Did you know that Jack from Jack and the Beanstalk has a grandson named Jack III? In the lesson I wrote for EconEdLink, learn how digital trails may help the Giant find Jack III. Using a video and an informational text students explore risky online behaviors and decide what is risky to share online.
According to the website information on Your Digital Footprint: Leaving a Mark every time you share information it becomes part of your digital footprint. For example think about the times you click "like" on social media. Now read about how this information is used in this article on LIKE farming. Scammers will use information to make money or launch online scams. This article from USA Today explains why you should be careful before clicking “like” on Facebook and other social media sites. Social media sites also make photo sharing easy. However, anyone can access online photos unless you take precautions. Did you know that your smartphone automatically applies geotags of location and time to your photos unless you disable the function in settings? Read more about geotagging on Common Sense Media's website . In addition to adjusting settings, there are other strategies adults can use to keep browsing private.One way is to sign out of your browsers and accounts when you are done. For more information on how to keep your browsing private, read the article, How to Keep Your Web Browsing Private. For more information about digital footprints, watch Common Sense Media's Follow the Digital Trail. Do you remember the Internet classic, "On the Internet, nobody knows you’re a dog." This is a popular Internet meme that shows a dog typing on the computer, meaning that you never know who is at the other end of the message you are receiving. In the lesson I wrote for EconEdLink students learn about Little Red Riding Hood's granddaughter: Red. Red has a problem. She isn't aware of risky online behaviors. She learns Stop, Think, Connect . In other words, she learns how to stop and think about the risks of sharing information before making a decision to share information or connect online.
What are some things you should consider before connecting? Did you know that when you are on social media and take a quiz line "Which-Harry-Potter-character-are-you" you are sharing PII (Personally Identifiable Information)? When you give out any information online, there is a risk that you are giving away your privacy and making yourself vulnerable to predators. After using some of the materials in the lesson, have children create their own posters, videos, or memes with information about how to protect against the Big Bad Cyberwolf!
Like most young people, Jamal and Ana love downloading and playing with Apps. According to a Pew Internet study in 2011 many parents downloaded apps for their children. Common Sense Media noted that the number of children using mobile media has doubled and the time spent using mobile apps has tripled. When working online, children aren't usually aware that parents have to enter a credit card in order to pay for apps on mobile devices. Although many apps are free, even free apps can have costs because many commercial apps have "freemium" options that encourage purchases. Although many of these apps are free, most commercial apps have options for in-app purchases. Parental gates can help protect you against unintentional spending! For more information, check out the Huffington Post article on parental gates that describes changes to Children’s Online Privacy Protection rule COPPA .
In the video series below, find out how Jamal helps Ana solve her problem. Can Jamal help Ana live 'appily ever after? You can further explore these ideas in this lesson I wrote for EconEdLink.org that uses the videos. |
AuthorDeborah Kozdras, Ph.D. Archives
February 2022
Categories |