’t say or do it in person, don’t say or do it online
– The “Golden Rule” of social networking: Post about others only
as they would post about themselves
– Consider your motives for posting about others
21. The Bottom Line for Using
Technology Responsibly
THINK…!
•…before you post
•…before you act
Ask yourself:
• What are the risks?
• Why am I doing this?
• Would I want ________
to see this?
• Do these actions/words
portray me as I want to
be perceived by others?
22. Activity: You Are What You Post
• Pretend that you are moving to a new city.
• You’ve found a great 3-bedroom apartment, and you’re
looking for 2 roommates to share it with.
• You decide to go online and check out the “SpaceBookster”
social networking profiles of a few people who have
emailed you inquiring about your request for roommates.
• Look at their profiles and use the “Social Networking Site
Evaluation” worksheet to make notes about each.
• Based on their profiles, select your “top 2” preferences to
ask to move in. Be ready to discuss why you chose these
people as potential roommates.
Editor's Notes
#1:Module 3 Lesson 4
This lesson is aimed at helping students become more aware of technology issues, including their own online presence, and enabling them to make smart choices about the ways they use technology, how they interact with people online, and the information they share with the online community
Sincere thanks to Sir Peter Romary, Director of Student Legal Services at East Carolina University, for a large portion of the information contained in this lecture.
Additional source of information: ECU’s Information Technology and Computing Services website at http://www.ecu.edu/cs-itcs/itsecurity/Safe-Computing.cfm
Unless otherwise specified, all clip art and images in this document are used with permission from Microsoft in accordance with their End User License Agreement.
#2:Becoming tech-savvy is important for college students because of how much they rely on technology every day for both academic and non-academic purposes. These are just a few of the technology items college students often use.
Unlike in many high schools, college students have near-constant access to technology. Because there’s more freedom in college, there’s often nobody enforcing limits on things like non-academic computer use or when and where a smartphone can be used.
In addition, college students need to do many more things online than they likely had to do in high school. For example, many colleges only post grades online, and many professors use web-based course software that requires students to do things like complete homework assignments, take quizzes, and submit papers online.
Becoming tech-savvy is a key skill for college students because not only do they need to know how to use these technology items, but they also need to become truly savvy about technology in many different ways.
#3:In our daily lives, the ubiquity of technology is a double-edged sword.
As you can see from the myriad of uses we just discussed, technology is so completely integrated into most people’s lifestyles that it often tends to blend into the background. When it works seamlessly, as it often does, we forget that it’s even there. This can be dangerous because it leads to us taking it for granted, becoming lax about safety/responsibility, and forgetting that there are still risks associated with its use.
The convenience and efficiency that technology provides also come with the tradeoffs of dependence and vulnerability. We generally don’t remember or notice these drawbacks until something goes wrong…there’s no concern about the security of your computer until you get a virus that fries your entire hard drive, or you take for granted that your bank’s website is secure until there’s a data breach and your identity is stolen.
Although the benefits of technology generally far outweigh the risks, we cannot forget that there are risks. It’s important to get into the habit of recognizing those risks early on and consistently taking actions that minimize and/or avoid them.
#4:Risks associated with technology come in different types. Some of them fall into multiple categories at the same time.
In general, here’s what these broad categories refer to:
Security – keeping information out of the wrong hands
Safety – issues that can cause harm to someone
Privacy – sharing more information than is preferred or advisable
Data integrity – loss of information
#5:To start off, we’ll talk about the risks associated with the large volume of information that’s available online about most people. This ties into all the different types of risks listed on the previous slide (privacy, safety, and security more so than data integrity).
The knowledge required about you to get started is minimal. For many of the details, it’s as simple as looking at Facebook or Twitter and using the information gleaned from that site as clues to where else to start looking. Even for further depth, the prior knowledge needed could be as simple as where you go to school or when your birthday is.
Someone with nefarious motives and just a little bit of technological expertise can gain access to even more information – IF you’re careless about security. What they can probably access is even scarier: how much money you make, credit cards you own, where you bank, etc. The carelessness doesn’t even have to be something as drastic as leaving a list of your passwords out somewhere. Something as simple as forgetting to log out of a social networking or email account on a public computer could give a total stranger access to completely take over the account and lock you out!
#6:This is a list of a few of the tidbits of information about you that I may be able to find online. Anyone can find out hundreds of details about you if they know where to look online, and many of these can be found if I know nothing more than your name.
Of course, all of these will not apply to everyone. However students may be surprised by how much information is available and how actions you take online that you might assume are not being tracked actually are.
#7:So where is all this information coming from?
In case you were thinking that some of those things mentioned on the previous slide couldn’t possibly be public information, here’s a list of some of the types of websites (and a few specific examples of each type) where these details can be found. A great deal of additional information that wasn’t mentioned is also available on these sites and others.
If someone is looking to find out about you, these are the places they will probably start. Once they get started on one site, it’s usually an easy jump to figure out other sites where they can find more information.
Let’s take a moment to consider this: What are the possible consequences of people knowing this information?
[Have students briefly brainstorm potential consequences.]
#8:These are some examples of the consequences that can arise from using poor judgment about posting online or other lax online security, privacy, or safety behaviors.
Colleges have disciplined students based on social networking posts depicting activities that violated laws or student codes of conduct. Disciplinary actions have been taken based on activities such as underage drinking, drug use, sexual activities, miscellaneous illegal activities, joining certain groups or posting controversial/hate speech, etc. Students have also lost scholarships for activities such as these. A specific example of something that could lead to this consequence: a student under age 21 posts a photo of himself drinking a beer that was clearly taken inside his dorm room.
Students have been stalked after posting their schedules or other detailed information about their whereabouts on social networking sites, blogs, or personal websites. Some people have even been killed by someone who gained access to the victim through personal information found online. Since many schools have open campuses, information about a student’s schedule may be all that’s needed to pinpoint their location at a specific time and then show up at that location.
The increase in apps that let you “check in” at a location (e.g., Foursquare) can make this even easier to do. When using these, not only are people advertising that they’re not at home (useful information for anyone who wants to break in and steal something), but they’re also sharing exactly where they are in real time (useful information for a potential stalker).
Law enforcement officials can use photos, videos, and other information posted online as incriminating evidence against you. They can also arrest people for cyber-stalking and harassment, threats, and false statements against others online.
Anyone who posts detailed personal information online is vulnerable to identity theft. Identity theft may not seem like a big deal to many high school students because they may not fully understand its implications; in fact, many adults don’t fully understand how serious of a threat it is either. It’s even more serious for high school and college students because they’re less likely to check their credit reports or engage in financial activities that would call attention to and catch the problem before it reaches crisis levels.
Many employers now check the internet, especially social networking sites, before hiring new employees. Even if you think your information is not accessible to potential employers, it may be. Under the Patriot Act, many agencies are now able to access the profile of any potential employee, regardless of their privacy settings, without any notification to the individual. (This could easily apply to a college student applying for an internship with a government agency, as well as in many other situations.)
Even if an employer does not have access under the Patriot Act, they can still simply ask you to pull up your social networking profile in an interview (which prevents you from being able to “clean it up” like you might if they asked you to grant them access later on).
Once you have a job, posting online can still cause you to lose it. There are numerous examples of people whose social media posts got them into trouble, and it’s not always for the same reason. Some have gotten in trouble for breaking a law; while others have been disciplined for sharing information the employer does not want public or disparaging the employer or customers/clients.
#9:This discussion is not intended to convince you to remove all of your information from the entire internet. That’s neither practical nor realistic. On the contrary, the sites where all of these personal details are available are often highly effective and important tools for communication, information-sharing, education, business, and more.
Even experts on internet safety have an online presence, so the answer is not to disappear from the internet. The problem arises when people do not use good judgment related to the information they share online. By simply using your good judgment in conjunction with what you know about the risks and benefits of your online presence, you can drastically decrease the possibility of running into problems.
#10:So how do you become web wise and tech-savvy? The following slides will all talk about more specific aspects of being web wise and tech-savvy, but here’s an overview first.
First, you need to understand that being tech-savvy is about much more than knowing how to use technology. Many people use that term to refer to people who can easily navigate technology - people who use technology effectively and efficiently and who can troubleshoot basic and intermediate tech problems without much support. But being truly tech-savvy entails also being aware of larger issues surrounding technology, such as: why it’s an important tool, the purposes it serves, where people can run into problems with it, how to solve those problems, and what impact their use of technology has on the communities they’re part of.
Being web wise and tech-savvy also means learning about the risks related to technology and taking steps to minimize or avoid those risks.
Web-wise and tech-savvy people also take responsibility for the impact they have within the online community. They become good cyber-citizens.
Finally – and most importantly by far – web-wise and tech-savvy people use critical thinking skills and good judgment in all their technology-related actions. They evaluate benefits and drawbacks with a critical eye, consider the purpose their actions are serving, and engage responsibly with technology and online.
#11:The next section contains more specific tips on how to use technology responsibly, especially as a college student.
#12:To minimize your risks, you can start by keeping your computer clean and protected from online threats.
Downloading reputable and comprehensive security software is critical. Be sure that it’s enabled and runs on a regular basis to check for threats or problems. It should go without saying that bypassing or disabling these functions defeats the purpose of having the software in the first place. For example, it may be annoying to have to repeatedly tell your internet browser that a certain kind of pop-up window is not a threat, but disabling the feature entirely can cause more problems than eliminating the annoyance was worth.
It’s also crucial to keep this software updated, as threats change constantly and the software needs to be updated to handle new problems that pop up. You can set these things to update automatically, and it’s a good idea to do so.
Your laptop isn’t the only device that needs protection from potential security threats. Any web-enabled device can be vulnerable, including smart phones, tablets (iPad), game consoles (Xbox, Playstation), e-readers (Kindle, Nook), etc.
Don’t forget to use your security software to scan and clean up external devices like flash drives, external hard drives, etc. These items can become infected with viruses, malware, and spyware as well, and are often more vulnerable because (1) they may be plugged into multiple computers over time, some of which may be public and not subject to security as rigorous as your personal computer; and (2) they’re not usually automatically scanned and protected by security software.
#13:Be savvy when it comes to connecting to Wi-Fi hotspots. Although many businesses offer free Wi-Fi, not every network is set up the same, and some may present significant risks to your devices.
Pay attention to where the Wi-Fi you’re connecting to is coming from. If it’s provided by a business as a perk to their customers (especially if it requires a password) then it’s probably safer than some random network you can’t identify the source of.
Make sure that your security settings on your computer are more stringent when connecting to a public network. Designate any Wi-Fi network you don’t personally control the security of as a public network to ensure that your computer is not sharing your personal information with unsecured networks. You can also set it so your device does not automatically scan and/or connect to networks without you first searching for and selecting them.
If you’re on a public network, make smart choices about the information you access and transmit. For example, watching funny animal videos on YouTube carries minimal risk, but making an online purchase with a credit card is a much riskier thing to do.
Protect your money by always checking whether a website is security-enabled before entering any kind of financial information for banking or shopping transactions. The web address should say https:// or shttp:// to indicate that the site takes additional measures to secure your information. (The s stands for secure.) Sites starting with simply http:// are not secured.
Using strong passwords is critical to protecting yourself online. (More about passwords on the next slides) In addition, many websites and online accounts also offer additional identity-verification and security measures, which you should take advantage of.
#14:Practicing excellent password security can go a long way toward keeping your information safe. Here are some key tips:
Create strong passwords: It’s easy to find guidance on how to create a strong password. Many colleges provide guidelines and examples, and some even require your password to meet certain criteria in order to be accepted by the campus system. The key is to create something that is easy for you to remember but is extremely difficult for others (or a computer program) to guess.
Passwords should be at least 8 characters long, preferably more. The longer it is, the harder it is for a human to guess or for software to crack.
Passwords should include at least 3 of the 4 different types of characters: uppercase letters, lowercase letters, numbers, and symbols/special characters.
Do not include personal information in your password. Many people use information that is significant to them and thus easy to remember, but these things are also easy for someone to find out. Your phone number, birthday, graduation year, names of pets/family/friends, favorite team/movie/book/band/etc., address, license plate number, make/model of vehicle, etc. should all be off-limits.
If you can find the word in the dictionary, then a computer program can easily guess it. The same goes for any proper name.
Be aware that you will not outsmart hackers by spelling a password backwards or substituting common symbols or misspellings. (e.g., regrubeseehc instead of cheeseburger; 3L!z@b3t4 instead of Elizabeth, etc.)
#15:The company that compiles this list bases it on passwords that have been posted by hackers and releases it yearly “in an effort to encourage the adoption of stronger passwords.”
Source: “Scary Logins: Worst Passwords of 2012 – and How to Fix Them” from http://www.prweb.com/releases/2012/10/prweb10046001.htm and also referenced in “The 25 most common passwords of 2012” by Chenda Ngak, CBS News, 10/24/2012. (http://www.cbsnews.com/8301-205_162-57539366/the-25-most-common-passwords-of-2012/)
#16:Change passwords regularly
Some college computer networks (or other systems) require you to change your password at regular intervals. Even if yours doesn’t, you should get into the habit of changing all your passwords every so often. You don’t have to make drastic changes, but at least a few characters should be different.
Use a different password for every account
Given the large number of online accounts that most people have, this can seem like a daunting proposition. However it actually doesn’t have to be. The password you use don’t have to be completely random or drastically different from each other, as long as there’s no easily discernible way that they relate to each other. The important thing is that if someone gains access to one of your accounts by guessing or hacking your password, they should not be able to use that same password to access any of your other accounts. Furthermore, you can use a password manager to keep track of them all in case you forget. (See next tip…)
Store passwords securely
The old advice given by security professionals (back when people only had 1 or 2 passwords to remember) was to never, ever write your passwords down anywhere. However, based on that advice, too many people chose extremely easy-to-remember – and thus extremely easy-to-guess – passwords (such as “password” or “123abc”). As a result, the newer advice is to write down your passwords if you need to do so in order to use strong, secure ones. However it’s crucial to store your passwords securely.
One option for this is to write them down and lock up the paper somewhere away from your computer. For college students, this might be in a lockbox in your room or somewhere at your parents’ house.
Another option is to use a reputable password manager app/software. Many of these exist, and plenty of them have excellent reputations and track records for keeping customers’ data safe and secure. If you use an app like this, you only have to remember one password at a time, because you store the rest of them in the app and log in to see what they are anytime you need to log into a different account. Provided that you use secure software from a reputable company and that you use an extremely strong password to secure your password manager account, this is a great option. However, in the wrong hands, it can also be a disaster for you and a windfall for a criminal.
Do not share your password with anyone
This also applies to letting someone use your account, even if you logged in yourself and didn’t actually tell them the password. Unless you’re standing there watching what they’re doing the entire time, you don’t have any idea what they’re doing, and yet you’ll be responsible for any consequences stemming from their actions.
Choose security questions and answers wisely
Many websites and online accounts require you to answer security questions. These are intended to allow you to access your account if you forget your password and sometimes to provide an additional layer of security by requiring you to answer them when you log in from a computer with a different IP address than the one you created the account from.
It can be tempting to choose easy questions and answers – after all, if you’ve forgotten your password and need access to your account, you don’t want to run the risk of being locked out forever because of your security questions. However, this can be just as dangerous as having an insecure password. Many security questions ask for information that is either easy to find or that many people who know you would have access to. (e.g., What is your father’s middle name? What is the name of the hospital where you were born? What make and model was your first car?) Some even ask for information where there are only a few possible answers, meaning that they can be guessed quickly with no knowledge about you at all. (e.g., What month is your parents’ wedding anniversary? What is your youngest sibling’s birthdate?)
If given the option, make up your own security question, and choose one that is meaningful to you, won’t change over time, and won’t be known by anyone else. Then give a specific answer. Good examples include:
“Where were you when…?” some specific life event occurred, such as you had your first kiss, your first speeding ticket, etc. Be specific in the answer – don’t just say “at school” or “Milwaukee.”
“What is the first name of the person whose middle name is…” People’s middle names are less commonly known and harder to search for than their first names. As long as you don’t choose an immediate family member or someone with a well-known or extremely unusual middle name, this should work.
“What was the name of your second…” Many security questions ask about “firsts”…your first boyfriend/girlfriend, first pet, etc. It’s much less common for people around us to be aware of the second of these things.
(Source: Information and examples given in the security questions section are copied from or based on advice and examples from: http://geekswithblogs.net/james/archive/2009/09/23/how-to-pick-a-really-good-security-question.aspx)
#17:The things listed here fall into the category of “common-sense ideas that are not common enough!” Although they may sound completely obvious, you may be surprised how many people don’t follow them and run into problems as a result.
Check on the security and privacy settings for all your technology and accounts. Don’t assume the default settings are acceptable. Also keep in mind that there is nothing wrong with choosing to set your security and privacy settings to maximum. This applies most often to how much people are willing to share on social networking sites – there can be some social pressure to share a lot of information online, but you need to own your online presence. If you’re not comfortable sharing certain information online, then don’t! It’s ok to limit who has access to your information, even if others around you don’t.
Never leave your computer, smart phone, or any other technology unattended. College students are terrible at following this advice, and that’s likely one of the reasons why theft is one of the most common crimes on college campuses. If you make it easy for a criminal to walk up and take your technology, you’re asking for trouble. Keep in mind that if someone walks off with your personal laptop, they’ll have immediate access to anything that automatically logs you in…for many students, this includes social media sites, email, music/movie sites, and more.
When you’re using a public or shared computer, always log out of everything you logged into. Then close every program you were using, especially the web browser. The best practice is to also completely turn off or restart the computer to make sure you haven’t missed anything.
When it doubt, throw it out. If you receive or encounter anything that looks even remotely suspicious to you, delete or navigate away from it immediately. Don’t assume that just because you know the sender it must be safe. People have their email address books hacked into often, and cybercriminals often prey on victims by sending emails with damaging viruses, spyware, or malware in links that the recipients may click on simply in good faith that the sender (the person whose account was hacked) wouldn’t possibly send them anything malicious. Pay attention to what you’re doing online, and don’t open or click on anything on “autopilot.” Be especially wary of anything that asks you to “act immediately,” that sounds too good to be true, or that wants you to enter personal information.
Back up your data often to protect your schoolwork, music, photos, and all other digitally-stored information. Make sure the backup copy is safely stored somewhere else. For example, if you back up your flash drive to your hard drive but then keep them both in the same bag, this defeats the point of backing it up. Lots of colleges offer their students storage space on the school’s server, which can be a great backup option. This way, if you do encounter a problem – such as a virus that erases your hard drive or a hacker who locks you out of the account where you store all your photos – your backup will make the consequences less dire.
#18:Social networking sites have become extremely popular over the past decade. They have many benefits, including being a great way to keep family and friends updated on your life and to connect with colleagues and communities that share your interests. You can use social networks to build a positive reputation that will follow you both online and offline. But it’s very important to stay safe! To safely share information on social media, consider the following…
Instead of seeking to amass the most friends/followers/connections online, consider limiting access to only those people with whom you would actually want to directly share the information you post.
Privacy settings are great, and you should use them. However, don’t rely solely on those settings to protect your information. If you assume that only the people you are directly connected with on the social media site with have access to the information, then you’re putting yourself at risk. It’s better to work under the assumption that others may be able to see or access the information and then only post what you’re comfortable sharing with a wider audience. Remember, you don’t have to be the victim of a security breach for your posts to gain a wider audience…it could be as simple as one of your friends/followers re-tweeting what you shared or showing your post to someone else who’s nearby.
A good rule of thumb: If you don’t want something to be public knowledge, don’t post it!
When deciding what you should share online, allow yourself to make the choices with a clear, level head. This means not posting in the heat of the moment when you’re particularly emotional about something. Remember that once you post, it’s out there. You don’t want a momentary lapse of judgment or impulsivity to cost you more than you were willing to risk. Another aspect of this is avoiding posting while under the influence of anything that may lower your inhibitions, whether it’s alcohol, drugs, or peer pressure.
Finally, learn to evaluate your social media presence with a critical eye. It’s important to be aware of how the things you post are perceived by others, including peers, parents, teachers, employers, and more. Remember that the way to intended for something to come across may not be the same as the way it reads online. And although you can always attempt to explain yourself later, you may not get the chance to change the impression you’ve created.
#19:The concept of good citizenship is probably familiar to you already. What are some things that the phrase “good citizenship” makes you think of?
[Allow students to briefly brainstorm what they associate with good citizenship.]
In general terms, you may consider good citizenship to be anything related to demonstrating respect for our surroundings and the people in those surroundings. There are many possible components to this. Some may include:
Becoming well-informed and educated so that you know what the issues facing your community are and can generate ideas for solving the problems that arise
Respecting legitimate authority, in ways such as obeying laws, rules, and guidelines established by authority figures. This, of course, assumes that the authority is legitimate and there’s no abuse of power occurring.
Being involved and engaged in your community to promote a sense of community and the welfare of both the community and the individual people/groups within it. This could take many forms. Some may be overt and structured, such as volunteering in ways that help you “pull your weight” in improving the community. It can also be less formalized and simply pertain to the attitudes you hold. (Of course those attitudes should also be reflected in your overt behaviors as well.)
Treating yourself and others with respect. This would include cooperation and positive regard of others, as well as making decisions that reflect this respectfulness. This would hopefully result in strengthening the bonds between yourself and other people/groups as well as the community overall. Treating your environment with respect can be as simple as picking up litter or refraining from walking over newly-planted grass.
Finally, this includes helping others who need support when you are able to do so and in the ways that you are able to do so. This may be anything from doing a small kindness for an acquaintance who just got some bad news to creating a social advocacy group aimed at changing the world on a large scale – and anything in between. This is not necessarily related to any kind of financial support – it only requires being willing to contribute to the world around you in a positive way based on the strengths, talents, and resources you have and can spare. This also ties into the idea of protecting your community – the people in it individually and the larger community as a whole.
Standing up for what you know is right and resisting pressure and intimidation is a concept in good citizenship that is related both to the idea of respecting yourself/others/environment and to the idea of supporting those who need help.
(Sources of citizenship info: http://charactercounts.org/sixpillars.html; http://www.goodcitizen.org/)
The concept of good citizenship applies on the internet to the communities you encounter there, as well as to your local communities (e.g., school, town, etc.). Although it’s not a physical place or location, being so connected to others online allows us to form many communities within a huge global community.
#20:The internet allows us to be highly interconnected, which makes us interdependent. This is a wonderful thing because it allows us to connect with people and resources we would otherwise never have access to and allows us to do things more efficiently and quickly than ever. However it also means that we’re interdependent on each other and we can each have a significant impact on other people and communities despite potentially being on opposite sides of the globe.
If you understand and appreciate the potential you have to impact others through your actions online, then it may help bring the “right choices” into clearer focus. Your decisions affect not only you, but possibly also millions of other people. For example, consider that depending on how your college’s computing resources are set up, it may be possible for one person to illegally download something (like movies, music, etc.) but for the university to be unable to determine which user it was. Although many college networks are set up to avoid this, there are plenty of college students with enough technical know-how to misdirect the investigation into who pirated the material. As a result, students who were not involved can potentially be blamed; entire campus communities can also be subjected to intense scrutiny due to the actions of one or a few individuals.
Cyberbullying is another example of the effects of online actions, and is one that has been tragically in the news more frequently over the past few years. The impact that one individual or a group of people can have on the life of a peer cannot be overestimated. Being aware that the things you say, do, and share online have an impact that is just as tangible, and sometimes devastating, as those you undertake in person, is critical to being a good cyber-citizen.
Respecting the laws, rules, and guidelines that apply online is another component of good cyber-citizenship. The biggest example of this for college students is piracy. Illegal downloading of music, movies, and other copyrighted material is prevalent and can be extremely tempting. Ad campaigns attempting to raise awareness of this issue have likened downloading music and movies illegally to walking into a store and shoplifting a CD or DVD. Although many students struggle to truly see these as the same thing, in the eyes of the law, they are equivalent.
In addition, reporting cyber-crime helps the authorities to fight it. The Internet Crime Complaint Center (www.ic3.gov) is a partnership between the FBI and the National White Collar Crime Center where people can report internet-related crimes such as fraud, hacking, identity theft, intellectual property rights violations, and more. You can also report violations to your local law enforcement, state attorney general, or the Federal Trade Commission (for fraud) as appropriate.
Treating others with respect is a key component of good cyber-citizenship that applies in many different ways. The internet provides a measure of anonymity – it can make people feel like they can say or do things online that they wouldn’t say or do in “real life.” Remember that just because you aren’t seeing a person face-to-face doesn’t mean that what you say or do doesn’t have real consequences. Examples:
Cyberbullying
Comments sections on websites
If you’ve ever played a video game online where you can put on a headset and talk to the people you’re playing with/against in real time during the game, you may have noticed some incredibly appalling things being said – profanity, racial/ethnic slurs, hateful and degrading insults, and more. Many of the people saying these things would never say anything similar in “real life” but feel anonymous and invulnerable when represented only by an avatar and a gamertag/screenname. Remember that just because you feel anonymous doesn’t mean that you really are anonymous.
Finally, respecting others online also applies on social networking sites. Along with the ability to share anything we want to about ourselves comes the ability to share anything we want to about other people. However this is an ability that comes with a heavy responsibility for a good cyber-citizen. Respecting the people we’re connected to in our real lives and online involves knowing how they prefer to represent themselves online and never attempting to undermine their preferences. The “golden rule” (do unto others as you would have them do to you) that we all learned as small children applies to social networking too; it can be more clearly stated as “post about others only as they would post about themselves.” This includes:
Respecting those who prefer not to have their photos posted online or have differing standards about privacy than you
Not posting highly unflattering photos that the other person would be embarrassed by
Not “outing” people for things they don’t want shared with others (e.g., when a friend tells you something in confidence that s/he is not yet telling everyone else, you should not post about or hint at it online)
Respecting (reasonable) requests about untagging or removing photos or posts
Understanding and appreciating that once something has been posted, you cannot undo its impact even if you remove it. There’s no way to know whether anyone else saw it before you removed it, and there’s nothing to stop anyone who saw it from taking a screenshot of it for permanent evidence that it existed. In addition, removing something online doesn’t mean that it’s immediately removed from the website’s records.
[Note: This can be a somewhat contentious issue. Other potential viewpoints may include: - Any actions/words a person does/says in public are fair game to be shared on the internet. - Privacy is an archaic or overrated notion. - If someone does/says something they wouldn’t want to have shared online then it’s their own fault for behaving in a manner they would be ashamed of.]
Regardless of whether your viewpoints in this area differ from the people you may be posting about, when a situation arises where you must decide whether to post something about another person, it’s important to consider what you are accomplishing by doing so.
Are you embarrassing the person for the sake of being funny? For the sake of hurting their feelings?
Are you trying to change their perspective about what to share online?
Are you trying to get them in trouble with an authority figure? (e.g., posting evidence that would lead to sanctions from parents, school, or law enforcement)
Are you trying to cause friction with peers? (e.g., posting evidence of cheating on a significant other or speaking poorly about someone behind their back)
#21:_________ refers to whoever would be relevant in the situation.
Important people to consider filling in the blank with:
My parents
My teachers (professors, guidance counselors, other school personnel, etc.)
A potential employer
A college admissions counselor or member of a scholarship application review committee
My religious/spiritual authority figure (e.g., a clergyperson, Sunday school teacher, etc.) or the deity I believe in
The police
#22:Guided Practice: In this activity, students are going to form impressions of people based on their profiles from social networking sites.
The “Spacebookster” profiles for this lesson are (loosely) based on famous people and fictional characters. However, do not tell the students this at the beginning of the activity. They should think these are just generic/made-up profiles until they have revealed their choices at the end.
The point of the activity is for students to realize that the information they post in their social profiles presents them in a certain way, depending on what/how they post. They may not realize how those things look to others or what kind of impression they may be making because they are looking at the information in the context of knowing the circumstances behind all the photos and information included.
Similarly, the profiles that the students will review in this activity were created with the intention of representing the people in the way they would want others to perceive them. The impressions created by the profiles may or may not match up with the way that other people would perceive these individuals in person. Without knowing the context of who they are, students may make different choices about who they would select to live with.
Allow students to work in pairs or individually to review all of the profiles, make notes on the “Social Networking Site Evaluation” worksheet, and select their top 2 choices for who to live with. Once they have made their decisions, come together as a class to discuss who they chose and why. Students should discuss the impressions they got from each profile and why they believe the individual would be a good or poor choice for a roommate.
After all students have shared their choices, reveal the person/character that each profile represented and discuss. Would the students have made different choices if they had known the people’s names first? How have their perceptions changed now that they have some context to add to the profiles?