0% found this document useful (0 votes)
282 views20 pages

B2 The Art of Privacy in The Digital Age TV

Lesson for teachers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
282 views20 pages

B2 The Art of Privacy in The Digital Age TV

Lesson for teachers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

The Art of

Privacy in the
Digital Age
Agree or disagree
Read the statements below and agree or diagree with them. Explain your answer.

People who have nothing to hide should not worry about online privacy.

Children under the age of 13 should be prohibited from using social media due
to privacy concerns.

Oversharing personal information on social media platforms is harmless fun.

The use of real names should be mandatory on all social media platforms to prevent
anonymity and potential harm.

Deleting a post or comment erases it completely from your digital history.

Employers have the right to monitor their employees' online activities during work
hours.

Artificial Intelligence (AI) poses a significant threat to personal privacy.


What is a digital footprint?
Answer the question above. If you are not sure, try to guess. Then, read the text below and check if you were right.
In the digital era, everyone leaves behind a 'digital footprint', a trail of data we create while using the Internet. This footprint can reveal a surprising amount of
information about our behaviors, preferences, and even our identities. It's a double-edged sword: while it can provide us with personalized experiences, it can also leave
us vulnerable to threats like (1)cyberbullying and (2)data breaches.
Why is our digital footprint important? Firstly, it's valuable to marketers and businesses who use this data to provide personalized content and advertising. But perhaps
more critically, a poorly managed digital footprint can expose us to (3)cybersecurity threats. Criminals can use information obtained from (4)oversharing on social
media, for example, to launch (5)phishing attacks or install (6)malware.
How do we create our digital footprints? Every time we visit a website, make an online purchase, or post on social media, we're adding to our digital footprint. Even
something as seemingly harmless as accepting a website's (7)cookie policy can contribute to our footprint, as cookies can track our online activities.
Who might need to consider their digital footprint? The simple answer is: everyone. Whether you're an individual protecting yourself from identity theft, a company
guarding against data breaches, or a public figure maintaining a reputation, managing your digital footprint is critical.
To secure our digital footprint, there are several measures we can take. Using privacy settings on social media can limit who sees our information. Employing
(8)firewalls and (9)encryption can protect our data from unauthorized access. (10)Two-factor authentication provides an extra layer of security for our online accounts.
Understanding the privacy policy of any site or service we use is also crucial to know how our data is collected and used.
In the digital age, awareness of our digital footprint and knowledge of cybersecurity is no longer optional – it's essential. We must all become experienced at managing
and protecting our digital footprints to ensure our privacy and security in an increasingly connected world.

Match the highlighted words and phrases with their meanings. Write the corresponding numbers in the boxes.
a)protecting systems/ programs c)converting information or d) giving out too much personal e)security measure with 2
b)online harassment
from digital attacks data into a secret code information methods of validation

f)barriers that block g)unauthorized access to h)malicious software designed i)rules about how a website will j)an attempt to trick smb into
unauthorized access confidential data to cause damage store or get information giving information online
answers
Answer the question above. If you are not sure, try to guess. Then, read the text below and check if you were right.
In the digital era, everyone leaves behind a 'digital footprint', a trail of data we create while using the Internet. This footprint can reveal a surprising amount of
information about our behaviors, preferences, and even our identities. It's a double-edged sword: while it can provide us with personalized experiences, it can also leave
us vulnerable to threats like (1)cyberbullying and (2)data breaches.
Why is our digital footprint important? Firstly, it's valuable to marketers and businesses who use this data to provide personalized content and advertising. But perhaps
more critically, a poorly managed digital footprint can expose us to (3)cybersecurity threats. Criminals can use information obtained from (4)oversharing on social
media, for example, to launch (5)phishing attacks or install (6)malware.
How do we create our digital footprints? Every time we visit a website, make an online purchase, or post on social media, we're adding to our digital footprint. Even
something as seemingly harmless as accepting a website's (7)cookie policy can contribute to our footprint, as cookies can track our online activities.
Who might need to consider their digital footprint? The simple answer is: everyone. Whether you're an individual protecting yourself from identity theft, a company
guarding against data breaches, or a public figure maintaining a reputation, managing your digital footprint is critical.
To secure our digital footprint, there are several measures we can take. Using privacy settings on social media can limit who sees our information. Employing
(8)firewalls and (9)encryption can protect our data from unauthorized access. (10)Two-factor authentication provides an extra layer of security for our online accounts.
Understanding the privacy policy of any site or service we use is also crucial to know how our data is collected and used.
In the digital age, awareness of our digital footprint and knowledge of cybersecurity is no longer optional – it's essential. We must all become experienced at managing
and protecting our digital footprints to ensure our privacy and security in an increasingly connected world.

Match the highlighted words and phrases with their meanings. Write the corresponding numbers in the boxes.
a)protecting systems/ programs c)converting information or d) giving out too much personal e)security measure with 2
b)online harassment
3 from digital attacks 1 9 data into a secret code 4 information methods of validation
10
f)barriers that block g)unauthorized access to h)malicious software designed i)rules about how a website will j)an attempt to trick smb into
8 unauthorized access 2 confidential data 6 to cause damage 7 store or get information 5 giving information online
Let's practice!
Fill in the gaps with the words on the left.

cyberbullying data breaches


1. ______________________ provides an additional layer of security by requiring two types of
identification before granting access to an online account.
cybersecurity oversharing 2. One must be careful about ______________________ on social media as it can expose personal
information to cybercriminals.
phishing attacks malware 3. Every website has a ______________________ which dictates how the site will use, save, and disclose
the information collected from the visitors.
cookie policy firewalls 4. ______________________ are network security systems that monitor and control incoming and
outgoing network traffic based on predetermined security rules.
encryption two-factor authentication 5. ______________________ is a serious problem on social media platforms where people are harassed
or threatened by others.
6. ______________________ is the process of converting plaintext into an encoded version that can only
be decoded by another party if they have access to the decryption key.
7. With increasing online threats, every company needs to invest in ______________________ to protect
its network and data.
8. ______________________ are deceptive attempts to steal sensitive information like usernames,
passwords, and credit card details by pretending to be a trustworthy entity.
9. Many companies fear ______________________ because they can lead to loss of sensitive data and
harm their reputation.
10. Using strong antivirus software can help detect and remove _________, thus protecting your
computer and personal information from potential harm.
ANSWERS
Fill in the gaps with the words on the left.

cyberbullying data breaches


1. Two-factor authentication provides an additional layer of security by requiring two types of
identification before granting access to an online account.
cybersecurity oversharing 2. One must be careful about oversharing on social media as it can expose personal information to
cybercriminals.
phishing attacks malware 3. Every website has a cookie policy which dictates how the site will use, save, and disclose the
information collected from the visitors.
cookie policy firewalls 4. Firewalls are network security systems that monitor and control incoming and outgoing network
traffic based on predetermined security rules.
encryption two-factor authentication 5. Cyberbullying is a serious problem on social media platforms where people are harassed or
threatened by others.
6. Encryption is the process of converting plaintext into an encoded version that can only be decoded by
another party if they have access to the decryption key.
7. With increasing online threats, every company needs to invest in cybersecurity to protect its network
and data.
8. Phishing attacks are deceptive attempts to steal sensitive information like usernames, passwords,
and credit card details by pretending to be a trustworthy entity.
9. Many companies fear data breaches because they can lead to loss of sensitive data and harm their
reputation.
10. Using strong antivirus software can help detect and remove malware, thus protecting your computer
and personal information from potential harm.
let's discuss!
What measures have you taken to
What type of information do
protect your digital footprint? Are you
you think your digital footprint
using 'privacy settings', 'firewalls', or
reveals about you?
'two-factor authentication'?

Can you describe a situation when


How often do you read the 'privacy
personalized content or advertising,
policy' of the websites or services you
resulting from your digital footprint, was
use? Is it important to do so?
beneficial/annoying?

Why should everyone, How do you balance the benefits of the


regardless of their role or digital age, like convenience and
status, be concerned about connectivity, with the need to protect
their digital footprint? your digital privacy and security?
digital detective
As a digital detective, your task is to use the clues below to create a profile of the mystery individual.

Browser History: Most Frequently Used Apps: Most Visited Websites:


Amazon (books on gardening) Spotify (Acoustic Guitar playlist) Facebook (part of gardening groups)
YouTube (how to play the guitar videos) UberEats (vegetarian restaurants in San Coursera (enrolled in a Spanish language
BBC News (Science & Environment section) Francisco) course)
Weather.com (daily weather updates for Duolingo (learning Spanish) Gmail (subscribed to newsletters about
San Francisco) Headspace (meditation app) environmental issues)
WebMD (searches about plant-based diets) Google Calendar (scheduled gardening
activities and guitar lessons)

Now, based on this digital footprint, answer the following:


What hobbies does this person likely have?
Where might this person live?
What is their probable diet preference?
What could be their environmental interests?
What languages might they speak or be learning?
After analyzing, discuss the following:
How accurate do you think this profile is and why?
How do you feel about the amount of information you were able to gather based on someone's digital footprint?
possible answers
As a digital detective, your task is to use the clues below to create a profile of the mystery individual.

Browser History: Most Frequently Used Apps: Most Visited Websites:


Amazon (books on gardening) Spotify (Acoustic Guitar playlist) Facebook (part of gardening groups)
YouTube (how to play the guitar videos) UberEats (vegetarian restaurants in San Coursera (enrolled in a Spanish language
BBC News (Science & Environment section) Francisco) course)
Weather.com (daily weather updates for Duolingo (learning Spanish) Gmail (subscribed to newsletters about
San Francisco) Headspace (meditation app) environmental issues)
WebMD (searches about plant-based diets) Google Calendar (scheduled gardening
activities and guitar lessons)

Now, based on this digital footprint, answer the following:


What hobbies does this person likely have? Gardening and playing the guitar seem to be the person's hobbies as indicated by their browser history and the apps
they frequently use.
Where might this person live? The person likely lives in San Francisco, as indicated by their weather updates and food delivery app.
What is their probable diet preference? The person likely follows a vegetarian or plant-based diet, as shown by their WebMD searches and UberEats preferences.
What could be their environmental interests? The person seems to be interested in environmental issues, as suggested by their news preferences and newsletter
subscriptions.
What languages might they speak or be learning? The person could be learning Spanish, as suggested by their use of Duolingo and enrollment in a Spanish
language course on Coursera.
the city that knows everything about you
1.Answer the questions below. After completing tasks 2-3, watch the video and check if any of your ideas are mentioned.

Based on your current knowledge and understanding, do you think a smart city would have more positive or negative impacts on our daily life?
What aspects of your life do you predict might change the most and why?

2.Match the words with their synonyms.

1.far-fetched a)modify
2.adjust b)minor
3.reassured c)unlikely
4.negligible d)comforted

3.Match the halves of the phrases.

1.sound a)reassured
2.adjust b)crime rate
3.feel c)far-fetched
4.negligible d)the climate
ANSWERS
1.Answer the questions below. After completing tasks 2-3, watch the video and check if any of your ideas are mentioned.

Based on your current knowledge and understanding, do you think a smart city would have more positive or negative impacts on our daily life?
What aspects of your life do you predict might change the most and why?

1.C. 2.A. 3.D. 4.B

1.far-fetched c)unlikely

2.adjust a)modify
3.reassured d)comforted
4.negligible b)minor

1.C. 2.D. 3.A. 4.B

1.sound c)far-fetched
2.adjust d)the climate
3.feel a)reassured

4.negligible b)crime rate


let's discuss!
The video mentions the potential for
Which aspects of the smart city are
misuse of personal data. Can you think of
most appealing to you, and why?
any other potential risks of living in a
smart city?

If you had control over what data the smart How do you think crime would
city collected about you, what would you change in a smart city? Would there
allow and what would you prohibit? be new types of crimes?

If you could trade some of your privacy for


The video discusses the trade-off
improved convenience (never having to
between convenience and privacy in a
remember a password again or having
smart city. Which do you think is more
your coffee ready the moment you walk
important, and why?
into a café), would you?
Dystopian Future Storytelling
Read the first sentence of the story. Take turns adding a sentence to continue the story.
Once the story is complete, engage in a class discussion about what the story suggests about the future of privacy.

In the year 2075, privacy had become the world's rarest commodity.
Can be done in class or
assigned for homework.
sample story
Read the first sentence of the story. Take turns adding a sentence to continue the story.
Once the story is complete, engage in a class discussion about what the story suggests about the future of privacy.

In the year 2075, privacy had become the world's rarest commodity.
Can be done in class or
assigned for homework.
An artificial intelligence system called 'The Overseer' saw and recorded everything.
Everyone's lives, thoughts, and actions were open to this system. For some, the
convenience and safety it provided were a fair trade-off. It could tell you if you were
getting sick or if an accident was about to happen. But it also knew every secret.

Every person's life was like an open book, continuously read and analyzed. Private
conversations were a thing of the past. But a small group of people, known as 'The
Shadows,' chose a different life. They lived away from this system, in hidden places.
They used old technologies to avoid detection, and they communicated using paper
messages. They moved around quietly, usually when it was dark, to stay unnoticed.

Their goal was to get back the privacy that people had lost. It was a dangerous life.
'The Overseer' was always searching for them. But they kept going, hoping to bring
back the freedom that everyone used to have.
extra task
Let's have fun! Can you solve the rebuses below?
answers
Let's have fun! Can you solve the rebuses below?

authentication

encryption

firewall

phishing attack

malware
extra tasks
1, Fill in the gaps in the dialogue with the words about privacy from today's lesson. 2. Record a podcast

Lucy: Did you know there's a lot of _____________________ happening on social


Using a recording tool on your phone or computer,
media now?
record a short, 5-10 minute "podcast episode" about
Mark: Yes, I think it's because people are _____________________their personal
the importance of digital privacy and the potential
stuff online and they don't realize how risky it can be.
dangers of oversharing on social media. Use as many
Lucy: Exactly, we need to be careful with our _____________________. Oh, did you
hear about those _____________________ at that other company? of the vocabulary words as you can. Listen to the
Mark: Yeah, it's kind of scary how many businesses get attacked. It shows how recording and critique your own language use,
important it is to have good _____________________and strong pronunciation, and fluency.
_____________________ to protect our information.
Lucy: And we, as individuals, need to watch out too. We need to avoid
_____________________ and be careful not to download any
_____________________.
Mark: Absolutely. And we should understand what _____________________ are, so
we know what data websites are collecting from us.
Lucy: Plus, using _____________________can really help to keep our accounts safe.
Mark: I completely agree. We just need to be aware and proactive about our online
safety.
Answers
1, Fill in the gaps in the dialogue with the words about privacy from today's lesson. 2. Record a podcast

Lucy: Did you know there's a lot of ______(1: cyberbullying) happening on social
Using a recording tool on your phone or computer,
media now?
record a short, 5-10 minute "podcast episode" about
Mark: Yes, I think it's because people are ______(2: oversharing) their personal stuff
the importance of digital privacy and the potential
online and they don't realize how risky it can be.
dangers of oversharing on social media. Use as many
Lucy: Exactly, we need to be careful with our _______(3: cybersecurity). Oh, did you
hear about those _______(4: data breaches) at that other company? of the vocabulary words as you can. Listen to the
Mark: Yeah, it's kind of scary how many businesses get attacked. It shows how recording and critique your own language use,
important it is to have good _______(5: firewalls) and strong _______(6: encryption) pronunciation, and fluency.
to protect our information.
Lucy: And we, as individuals, need to watch out too. We need to avoid _______(7:
phishing attacks) and be careful not to download any _______(8: malware).
Mark: Absolutely. And we should understand what _______(9: cookie policies) are,
so we know what data websites are collecting from us.
Lucy: Plus, using _______(10: two-factor authentication) can really help to keep our
accounts safe.
Mark: I completely agree. We just need to be aware and proactive about our online
safety.
quizlet

Revise the words for the next lesson. Use this


Quizlet set. You can also play different games to
practice or even test yourself in the Quizlet app
or on the site.
THANK YOU!

You might also like