Family Feud. Family Feud Example dkgS0wfJlBY&feature=fvst.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Part I: Making Good Online Choices
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
What is identity theft, and how can you protect yourself from it?
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Financial Know-How for College Students Presented by Noel Brock.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How To Protect Your Privacy and Avoid Identity Theft Online.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
PRIVACY BOOTCAMP YpJU.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Consumer Protection Shop Safely and Guard Your Financial Information.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Facebook privacy policy
Attention Identity theft Definition
Personal spaces.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Protecting Your Identity:
Working with Google Applications Gmail, a popular
Lesson 2- Protecting Yourself Online
Lesson 2- Protecting Yourself Online
What devices use the internet?
Presentation transcript:

Family Feud

Family Feud Example dkgS0wfJlBY&feature=fvst

Family Feud Rules Face-off to see who can guess the highest ranked answer Face-off winner’s team get to guess all the answers Each round is worth $10*number of answers If a team gets all the answers, they win the money. If they get three wrong the other team can steal.

Name Private information you might reveal online 2 Location Financial everythingBirthday/age X

Lock Evidence that your information will be encrypted 2 Asks for password https 3 1 X

McAfee A website that is trustworthy 2 Yahoo Google twitter msnMy Bank X

spyware A website that is malicious 2 porn Facebook 3 1 X

Change password A way to avoid being a victim of identity theft 2 Don’t give out SSN Delete unwanted s Stay offline X

DNS failure Reasons for “certificate” errors 2 Self-signed hackingNo idea 3 41 X

address Information that is automatically sent to every website I visit 2 Browser type don’t know everythingIp address X

Don’t know An online ad company 2 google1 X

Behavioral economics “There are areas of life in which people seem to display less than perfect rationality” (Loewenstein et al, 2008):  Personal Finances  Privacy online and on mobile devices G. F. Loweinstein and E.C. Haisley. The foundations of Positive and Normative Economics, chapter 9. Oxford University Press, 2008.

Private Information You might Reveal Online Location Name Marital status Sex orientation Gender Finances Zip Code Credit card Address Phone everything Birthday + State = SSN (Acquisti 2009)

OKCupid Discussion Board

Behavioral economics and privacy decision making  Imperfect or asymmetrical information  Biases  Default bias  Hyperbolic discounting  Bounded Rationality

Imperfect Information

Default Bias Organ Donation Retirement (Thaler 2008) Facebook – 69% had changed default settings (Debatin 2009)

Bounded Rationality Calculating carbon emissions Friends of friends

Hyperbolic Time Discounting Benefits now – costs later Donuts and smoking Clicking through warnings Installing apps on Droid

Bib J. Tsai, P. Kelley, L. Cranor, and N. Sadeh, “Location ‐ Sharing Technologies: Privacy Risks and Controls." Telecommunications Policy Research Conference (TPRC). A. Acquisti and R. Gross, “Predicting Social Security Numbers From Public Data.” Proceedings Of The National Academy Of Science, 106(27), What Can Behavioral Economics Teach Us About Privacy? Alessandro Acquisti and Jens Grossklags Thaler and Sunstien Nudge Improving Decisions about Health Wealth and Happiness