Learning Resource Type

Classroom Resource

Case Study: True Threats or Venting? (2015)

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Students will review a court case and case study to determine what is protected and what may not be. 

Elonis v. the United States provides the foundation for a debate on what forms of expression on social media are and are not protected by the First Amendment — and the blurry line in-between.

To access this free resource, you will need a free account. 

    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.11

    Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

    Unpacked Content

    UP:DLCS18.HS.11

    Vocabulary

    • ethics
    • digital world
    a.
      cookies
    • virus
    • malware
    • packet sniffing
    • spyware
    • phishing
    b.
    • browser history
    c.
    • personal data
    d.
      data mining
    • digital marketing
    • online wallets
    • personal information
    • data accessibility
    • passwords.
    e.
    • cyberbullying
    • harassment
    • sexual communication
    f.
    • online safety

    Knowledge

    Students know:
    • safe, legal, and ethical behaviors for online behavior.
    a.
    • tracking methods are often used to improve digital tools and advertising.
    • hazards exist when unknown entities have access to a user's digital habits.
    b.
    • methods to counteract the use of tracking.
    c.
    • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
    • that EULAs and terms of service agreements can grant access to the user's personal data.
    • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
    d.
    • often there exists an inverse relationship between online privacy/personal security and convenience.
    e.
    • that inappropriate digital behavior can have physical, legal, and ethical consequences.
    f.
    • that negative digital behaviors can have lasting consequences.
    • that some behaviors are illegal.
    • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

    Skills

    Students are able to:
    • interact digitally while exercising safe, legal, and ethical behaviors.
    a.
    • identify tracking methods used to gather data.
    • identify hazards that exist when tracking methods are used.
    b.
    • list techniques to avoid tracking.
    • apply techniques to avoid tracking.
    c.
    • interpret the terms of EULAs and terms of service agreements.
    • make an educated decision to agree to EULAs and terms of service agreements.
    d.
    • weigh the risks of using a digital tool to one's personal security.
    • identify potential risks to using various digital tools.
    • evaluate a digital tool's security.
    e.
    • identify inappropriate digital behaviors.
    • identify consequences of inappropriate digital behaviors.
    f.
    • identify negative digital behaviors.
    • share strategies to to lessen the impact of negative digital behaviors.

    Understanding

    Students understand that:
    • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
    a.
    • entities use tracking methods to make products more appealing to their users.
    • hazards exists when tracking data can be tied to individual users.
    b.
    • privacy can be violated when tracking is used.
    • techniques exist to mitigate the effects of tracking methods.
    c.
    • nothing is free—you often give up data to use digital resources for no charge.
    • it is important to educate yourself on EULAs and terms of service agreements.
    d.
    • free digital tools can compromise one's privacy and security.
    • it is important to be aware of what one is trading for use of a service.
    e.
    • inappropriate digital behavior can have physical, legal, and ethical consequences.
    • consequences of inappropriate digital behaviors can have life-altering consequences.
    f.
    • digital identity is tied to online digital behavior.
    • negative digital behaviors can have lasting consequences.
    • some digital activity is illegal.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.16

    Identify laws regarding the use of technology and their consequences and implications.

    Unpacked Content

    UP:DLCS18.HS.16

    Vocabulary

    • net neutrality
    • hacking
    • intellectual property
    • piracy plagiarism

    Knowledge

    Students know:
    • technology changes at a rapid rate.
    • all things that are possible with technology may not be ethical.
    • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.

    Skills

    Students are able to:
    • identify laws relative to the use of technology.
    • identify consequences of violating laws relative to the use of technology.
    • identify implications of laws relative to the use of technology.

    Understanding

    Students understand that:
    • technology changes at a rapid rate.
    • all things that are possible with technology may not be ethical.
    • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.
    Link to Resource

    CR Resource Type

    Lesson/Unit Plan

    Resource Provider

    Newseum
    Accessibility

    Accessibility

    Text Resources: Content is organized under headings and subheadings
    License

    License Type

    Attribution Non-Commercial No Derivatives
    ALSDE LOGO