
Following on from my blog in relation to internet safety day I thought I would share some of the actual presentations I have used recently with students when discussing differing parts of internet safety.
Now all the presentations are on the short side as they are designed to provoke thought and further follow up discussions with each presentation designed around a 5 to 10 minute assembly.
I hope the presentations are useful or at least provide some ideas. I am also open to any thoughts or ideas for other topics or areas which should be included in future presentations.
This session revolves around a tweet from a parody HRH Prince William account which was picked up by some UK radio broadcasters as fact where there was no evidence to support the figures quotes. Also the session looks at the possible impact from generative AI in relation to fake images or video.
This session is very much about asking the students if they feel comfortable with their technology use and then discussing ways that a balance might be achieved. It is also important to discuss how “screen time” is an overly simplistic measure and that all screen time is not equal.
This session focuses on binary arguments and how two opposite viewpoints can actually both be true or both be false. Some discussion of why people might seek to exploit binary arguments, social media algorithms and echo chambers is also included.
This session focuses on some examples of social engineering and how human habits can be used against us by malicious individuals. The key message is the increasing “sophistication” of attacks and therefore the need to be more vigilant and careful.
This session looks at data breached from sites and how this is leaked online. It may be worth getting the students to use HaveIBeenPwned if possible to see how many students already have data leaked on them online. The key closing point is that as we do more online we need to be aware of the resulting increasing risk.
The key feature of this session is the predictability of human choices in relation to passwords.You may wish to use the Michael McIntyre cyber video here or simply ask students about where the capital letter, number and symbol in their passwords might be.
This includes reference to an OSINT tool which allows you to identify the date and time of a photo based on the position of shadows within the photo; This illustrates how even simple things might give away information about us.
It also contains a “pick a number” to illustrate how we can be easily influenced. As the presenter you would stress the trackers slide and “14” to see if you can then encourage students to select 14 later in the presentation. If we can be that easily influenced then what might social media and other individuals be able to do with much much more data?
This session looks at public good vs. individual privacy and how these two issues may be at opposite ends of a continuum. The key is to show how we need to find a balance between these two extremes.