c2 Challenges of the digital world

Last modified by Daniel Nübling on 2022/08/03 08:12

Introduction

The digital world offers enormous advantages and conveniences. But we also encounter risks on the internet. These are manifold and also vary in their level of danger. Ultimately, however, they always represent an attack on our privacy and our data. The dangers range from the unwanted disclosure of our data to deletion and destruction.

It is important to know the dangers and their effects. Because if we understand the underlying mechanisms, most risks are avoidable or we can at least minimise them through appropriate behaviour.

Learning aims

Learning aims

He/she knows risks that can affect our privacy and the security of our data and knows strategies to minimise these risks

KnowledgeSkillsCompetences

He/She can 

  • identify common risks on the internet and know ways to minimise them.
  • describe the possible effects of knowingly or unknowingly publishing data on the internet

He/She is able to

  • Understand the common risks and implement appropriate protective measures
  • recognise dangers and act accordingly.
  • Assess the value of their own data

He/She is able to

  • Take measures to increase the security of one's own data and privacy on the Internet
  • Develop strategies to protect privacy and one's own data.
  • to deal with one's own data in a self-determined manner

Learning material

ExerciseShort descriptionTypeTime neededDescription and material
Lesson 01 - Data propertyThis lesson is aimed the student to verify the user agreement of the most common platforms (as social networks) and verify to which extend the rigths of that platforms over your dataSingle work 30 min.Detail description
Lesson 01b - Data ownership IIUsing the example of a fictitious GPS transmitter in a car, we want to explore the following questions: Who owns our data? And who has the right to process them? And what scenarios are possible based on this data? Plenum45 min.Detail description
Lesson 02 - cookies practiseLearner should practise the use of ordinary surfer and later an incognito window to differenciate the behaviour of the cookiesGroup or individual work45 min.detail description
Lesson 03  - Identify phisingSome phishing examples will be presented and learners will have also the oportunity to explore possible spam and phising received in their mail boxesGroup or individual work30 min.detail description
Lesson 04 - Apps rightsIdentify and verify which apps of our smartphone or tablet have access to the camera, microphone, gps, etc.Single work30 min.detail description
Lesson 05 - Passwords safetyLearners will be able to verify and understand  how secure is a password. Understand the two-factors identification processGroup or individual work15 min.detail description
Lesson 06 - Treacherous receiptFrom supposedly unrelated or seemingly unimportant data, conclusions can be drawn about us and our person. This exercise aims to raise awareness of this fact.Group or individual work45 min.detail description
Lesson 07 - Personalised advertisingHow does personalised advertising work? Where does the information come from and is personalised advertising good or bad? Plenum30 min.detail description
Lesson 08 - Big DataBig data is an important but also very complex topic. There are different methods and approaches to deal with this topic in more detail.Group or individual work, roleplay45 - 90 min.detail description
Tags: