ALEX Classroom Resource

  

Deepfakes: Can You Spot a Phony Video?

  Classroom Resource Information  

Title:

Deepfakes: Can You Spot a Phony Video?

URL:

https://aptv.pbslearningmedia.org/resource/above-the-noise-deep-fakes/above-the-noise-deep-fakes/support-materials/

Content Source:

PBS
Type: Audio/Video

Overview:

A doctored video of Speaker Nancy Pelosi got millions of views on social media. Deepfakes are becoming easier to make and spread, and Above the Noise is here to help people understand this new phenomenon and what to do about it. This video has an educator's guide and student viewing guide.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 7
10) Explain social engineering, including countermeasures, and its impact on a digital society.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • define social engineering in the context of information technology.
  • will identify methods to avoid being a victim of social engineering.
  • outline the impacts of social engineering on society.
Teacher Vocabulary:
  • social engineering
Knowledge:
Students know:
  • the importance of protecting personal data.
Skills:
Students are able to:
  • identify instances of social engineering and ways to avoid becoming a victim.
Understanding:
Students understand that:
  • personal data should be protected so that the information is not accessible by someone looking to exploit your information for personal gain.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify various modes of social engineering and indicate their effectiveness.
Teacher Vocabulary:
  • social engineering
Knowledge:
Students know:
  • social engineering is used to elicit access to information one would not normally allow.
Skills:
Students are able to:
  • identify various modes of social engineering and indicate their effectiveness.
Understanding:
Students understand that:
  • social engineering is used to manipulate individuals into revealing personal information.
  • many modes of social engineering are used to manipulate individuals into revealing personal information.
Tags: digital tool, fake, influence, internet, online, social media
License Type: Custom Permission Type
See Terms: https://www.pbslearningmedia.org/help/terms-of-use/
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Stephanie Carver