Digital Identities and Digital Security (Visual)

Screen Shot 2018-05-04 at 2.39.44 pmSamann, T. (2016). Digital Security- Battening down the hatches in a sea of data. [Digital Image]. Retrieved from https://blog.soprasteria.com/digital-security-battening-down-the-hatches-in-a-sea-of-data/

Powtoon Link: https://www.powtoon.com/online-presentation/dv5JLjyfio2/?mode=movie

 

Words used in Powtoon:

All About Digital identities and Security

What is Digital Identity?

It is a permanent collection of you data online to identify you (CI Keys, 2015)

Examples of Digital Identities- Social, Customer, Anonymous, Private

How do digital identities affect teaching and learning?

Teachers develop students digital identities by teaching them the importance of different identities

Students learn what each identity means and how to use different identities, which helps them with careers later in life

Both have different forms of digital identities (e.g private and student identities)

Advantages in education

Allows you to create a anonymous profile

Explores creativity

Allows you to create more than one profile

Can help students with employment (Campbell, 2014)

Different identities allows both privacy and collaboration

Disadvantages In education

Students may not understand how to keep information private (e.g use their full their full name as a username)

Students may use their educational digital identity for fun which could distract them from school work

Students and teachers have no control of their information, once something is online it stays there

Students are more vulnerable to cyber bulling (SlideShare, 2013)

What is Digital Security?

Refers to digital tools individuals use to secure their identity online (Gemalto, n.d)

Blocking cookies

Restricting websites

Also

Blocking a

Using anti-virus software

How does digital security affect teaching and learning?

Teachers have to teach students how to be less vulnerable and safe online (Smith, n.d)

Teachers are responsible for protecting student data (IKeppSafe, 2018)

Students are taught to secure their digital devices (e.g use strong passwords)

Advantages in education

Keep students and teachers safe from viruses

Students learn how to be safe online

Teachers don’t have to worry about students accessing restricted websites

Everything the students access is usually monitored by teachers

Students may think its safe to post anything they desire online just because they have been informed of digital security

The same website accessed at school may be different at

References 

C1 Keys. (Speaker). (2015, June 25). What is digital identity? [Animation]. Retrieved from https://www.youtube.com/watch?v=uJzuDcyR0WM

Campbell, B. (2014). Advantages and Disadvantages of Having a Digital Identity. Retrieved from https://beccacampbellblog.wordpress.com/2014/10/27/advantages-and-disadvantages-of-having-a-digital-identity-2/

Gemaltjo. (n.d). What is Digital Security? Retrieved from https://www.justaskgemalto.com/en/what-is-digital-security/

IKeepSafe. (2018). Achieving Digital Security. Retrieved from http://generationsafe.ikeepsafe.org/professional-development/achieving-digital-security/

SlideShare. (2013). Disadvantages of Digital Identity. Retrieved from https://www.slideshare.net/Digital-identity/disadvantages-of-digital-identity

Smith, J. (n.d). Digital Security, Digital Identity. Retrieved from https://jaynemsmith.wordpress.com/digital-security-digital-identity/

 

Images

Brand Resource Center. (2016). “f” logo. [Digital Image]. Retrieved from https://en.facebookbrand.com/assets/f-logo

Connecting Up. (2018). Bitdefender. [Digital image] Retrieved from https://www.connectingup.org/partner/bitdefender

IconFinder. (2018). Bank card. [Digital Image]. Retrieved from https://www.iconfinder.com/icons/331707/bank_bank_card_debit_card_finance_money_payment_visa_icon#size=128

Identity Guard. (2015). 8 Tips to Stay Secure Online. [Digital Image]. Retrieved from https://www.identityguard.com/news-insights/going-online-use-these-8-tips-to-stay-secure/?utm_source=pinterest&utm_medium=social&utm_campaign=idtheft&cvosrc=social.pinterest.idtheft

Its Nice That. (2018). The New Twitter Logo. [Digital image]. Retrieved from https://www.itsnicethat.com/articles/new-twitter-logo

LAFM. (2018). Cyber Bullying. [Digital Image]. Retrieved from https://lafm.com.au/the-drive-home/home/79644-cyber-bullying

Linked in. (2017). Sophos. [Digital Image]. Retrieved from https://www.linkedin.com/company/sophos

Randhawa, B. (2015). Top 10 Computer Viruses and How They Work. [Digital Image]. Retrieved from https://thehacktoday.com/10-types-of-computer-viruses-and-how-they-work/

Samann, T. (2016). Digital Security- Battening down the hatches in a sea of data. [Digital Image]. Retrieved from https://blog.soprasteria.com/digital-security-battening-down-the-hatches-in-a-sea-of-data/

Word Press. (2015). How To Enable Parental Controls On Amazon Fire TV and Fire Stick. [Digital Image]. Retrieved from https://eitstudentit.wordpress.com/2015/06/15/how-to-enable-parental-controls-on-amazon-fire-tv-and-fire-stick/

Wikimedia Commons. (2016). File: Mail iOS. [Digital Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Mail_iOS.svg

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s