SlideShare una empresa de Scribd logo
1 de 21
Privacy – the birth of an online module
Question 1
Which group is the most frequent victim of
cybercrime?
1. Elderly people
2. Highly educated young people
3. Low-educated young people
Question 2
Is the Wi-Fi on the train trustworthy?
1. Yes, it is usually safe.
2. The internet on the train is not safe, so it is
better to work on the train via a VPN
connection.
2.
Question 3
Is the university responsible for the data you
collected for your thesis and saved on your USB
flash drive?
1. Of course not; that would be crazy!
As a student, you are responsible for your
own USB flash drives
2. Of course, the university can be held
responsible for any sensitive data on students’
USB flash drives that are left lying about
Question 4
Is it dangerous to send your bank account
number to someone via WhatsApp?
1. No, because WhatsApp has end-to-end
encryption.
2. Cybercriminals can’t do anything with your
account number anyway, so it’s no problem to
send it over WhatsApp
3. You should never share your bank account
number, especially not on social media.
2.
Question 5
Do you use your university email address?
1. No, I use my regular email address
(e.g. Gmail, Hotmail) whenever I can.
2. Yes, I have forwarded my university email to
my regular email address (e.g. Gmail, Hotmail).
3. Yes of course!
2.
Why is privacy suddenly
such an important issue?
Big Fines
Data
Leaking
How big?
• a warning in writing in cases of first and non-intentional non-compliance
• regular data protection audits
• a fine up to 10,000,000 EUR
• a fine up to 20,000,000 EUR
All data?
Do we have confidential information at our
universities?
• Personal information of students and employees (name,
address, bankaccount, password)
• Research data on persons and companies (e.g. interviews,
medical data, inside information on companies!)
What do we want to teach the students?
• Not to share their (confidentional) documents on dropbox/google drive
• Not to use gmail, but (the protected) mailservice of the university
• To encrypt their laptops, USB flash drive and documents
Why libraries?
ACRL
Framework
Information Has Value
• give credit to the original ideas of others through proper attribution and citation;
• understand that intellectual property is a legal and social construct that varies
by culture;
• articulate the purpose and distinguishing characteristics of copyright, fair use,
open access, and the public domain;
• understand how and why some individuals or groups of individuals may be
underrepresented or systematically marginalized within the systems that
produce and disseminate information;
• recognize issues of access or lack of access to information sources;
• decide where and how their information is published;
• understand how the commodification of their personal information and online
interactions affects the information they receive and the information they
produce or disseminate online;
• make informed choices regarding their online actions in full awareness of
issues related to privacy and the commodification of personal
information.
So we have to teach the students to…
• make informed choices regarding their online actions
• in full awareness of issues related to privacy
• and the commodification of personal information.
>> be a percipient producer of information
Outline of the module
• Identity and social media
- Name and address, date of birth, bank account
- Safe use of Social Media (beware of what you post!)
• Safe surfing
- Incognito or private browsing/ searching
- VPN
• Protecting your device
- Passwords
- Cloud services
- Encrypting
Most important lesson:
There it is…..
And they lived happily ever after…?
(university)
library
privacy
Discussion
Is privacy awareness a task of the library?
Should it be a compulsory element of
academic skills / media literacy courses?
How far do we (libraries) have to go in
teaching students / the public about privacy?
The birth of an online module about privacy - Schoutsen & van Putten

Más contenido relacionado

La actualidad más candente

Uses of internet
Uses of internetUses of internet
Uses of internet
sheenam65
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
sarthakgarg97
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
vincentl33
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
Soham
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
ChauTran09
 

La actualidad más candente (20)

Uses of internet
Uses of internetUses of internet
Uses of internet
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet communication
Internet communicationInternet communication
Internet communication
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
 
Digital Native
Digital NativeDigital Native
Digital Native
 
Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Electronic communication grade 10 cat
Electronic communication grade 10 catElectronic communication grade 10 cat
Electronic communication grade 10 cat
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
IS341 - Course introduction
IS341 - Course introductionIS341 - Course introduction
IS341 - Course introduction
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Internet and its application in education
Internet and its application in educationInternet and its application in education
Internet and its application in education
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkirat
 
Internet and computer
Internet and computerInternet and computer
Internet and computer
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 

Similar a The birth of an online module about privacy - Schoutsen & van Putten

Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
Quennith
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
Quennith
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Sarah Sell
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policy
Matt Britland
 

Similar a The birth of an online module about privacy - Schoutsen & van Putten (20)

Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Watcha Webtrap!
Watcha Webtrap!Watcha Webtrap!
Watcha Webtrap!
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policy
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Current-Trends-REPORT.pptx
Current-Trends-REPORT.pptxCurrent-Trends-REPORT.pptx
Current-Trends-REPORT.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social networking
Social networkingSocial networking
Social networking
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 

Más de IL Group (CILIP Information Literacy Group)

Más de IL Group (CILIP Information Literacy Group) (20)

Shiny and New Library professionals stepping into new information literacy te...
Shiny and New Library professionals stepping into new information literacy te...Shiny and New Library professionals stepping into new information literacy te...
Shiny and New Library professionals stepping into new information literacy te...
 
Develop with Derby: creating an online platform to support school students’ i...
Develop with Derby: creating an online platform to support school students’ i...Develop with Derby: creating an online platform to support school students’ i...
Develop with Derby: creating an online platform to support school students’ i...
 
Comic strips as educational tools - Holly Brown
Comic strips as educational tools - Holly BrownComic strips as educational tools - Holly Brown
Comic strips as educational tools - Holly Brown
 
The new Teaching Librarian certificate course at the University of Vienna - A...
The new Teaching Librarian certificate course at the University of Vienna - A...The new Teaching Librarian certificate course at the University of Vienna - A...
The new Teaching Librarian certificate course at the University of Vienna - A...
 
How our library has radically and successfully altered the way we teach using...
How our library has radically and successfully altered the way we teach using...How our library has radically and successfully altered the way we teach using...
How our library has radically and successfully altered the way we teach using...
 
Performance students' perceptions of information literacy - Alice Bloom
Performance students' perceptions of information literacy - Alice BloomPerformance students' perceptions of information literacy - Alice Bloom
Performance students' perceptions of information literacy - Alice Bloom
 
A collision of two worlds. The information behaviour of incarcereted students...
A collision of two worlds. The information behaviour of incarcereted students...A collision of two worlds. The information behaviour of incarcereted students...
A collision of two worlds. The information behaviour of incarcereted students...
 
How collaborative reading techniques can develop information literacy the mag...
How collaborative reading techniques can develop information literacy the mag...How collaborative reading techniques can develop information literacy the mag...
How collaborative reading techniques can develop information literacy the mag...
 
Health literacies in marginalised communities - Pam McKinney
Health literacies in marginalised communities - Pam McKinneyHealth literacies in marginalised communities - Pam McKinney
Health literacies in marginalised communities - Pam McKinney
 
Information literacy and society - Presentation Bruce Ryan
Information literacy and society - Presentation Bruce RyanInformation literacy and society - Presentation Bruce Ryan
Information literacy and society - Presentation Bruce Ryan
 
Academic libraries and neurodiversity - Emma Finney.pptx
Academic libraries and neurodiversity - Emma Finney.pptxAcademic libraries and neurodiversity - Emma Finney.pptx
Academic libraries and neurodiversity - Emma Finney.pptx
 
What does research mean to you - Unpacking information hierarchies and creati...
What does research mean to you - Unpacking information hierarchies and creati...What does research mean to you - Unpacking information hierarchies and creati...
What does research mean to you - Unpacking information hierarchies and creati...
 
Information literacy and society: a systematic literature review - Bruce Ryan
Information literacy and society: a systematic literature review - Bruce RyanInformation literacy and society: a systematic literature review - Bruce Ryan
Information literacy and society: a systematic literature review - Bruce Ryan
 
Liberating the library through information creation a ‘messy’ workshop - Vick...
Liberating the library through information creation a ‘messy’ workshop - Vick...Liberating the library through information creation a ‘messy’ workshop - Vick...
Liberating the library through information creation a ‘messy’ workshop - Vick...
 
Accessibility 101 Small steps, big rewards - Eva Garcia Grau
Accessibility 101 Small steps, big rewards  - Eva Garcia GrauAccessibility 101 Small steps, big rewards  - Eva Garcia Grau
Accessibility 101 Small steps, big rewards - Eva Garcia Grau
 
Thriving Overseas: Finding the Niche as an Instruction Librarian in a Foreig...
Thriving Overseas:  Finding the Niche as an Instruction Librarian in a Foreig...Thriving Overseas:  Finding the Niche as an Instruction Librarian in a Foreig...
Thriving Overseas: Finding the Niche as an Instruction Librarian in a Foreig...
 
The opportunity of narrative inquiry for information literacy research_ Narra...
The opportunity of narrative inquiry for information literacy research_ Narra...The opportunity of narrative inquiry for information literacy research_ Narra...
The opportunity of narrative inquiry for information literacy research_ Narra...
 
Taking Stock: A Scan of AI Literacy Instruction in Academic Libraries.pdf - B...
Taking Stock: A Scan of AI Literacy Instruction in Academic Libraries.pdf - B...Taking Stock: A Scan of AI Literacy Instruction in Academic Libraries.pdf - B...
Taking Stock: A Scan of AI Literacy Instruction in Academic Libraries.pdf - B...
 
Reciprocity in Learning: Co-creation with undergraduate students- creating co...
Reciprocity in Learning: Co-creation with undergraduate students- creating co...Reciprocity in Learning: Co-creation with undergraduate students- creating co...
Reciprocity in Learning: Co-creation with undergraduate students- creating co...
 
Plagiarism and AI tools: an example of linking information- and digital liter...
Plagiarism and AI tools: an example of linking information- and digital liter...Plagiarism and AI tools: an example of linking information- and digital liter...
Plagiarism and AI tools: an example of linking information- and digital liter...
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

The birth of an online module about privacy - Schoutsen & van Putten

  • 1. Privacy – the birth of an online module
  • 2. Question 1 Which group is the most frequent victim of cybercrime? 1. Elderly people 2. Highly educated young people 3. Low-educated young people
  • 3. Question 2 Is the Wi-Fi on the train trustworthy? 1. Yes, it is usually safe. 2. The internet on the train is not safe, so it is better to work on the train via a VPN connection. 2.
  • 4. Question 3 Is the university responsible for the data you collected for your thesis and saved on your USB flash drive? 1. Of course not; that would be crazy! As a student, you are responsible for your own USB flash drives 2. Of course, the university can be held responsible for any sensitive data on students’ USB flash drives that are left lying about
  • 5. Question 4 Is it dangerous to send your bank account number to someone via WhatsApp? 1. No, because WhatsApp has end-to-end encryption. 2. Cybercriminals can’t do anything with your account number anyway, so it’s no problem to send it over WhatsApp 3. You should never share your bank account number, especially not on social media. 2.
  • 6. Question 5 Do you use your university email address? 1. No, I use my regular email address (e.g. Gmail, Hotmail) whenever I can. 2. Yes, I have forwarded my university email to my regular email address (e.g. Gmail, Hotmail). 3. Yes of course! 2.
  • 7. Why is privacy suddenly such an important issue?
  • 9. How big? • a warning in writing in cases of first and non-intentional non-compliance • regular data protection audits • a fine up to 10,000,000 EUR • a fine up to 20,000,000 EUR
  • 11. Do we have confidential information at our universities? • Personal information of students and employees (name, address, bankaccount, password) • Research data on persons and companies (e.g. interviews, medical data, inside information on companies!)
  • 12. What do we want to teach the students? • Not to share their (confidentional) documents on dropbox/google drive • Not to use gmail, but (the protected) mailservice of the university • To encrypt their laptops, USB flash drive and documents
  • 14. Information Has Value • give credit to the original ideas of others through proper attribution and citation; • understand that intellectual property is a legal and social construct that varies by culture; • articulate the purpose and distinguishing characteristics of copyright, fair use, open access, and the public domain; • understand how and why some individuals or groups of individuals may be underrepresented or systematically marginalized within the systems that produce and disseminate information; • recognize issues of access or lack of access to information sources; • decide where and how their information is published; • understand how the commodification of their personal information and online interactions affects the information they receive and the information they produce or disseminate online; • make informed choices regarding their online actions in full awareness of issues related to privacy and the commodification of personal information.
  • 15. So we have to teach the students to… • make informed choices regarding their online actions • in full awareness of issues related to privacy • and the commodification of personal information. >> be a percipient producer of information
  • 16. Outline of the module • Identity and social media - Name and address, date of birth, bank account - Safe use of Social Media (beware of what you post!) • Safe surfing - Incognito or private browsing/ searching - VPN • Protecting your device - Passwords - Cloud services - Encrypting
  • 19. And they lived happily ever after…? (university) library privacy
  • 20. Discussion Is privacy awareness a task of the library? Should it be a compulsory element of academic skills / media literacy courses? How far do we (libraries) have to go in teaching students / the public about privacy?

Notas del editor

  1. By Barry Mangham [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0) or GFDL (http://www.gnu.org/copyleft/fdl.html)], from Wikimedia Commons