c1 Digital identity
Introduction
Our identity is unmistakable. In real life, we can prove our identity by means of our fingerprint or our identity card. Nowadays, however, everyone also has a digital identity, which enables us to identify ourselves on the internet. This can be done, for example, via a digital signature, an e-mail account or a social media account. And even those who always try not to leave any traces on the internet will not be able to prevent their personal information from ending up on the net in a roundabout way. For example, when other people publish their own personal information such as names, videos, photos or other personal data on the internet. Thus, someone can even have a digital identity without being aware of it.
In this chapter, we will explore the questions of how far we can identify people in the digital world? How do digital identities arise from the personal information we leave behind on the internet (whether consciously or unconsciously)? What risks are associated with this and what value do they have? This should help us to be more careful with personal data and to protect it from unwanted access.
Learning aims
Learning aims | ||
He/she understands the importance of a digital identity. Especially when dealing with data and creating or sharing content on the internet. He/she knows the risks when dealing with other digital identities. | ||
Knowledge | Skills | Competences |
He/She
| He/She can
| He/She is able
|
Learning material
Exercise | Short description | Type | Time needed | Description and material |
---|---|---|---|---|
Lesson 01 - Search for identities | In this lesson you will be able to search, locate and observe the information that is available on the Internet about you and your friends, also famous people. | Group or individual work | 45 min. | detail description... |
Lesson 02 - Your data | Locate and manage the information that an organisation keeps about you, by logging to that organisation webpage and locate or profile or our data. It is also aimed to check the methods for password recovery. | Single work | 30 min. | detail description |
Lesson 03 - Fake identities | This lesson is aimed to try to find fake identities from famous people with the main purpose to raise the awareness on the learner about the existence of unfaithfull information | Group or individual work | 30 min. | detail description |