Grade8: Lesson #15
How do social networking sites and online activity expose people to risks?
SS.8.FL.6.7Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity theft or misuse of their personal information.
SS.8.FL.6.7Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity theft or misuse of their personal information.
The Internet: Fun, Fast and….. Frightening?
Lesson Number#15
Correlated Florida Standards (See Full Text on Cover Page)
- SS.8.FL.6.7
Essential Question
- How do social networking sites and online activity expose people to risks of fraud and identity theft?
- What are some ways that people can protect themselves while online?
Learning Goals/Objectives
- Understand identity theft and why it is important to guard against it.
- Recognize that social networking sites and other online activities expose them to misuse of their personal information.
- Identify strategies that scam artists use to access private information.
- Explain ways to safeguard themselves from identity theft online.
Overview
- This lesson explores the concept of identity theft and provides strategies for making you less vulnerable to the theft or misuse of personal and financial information.
Materials
- Computer or tablet with internet access
- Promethean or Smart Board
- Video Social Experiment (3:42)
- Video Social Media Identity Fraud - Facebook Identity Theft: (1:51
- Bureau of Justice Statistics Sheet: Victims of Identity Theft in 2014:
- Handout #1 Identity Theft Activity (included)
- Handout #1 Identity Theft Activity Answer Key (included)
- Avoid an Identity Crisis
- Theft Faceoff Game
- Protection Connection
Time
- 50 minutes
Introduction/Hook Activity(8 minutes)
Ask students to raise their hands if they use Facebook. Twitter? Instagram? Other forms of social media? Allow time for students to share answers. Then ask students what information they put on social media. Do they realize that anyone can access their information: strangers; parents; teachers; prospective employers; colleges; cyber bullies; identity thieves?
Explain to students that they will be watching a video called Social Experiment. In the video, the presenter will search his current location to view social media accounts of people located nearby. He will then access information from theirsocial media accounts. He will then approach these total strangers using the personal information he acquired from their social media posts. Show video: Social Experiment.
After viewing the video, ask students what kind of information the “stranger” was able to acquire from social networking sites. Then discuss their feelings about having someone access their personal information.
Activity
1.Tell students that in today’s lesson, they will be exploring some problems they might encounter by using social media and learn ways to protect themselves. One of the issues that will be discussed in today’s lesson is “Identity Theft.” Ask students if anyone is able to explain identity theft? Discuss answers. Then ask students if they know anyone who has been a victim of identity theft. Discuss. ( 3 minutes)
- Explain to students that Identity Theft happens when someone accesses and uses your personal information without your knowledge or permission. It may involve any of the following:
- Using your personally identifying information to get credit cards
- Using your personally identifying information to get wireless phones
- Using your personally identifying information to obtain loans
- Using your personally identifying information to file a fraudulent income tax return
- Commit fraudulent or criminal acts using your name and identity
- Use to email or social networking accounts to send messages that appear to come from you
- May use your social networks to cyber bully your “friends” and acquaintances
Discuss the above aspects of Identity Theft. (5 minutes)
- Discuss terms related to identity theft:
- Identity theft: a crime in which someone steals your private personal information without your knowledge or permission and uses it in criminal activity
- Phishing: When someone (or group of people) sends you fake emails, texts, social media messages, calls, or links to fake websites in order to get you to give them your personal and financial information
- Scam: a fraudulent scheme; trick to steal your money or private information
- Vulnerable: open to risk, in a position that makes you easier to be harmed (3 minutes)
- Discuss the repercussions of identity theft. Explain to students that Identity theft is a federal crime. The Identity Theft and Assumption Deterrence Act of 1998 made it a federal crime when anyone "knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of the Federal law, or that constitutes a felony under any applicable State or local law. According to the Bureau of Justice Statistics, in 2014, an estimated 17.6 million Americans—about 7% of U.S. residents age 16 or older—were victims of identity theft in 2014. Project the: Bureau of Justice Statistics Sheet: Victims of Identity Theft in 2014: on the SmartBoard. Review and discuss with students. (5 minutes)
- Tell students that they will first be examining activities that place them at risk for identity theft. Ask students, “How many of you think that you could be victims of identity theft?” Discuss (most will probably think they are too young- don’t have credit cards, file income tax, etc.) Now, tell students that they will be watching a brief video on how a teen became an identity theft victim. Show the video Social Media Identity Fraud - Facebook Identity Theft: Discuss what the teen did wrong in the video. What were the consequences? Are there more possible problems in the future for him and his family? What might these be? (5 minutes)
- Explain to students that using Social Media such as: Twitter, Facebook, SnapChat, Instagram, etc. make people vulnerable to identity theft. Distribute Handout # 1 Identity Theft Activity. Review the first paragraph together. Then explain to students that the will use the screenshot on the Handout to highlight words, sentences or phrasesyou think couldbeused to helpanidentity thief gainaccess to yourinformation. (You may choose to have students work individually or in pairs to complete the handout) (5 minutes)
- When students have completed the activity, review and discuss answers using the answer key included in the lesson. (3 minutes)
- Explain to students that once their identity is stolen it may take months or years to clear up the damage that has been done to their reputation, finances, and credit record. Victims may lose job opportunities, be turned down for loans while trying to get their identity theft cleared up. Victims may not be able to be accepted for an education loan, car loan or home mortgage through no fault of their own. Discuss (2 minutes)
- Pose the following question to students: Thinking about what you have learned today, how can you protect yourself against identity theft? Discuss. Project Avoid an Identity Crisis from on the SmartBoard. Review: Keep it Secret and Search and Destroy. Then click on: The Do’s; The Don’ts; and Deal With it from the drop down menu and discuss each point. (2 minutes)
- Have students work in pairs using their tablets to play the Identity Theft Interactive Games:
•Cyber Criminal
•Theft Faceoff Game
•Protection Connection (10 minutes)
Closure
Revisit the lessons essential questions. Summarize the important tips to remember to help minimize risk of identity theft.
OPTIONAL EXTENSION SUGGESTIONS/HOME LEARNING
Have students read the article Seven Steps to Staying Safe on Social Media
Then have students create posters on Using Social Media Wisely.
Have students read and summarize the article on teens and identity theft:
SOURCES/BIBLIOGRAPHIC INFORMATION THAT CONTRIBUTED TO THIS LESSON:
Handout # 1 Name______
Identity Theft Activity
Social mediasitesaregreat waysto sharepicturesandnews with your friends andfamily,but they canalsobegreatplaces for identify thievesto locatepersonalinformationandstealyouridentity.Many timesidentity thieves aren’tstrangers; they have relationshipswiththeir victims!It’s silly to completelyban theuseofsocialmedia for fear ofbecominganidentity theft victim,butyoucan take precautions to makesureyouaren’tover-sharing.
Use the following screenshot—to highlight words, sentences or phrasesyou think couldbeused to helpanidentity thief gainaccess to yourinformation.
Miami, Florida
June 1, 2001
Miami, Florida
Single
Friends, Dating
Well, my middle name is Kathryn. I’ma student atMiami Woods Senior High School. I LOVE swimming – I’ve been swimming on a team since I was 8!! Ican’timaginelife without swimming.I work part-time at Pollo Tropical on Biscayne after school, and at Target mid-town on the weekends. My favorite singers are Shawn Mendes, Justin Bieber, and Willow. I lovedogs, watching movies with my bffs Tamika and Joelle, Big Bang Theory, Project Runway,
The Miami Heat,Pepsiand mypuppy,Marco!I love totravel, especially toArubato visitmygrandparents. I loveyouGram & GrampsOlivares!
Answer Key Handout # 1 Identity Theft Activity
Your students may have highlighted the following words:
• Jane Smith: Of course, you can’t avoid using your name; however, students can avoid using middle initials that might make obtaining information easier for an identity thief.
• Birthday: Encourage students to only use the date, not the year. However, even with just the date, a savvy thief could guess the year you were born.
•Miami, Florida; Miami Woods High School, and Tigers: Many websites, like banks and credit card companies, have additional security questions that often include the high school you attend(ed) or mascot name.
•Kathryn- adding your middle name makes things much easier for an identity thief
• Swimming- Students who don’t use strong passwords may turn to easy to remember passwords like swimmer16 for their passwords.
• Pollo Tropical or Target: When calling to switch services or change account information, some institutions may ask you to verify your place of employment. Adding your location makes you more vulnerable to identity thieves and stalkers.
• I Love...: Any of the items listed in this sentence could be used to gain access to more personal information. Security questions often involve your favorite animal (dog), favorite drink (Pepsi) , favorite television show (Big Bang).or favorite singers: Shawn Mendes, Justin Bieber, and Willow
•Tamika, Joelle, Best friends and Marco – again your best friends and pet’s name may be used as security questions (or they are a chance try for passwords)
• Olivares: Many financial institutions use your mother’s maiden name as an added security feature.
Again, remind your students that this exercise isn’t meant to scare them away from social media. But, they must be aware of the information they are making public and how it can be used to gain access to their personal life as well as their finances.
1