Segment

Materials

Introduction (5 Minutes)

  • With the rise of technology, we have shared a wide range of information online.
  • This allows others to identify information the sharer did not intend to share.

Presenters

Activity – Digital Footprint Detectives (15 Minutes)

  1. Each group of 4-5 receives 3 clue handouts and a recording sheet.
  1. Situation handouts contain various forms of media shared by a character.
  1. Groups have 5 minutes to decipher each handout. On their recording sheet, they must record details they notice and inferences they can create based on the clues.
  1. Encourage students to record as many details as possible!
  1. Once time expires, reconvene the room; each group should share at least 5 details.
  1. As a class, create a realistic story based on the clues they identified.
  1. Reveal the real story and compare eerie similarities between the class’ story.

Participants

Presenters

  • Whiteboard
  • Dry-Erase Marker

Reflection (5 Minutes)

  • What was some of the information shared purposely by the character?
  • What was some of the information you inferred? How did you make the inference?
  • Inferences could be made by researching further and connecting clues.
  • Was it relatively easy or difficult to combine the clues into a story?

N/A

Connector (15 Minutes)

  • The clues we just identified are part of the character’s “digital footprint”.
  • All data we leave on the internet is part of our digital footprint.
  • Digital footprints can be used to track our activities and devices.
  • Even if we delete something, it may still be identifiable.
  • Although digital footprints sound invasive, there are both pros and cons.
  • Pros: online activity can be personalized (GPS, Face ID, etc.)
  • Cons: previous activities a user wants to conceal could be revealed.
  • In our activity, the character posted a complaint about a company. How might that affect them?
  • There are 2 main categories of digital footprints: passive and active.
  • Passive: data shared unwillingly by the user.
  • Active: data shared intentionally by the user.
  • There are 4 underlying categories: PII, Anonymous, user input, and sensor data.
  • PII (Personally Identifiable Information): traceable to individuals.
  • Anonymous: collects data anonymously (IP address concealed too).
  • User Input: data generated by user input (personalization).
  • Sensor Data: collects data by sensors (ex. touch to wake on phones).
  • Some ways we can keep our data safer: secure passcodes, privacy settings, delete old accounts, share online minimally, update software, etc.

N/A

Closing Activity – Data Card Sort (10 Minutes)

  • Each pair gets one packet with participant materIals.
  • Discuss to categorize the situations into the 8 categories and share why they believe it belongs to each category.
  • Discuss how some situations may land in several categories.
  • Share findings with others in the room.
  • Distribute closing survey.

Participants