Segment | Materials |
Introduction (5 Minutes) - With the rise of technology, we have shared a wide range of information online.
- This allows others to identify information the sharer did not intend to share.
| Presenters |
Activity – Digital Footprint Detectives (15 Minutes) - Each group of 4-5 receives 3 clue handouts and a recording sheet.
- Situation handouts contain various forms of media shared by a character.
- Groups have 5 minutes to decipher each handout. On their recording sheet, they must record details they notice and inferences they can create based on the clues.
- Encourage students to record as many details as possible!
- Once time expires, reconvene the room; each group should share at least 5 details.
- As a class, create a realistic story based on the clues they identified.
- Reveal the real story and compare eerie similarities between the class’ story.
| Participants
Presenters - Whiteboard
- Dry-Erase Marker
|
Reflection (5 Minutes) - What was some of the information shared purposely by the character?
- What was some of the information you inferred? How did you make the inference?
- Inferences could be made by researching further and connecting clues.
- Was it relatively easy or difficult to combine the clues into a story?
| N/A |
Connector (15 Minutes) - The clues we just identified are part of the character’s “digital footprint”.
- All data we leave on the internet is part of our digital footprint.
- Digital footprints can be used to track our activities and devices.
- Even if we delete something, it may still be identifiable.
- Although digital footprints sound invasive, there are both pros and cons.
- Pros: online activity can be personalized (GPS, Face ID, etc.)
- Cons: previous activities a user wants to conceal could be revealed.
- In our activity, the character posted a complaint about a company. How might that affect them?
- There are 2 main categories of digital footprints: passive and active.
- Passive: data shared unwillingly by the user.
- Active: data shared intentionally by the user.
- There are 4 underlying categories: PII, Anonymous, user input, and sensor data.
- PII (Personally Identifiable Information): traceable to individuals.
- Anonymous: collects data anonymously (IP address concealed too).
- User Input: data generated by user input (personalization).
- Sensor Data: collects data by sensors (ex. touch to wake on phones).
- Some ways we can keep our data safer: secure passcodes, privacy settings, delete old accounts, share online minimally, update software, etc.
| N/A |
Closing Activity – Data Card Sort (10 Minutes) - Each pair gets one packet with participant materIals.
- Discuss to categorize the situations into the 8 categories and share why they believe it belongs to each category.
- Discuss how some situations may land in several categories.
- Share findings with others in the room.
- Distribute closing survey.
| Participants |