c2 Challenges of the digital world
Last modified by Daniel Nübling on 2022/08/03 08:12
Inhaltsverzeichnis
Introduction
The digital world offers enormous advantages and conveniences. But we also encounter risks on the internet. These are manifold and also vary in their level of danger. Ultimately, however, they always represent an attack on our privacy and our data. The dangers range from the unwanted disclosure of our data to deletion and destruction.
It is important to know the dangers and their effects. Because if we understand the underlying mechanisms, most risks are avoidable or we can at least minimise them through appropriate behaviour.
Learning aims
Learning aims | ||
He/she knows risks that can affect our privacy and the security of our data and knows strategies to minimise these risks | ||
Knowledge | Skills | Competences |
He/She can
| He/She is able to
| He/She is able to
|
Learning material
Exercise | Short description | Type | Time needed | Description and material |
---|---|---|---|---|
Lesson 01 - Data property | This lesson is aimed the student to verify the user agreement of the most common platforms (as social networks) and verify to which extend the rigths of that platforms over your data | Single work | 30 min. | Detail description |
Lesson 01b - Data ownership II | Using the example of a fictitious GPS transmitter in a car, we want to explore the following questions: Who owns our data? And who has the right to process them? And what scenarios are possible based on this data? | Plenum | 45 min. | Detail description |
Lesson 02 - cookies practise | Learner should practise the use of ordinary surfer and later an incognito window to differenciate the behaviour of the cookies | Group or individual work | 45 min. | detail description |
Lesson 03 - Identify phising | Some phishing examples will be presented and learners will have also the oportunity to explore possible spam and phising received in their mail boxes | Group or individual work | 30 min. | detail description |
Lesson 04 - Apps rights | Identify and verify which apps of our smartphone or tablet have access to the camera, microphone, gps, etc. | Single work | 30 min. | detail description |
Lesson 05 - Passwords safety | Learners will be able to verify and understand how secure is a password. Understand the two-factors identification process | Group or individual work | 15 min. | detail description |
Lesson 06 - Treacherous receipt | From supposedly unrelated or seemingly unimportant data, conclusions can be drawn about us and our person. This exercise aims to raise awareness of this fact. | Group or individual work | 45 min. | detail description |
Lesson 07 - Personalised advertising | How does personalised advertising work? Where does the information come from and is personalised advertising good or bad? | Plenum | 30 min. | detail description |
Lesson 08 - Big Data | Big data is an important but also very complex topic. There are different methods and approaches to deal with this topic in more detail. | Group or individual work, roleplay | 45 - 90 min. | detail description |