Lesson video

In progress...

Loading...

Hello, my name is Ms. Powell, and welcome to Computing.

I'm so pleased that you decided to join me here today.

In today's lesson, we're gonna be talking about ways that we can protect ourselves and stay safe online.

Let's get started.

Welcome to today's lesson from the unit "Online safety." Today's lesson is called "Protecting myself online." And in today's lesson, we'll identify the potential harms of being online and determine the practical actions that I can make to protect myself online.

We'll be using these keywords throughout today's lesson.

Let's take a look at them.

The first word is content, content.

This is information online, which can sometimes be inappropriate or harmful.

The next word is contact, contact.

This means when people interact with each other online.

The next word is conduct, conduct.

This means the way people behave online.

And the last word is commerce, commerce.

This means buying and selling goods online.

Lesson outline, "Protecting myself online." Today's lesson is split into two sections.

In the first section, we'll explain potential harms of being online.

In the second section, we'll determine actions to protect myself online.

Let's get started with the first section, explain potential harms of being online.

How many different online safety threats can you think of? Pause the video and have a think.

Negative online reputation.

An online reputation is the image or perception that others have of you, a company, or a brand based on your online activity and interactions.

It encompasses your digital footprint, which includes all the traces you leave online as well as the opinions and content shared about you by others.

Your online reputation can significantly impact how people perceive you, whether it's in a personal or professional context.

You could have a positive online reputation or a negative online reputation.

Try to focus on creating a positive and consistent online presence across all platforms. Filter bubbles.

A filter bubble is a situation in which an internet user encounters only information and opinions that conform to and reinforce their own beliefs, caused by algorithms that personalise an individual's online experience.

Cyberbullying.

Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person.

Online threats and mean, aggressive, or rude text, tweets, posts, or messages all count.

So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Privacy infringement.

An infringement of privacy refers to the act of violating someone's right to keep their personal life and information private.

This can involve unauthorised disclosures, access or misuse of private information.

Publishing private photos or videos revealing confidential health information or using someone's identity for fraudulent purposes are all examples of privacy infringement.

Obscene content.

Obscene content is generally defined as material that is offensive, rude, or shocking.

In legal terms, obscenity is often defined by its tendency to deprave and corrupt individuals.

This means the content is likely to lead to moral degradation or harmful behaviour.

Obscene content is often considered too explicit or graphic for the general public.

In the UK, obscenity laws are primarily governed by the Obscene Publications Act.

Scams. A scam is a deceitful scheme, trick, or fraudulent act, often designed to trick individuals into giving up money, personal information, or other valuable items. Scammers use various tactics to manipulate people, including building trust, creating a sense of urgency, or making promises that are too good to be true.

Censorship.

Censorship is the act of suppressing speech, public communication, or other information.

This suppression can be carried out by various entities, including governments and private institutions, and often occurs when content is deemed objectionable, harmful, sensitive, or inconvenient.

Data theft.

Data theft, also known as information theft, is the unauthorised access, copying, or taking of digital data.

This can involve personal, confidential, or financial information and includes things like passwords, software code, or intellectual property.

Data theft can occur through various means, including cyberattacks, insider threats, or even physical theft of devices containing sensitive data.

Fake news.

Fake news or information disorder is false or misleading information claiming the aesthetics and legitimacy of news.

Fake news often has the aim of damaging the reputation of a person or entity or making money through advertising revenue.

Malware.

Malware, short for malicious software, is any software designed to harm a computer system, network, or device.

It can include viruses, ransomware, Trojans, and spyware.

The goal of malware is often to steal data, disrupt operations, or cause financial damage.

Data collection.

Online data collection refers to gathering information through the internet, often by analysing website data and social media interactions.

It's a method that enables researchers and businesses to access information more quickly.

Tracking website traffic, user behaviour, and website content can provide valuable insights.

Analysing social media conversations and posts can reveal customer sentiments, market trends, and brand mentions.

Data can be collected and analysed in real time, enabling faster decision-making.

Big data refers to exceptionally large and complex datasets that are difficult to manage and analyse using conventional data processing tools.

Pornography.

Pornography is a broad term that generally refers to sexually explicit materials.

It can take various forms, like images, videos, or written content.

Hate crime.

Online hate crime refers to criminal acts committed with a bias or prejudice against a person or group based on their characteristics, like race, religion, sexual orientation, gender identity, or disability.

This can involve online threats, hate speech, cyberbullying, and inciting violence, often through various platforms like social media or online forums. Explain potential harms of being online.

Potential online harms. Don't be overwhelmed.

There are lots of potential harms online, but you won't need to deal with all of them at the same time.

The potential online harms you might face will be different depending on what you're doing online.

Sometimes it can be helpful to break down the potential harms into these four categories: content, contact, conduct, commerce.

Let's take a look at these words in more detail.

Content, these online harms are prevalent when accessing information online.

They could include hate speech, pornography, or fake news.

Contact, these online harms are prevalent when people interact with others online.

The potential harms could include grooming, cyberbullying, or phishing emails.

Grooming is the process that enables an offender to build a relationship with a child and sometimes with their wider family, gaining their trust and a position of power over the child in preparation for abuse.

Conduct, this relates to the way people conduct themselves or behave online.

The potential harms could include someone damaging their online reputation by, for example, sharing inappropriate images or cyberbullying others.

Commerce, these online harms are prevalent when people are buying and selling goods online.

Potential harms could include phishing scams, targeted advertising, or financial scams. Categorising potential online harms. It can be helpful to categorise the different online harms to understand the different types and when these might occur.

Knowing when these harms may potentially occur can support people in identifying, preventing, or managing the risk.

How well do you understand the four categories? Content, this means the things that you are looking at.

Contact, this means the people you're interacting with.

Conduct, the behaviour of people, including yourself.

And commerce, this means the things that you're buying.

Explain potential harms of being online.

Match the online threat to the appropriate category.

You see a pop-up on screen which shows a fruit machine and says you can win money if you match three lemons.

All you need to do is authorise a card payment to play.

Which category does that online threat fall into? Is it A, content, B, contact, C, conduct, or D, commerce? Pause the video to have a think.

The answer is D, commerce.

This online threat is using the powers of persuasion to get you to purchase something with your card.

Match the online threat to the appropriate category.

You've been talking to someone online for a while and they have said they'll buy you some trainers if you meet them after school.

Do you think that online threat belongs in category A, B, C, or D? A, content, B, contact, C, conduct, or D, commerce.

Pause the video and have a quick think.

The answer is B, contact.

In this online threat, an unknown stranger is trying to contact you with the lure of new trainers.

This could be potentially grooming.

Match the online threat to the appropriate category.

Your friend posts negative comments on an online forum about the teachers in their school.

Do you think this online threat fits in category A, content, B, contact, C, conduct, or D, commerce? Pause the video to have a think.

Well done, it's C, conduct.

In this online threat, your friend's behaviour could lead to a negative online reputation.

This could be for themselves or for their teacher.

Likewise, these comments will remain indefinitely as part of your friend's digital footprint.

It might have been in the best case for your friend not to have left those comments, especially if they were unfounded or unfair.

If your friend did have legitimate reasons to post negative comments, it may be better handled if they speak to the school directly and try to resolve them.

Match the online threat to the appropriate category.

When watching videos online, a suggestion comes up to watch a video encouraging young people to support a terrorist group.

What do you think, does this online threat fit into category A, content, B, contact C, conduct, or D, commerce? Pause the video and have a think.

Here, the answer is A, content.

I have a task here for you.

I'd like you to give it a try.

Explain potential harms of being online.

Consider Sam's point of view.

Sam says, "There's so many potential online harms. The internet is too dangerous to use." Do you agree or disagree with Sam? Create a short speech to express your opinions.

Use the prompts on the following slide to help you.

Speech prompts, I believe that.

Point 1: explanation and example.

Point 2: explanation and example.

Conclusion: use these speech prompts to agree or disagree with Sam's point.

Sam believes the internet is too harmful to use.

Pause the video to finish the task.

I'd like to give you some feedback.

Is the internet too dangerous to use? Lucas says, "I believe that Sam is incorrect." Point 1: You don't have to cope with all of the online harms at once.

Explanation: Thinking about all of the potential online harms that we have seen in this course could be overwhelming, but it doesn't have to be.

Example: You can think about the activity you're doing and which harms might be most likely to occur, then it's more manageable.

Point 2: The internet is a fantastic resource.

Explanation: Although we should be vigilant of the potential dangers online, the internet provides so many opportunities.

Example: Using the internet, I can order a takeaway and have it delivered to my house or keep in touch with my nan in Australia.

Conclusion: If people use the internet positively, then it's a good space.

It's only the people who use it negatively who cause issues.

If we protect ourselves as best we can, we can make use of the many opportunities the internet provides.

Fantastic, that brings us to the end of the first section, explaining potential harms of being online.

Let's move on to the second section, determine actions to protect myself online.

How do you use the internet? Consider all the different ways in which you currently use or would like to use the internet.

Pause the video to have a think.

How do you want to use the internet? You might use the internet to play games, to talk to friends, to read the news, to manage your bank account, to research school work, to shop, to connect with people on social media, to watch content.

What actions could you take to protect yourself online when doing each of these activities? Pause the video and have a quick think.

Playing games.

How can you protect yourself when playing games online? Pause the video and have a think.

Number one, check the privacy policy of games and apps that you download or sign up to.

Where possible, limit the information about you that is taken by a game.

Number three, do not connect with strangers when playing games online.

Connecting with people on social media.

How can you protect yourself when connecting with people on social media? Pause the video and have a quick think.

Number one, only connect with people you know.

Number two, only open attachments and links from communications if you're expecting them and trust the sender.

Never send personal or private information to people that you don't know or via an insecure communication channel.

Number four, where possible, encrypt your communications.

True or false? You should always open attachments you are sent on social media.

Pause the video and have a quick think.

Is that true or false? The answer's false.

Why is that? You should only open attachments and links from communications if you're expecting them and trust the sender.

Managing a bank account.

How can you protect yourself when managing a bank account? Pause the video and have a quick think.

Number one, only sign into your account when using a secure connection.

Number two, never give your details or password to anyone, especially not in response to an email request.

Number three, verify that any communications from your bank are legitimate.

Reading the news.

How can you protect yourself when reading the news? Pause the video and have a quick think.

Number one, use independent and accredited news sources instead of getting the news via social media.

Number two, verify the story is accurate by researching its author and checking for conflicts of interest, especially if the story appeals to your existing beliefs and feelings.

Number three, reverse image search photos to check if they have been edited.

Number four, use privacy-preserving search engines and technologies to hide your identity and prevent data being collected on your behaviour.

Reading the news.

Number five, get a balanced view by looking for competing perspectives to the ones presented in the stories you have read.

Researching school work.

How can you protect yourself when researching school work? Number one, use privacy-preserving search engines to hide your search history and prevent your results being altered by bubble-creating algorithms. Number two, use safe search and similar tools to protect yourself from obscene content when exploring new websites.

Number three, delete your cookies or deny websites the right to collect cookies when you visit them.

Number four, use an ad blocker.

Researching school work.

I have some missing words here, and I'd like you to fill in the blanks.

Number one, use blank search engines to hide your search history and prevent your results being altered by blank algorithms. Number two, use safe search and similar tools to blank yourself from obscene content when exploring new websites.

Number three, delete your blank or deny websites the right to collect them when you visit websites.

Use the words here in blue, cookies, bubble-creating, protect, and privacy-preserving, to fill in the blanks.

Pause the video to finish the task.

Let's check the answers.

Use privacy-preserving search engines to hide your search history and prevent your results being altered by bubble-creating algorithms. Use safe search and similar tools to protect yourself from obscene content when exploring new websites.

Delete your cookies or deny websites the right to collect them when you visit websites.

Shopping.

How can you protect yourself when shopping? Pause the video to have a think.

Number one, only shop online when using a secure connection.

Use privacy-preserving search engines to look for products and deny websites the right to collect cookies to stop information being recorded about your purchases.

Talking to friends.

How can you protect yourself when talking to friends? Pause the video to have a think.

Number one, use messaging services that do not read your messages, mine them for data, or record and sell your conversations.

Number two, never send information that could damage your online reputation to someone that you don't trust.

Number three, never communicate with someone if you cannot verify their identity.

I've got a task here for you.

I've got some missing words, and I'd like you to fill in the blanks.

Talking to friends.

Number one, use the blank services that do not read your messages, mine them for data, or record and sell your conversations.

Number two, never send information that could blank your online reputation to someone that you don't trust.

Number three, never blank with someone if you cannot blank their blank.

Use the words in blue, identity, damage, verify, messaging, and communicate, to fill in the blanks.

Pause the video to finish the task.

Let's check the answers.

Use messaging services that do not read your messages, mine them for data, or record and sell your conversations.

Number two, never send information that could damage your online reputation to someone that you don't trust.

Number three, never communicate with someone if you cannot verify their identity.

Watching content.

How can you protect yourself when watching content? Pause the video to have a think.

Number one, don't stream content illegally.

Number two, only stream and, especially, download content on a secure connection.

Well done.

I've got a task here for you.

Determine actions to protect myself online.

Protecting yourself online.

Number one, create a leaflet to support someone in taking actions to protect themselves against online harms. Number two, share your leaflet with someone else.

Have they learned something they didn't know before? Pause the video to finish the task.

I'd like to give you some feedback.

Create a leaflet to support someone in taking actions to protect themselves against online harms. This is Sam.

And this is Sam's leaflet.

The title is "protect yourself online." Sam says, "Never stream content illegally.

Only download content on a secure connection.

Do a reverse image search to check if photos have been edited." Number two, share your leaflet with someone else.

Have they learned something they didn't know before? Jacob said, "I've done reverse image searches in the past, but I wouldn't have thought of doing one to find out whether an image was part of a fake news article.

I'll add that to my online safety toolkit!" Fantastic, that brings us to the end of today's lesson.

Let's summarise.

"Protecting myself online." Being online poses a number of risks.

These risks can be categorised into content, contact, conduct, and commerce.

These risks can be reduced and mitigated by a user's actions and behaviour.

Online safety is about taking practical steps to protect yourself online.

For example, when talking online to friends, you should never send information that may damage your online reputation or communicate with someone if you cannot verify their identity.

Fantastic.

You've done really well in this unit.