Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Text document
Social media is, after all, just a small piece of the data puzzle. “We really have two forms of digital selves,” explains Jen King, director of privacy at the Center for Internet and Society at Stanford University. “One is basically all the data that companies collect on us — that's what you find in the hands of data brokers. The other is the one you construct, the one we curate and spend a lot of time trying to control. The two things overlap, but one is controlled by you and the other is not.”
[...] Even something as innocuous as a phone number can be used to reveal where you live, who you're related to, and whether or not you've ever been arrested. This information can also be used to breeze past security questions used to secure online accounts.
[...] Given the scale of the problem and the difficulty of staying completely offline, digital privacy is more important than ever before.
Zoe Schiffer
“How to erase your personal information from the internet (it's not impossible!)”, Vox.com, 2019.
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Group 2
Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Text document
It used to be that when we thought of the future, we dreamed of the new and wonderful things people could be doing in it. Now, when we think of the future, we anticipate the development of new technologies [...].
A seminal year in this cultural shift was 1984. In fiction, it was the year of George Orwell's totalitarian dystopia, in which surveillance, absence of privacy, and what we now term “alternative facts” enabled the erasure of individuality. 1984 was also the year when William Gibson released Neuromancer, the book that popularized the term “cyberspace.” Gibson's novel tells the story of a washed‑up computer hacker hired by a mysterious employer to stage “the ultimate hack.” Neuromancer isn't exactly a utopian counter‑vision to 1984, but at least it expands the playing‑field.
[...] The themes explored in that year remain at the core of our culture's concern with the impact of digital innovation on human identity. Neuromancer has inspired an entire genre of science fiction as well as inspired the Hollywood blockbuster film series The Matrix.
Tim Leberecht
“Our Exponential Selves: Identity in the Digital Romantic Age”, Medium.com, 2017.
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Group 3
Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Text document
The world is more connected than ever before. Increasingly significant aspects of our lives are being played out online. As our homes, our cars and even our fitness and health devices connect over the internet, they are transmitting thousands of bits of information about us.
But as we increase our connectivity, we're exposing ourselves to new risks. [...]
Cyber researchers have been working for years to help develop the right protocols to protect our homes, our physical safety and even our governments. [...]
Originally built as a way to secure cryptocurrency transactions, blockchain is a digital platform that verifies and records exchanges. It creates an indisputable history of these transactions that cannot be modified by a single user, eliminating opportunities for fraud. It is this feature that has some heralding blockchain as a potential solution for some types of cyber vulnerability. But does blockchain have the practical applications we
need to keep our digital information secure?
Etta Di Leo
“Is Blockchain the Future of Cyber Security?”, Uwaterloo.ca, 2019.
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Group 4
Each group is in charge of a document. Study it and
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Let's learn!
Guess what
Tell the class all about your purchasing and posting habits on the Internet. Your classmates must guess what you may find on your sidebars then.
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Over to you!
Ressource affichée de l'autre côté. Faites défiler pour voir la suite.
Share Your Opinion
Let's use what you have learnt in
!
After reading about all this, you google yourself. Explain your reaction to what you find in a post. What do you intend to do now to define and protect your digital identity?
Une erreur sur la page ? Une idée à proposer ?
Nos manuels sont collaboratifs, n'hésitez pas à nous en faire part.
Oups, une coquille
j'ai une idée !
Nous préparons votre pageNous vous offrons 5 essais
Yolène
Émilie
Jean-Paul
Fatima
Sarah
Utilisation des cookies
Lors de votre navigation sur ce site, des cookies nécessaires au bon fonctionnement et exemptés de consentement sont déposés.