Chargement de l'audio en cours
Plus

Plus

Digital Passports at Risk...
Page numérique

Mode édition
Ajouter

Ajouter

Terminer

Terminer

Unit B

4 • Citizenship and Virtual Worlds
WB p. 49

Digital Passports at Risk...
USA flag
UK flag

➜ To what extent are we in control of our digital identity?



Retrouvez une banque d'audios et de vidéos authentiques en lien avec cette thématique.

Ce chapitre numérique est téléchargeable au format PDF ici !

Serious Game

en lien avec cette unité disponible dès cet été !

Photomontage about digital identity

Get ready!

1
a. What words come to mind when you think of digital identity?


b. Look at the vocabulary lists. Find a title for each category, then add the words you found.


2
a. Look at the picture. How does it illustrate digital identity?


b. Think of all the ways you identify yourself on the Internet.
Voir les réponses
Voir les réponses

3
Watch the video. Sum it up, and explain what digital identity means.


4
Discuss these brainstorming questions with your classmates:
How concerned do you feel about privacy when you log on to a website? Have you ever googled your name on the Internet? Someone else’s name? What would you expect to find?

5
Read the idiom of the week. Rephrase it in your own words and give examples.
Voir les réponses

Toolbox

Toolbox
  • offline / online (adj.)
  • theft / data breach /ˈdԑɪtə ˈbriːʧ/ (n.)
  • aggregate /ˈægrɪˌgԑɪt/ (v.)
  • compromise /ˈkɒmprəˌmaɪz/ (v.)
  • hack /ˈhæk/ (v.)

Let’s learn!

Find the word!

Choose a word from the vocabulary lists. Give a synonym or a definition of it and have your classmates guess it.


Picture of an iceberg

Idiom of the week!

The tip of the iceberg!

Idiom


Of course, everybody knows the story of the Titanic. This idiom is inspired by the iceberg, rather than the ship. The first use was actually recorded in 1969. The metaphor is used to refer to a problem which seems small and relatively harmless, but whose true, greater significance is hidden.

Digital Identity


1
box 1
  • black hat (exp.)
  • data analyst (exp.)
  • software engineer (exp.)
  • cryptographer (n.)
  • developer (n.)
  • hacker (n.)
  • programmer (n.)

2
box 2
  • addictive (adj.)
  • behavioural (adj.)
  • counterintuitive (adj.)
  • emphatic /ɪmˈfætɪk/ (adj.)
  • fast-changing (adj.)
  • digital native (exp.)
  • interact with (v.)

3
box 3
  • underhand / sneaky (adj.)
  • encryption /ɪnˈkrɪpʃən/ (n.)
  • hindrance / obstacle (n.)
  • threat /ˈθrɛt/ (n.)
  • steal (v.)

4
box 4
  • blackmail /ˈblækˌmɛɪl/ (n. or v.)
  • corroborate (v.)
  • display /dɪsˈplɛɪ/ (v.)
  • distort (v.)
  • engross /ɪnˈgrəʊs/ (v.)
  • interfere with (v.)
  • intrude in (v.)

5
box 5
  • exposure (n.)
  • connect / bond (v.)
  • engage with (v.)
  • express oneself (v.)
  • misuse /ˌmɪsˈjuːz/ (v.)
  • overuse (v.)
  • post /ˈpəʊst/ (v.)

6
box 6
  • nosey /ˈnəʊzɪ/ (adj.)
  • keep tabs on (exp.)
  • titbit /ˈtɪtbɪt/ (fam.) (n.)
  • snoop / spy on (v.)
  • stalk /ˈstɔːk/ (v.)
  • track (v.)
  • unmask (v.)

On your way to the task ❯❯ Step 1


After googling yourself, write your reaction in a post.

❯❯ Step 2


Create a pitch for a TV episode on digital identity.

❯❯ Your final project


Organize a school event for the All Digital Week.
Utilisation des cookies
En poursuivant votre navigation sans modifier vos paramètres, vous acceptez l'utilisation des cookies permettant le bon fonctionnement du service.
Pour plus d’informations, cliquez ici.