Month: July 2023 (Page 1 of 2)

Grading Criteria: Data Privacy, Cybersecurity, and Academic Integrity

  1. Knowledge Mastery (40 points):
    • Correctly defines fundamental concepts such as data privacy, academic integrity, etc., and explains their significance.
    • Lists and explains at least two important data protection regulations and two common cyber threats.
    • Demonstrates understanding of multi-factor authentication principles and applications, explaining its advantages.
    • Familiar with at least two appropriate academic writing citation methods and techniques to prevent plagiarism.
  2. Application and Understanding (30 points):
    • Applies data protection principles to propose best practices for personal data privacy and explains their impact.
    • Provides cybersecurity recommendations tailored to specific scenarios (e.g., cybersecurity for a small business).
    • Illustrates how to properly cite and avoid plagiarism in academic writing to uphold academic integrity.
  3. Analysis and Critical Thinking (20 points):
    • Analyzes the relationship between data privacy and academic integrity, explaining the impact of data privacy on academic research.
    • Analyzes and evaluates data privacy and cybersecurity issues in given contexts, offering reasonable solutions.
  4. Writing Expression (10 points):
    • Provides clear, concise answers to questions, with accurate expression, and free of grammar and spelling errors.
    • In the essay question, organizes the essay coherently, with a clear structure and well-supported arguments.

Total Score: 100 points

  • 90-100 points: Excellent, demonstrates comprehensive knowledge of the course content, with deep understanding and flexible application of knowledge.
  • 80-89 points: Good, shows a solid grasp of the course content, with reasonable application of knowledge.
  • 70-79 points: Average, demonstrates moderate understanding of the course content, needs to strengthen practice and comprehension.
  • 60-69 points: Pass, exhibits weak grasp of the course content, requires more learning and review.
  • 0-59 points: Fail, lacks sufficient understanding of the course content, needs comprehensive review and improvement.

Final Exam – Data Privacy, Cybersecurity, and Academic Integrity

  • Data privacy refers to:
    • a) Protecting digital devices from malware
    • b) Ensuring data is stored securely in the cloud
    • c) The right to control personal information
    • d) Using strong passwords for online accounts
  • Which of the following is NOT a key principle of data protection?
    • a) Purpose limitation
    • b) Data encryption
    • c) Data minimization
    • d) Data retention
  • Phishing is a type of cyber attack that involves:
    • a) Overloading a system with excessive traffic
    • b) Intercepting communication between two parties
    • c) Sending deceptive emails to trick users into revealing sensitive information d) Injecting malicious code into a web application
  • Multi-factor authentication (MFA) adds an extra layer of security beyond passwords by:
    • a) Encrypting data transmitted between the user and the server
    • b) Requesting multiple passwords for the same account
    • c) Verifying the user’s identity using multiple methods
    • d) Blocking access to an account after multiple failed login attempts
    • Proper citation and referencing in academic writing are important because they:
    • a) Make the writing more formal and sophisticated
    • b) Allow readers to verify the sources and build credibility
    • c) Add unnecessary length to the paper
    • d) Are required by all academic institutions without exception
  • Plagiarism in academic writing refers to:
    • a) Using strong and unique passwords for online accounts
    • b) Failing to properly cite and reference sources in the paper
    • c) Encrypting data to protect it from unauthorized access
    • d) Implementing multi-factor authentication for secure login
  • Which citation style is commonly used in the fields of social sciences, education, and psychology?
    • a) APA (American Psychological Association)
    • b) MLA (Modern Language Association)
    • c) Chicago
    • d) Harvard
  • The General Data Protection Regulation (GDPR) is a data protection regulation implemented in:
    • a) The United States
    • b) China
    • c) The European Union
    • d) Australia
  • The California Consumer Privacy Act (CCPA) is a data protection regulation implemented in:
    • a) California, USA
    • b) Canada
    • c) China
    • d) The European Union
  • A strong password should contain: a) A person’s name and birthdate b) A mix of upper and lower-case letters, numbers, and special characters c) Common words found in the dictionary d) The same characters repeated multiple times for length

inal Exam – Data Privacy, Cybersecurity, and Academic Integrity

Section 1: Data Privacy and Cybersecurity

  1. Define data privacy and explain its significance in the digital age.
  2. List three major data protection regulations and briefly describe one of them.
  3. What are the key principles of data protection? Provide examples of how these principles can be applied in real-life scenarios.
  4. Explain the value of personal data and the potential risks associated with data breaches.
  5. Discuss two best practices for data protection, and explain how they can enhance cybersecurity.
  6. What are the common types of cyber threats and attacks mentioned in the course? Provide a brief description of each.
  7. How does multi-factor authentication (MFA) enhance security beyond passwords? Give an example of an MFA method and its application.
  8. Describe the concept of phishing and its impact on individuals and organizations. How can individuals protect themselves from phishing attacks?

Section 2: Academic Integrity and Proper Citation

  1. Define academic integrity and explain its importance in research and academia.
  2. What are the consequences of academic dishonesty and plagiarism? How can students avoid academic cheating?
  3. Discuss the significance of proper citation and referencing in academic writing. Why is it essential to give credit to the original authors?
  4. Differentiate between direct quotes and paraphrasing. When and how should each be used in academic writing?
  5. Name two major citation styles used in academic writing (e.g., APA, MLA) and explain the differences between them.
  6. How can students avoid unintentional plagiarism when using external sources in their academic work?
  7. Why is academic integrity important in research and how does it contribute to the advancement of knowledge?

Section 3: Short Answer Questions

  1. Describe two best practices for protecting personal data online.
  2. What is the significance of having a strong, unique password for each online account?
  3. Provide three examples of cyber threats and briefly explain their potential impact.
  4. How does multi-factor authentication (MFA) work, and why is it considered more secure than single-factor authentication?
  5. Explain why it is crucial to properly cite and reference sources in academic writing.

Section 4: Critical Thinking

Imagine you are a cybersecurity consultant for a small business. The business owner wants to enhance data privacy and cybersecurity measures for their company. Provide three specific recommendations tailored to their needs, considering their budget and resources.

Section 5: Essay Question

In an essay of at least 300 words, discuss the intersection between data privacy and academic integrity. How does data privacy impact academic research, and why is academic integrity essential when handling sensitive data? Provide examples to support your arguments.

(Note: The final exam questions cover topics from the course, including data privacy, cybersecurity, academic integrity, and proper citation. The exam is designed to assess students’ understanding of the key concepts and principles presented in the course.)

  1. c) The right to control personal information

Reading Resources for Class6 Final(Course Review)

Course Review: Data Privacy, Cybersecurity, and Academic Integrity

This course was designed to provide students with a comprehensive understanding of data privacy, cybersecurity, and academic integrity. It aimed to equip participants with essential knowledge and skills to protect personal data, secure digital assets, and uphold ethical academic practices.

Key Concepts and Principles:

  1. Data Privacy and Protection: Students learned about the importance of personal data privacy and relevant regulations. They gained insights into data protection principles, individual rights, and the value of personal data. Best practices and tools for data protection, such as encryption, secure communication, and password management, were explored.
  2. Cybersecurity Lessons Learned: Students were introduced to various cyber threats and attacks, including malware, phishing, and DoS attacks. They learned about password security and the significance of using strong, unique passwords. Multi-factor authentication (MFA) principles and its applications were also discussed, enhancing security beyond passwords.
  3. Academic Integrity Principles: The course highlighted the fundamental principles of academic writing, including clarity, formal language, and proper organization. Students were educated on the importance of citing and referencing sources accurately to avoid plagiarism. The significance of academic integrity in research and academia was emphasized, along with the consequences of academic dishonesty.

Key Takeaways:

  1. Data Privacy and Cybersecurity: Students gained the knowledge and skills to protect personal data, recognize cyber threats, and implement data protection measures. They now understand the value of secure communication, encryption, strong passwords, and the importance of staying updated with security patches.
  2. Authentication and Identity Verification: Students learned about multi-factor authentication (MFA) as an additional layer of security and the various methods for user identity verification. They are aware of the importance of using MFA to prevent unauthorized access.
  3. Academic Integrity and Proper Citation: Students now understand the importance of academic integrity and ethical writing practices. They can properly cite and reference sources, avoiding academic cheating and plagiarism.

Course Conclusion:

This course has provided students with essential knowledge and skills in data privacy, cybersecurity, and academic integrity. Participants have gained insights into protecting personal data, securing digital assets, and implementing best practices for academic writing. By being mindful of cybersecurity threats and practicing academic integrity, students are better equipped to navigate the digital world responsibly and ethically.

Remember, the lessons learned in this course should be continuously applied and adapted to new challenges in an ever-evolving digital landscape. Upholding data privacy, implementing strong cybersecurity measures, and practicing academic integrity are essential for personal and professional success.

Reading Resources for Class5 Academic Writing and Citation Standards

Lecture 1: Importance of Personal Data Privacy and Relevant Regulations

In this lecture, we will discuss the significance of personal data privacy in the digital age and the relevant regulations that govern data protection.

  1. Defining Data Privacy: Explain what data privacy means and how it pertains to an individual’s right to control their personal information.
  2. Value of Personal Data: Discuss the value of personal data in the modern world, its potential misuse, and the risks associated with data breaches.
  3. Data Protection Regulations: Introduce major data protection regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).
  4. Key Principles of Data Protection: Explore the core principles of data protection, including consent, purpose limitation, data minimization, and data retention.
  5. Individual Rights: Discuss the rights individuals have regarding their personal data, such as the right to access, rectification, and erasure.

Lecture 2: Best Practices and Tools for Data Protection

In this lecture, we will explore best practices and tools that individuals and organizations can employ to safeguard personal data.

  1. Data Encryption: Explain the concept of data encryption and how it can protect sensitive information from unauthorized access.
  2. Secure Communication: Discuss the importance of using secure communication channels, such as HTTPS, to prevent data interception.
  3. Password Management: Introduce the use of strong, unique passwords and password managers to enhance data security.
  4. Two-Factor Authentication (2FA): Highlight the benefits of 2FA in adding an extra layer of protection to online accounts.
  5. Regular Software Updates: Stress the significance of keeping software and applications up to date to patch known vulnerabilities.

Lecture 3: Significance of Privacy Protection at an Individual and Organizational Level

In this lecture, we will emphasize the importance of prioritizing data privacy and protection both as individuals and organizations.

  1. Individual Responsibility: Encourage individuals to be vigilant about their own data privacy, including being cautious about sharing personal information online.
  2. Privacy Policies: Explain the significance of reviewing and understanding privacy policies before providing personal data to organizations.
  3. Data Protection in Organizations: Discuss the responsibility of organizations in protecting customer data, employee data, and other sensitive information.
  4. Data Breach Preparedness: Emphasize the need for organizations to have data breach response plans in place to handle security incidents effectively.
  5. Employee Training: Introduce the importance of educating employees about data privacy best practices and the role they play in protecting sensitive data.

By the end of these lectures, participants should have a comprehensive understanding of the importance of data privacy and protection. They will be equipped with best practices and tools to safeguard personal data at both individual and organizational levels, ensuring a more secure digital environment for everyone involved.

Reference

https://crsreports.congress.gov/product/pdf/IF/IF11207

Reading Resources for Class4 Academic Writing and Citation Standards

Lecture 1: Fundamental Principles of Academic Writing

In this lecture, we will cover the fundamental principles and standards of academic writing to help students excel in their academic endeavors.

  1. Clarity and Precision: Stress the importance of clear and concise writing to effectively convey ideas and arguments.
  2. Formal Language: Encourage the use of formal language and academic tone to maintain professionalism in academic writing.
  3. Structure and Organization: Explain the significance of a well-structured essay or paper with an introduction, body paragraphs, and a conclusion.
  4. Thesis Statement: Guide students in crafting a strong and focused thesis statement that sets the direction for their work.
  5. Evidence and Analysis: Highlight the necessity of supporting claims with credible evidence and analyzing the information critically.
  6. Avoiding Bias: Discuss the importance of presenting a balanced perspective and avoiding biased language in academic writing.

Lecture 2: Importance of Proper Citation and Referencing

In this lecture, we will delve into the significance of proper citation and referencing in academic writing to acknowledge the contributions of others and avoid plagiarism.

  1. Academic Integrity: Emphasize that proper citation and referencing are essential components of academic integrity and ethical scholarship.
  2. Avoiding Plagiarism: Explain that citing sources correctly helps prevent unintentional plagiarism and demonstrates respect for intellectual property.
  3. Credibility and Verification: Discuss how accurate citations allow readers to verify the sources and build credibility for the author’s work.
  4. Building on Existing Knowledge: Illustrate how proper referencing allows writers to build upon existing research and contribute to the academic conversation.
  5. Academic Requirements: Introduce students to different citation styles (e.g., APA, MLA, Chicago) and their specific formatting guidelines.

Lecture 3: Identification and Avoidance of Academic Plagiarism

In this lecture, we will focus on detecting and avoiding academic plagiarism to maintain the integrity of one’s academic work.

  1. Understanding Plagiarism: Define plagiarism and its various forms, including direct copying, paraphrasing without attribution, and self-plagiarism.
  2. Using Citation Styles: Revisit different citation styles and demonstrate how to properly cite various types of sources (e.g., books, articles, websites).
  3. Quoting and Paraphrasing: Explain the difference between direct quotes and paraphrasing, and how to attribute ideas correctly.
  4. Plagiarism Checkers: Introduce plagiarism detection tools and discuss their role in self-assessment before submitting academic work.
  5. Tips for Avoiding Plagiarism: Provide practical tips for avoiding plagiarism, such as taking accurate notes, keeping track of sources, and seeking clarification from instructors when in doubt.
  6. Cultivating Good Writing Habits: Encourage students to develop good writing habits, plan their research and writing process well in advance, and seek feedback from peers and instructors.

By the end of these lectures, students should have a comprehensive understanding of academic writing principles, the importance of proper citation and referencing, and the significance of avoiding plagiarism. Equipped with this knowledge, they can produce well-structured and properly cited academic papers, demonstrating academic integrity and contributing to the scholarly community

Reference

Caulfield, J. (2022). Citation Styles Guide | Examples for all major styles. Scribbr. https://www.scribbr.com/citing-sources/citation-styles/

.

Reading Resources for Class3 Password Security and Identity Verification

Lecture 1: Creating and Managing Strong Passwords

In this lecture, we will focus on the importance of strong passwords and best practices for creating and managing them. A strong password is a critical defense against unauthorized access to accounts and sensitive information.

  1. Password Complexity: Encourage the use of passwords with a mix of upper and lower-case letters, numbers, and special characters to increase complexity.
  2. Password Length: Emphasize the significance of longer passwords, as they are generally more secure than short ones.
  3. Avoid Common Passwords: Discourage the use of easily guessable passwords such as “123456” or “password.”
  4. Unique Passwords: Stress the importance of using different passwords for different accounts to prevent a single breach compromising multiple accounts.
  5. Password Managers: Introduce password manager tools to securely store and generate strong, unique passwords for each account.
  6. Regular Password Updates: Encourage users to change their passwords periodically to minimize the risk of unauthorized access.
  7. Beware of Phishing: Remind users never to share their passwords through email or other non-secure channels, as this could be a phishing attempt.

Lecture 2: Multi-Factor Authentication (MFA)

In this lecture, we will explore the principles and applications of multi-factor authentication, an additional layer of security to protect accounts beyond passwords.

  1. What is MFA: Explain the concept of MFA, which involves using multiple methods of authentication to verify the user’s identity.
  2. Factors of Authentication: Introduce the three common factors: something you know (password), something you have (e.g., smartphone or token), and something you are (biometric data).
  3. Benefits of MFA: Highlight the advantages of MFA, including enhanced security and protection against unauthorized access.
  4. MFA Implementation: Discuss various MFA methods such as SMS codes, authenticator apps, hardware tokens, and biometric authentication.
  5. Adoption Challenges: Address potential challenges in implementing MFA, such as user resistance or compatibility issues.
  6. Selecting Appropriate MFA: Guide users on choosing the most suitable MFA method based on their needs and preferences.

Lecture 3: Preventing Password Leaks and Social Engineering Attacks

In this lecture, we will emphasize the significance of preventing password leaks and protecting against social engineering attacks.

  1. Password Hygiene: Reiterate the importance of strong passwords, using MFA, and not sharing passwords.
  2. Monitoring Account Activity: Encourage users to regularly review their account activity and enable account notifications for suspicious logins.
  3. Beware of Phishing and Social Engineering: Educate users about common social engineering tactics used to trick them into revealing sensitive information.
  4. Secure Password Resets: Emphasize the need for secure password reset processes, such as security questions or account recovery codes.
  5. Data Breach Awareness: Discuss the implications of data breaches and how leaked passwords can be used in other attacks.
  6. Security Awareness Training: Suggest ongoing security awareness training to keep users informed about the latest threats and best practices.

By the end of these lectures, participants should have a comprehensive understanding of password security, multi-factor authentication, and the importance of protecting against password leaks and social engineering attacks. Armed with this knowledge, they can take proactive steps to enhance their account security and safeguard sensitive information.

Reference

Create and use strong passwords – Microsoft Support. (n.d.). https://support.microsoft.com/en-us/windows/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb

Reading Resources for Class 2

Introduction to Academic Integrity:

Academic integrity is a fundamental ethical principle that governs the conduct of students, researchers, and academics in the academic community. It revolves around honesty, trust, and respect for intellectual work. Upholding academic integrity is essential for maintaining the credibility and reputation of educational institutions and fostering a fair and equitable learning environment.

Definition and Principles of Academic Integrity:

Academic integrity encompasses several key principles:

  1. Honesty: Being truthful and transparent in all academic endeavors, including research, writing, exams, and assignments.
  2. Originality: Respecting intellectual property rights by giving proper credit to the ideas, works, and contributions of others through appropriate citation and referencing.
  3. Fairness: Treating all individuals fairly and equitably, without favoritism or discrimination, and adhering to the rules and guidelines set by educational institutions.
  4. Responsibility: Taking responsibility for one’s academic work, both in terms of individual effort and collaborative projects, and avoiding any form of academic misconduct.

Significance of Academic Integrity in Research and Academia:

Academic integrity plays a crucial role in research and academia for several reasons:

  1. Credibility and Trust: Upholding academic integrity ensures that the research and academic outputs are trustworthy and reliable, enhancing the credibility of scholars and educational institutions.
  2. Advancement of Knowledge: Academic integrity encourages the free exchange of ideas, leading to the growth and advancement of knowledge in various fields.
  3. Personal Growth: Students and researchers develop critical thinking and analytical skills when they engage in honest and independent work, contributing to their personal growth and development.
  4. Equality in Evaluation: Academic integrity ensures that all individuals are evaluated fairly based on their actual abilities and efforts, promoting a level playing field.

Consequences of Academic Dishonesty and Plagiarism:

  1. Academic Penalties: Academic institutions often impose severe penalties for academic dishonesty, ranging from failing grades in assignments or courses to suspension or expulsion from the institution.
  2. Damage to Reputation: Engaging in academic dishonesty can tarnish an individual’s reputation and credibility within the academic community.
  3. Legal Consequences: In some cases, plagiarism or other forms of academic dishonesty can lead to legal repercussions, especially if copyright infringement is involved.
  4. Loss of Trust: Academic dishonesty erodes trust between students, faculty, and institutions, negatively impacting the learning and research environment.
  5. Career Implications: Academic misconduct can have long-term consequences on future career prospects, as potential employers and academic institutions value individuals with a record of academic integrity.

In conclusion, academic integrity is the cornerstone of ethical conduct within the academic community. It promotes honesty, originality, fairness, and responsibility in all academic endeavors, fostering a culture of trust, respect, and intellectual growth. Upholding academic integrity is essential for preserving the credibility of educational institutions and nurturing a conducive environment for learning and research. On the other hand, academic dishonesty and plagiarism can have severe consequences, affecting an individual’s academic and professional future.

References

https://www.monash.edu/student-academic-success/maintain-academic-integrity/what-is-academic-integrity-and-why-is-it-important

Reading Resources for Session 1 Overview of Cybersecurity

Introduction to Cybersecurity:

Cybersecurity refers to the practice of protecting computers, networks, data, and other digital systems from unauthorized access, damage, theft, or disruption. It involves implementing a range of technologies, processes, and practices to safeguard sensitive information and ensure the confidentiality, integrity, and availability of digital assets. In today’s interconnected world, where data plays a critical role in businesses and individuals’ lives, cybersecurity has become of paramount importance.

Importance of Cybersecurity:

The importance of cybersecurity stems from the increasing reliance on digital technologies and the internet. Here are some key reasons why it is crucial:

  1. Protection of Sensitive Data: Cybersecurity safeguards sensitive information, such as personal data, financial records, intellectual property, and confidential business data from falling into the wrong hands.
  2. Preventing Disruptions: Cyber attacks can lead to significant disruptions in critical services, operations, and infrastructures. Proper cybersecurity measures help mitigate the risk of such disruptions.
  3. Preserving Privacy: With the growing concerns about data privacy, cybersecurity ensures that individuals’ and organizations’ privacy rights are upheld, preventing unauthorized access to private data.
  4. Maintaining Trust and Reputation: A data breach or cyber attack can severely damage an organization’s reputation and erode the trust of customers, partners, and stakeholders.
  5. National Security: In the case of government entities and critical infrastructure, cybersecurity plays a crucial role in protecting national security interests.

Common Types of Cyber Threats and Attacks:

  1. Malware: Malware is malicious software designed to infiltrate systems, steal data, or cause damage. Types of malware include viruses, worms, Trojans, ransomware, spyware, and adware.
  2. Phishing: Phishing attacks involve sending deceptive emails or messages, often impersonating legitimate sources, to trick users into revealing sensitive information, such as login credentials or financial details.
  3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks: These attacks overload systems with excessive traffic, causing them to become slow or unavailable, disrupting services.
  4. Man-in-the-Middle (MitM) Attacks: In MitM attacks, an attacker intercepts and possibly alters communication between two parties without their knowledge.
  5. SQL Injection: This involves exploiting vulnerabilities in web applications to inject malicious SQL code, enabling unauthorized access to databases and sensitive information.
  6. Zero-day Exploits: Cyber attackers may exploit vulnerabilities in software or hardware that are unknown to the vendor, leaving no time for patching before the attack.

Basic Measures to Protect Against Cyber Attacks:

  1. Use Strong Passwords: Create strong, unique passwords for each account, and use multi-factor authentication (MFA) wherever possible.
  2. Keep Software Updated: Regularly update operating systems, applications, and antivirus software to patch known vulnerabilities.
  3. Educate Users: Train individuals in recognizing phishing emails, suspicious links, and social engineering attempts.
  4. Backup Data: Regularly back up critical data to an external source or cloud storage to mitigate the impact of ransomware attacks.
  5. Firewalls and Network Security: Implement firewalls and network security solutions to monitor and control incoming and outgoing traffic.
  6. Secure Wi-Fi Networks: Use strong encryption and change default router passwords to secure Wi-Fi networks.
  7. Limit Access: Grant access privileges based on the principle of least privilege, ensuring users only have access to what is necessary for their roles.
  8. Monitor Systems: Continuously monitor systems for suspicious activities and intrusions.
  9. Security Patches and Updates: Promptly apply security patches and updates to fix known vulnerabilities.
  10. Create an Incident Response Plan: Have a well-defined incident response plan in place to respond effectively to cyber incidents if they occur.

Remember that cybersecurity is an ongoing process that requires vigilance and adaptation to new threats. By implementing these basic measures, individuals and organizations can significantly enhance their security posture and protect against common cyber threats and attacks.

References

What is Cybersecurity? | IBM. (n.d.). https://www.ibm.com/topics/cybersecurity

BLOG#4

Hi I enjoyed your article, which explains in detail how interactive a video resource can be and how it can provoke responses and thoughts among students. The article refers to a video about emotional well-being and describes activities students might do after viewing the video. The report also addresses ways to provide feedback on student activities, teacher workload, and scalability of activities. But I think you have some shortcomings, like the video could have been put directly in your Blog, or it would have given us a more direct view of the video you are talking about.

BLOG#4

1 What kind of interaction would the video require from your students? Does it force them to respond in some way (inherent)?

This video does not allow students to interact with the video and focuses on protecting their privacy and information on the Internet. It also advises on how not to fill out random forms online.

2 In what way are they likely to respond to the video on their own, e.g., make notes, do an activity, or think about the topic (learner-generated)?

After watching this video, students will definitely think about whether they have done something to give away their privacy in the past. And they will improve their sense of prevention, which is why I want them to watch this video.

3 What activity could you suggest that they do after they have watched the video (designed)? What type of knowledge or skill would that activity help develop? What medium or technology would students use to do the activity?

After watching the video, I will have the students discuss in small groups how we should prevent our privacy from being compromised in our future lives after watching this video. After the discussion, I will also want to conduct a questionnaire because then I will know if they have really learned something valuable.

4 How would students get feedback on the activity that you set? What medium or technology would they and/or you use for getting and giving feedback on their activity?

I give them time in class to ask me relevant questions to answer them, and I also provide them with some feedback on the paper after I correct their questionnaires, telling them what is lacking.

5 How much work for you would that activity cause? Would the work be both manageable and worthwhile? Could the activity be scaled for larger numbers of students?

All I had to do for this activity was to create a questionnaire and make sure that each of my students was actively participating in the group discussions. Since our classes were online, I would randomly divide them into groups and assign them to different ZOOM rooms, and I would go back and forth between the rooms during their discussions to ensure that each group was actively engaged.

« Older posts