ICT Ethics Assignment

Create an infographic (Affinity Designer is recommended for this) or Google Doc or podcast or video that shows an ICT-related ethical issue which:

  • clearly defines what the issue is all about,
  • convincingly shows us how to resolve it, and
  • recommends alternatives/safeguards which exist to protect against such issues in the future (if applicable).

Topic Suggestions

  • Music and video file downloading
  • Spyware
  • Identity theft
  • Phishing
  • Keystroke logging
  • Packet sniffing
  • Biometric data
  • Effective passwords
  • Firewalls
  • Secure websites
  • Cyber bullying

Citations

Be sure to give credit to all your sources!


Inspiration and credit for this assignment:
https://github.com/mrseidel-classes/ICS2O/wiki/Ethics

Affinity Photo Tutorials

This list of tutorials has been recommended by my students (from this master list) and is a work in progress. The order of the tutorials is somewhat random right now but will be reordered based on student feedback.

  1. Beginners – Adjustments (difficulty: 1)
  2. Beginners – Exporting (difficulty: 1) (no assignment)
  3. Beginners – Filters (difficulty: 1)
  4. Beginners – Layers (difficulty: 1) (assignment: put a logo on a picture….your choice!)
  5. Cutting Out (difficulty: 1)
  6. Haze Removal (difficulty: 1)
  7. Changing Eye Colour (difficulty: 2)
  8. Inpainting (difficulty: 2)
  9. Layer Concepts (difficulty: 2) (no assignment)
  10. Shadows/Highlights (difficulty: 2)
  11. Curves (difficulty: 2)
  12. Cloning (difficulty: 2)
  13. Refining Selections (difficulty: 2)
  14. Lighting (difficulty: 2)
  15. Adjustment Layers (difficulty: 3)
  16. Mask Layers (difficulty: 3)
  17. Affinity Photo Tutorial Manipulation Effects Editing (difficulty: 5) (Note 2)
  18. How to Retouch Skin in Affinity Photo (difficulty: 5) (Note 1)

You must do all the level 1 tutorials, a minimum of 5 level 2’s, and a minimum of 2 level 3’s, 4’s, and 5’s.

Note 1: take your own picture for this assignment.

Note 2: use only creative-commons photos for this assignment. Be sure to keep the links to your sources to give credit!

Let’s Go Phishing!

In the spirit of yesterday’s Safer Internet Day

I often get asked which is better — Gmail or Hotmail (or its derivative outlook). The answer for me is so easy: Gmail, and one of the reasons is because it handles phishing attempts so much better than Hotmail.

I only log into my Hotmail account once a month or so, just to keep it alive. This time, there were approximately 20 emails in my inbox. A few were legitimate security alerts created by my Google account, a few were from Microsoft trying to sell me something or other, but the rest (over half) were phishing attempts — bogus emails attempting to get me to click a link where they would prompt me to reveal private details such as account numbers or passwords. Continue reading “Let’s Go Phishing!”

Digital Literacy Resource — Teens’ Top 5 Technology Mistakes

Teens’ Top 5 Technology Mistakes _ CHOICES _ Scholastic.com

(This is an old post that has been moved to here from my previous blog.)

This morning I shared an article entitled “Teens’ Top 5 Technology Mistakes” with my BTT1O class. The five “mistakes” mentioned are:

  1. Forgetting to Log Out
  2. Right Message — Wrong Person
  3. Oversharing
  4. Losing Track of Your Phone
  5. Making Friends With Strangers

Reviewing the article gave us a great opportunity to share many stories, including:

  • students not logging out and other students sending crude messages from their Facebook account
  • students creating fake Snapchat accounts to use to get other students to send them inappropriate pictures
  • stories of students not being able to get jobs because of what they shared on their social media accounts
  • and others…

Continue reading “Digital Literacy Resource — Teens’ Top 5 Technology Mistakes”