Identifying People With Data

Slides:



Advertisements
Similar presentations
Nash- AP Chemistry Chemistry Podcasting- what is it and why? I want to explain what you should expect and how things will work this year.
Advertisements

Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
CS 174: Web Programming November 25 Class Meeting Department of Computer Science San Jose State University Fall 2015 Instructor: Ron Mak
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
We’ll be spending a few minutes talking about Quiz 2 on Sections that you’ll be taking the next class session, before you work on Practice Quiz.
Data Collection for Final Project Exploring Computer Science Lesson 5-3.
Acumen Usability Study Conducted January 2012 Amanda Presnell.
Asking the right questions to stimulate students’ minds.
2017 AP® Preadministration Session
AP CSP: Identifying People with Data and The Cost of Free
Unit 2 Lesson 7 Introduction to Data.
AP CSP: Data and Trends.
Reading and Writing to Succeed on the EAS (Educating All Students) Exam: Beating the Clock & Answering the Question A Student Workshop by Writing Across.
Student Orientation Fall 2016.
Hidden Slide for Instructor
JavaScript/ App Lab Programming:
Plagiarism and the IWU Student
Canvas and Arrays in Apps
AP CSP: Cleaning Data & Creating Summary Tables
Day 34- Identifying People With Data The Cost of Free
AP CSP: The Need for Programming Languages and Algorithms
Practice PT - Big Data and Cybersecurity Dilemmas
The Cost of Free Lesson 4-4.
Finding Trends with Visualizations
Take the Survey.
Functions and Top-Down Design
Lesson 5-2 AP Computer Science Principles
The Sherwood High School Counseling Center
Data Collection and Problem Solving
Student Orientation Fall 2016.
UNIT 4 – THE COST OF FREE LESSON 4.
The Need for Programming Languages
The Need for Algorithms 2 days
Good and Bad Data Visualizations
Rapid Research - Data Innovations
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
UNIT 2 – CHAPTER 2 – LESSON 7 Introduction to Data.
Unit 1 Lesson 2 Scientific Knowledge
Lesson 2-9 AP Computer Science Principles
Exploring Computer Science Lesson 5-2
We’ll be spending minutes talking about Quiz 1 that you’ll be taking at the next class session before you take the Gateway Quiz today.
We’ll be spending a few minutes talking about Quiz 2 on Sections that you’ll be taking the next class session, before you work on Practice Quiz.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Research participation program
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
Do Now It is important that we take responsibility for our health. Shields have been used as protective devices for centuries. At each table, there.
Digital Portfolio Go to Digital Portfolio: Click on OVERVIEW
Evaluating Information
Big Data on the Web News Gathering.
Lesson 16: Functions with Return Values
UNIT 4 – Identifying People With Data
Today’s goals Conduct media presentations.
DAY 1 - Explore - AP Performance Task Prep
4th Grade Homework Required: 20 minutes of independent reading or studying nightly. (RAZ-Kids and Study Island are excellent resources to be used.)
SEVEN STRATEGIES FOR IMPROVING TEST PERFORMANCE
Finding Trends with Visualizations
Understanding the Features of a Web Site
UNIT 4 – THE COST OF FREE LESSON 6.
Lesson 3, I’m Going to College
Web Logs: A Positive Approach to Blogging
UNIT 4 – Identifying People With Data
Rapid Research - Format Showdown
Global 9 History Mr. Meetze
Unit 1 Lesson 2 Scientific Knowledge
Introduction to Plagiarism (9th Grade)
IT and Society Week 2: Privacy.
CREATING A BLOG ON BLOGGER
Exploring the Instructional Shifts Inherent in the 2020 CAS
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Identifying People With Data Lesson 4-3 – AP Computer Science Principles

Objectives Students will be able to: Explain privacy concerns that arise through the mass collection of data Use online search tools to find and connect information about a person or topic of interest. Explain how multiple sources of data can be combined in order to uncover new knowledge or information. Analyze the personal privacy and security concerns that arise with any use of computational systems.

World’s Biggest Data Breaches Go to the home section for today and click on the World’s Biggest Data Breaches Visualization Spend a couple minutes browsing through the different breaches there. Make a few notes about the following questions: What kind of data is being lost? And how much? What kinds of issues could arise from this data getting into the wrong hands?

Data Security We’ve spent a lot of time looking at potential benefits of collecting and analyzing data. As we’ve already seen today, however, there are some risks associated with collecting all of this information. If it falls into the wrong hands or is used in ways we didn’t intend, there may be serious risks imposed on our privacy or security. We’re going to start looking more deeply at this problem.

Data Privacy Lab: How easily can you be identified? In the data breaches we just looked at, some fairly important pieces of information were stolen. Credit card numbers, passport information, or government security clearances are obviously not something we’d like to fall into the wrong hands. Other pieces of information, however, don’t seem that bad. So what if people know your ZIP code? So what if people know your birthday? This is information we usually share without a second thought.

How unique are you? Go to the Data Privacy Lab - Web Site (link in the homework section on in Code Studio). Type in your information (birthday, ZIP code, and gender) to determine how many other people share those characteristics. How unique are you?

Think about it… Why is it significant that you are one of only a few people with your birthday, gender, and ZIP code? What concerns does this raise?

Think about it… What information were you able to find about yourself? Were you able to make connections in the data you collected to figure out anything else? Were you concerned about anything you were able to find?

Activity Guide - Research Yourself Complete the activity guide. If the CPS blocks are preventing you then please use your cell phone to do some of the searches. You have just 15 minutes to complete this.