B2 The Art of Privacy in The Digital Age TV
B2 The Art of Privacy in The Digital Age TV
Privacy in the
Digital Age
Agree or disagree
Read the statements below and agree or diagree with them. Explain your answer.
People who have nothing to hide should not worry about online privacy.
Children under the age of 13 should be prohibited from using social media due
to privacy concerns.
The use of real names should be mandatory on all social media platforms to prevent
anonymity and potential harm.
Employers have the right to monitor their employees' online activities during work
hours.
Match the highlighted words and phrases with their meanings. Write the corresponding numbers in the boxes.
a)protecting systems/ programs c)converting information or d) giving out too much personal e)security measure with 2
b)online harassment
from digital attacks data into a secret code information methods of validation
f)barriers that block g)unauthorized access to h)malicious software designed i)rules about how a website will j)an attempt to trick smb into
unauthorized access confidential data to cause damage store or get information giving information online
answers
Answer the question above. If you are not sure, try to guess. Then, read the text below and check if you were right.
In the digital era, everyone leaves behind a 'digital footprint', a trail of data we create while using the Internet. This footprint can reveal a surprising amount of
information about our behaviors, preferences, and even our identities. It's a double-edged sword: while it can provide us with personalized experiences, it can also leave
us vulnerable to threats like (1)cyberbullying and (2)data breaches.
Why is our digital footprint important? Firstly, it's valuable to marketers and businesses who use this data to provide personalized content and advertising. But perhaps
more critically, a poorly managed digital footprint can expose us to (3)cybersecurity threats. Criminals can use information obtained from (4)oversharing on social
media, for example, to launch (5)phishing attacks or install (6)malware.
How do we create our digital footprints? Every time we visit a website, make an online purchase, or post on social media, we're adding to our digital footprint. Even
something as seemingly harmless as accepting a website's (7)cookie policy can contribute to our footprint, as cookies can track our online activities.
Who might need to consider their digital footprint? The simple answer is: everyone. Whether you're an individual protecting yourself from identity theft, a company
guarding against data breaches, or a public figure maintaining a reputation, managing your digital footprint is critical.
To secure our digital footprint, there are several measures we can take. Using privacy settings on social media can limit who sees our information. Employing
(8)firewalls and (9)encryption can protect our data from unauthorized access. (10)Two-factor authentication provides an extra layer of security for our online accounts.
Understanding the privacy policy of any site or service we use is also crucial to know how our data is collected and used.
In the digital age, awareness of our digital footprint and knowledge of cybersecurity is no longer optional – it's essential. We must all become experienced at managing
and protecting our digital footprints to ensure our privacy and security in an increasingly connected world.
Match the highlighted words and phrases with their meanings. Write the corresponding numbers in the boxes.
a)protecting systems/ programs c)converting information or d) giving out too much personal e)security measure with 2
b)online harassment
3 from digital attacks 1 9 data into a secret code 4 information methods of validation
10
f)barriers that block g)unauthorized access to h)malicious software designed i)rules about how a website will j)an attempt to trick smb into
8 unauthorized access 2 confidential data 6 to cause damage 7 store or get information 5 giving information online
Let's practice!
Fill in the gaps with the words on the left.
Based on your current knowledge and understanding, do you think a smart city would have more positive or negative impacts on our daily life?
What aspects of your life do you predict might change the most and why?
1.far-fetched a)modify
2.adjust b)minor
3.reassured c)unlikely
4.negligible d)comforted
1.sound a)reassured
2.adjust b)crime rate
3.feel c)far-fetched
4.negligible d)the climate
ANSWERS
1.Answer the questions below. After completing tasks 2-3, watch the video and check if any of your ideas are mentioned.
Based on your current knowledge and understanding, do you think a smart city would have more positive or negative impacts on our daily life?
What aspects of your life do you predict might change the most and why?
1.far-fetched c)unlikely
2.adjust a)modify
3.reassured d)comforted
4.negligible b)minor
1.sound c)far-fetched
2.adjust d)the climate
3.feel a)reassured
If you had control over what data the smart How do you think crime would
city collected about you, what would you change in a smart city? Would there
allow and what would you prohibit? be new types of crimes?
In the year 2075, privacy had become the world's rarest commodity.
Can be done in class or
assigned for homework.
sample story
Read the first sentence of the story. Take turns adding a sentence to continue the story.
Once the story is complete, engage in a class discussion about what the story suggests about the future of privacy.
In the year 2075, privacy had become the world's rarest commodity.
Can be done in class or
assigned for homework.
An artificial intelligence system called 'The Overseer' saw and recorded everything.
Everyone's lives, thoughts, and actions were open to this system. For some, the
convenience and safety it provided were a fair trade-off. It could tell you if you were
getting sick or if an accident was about to happen. But it also knew every secret.
Every person's life was like an open book, continuously read and analyzed. Private
conversations were a thing of the past. But a small group of people, known as 'The
Shadows,' chose a different life. They lived away from this system, in hidden places.
They used old technologies to avoid detection, and they communicated using paper
messages. They moved around quietly, usually when it was dark, to stay unnoticed.
Their goal was to get back the privacy that people had lost. It was a dangerous life.
'The Overseer' was always searching for them. But they kept going, hoping to bring
back the freedom that everyone used to have.
extra task
Let's have fun! Can you solve the rebuses below?
answers
Let's have fun! Can you solve the rebuses below?
authentication
encryption
firewall
phishing attack
malware
extra tasks
1, Fill in the gaps in the dialogue with the words about privacy from today's lesson. 2. Record a podcast
Lucy: Did you know there's a lot of ______(1: cyberbullying) happening on social
Using a recording tool on your phone or computer,
media now?
record a short, 5-10 minute "podcast episode" about
Mark: Yes, I think it's because people are ______(2: oversharing) their personal stuff
the importance of digital privacy and the potential
online and they don't realize how risky it can be.
dangers of oversharing on social media. Use as many
Lucy: Exactly, we need to be careful with our _______(3: cybersecurity). Oh, did you
hear about those _______(4: data breaches) at that other company? of the vocabulary words as you can. Listen to the
Mark: Yeah, it's kind of scary how many businesses get attacked. It shows how recording and critique your own language use,
important it is to have good _______(5: firewalls) and strong _______(6: encryption) pronunciation, and fluency.
to protect our information.
Lucy: And we, as individuals, need to watch out too. We need to avoid _______(7:
phishing attacks) and be careful not to download any _______(8: malware).
Mark: Absolutely. And we should understand what _______(9: cookie policies) are,
so we know what data websites are collecting from us.
Lucy: Plus, using _______(10: two-factor authentication) can really help to keep our
accounts safe.
Mark: I completely agree. We just need to be aware and proactive about our online
safety.
quizlet