91热爆

Article summary

An article about things to think about when online, such as how smartphones track information, being careful about sharing information, how cookies work, and how information is stored through online activity.

Back to top

Your smartphone is smarter than you think

Chances are, you are often giving away small pieces of information as you go about your life online - and big companies use those little pieces, that you give away for free, to make money for themselves.

Here鈥檚 how:

The smartphone in your pocket is a tracking device, following your every move.

It knows where you鈥檝e been, who you know, and what you do. It knows all your secrets.

Those secrets (aka your data) can be pulled together from different places, and put together like a jigsaw. People and companies can access anything you put online, like your name, age, school, or your favourite ice cream.

But why does that matter? Surely there鈥檚 no harm in letting someone see what ice cream you like?

By finding out which ice cream you love, where you eat it, how much you spend on it and when you might want it, someone can show you an advert for ice cream, at the exact moment you're most likely to buy it. That鈥檚 when it starts to get creepy.

So how on earth does this kind of creepy jigsaw get made? Well, it starts with what we deliberately post online.

Social media's secret mission

To get a social media account we give details like our name, email and date of birth.

In return we get to use social networks to connect with our friends and our mum can write embarrassing comments on posts, for all to see!

On top of this, social platforms can learn about you from something as simple as a 鈥榣ike鈥.

The things you write, share and search for, the pages or people you follow, all give them more of what their advertisers and other businesses need, to make money - clues about you.

Remember that funny Harry Potter quiz? Well, in your quest to find out whether you鈥檙e more Hermione Granger than Ron Weasley, you probably gave away stuff about yourself that could be used elsewhere.

Photos that friends share of you, even if you鈥檙e not tagged, could be traced back to you along with extra details that go with every picture - like the time and place it was taken and who uploaded it.

Cookies

And it鈥檚 not just about social media. Search engines can learn so much about you from what you search for and what you buy online.

You can also be easily tracked using what are known as 鈥榗ookies鈥.

Cookies help your computer remember where you鈥檝e been i.e. what you鈥檝e been doing online.

So let鈥檚 say you鈥檝e got 30 mins of screen time before you do your homework.

You start by watching videos of your favourite gamer, then open another browser and search for the new season strip of your favourite football team. Next time you go on the video site, you see ads pop up for your team鈥檚 merch.

The cookie remembered what you鈥檇 looked at in one browser, so that it could offer you something you鈥檇 be interested in buying, in another.

Check for yourself by going into your history on the top toolbar of your computer. The list of places you鈥檝e been online is laid out clearly.

IRL

Giving away data isn鈥檛 just about what we do sitting at home on the internet.

It also applies to what we do IRL.

For example, when you join the Free Wi-Fi at your local shopping centre, remember that nothing in this world is for free. You鈥檙e paying for that Wi-Fi with your valuable information.

You probably ticked a box to accept the terms and conditions (which are so long that nobody actually reads them), and gave some details like your email address.

Remember the jigsaw? Just because you only give your email at that moment, doesn鈥檛 mean that鈥檚 the only piece of the puzzle you鈥檙e handing over.

When people go shopping they leave a data trail, often without realising it. For example, a supermarket loyalty card takes your data in return for bonus points and discounts on stuff.

Electronic receipts are handy and save you from losing pesky pieces of paper. But remember, you鈥檝e had to give an email address in order to receive that e-receipt. Again, that鈥檚 data collection.

And that little spy in your pocket keeps cleverly tracking where you go and how you get there.

Time to wise up

Technology has made so many things easier, but people are definitely wising up to the price they鈥檙e paying for that.

And people are more aware about how valuable their information is - not just for themselves, but for others too. Recent horror stories of personal info being leaked or given away without proper permission have made sure of that.

A new law has been designed to protect people and make organisations (big and small) behave more responsibly or face big fines.

Remember: every time you give your information, someone somewhere goes "ker-ching". That's how little pieces of us have become 'the product'.

So it鈥檚 in all of our interest to become a bit more savvy about how much we give away.

Knowledge is power.

Back to top

Article: 5 min read

Learning objectives

(from the set out by the UK Council for Internet Safety)

  • 鈥業 can demonstrate how to make responsible choices about having an online identity, depending on context鈥

Glossary

  • Company: a business or corporation
  • Tracking: when your online and/or digital activity is monitored
  • Data: your information and online/digital activity
  • Access: to retrieve or obtain
  • Cookies: small bits of data that exist on web pages that track your activity
  • Merch: short for merchandise, items such as clothing or toys associated with a person or collection of people (such as a band), that you can purchase

Topic introductions and starters

Before the video:

  • Ask pupils to discuss in pairs/groups what information they think they may have shared online with others in the past few weeks

After the video:

  • Check pupils鈥 understanding of the key vocabulary 鈥 company, tracking, data, access, cookies, merch, browser, history
  • Write simple one sentence 鈥榙ictionary鈥 definitions of tricky key vocabulary - share with class and decide on best version
  • Read a printed copy of the article and highlight the key words and phrases - use colour-coding to separate out different types of information - key vocab/jargon, names of companies, types of technology
  • Pupils work in pairs/groups to strip the article down to a list of bullet points summarising the key points. Compare lists and create a class version

Discussion Points

  • Did you know that your data was being shared and used in this way? How does it make you feel? Is it okay for them to do it?

  • Do you always read the terms and conditions when you click agree? Why is it so long and complicated? Do companies really want you to read it?

  • Are companies stealing your data? Do you really agree to everything? Do you think they should make the Ts&Cs easierto understand?

  • Did you know that it was really your data that these apps want to collect? Are free apps/services really free? Are you paying for the service with your data?

  • What can you do to avoid your data from being collected? Say 鈥榥o鈥 to cookies? Turn off location-tracking on your phone? Hide your location? Delete apps?

Fillers and fast finisher activities

  • Make a 鈥榯rue or false鈥 quiz with facts and information from the article for your classmates
  • Create a 鈥榯rue鈥 advert for an app or company that collects your data with details of how they collect it and what they really use it for
  • Create a mind-map that shows all the different types of data that is collected about your online life
  • Make a list of what data is collected and shared, and divide into two groups - data you knew you were sharing, and data shared without you realising

Signposting potential homework activities

  • Create jigsaw pieces (use a pre-printed blank jigsaw outline) with different types of data that might be shared - cut up and make a real life jigsaw puzzle
  • Ask parents/guardians and family members what they think happens to their data online - share information from the article with them and report findings
  • Create an eye-catching warning poster (possibly use superhero characters etc) about the Data Jigsaw
  • Create an illustrated help guide with suggestions and tips to help other young people understand data collection and tracking.

For download/printing

Teacher notes (PDF, 150KB)
Back to top

Nailing online safety. video

Tips and advice on how to stay safe online.

Nailing online safety

Avoiding account hacks. document

Tips and advice on ways to avoid online accounts being 鈥榟acked鈥 or taken over by someone without your permission.

Avoiding account hacks

Oti Mabuse - what I do and don't share. video

Former Strictly star and dancer Oti Mabuse gives her tips for asking for permission before putting up posts of other people.

Oti Mabuse - what I do and don't share
Back to top