ALEX Classroom Resource

  

Buyer Beware

  Classroom Resource Information  

Title:

Buyer Beware

URL:

https://www.remc.org/21Things4Students/21/buyer-beware/

Content Source:

Other
REMC Association of Mighigan
Type: Learning Activity

Overview:

Buying and selling on the Internet have changed the way we live. We can now perform a web search to locate, compare, and buy goods and services.

You are going to investigate e-commerce as a consumer and learn some tips on how to shop online, avoid Internet fraud, and benefit from reviews and ratings.


LEARNING OBJECTIVES

When you have completed this activity you will:

  1. know how to research and compare products [Computational Thinker]

  2. know how to protect yourself as an online consumer [Digital Citizen]

  3. be able to protect yourself from deceptive advertising, scams, and rip-offs [Digital Citizen]

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 6
9) Differentiate between a secure and a non-secure website including how they affect personal data.

Example: HTTP vs. HTTPS.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • distinguish between a secure and non
  • secure website.
  • identify the risks associated with transmitting personal data over a non
  • secure website.
Knowledge:
Students know:
  • how to identify a website as secure or unsecure.
  • that sharing personal data can be dangerous.
Skills:
Students are able to:
  • recognize that secure web address begins with "https" and that a security symbol is displayed in the address bar such as a lock, etc.
Understanding:
Students understand that:
  • any information provided while navigating an unsecure website can negatively affect users.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 6
25) Differentiate between secure and non-secure systems.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify secure and non
  • secure systems.
  • differentiate between secure and non
  • secure systems.
Knowledge:
Students know:
  • not all information or websites are secure.
Skills:
Students are able to:
  • identify a resource as secure or non
  • secure.
Understanding:
Students understand that:
  • part of protecting data includes determining if a system is secure or non
  • secure.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 7
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • define social engineering in the context of information technology.
  • will identify methods to avoid being a victim of social engineering.
  • outline the impacts of social engineering on society.
Teacher Vocabulary:
  • social engineering
Knowledge:
Students know:
  • the importance of protecting personal data.
Skills:
Students are able to:
  • identify instances of social engineering and ways to avoid becoming a victim.
Understanding:
Students understand that:
  • personal data should be protected so that the information is not accessible by someone looking to exploit your information for personal gain.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify various modes of social engineering and indicate their effectiveness.
Teacher Vocabulary:
  • social engineering
Knowledge:
Students know:
  • social engineering is used to elicit access to information one would not normally allow.
Skills:
Students are able to:
  • identify various modes of social engineering and indicate their effectiveness.
Understanding:
Students understand that:
  • social engineering is used to manipulate individuals into revealing personal information.
  • many modes of social engineering are used to manipulate individuals into revealing personal information.
Tags: clickbait, deceptive advertising, scam, truth in advertising
License Type: Attribution Non-Commercial Share Alike
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Aimee Bates