Lesson Objective
Participants will understand that they can develop and manage their online reputation and identity by taking important privacy measures.
Participants will understand that they can develop and manage their online reputation and identity by taking important privacy measures.
Ready?
Begin Lesson
A digital footprint is all of the information about an individual that exists online or in the public domain. This can include personal information shared by the individual but can also include audio files, photos, social media posts, text and videos.
Digital footprints can even include interactions with family, friends, groups and organizations through comments and Likes. Just as you leave footprints when walking, you leave digital footprints while browsing and interacting online.
An individual’s identity can include their personal beliefs, characteristics, interests, and traits. It can also include their membership and participation in community groups based on their identifying characteristics or personal interests.
Your online identity is how you present yourself in an online setting. People actively make their own online identities.
You’re in control
You can control your online identity differently in different settings or situations. You might have different online identities depending on the community, group or social media platform you are using and the people you interact with in that space.
Identity across platforms
A platform facilitates interactions between people. Your online identity might be consistent across social media platforms, or you might develop several online identities or personas.
What personal information you choose to share online and who you chose to share that information with makes up your online identity.
Selective sharing
You may choose to share some content with select audiences and it is important to know how to make those modifications.
An individual’s reputation includes the beliefs or opinions others have about that individual.
Your online reputation is how others view you in an online setting.
Your online identity contributes to your online reputation, but you do not have complete control over your online reputation. Other people will interpret your online activity based on their own unique beliefs, experiences and opinions.
Your online reputation might differ with different people or groups.
Representation is media (images, photos, videos), symbols (emojis, gifs, memes) or text that expresses or represents someone or something.
Think before you share;
In other words, what people post online is a representation of themselves and how they feel about something or someone. Sometimes, people share information with a clear intent or message. Other times, information shared can be unclear. Often, information shared online is interpreted differently by different people. That is why it is important to think about the message something sends before you share that information.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View PageStudents will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View PageStudents will learn how to keep their online information more secure by using and maintaining strong passwords.
View PageStudents will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page