2.02

advertisement

COURSE

COMPETENCY

OBJECTIVE

ESSENTIAL

QUESTIONS

6411

Computer Applications I

Unit A The Internet

2.00 A1 4%

Remember components of electronic communication and rules of online safety.

2% Remember the rules of online safety. 2.02 A1

What personal information should I protect when online?

What are warning signs and precautions related to online safety?

What are online hazards and how do I safeguard my computer?

I.

UNPACKED CONTENT

Note : Remember to check Internet sites prior to each activity and each class period. If inappropriate comments or content have been posted to the website, be prepared to deliver the lesson via alternate means. It may be prudent to print hard copies of articles and distribute to students instead of allowing them to view them on the Internet.

Personal Online Internet Safety Guidelines

A. Online Disclosure of Personal Information

1. Full name

– use androgynous nicknames and screen names instead of

2. real names, which can quickly and easily be used by predators to steal personal information or locate a physical address of a potential victim

Home address – generic or specific information can be used by

3.

4. predators to hone in on potential victims

Phone number – a phone number can be used in a reverse search on the Internet to identify the addresses of potential victims

Social security number – online disclosure of social security numbers is extremely hazardous and provides unwanted access to predators and hackers who steal financial, medical, and other personal information

5. Disclosure of passwords to friends, relatives, and coworkers should be avoided. The greater the number of people with access to personal information, the greater the risk.

6.

7.

8.

Disclosure of the names of family members is another trick used by predators and hackers to zero in on potential victims.

Credit card information should only be disclosed to trusted, verified, and secure sites.

Photographs are potential sources of risk because they can be used by predators to decipher the locations of potential victims. Photographs can also be edited to falsify information, such as to make fraudulent identification cards.

B. Social Networking and Online Chatting

1. Behave properly when online a. Employers and college scouts are frequently turning to online social networking sites to assess the behavior of potential candidates i. Inappropriate pictures of partying and illegal behavior may be viewed by future employers and can prove fatal t o one’s employability potential

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 81

UNPACKED CONTENT

II.

2. b. ii. Your online reputation is valuable

Posting fraudulent and harmful information about someone on the

Internet and especially on social networking sites can have disastrous effects i. ii. Act responsibly

Safety guidelines and precautions : a.

Fraudulent and malicious information posted on the

Internet has resulted in many teen suicides across the country b.

Avoid yelling (keying in all caps) when chatting online. Keying in all caps symbolizes anger and should be noted as a possible warning sign. If yelled at, close the connection

Bullying c. i. In all cases, it is best to first ignore a bully ii. If a situation escalates or a bully does not stop, the victim should contact school authorities and inform parents/guardians immediately

Explicit material – any material that is considered adult or explicit or that makes the user feel uncomfortable d. Never meet someone in person that you have met online

C. Financial safeguards

1. Do not open emails or respond to sites that promise you will get rich quick or anything else that seems too good to be true. These emails and sites are most often screens that spammers use to access personal and financial information which they then sell to other companies or use with malicious intent.

2. Do not give out credit information without parental permission and only when the site is certified as secure a. The URL of a secure site begins with http s : - the “s” indicates a secure site b. An interactive lock is displayed on the site, usually in the bottom right or left-hand corner. Make sure the lock is interactive and read the contents of the link! c. A seal is another indication of a site’s safety. If there is a seal, inspect it and make sure it is authentic.

Potential Computer Hazards

A. Virus

– a small piece of software that attaches to programs that are installed on a user’s pc. Some viruses will automatically replicate themselves and spread to other computers. An email virus has the potential to automatically mail itself to dozens of people in the user’s email address book.

B. Spam – unwanted and unsolicited email advertisements or messages

C. Spyware – malicious software designed to take partial control of a computer’s operations without the consent of the user.

1.

2.

Some spyware intercepts and records passwords and credit card numbers

Tracks a user’s visits to different web sites to analyze their spending activity and forecast consumer behavior

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 82

Instructional Activities

1.  Using a digital projector, view and discuss the

Online Safety PowerPoint as students take notes using the Staying Safe Online graphic organizer

 The PowerPoint contains links to several videos and articles that are related to teen safety, cyber bullying, and information about college admissions officers who use the Internet to check out potential students

 Links to news articles related to online safety:

 http://www.edweek.org/ew/articles/2007/12/19/1

6applicants.h27.html?tmp=582024897

 http://stcharlesjournal.stltoday.com/articles/2007

/11/26/news/sj2tn20071110-

1111stc_pokin_1.ii1.txt

 http://www.usatoday.com/news/nation/2008-02-

06-Cyberbullying_N.htm

2.  Distribute Safety on the Internet to students and instruct them to determine the risk of each scenario

 Upon completion of the activity, discuss student answers as a class

Relevancy

Helps students

REMEMBER (A1) personal safety hazards, rules for keeping safe while online, computer safety hazards and rules for protecting computers against online hazards

3.  Preparation: For this activity, students will pick one of three topics related to social networking or online safety. They will visit Internet sites to gather information and answer related questions. Preview the sites prior to the activity

 If access to the web pages is unavailable, print copies of the articles for students prior to the activity

 Distribute one activity sheet to each student:

Employers and College Scouts OR Identity

Theft OR Parental Guidelines

 Review the instructions orally with students and instruct them to complete the activity independently

 Instruct students how to submit their work

 As closure, ask students to cite one piece of information they learned that they did not know before completing the activity

 Helps students

REMEMBER (A1) rules of online safety through scenarios

 Helps students

REMEMBER (A1) concepts related to online safety through reading and reflection of related information

Resources

 Online Safety

PowerPoint

 Staying Safe

Online graphic organizer

 Internet

 www.netsma

rtz.org

 www.edweek

.org

 Safety on the

Internet

Student activity and key

 Employers and College

Scouts activity

 Identity Theft

 Parental

Guidelines

 No key is provided for this activity

 Internet

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 83

Instructional Activities

Staying Safe Online ..................................................................................................................85

Safety on the Internet ................................................................................................................86

Safety on the Internet Key .........................................................................................................88

Employers and College Scouts .................................................................................................90

Identity Theft .............................................................................................................................92

Parental Safety Guidelines ........................................................................................................94

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 84

Staying Safe Online Graphic Organizer

Student Name: Date:

Student Activity

Period:

S

TAYING

S

AFE

O

NLINE

Directions: Use this graphic organizer to take notes as you view the PowerPoint about online safety.

1. What information should a. never be disclosed when online? b. c. d. e.

2. f. g. h.

How can your reputation be affected by online activities?

3. To what warning signs should you pay attention when online? a. b.

4.

5.

6. c.

How can you safeguard financial information? a. b. c.

What are computer hazards? a. b. c.

How can you safeguard your computer against online hazards? a. b. c.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 85

Safety on the Internet

Name: Period: Date:

Student Activity

S

AFETY ON THE

I

NTERNET

Directions : Read each scenario carefully and determine if the person in the scenario is following computer safety guidelines. If not, explain why in the space provided.

1. Sally is chatting on the computer with a buddy she met online. He asks her to give her phone number so he can hear her voice and get to know her better.

2.

Safe

Not safe

Why?

Chris is on My Space and places his email address in his profile.

3.

Safe

Not safe

Why?

Mary is chatting with Mike from school. He asks for her address so he can mail her an invitation to his party.

Safe

Not safe

4.

5.

6.

Why?

Jane gives Laura her password because Laura’s computer is in the shop and she wants to check her email.

Safe

Not safe

Why?

Joan is instant messaging Lou in all caps to stay away from her boyfriend. Joan has asked her to stop and deleted five messages already, but Lou keeps sending them.

Safe

Not safe

Why?

Max asks for Sharon’s picture so he can post it on his web page.

Safe

Not safe

Why?

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 86

Safety on the Internet

Name:

7.

Period: Date:

Student Activity

Tom is purchasing a surfboard online. He has checked and there is a lock in the bottom right of the browser window. Also, the site carries the VeriSign logo. Tom places his credit card number in to purchase the surfboard.

Safe

Not safe

8.

Why?

John is checking his email at home. He receives a message from someone he does not know. He opens the message.

9.

Safe

Not safe

Why?

How do you know if a site is secure?

10. Have you ever downloaded a program that caused you problems or harmed your computer? What should you do to avoid harmful programs from installing?

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 87

Safety on the Internet Teacher Key

S

AFETY ON THE

I

NTERNET

K

EY

Directions : Read each scenario carefully and determine if the person in the scenario is following computer safety guidelines. If not, explain why in the space provided

1. Sally is chatting on the computer with a buddy she met online. He asks her to give her phone number so he can hear her voice and get to know her better.

2.

Safe

Not safe

Why? It is never safe to give out information to a stranger online.

Chris is on My Space and places his email address in his profile.

3.

4.

Safe

Not safe

Why? He becomes vulnerable to anyone who visits.

Mary is chatting with Mike from school. He asks for her address so he can mail her an invitation to his party.

Safe

Not safe

Why? Mary doesn’t know who else is watching while she and Mike are chatting.

Jane gives Laura her password because Laura’s computer is in the shop and she wants to check her email.

Safe

Not safe

5.

6.

Why? It is never safe to give out your password.

Joan is IMing Lou in all caps to stay away from her boyfriend. Joan has asked her to stop and deleted five messages already, but Lou keeps sending them.

Safe

Not safe

Why? Joan is obviously not respecting Lou’s attempts to ignore her. Lou needs to let her parents or teacher know immediately.

Max asks for Sharon’s picture so he can post it on his web page.

Safe

Not safe

Why? Sharon doesn’t know who else may have access to her picture.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 88

Safety on the Internet

7.

8.

9.

10.

Teacher Key

Tom is purchasing a surfboard online (with his parent’s permission). He has checked and there is a lock in the bottom right of the browser window. Also, the site carries the VeriSign logo. Tom places his credit card number in to purchase the surfboard

Safe

Not safe

Why? The site is verified as safe and he checked with his parents.

John is checking his email at home. He receives a message from someone he does not know. He opens the message

Safe

Not safe

Why? The message may contain a virus.

How do you know if a site is secure?

Make sure that the URL begins with https: that there is an interactive lock on the site; check for a seal.

Have you ever downloaded a program that caused you problems or harmed your computer? What should you do to avoid harmful programs from installing?

Make sure the program is from a trusted source and does not have any hidden programs attached to it.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 89

Employers and College Scouts

Student Name: Date:

Student Activity

Period:

E

MPLOYERS AND

C

OLLEGE

S

COUTS

Directions : Visit the websites listed below and answer several related questions. The last question requires you to make a list of the risks associated with online social networking.

Websites:

• http://www.nytimes.com/2006/06/11/us/11recruit.html?_r=2&oref=slogin&oref=slogin

• http://www.foxnews.com/story/0,2933,208175,00.html

• http://64.233.169.104/search?q=cache:SuEYycsKhB4J:www.vanderburghsheriff.com/SexOf fender/Internet%2520Predator%2520Brochure%25202.pdf+social+networking+sites+and+c ollege+entrance&hl=en&ct=clnk&cd=8&gl=us (see page 2 of the article)

• http://www.webupon.com/Social-Networks/Your-Online-Reputation-Matters-Watch-Your-

Social-Site-Friends.73027

Questions:

1. Why do employers and college scouts research social networking sites to view information about potential candidates?

2. How popular is this research practice for companies and colleges?

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 90

Employers and College Scouts

Student Name: Date:

Student Activity

Period:

3. What sites are employers and college scouts viewing to find out information about candidates?

4. What kinds of information are employers and college scouts finding?

5. What are some examples of employer reactions to inappropriate postings?

6. What are some examples of college admissions officer s’ reactions to inappropriate postings?

7. Based on the information gathered, make a list of the risks associated with social networking sites.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 91

Identity Theft

Student Name: Date:

Student Activity

Period:

I

DENTITY

T

HEFT

Directions : Visit the websites listed below and answer several related questions. The last question requires you to make a list of techniques that you can use to avoid being a victim of identity theft.

Websites:

• http://www.ftc.gov/bcp/edu/microsites/idtheft//?CFID=853434&CFTOKEN=49488164

• http://www.usdoj.gov/criminal/fraud/websites/idtheft.html

• http://www.identitytheft.org/

Questions:

1. Approximately how many people are victims of identity theft?

2. Do you know anyone personally who is a victim of identity theft?

3. How does someone steal your identity?

4. What are some examples of how identity theft affects the victim?

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 92

Identity Theft

Student Name:

5. If caught, what charges does an identity thief face?

Date:

6. Is there any protection available to safeguard against identity theft?

Student Activity

Period:

7. Based on the information gathered, make a list of techniques you can use to avoid being a victim of identity theft.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 93

Parental Safety Guidelines

Student Name: Date:

Student Activity

Period:

P

ARENTAL

S

AFETY

G

UIDELINES

Directions : Visit the websites listed below and answer several related questions. The last question requires you to develop a list of guidelines directed to parents that will help them keep their children safe when online.

Websites:

• http://www.kidshealth.org/parent/positive/family/net_safety.html

• http://www.fbi.gov/page2/jan06/ccctf012506.htm

• http://www.wiredsafety.org/

• http://www.netsmartz.org/

• http://www.missingkids.com/missingkids/servlet/ServiceServlet?LanguageCountry=en_US&

PageId=3072

Questions

1. From a parent’s point of view, what safety risks are teenagers exposed to on the Internet?

2. What can parents do to ensure the safety of their teens online?

3. What are the common types of crimes that occur as a result of Internet use?

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 94

Parental Safety Guidelines

Student Name: Date:

Student Activity

Period:

4. What are some of the organizations that are available to help protect against cyber crimes and what services do they provide?

5. What types of protection are available to protect against these types of crimes? (Be specific)

6. Based on the information gathered from your research, develop a list of guidelines directed to parents that will help them keep their children safe when online.

6411 – Computer Applications I Summer 2008, Version 2 Unit A – 2.02 – page 95

Download