We may earn an affiliate commission when you visit our partners.
Course image
Beth Simon

In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.

Read more

In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.

This course is part of a larger Specialization through which you’ll learn impacts of computing concepts you need to know, organized into 5 distinct digital “worlds”, as well as learn pedagogical techniques and evaluate lesson plans and resources to utilize in your classroom. By the end, you’ll be prepared to teach pre-college learners to be both savvy and effective participants in their digital world.

In this particular digital world (personal data), you’ll explore the following Impacts & Technology pairs --

Impacts (Show me what I want to see!): Internet Privacy, Custom Ads, Personalization of web pages

Technologies and Computing Concepts: Cookies, Web vs Internet, https, Web Servers

Impacts (Use my data…. But protect it!): Common Cybersecurity knowledge levels, ISP data collection, Internet design, finding out what is known about you online, software terms and services

Technology and Computing Concepts: DNS, Cryptography (ciphers, hashing, encryption, SSL), Deep and Dark Web

Impacts (What could my data do for me in the future?): What is Big Data, Machine Learning finds new music, Wearable technologies.

Technology and Computing Concepts: AI vs ML, Supervised vs Unsupervised learning, Neural Networks, Recommender systems, Speech recognition

In the pedagogy section for this course, in which best practices for teaching computing concepts are explored, you’ll learn how to apply Bloom’s taxonomy to create meaningful CS learning objectives, the importance of retrieval-based learning, to build learning activities with online simulators, and how to use “fun” books to teach computing.

In terms of CSTA K-12 computer science standards, we’ll primarily cover learning objectives within the “impacts of computing” concept, while also including some within the “networks and the Internet” concepts and the “data and analysis” concept. Practices we cover include “fostering and inclusive computing culture”, “recognizing and defining computational problems”, and “communicating about computing”.

Enroll now

What's inside

Syllabus

Course Orientation
Welcome! Are you interested in teaching about the impacts of your personal data in the digital world? To learn more about the computation and computing concepts that underlie the technologies using that data? We'll be using a problem-based approach to explore interesting ways to teach concepts of networks and the internet, data and analysis, and even algorithms and data representation. Finally, we'll read a chapter from a children's fiction book -- "The Secret Code Menace" and identify some computer science learning outcomes for that chapter.
Read more
Data Collection
Why is it that when you are shopping for an item on one website, you start seeing ads for it other in other places? How do websites know (and quite well) what products and services to recommend their customers and users? We'll look at how the internet has evolved to personalize people's experiences while online. Then to finish up this week, we will learn about how cookies and web servers work, as well as how HTTPS keeps connections secure.
Data Privacy
This week we'll look at aspects of our personal data such as -- when we we do not want it used, how we can keep it safe, and what control we have. In this Technology Exploration, we'll learn about ciphers, hashing, cryptography, and encryption. Also, do you know the difference between the "deep" web and the "dark" web? (You will know by the end of this week!)
Data Use
So far we have learned about data collection and privacy. Now we will spend the week covering some ways that data is used, so we must introduce big data. Along with our exploration of this progressive concept, we will help you connect the use of big data to machine learning though an activity designed to guide your understanding in a fun way!
Impacts of Computing and Pedagogy
Next we'll let you choose what you want to explore around "impacts of computing" for the technologies we've explored in this world. Along with that, we'll introduce another "Formative Classroom Assessment Technique" (FACT) and have you practice how you would use this in the classroom. For our pedagogical focus, we'll look at how retrieval practice helps you learn far more effectively than "re-studying" and how to define the learning objectives for a given learning activity using Bloom's taxonomy. Finally, you'll get to read a short chapter from a children's fiction book "The Secret Code Menace" and identify for yourself what kids can learn from reading it!

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
This course takes a highly focused approach to a single, vital topic
Covers the latest and greatest in the field
Taught by industry veterans at the top of their field
Teaches skills that are not only valuable in the classroom but also in a career setting

Save this course

Save Teaching Impacts of Technology: Data Collection, Use, and Privacy to your list so you can find it easily later:
Save

Reviews summary

Highly rated data privacy course

This course (Teaching Impacts of Technology: Data Collection, Use, and Privacy) is highly rated by learners, indicating that most are satisfied with the content, assignments, and instructors. Key course features include engaging lectures and assignments regarding data privacy. The instructor's expertise is another positive according to multiple reviewers. Many learners recommend this course.
Learners recommend this course
Knowledgeable and helpful instructor
"This course is very nice, contents and videos are too good."
Engaging lectures and assignments
"learned a lot!"
"Excellent material"
"This course is very nice, contents and videos are too good."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Teaching Impacts of Technology: Data Collection, Use, and Privacy with these activities:
Review Privacy and Security Concepts
Review foundational concepts in privacy and security to understand how personal data is handled and protected online.
Show steps
  • Read articles or watch videos on privacy and security concepts.
  • Summarize key points and make notes for future reference.
Compile a List of Privacy Resources
Gather and organize valuable resources to enhance understanding of privacy concepts and best practices.
Browse courses on Privacy
Show steps
  • Research and identify relevant resources.
  • Categorize and organize the resources.
  • Share the compiled list with others.
Practice Using Privacy Settings on Social Media
Gain hands-on experience adjusting privacy settings on social media platforms to enhance data protection.
Browse courses on Social Media
Show steps
  • Identify different social media platforms used.
  • Explore privacy settings and understand their implications.
  • Configure privacy settings to control data sharing.
  • Review privacy settings periodically and make adjustments as needed.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend a Data Privacy Conference or Workshop
Connect with experts and learn about the latest trends and best practices in data privacy.
Browse courses on Data Privacy
Show steps
  • Identify relevant conferences or workshops.
  • Register and attend the event.
  • Network with other attendees and share knowledge.
Read 'Surveillance Valley' by Julia Angwin
Gain insights into the history and impact of surveillance technologies on personal data and privacy.
Show steps
  • Read the book and take notes on key concepts.
  • Identify examples of data collection and privacy concerns discussed in the book.
  • Discuss the book with others and share perspectives on the implications of surveillance.
Mentor Students in Privacy and Data Protection
Share knowledge and provide guidance to others interested in enhancing their understanding of privacy and data protection.
Browse courses on Mentoring
Show steps
  • Identify opportunities to mentor students.
  • Share resources and provide guidance.
Design a Privacy Policy for a Personal Website
Develop a privacy policy that outlines how personal data will be collected, used, and protected on a personal website.
Show steps
  • Research best practices for privacy policies.
  • Identify the types of personal data collected on the website.
  • Determine how the data will be used and shared.
  • Draft a clear and concise privacy policy.
  • Publish the privacy policy on the website.
Contribute to an Open-Source Privacy Tool
Gain practical experience and contribute to the development of privacy-enhancing tools.
Browse courses on Open-Source
Show steps
  • Identify open-source privacy tools.
  • Choose a project to contribute to.
  • Submit code contributions or documentation improvements.

Career center

Learners who complete Teaching Impacts of Technology: Data Collection, Use, and Privacy will develop knowledge and skills that may be useful to these careers:
Data Scientist
Data Scientists are responsible for using data to solve business problems. This course could be useful for those interested in a career as a Data Scientist, as it provides a foundation in data analysis and machine learning.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer systems and networks from unauthorized access and attacks. This course may be useful for those interested in a career as a Cybersecurity Analyst, as it provides a foundation in cybersecurity and data protection.
Information Security Analyst
Information Security Analysts are responsible for protecting computer systems and networks from unauthorized access and attacks. This course may be useful for those interested in a career as an Information Security Analyst, as it provides a foundation in cybersecurity and data protection.
Security Analyst
Security Analysts are responsible for protecting computer systems and networks from unauthorized access and attacks. This course may be useful for those interested in a career as a Security Analyst, as it provides a foundation in cybersecurity and data protection.
Privacy Analyst
Privacy Analysts are responsible for developing and implementing policies and procedures to protect personal data. This course may be useful for those interested in a career as a Privacy Analyst, as it provides a comprehensive overview of data privacy issues.
Data Architect
Data Architects are responsible for designing and managing data systems. This course may be useful for those interested in a career as a Data Architect, as it provides a foundation in data analysis and management.
Data Engineer
Data Engineers are responsible for building and maintaining data pipelines. This course may be useful for those interested in a career as a Data Engineer, as it provides a foundation in data analysis and management.
Cloud Architect
Cloud Architects are responsible for designing and managing cloud computing systems. This course may be useful for those interested in a career as a Cloud Architect, as it provides a foundation in cloud computing concepts and technologies.
Computer Scientist
Computer Scientists are responsible for developing and researching new computer technologies. This course may be useful for those interested in a career as a Computer Scientist, as it provides a foundation in computer science concepts and technologies.
Database Administrator
Database Administrators are responsible for managing and maintaining database systems. This course may be useful for those interested in a career as a Database Administrator, as it provides a foundation in database management and administration.
Network Engineer
Network Engineers are responsible for designing, implementing, and maintaining computer networks. This course may be useful for those interested in a career as a Network Engineer, as it provides a foundation in computer networking concepts and technologies.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between software development and IT operations. This course may be useful for those interested in a career as a DevOps Engineer, as it provides a foundation in software development and IT operations.
Software Developer
Software Developers are responsible for designing, developing, and maintaining software applications. This course may be useful for those interested in a career as a Software Developer, as it provides a foundation in computer science concepts and technologies.
Software Engineer
Software Engineers are responsible for designing, developing, and maintaining software applications. This course may be useful for those interested in a career as a Software Engineer, as it provides a foundation in computer science concepts and technologies.
Data Analyst
Data Analysts are responsible for collecting, cleaning, and analyzing data to identify trends and patterns. This course may be useful for those interested in a career as a Data Analyst, as it provides a foundation in data collection, use, and privacy.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Teaching Impacts of Technology: Data Collection, Use, and Privacy.
Offers a comprehensive look at the data industry, how it works, and the implications for our privacy and freedom. It must-read for anyone interested in understanding the challenges of protecting personal data in the digital age and provides a valuable historical context for many of the issues discussed in the course.
Excellent and accessible resource for learning about the history and science of cryptography, including ciphers, hashing, encryption, and SSL. While not specifically focused on personal data privacy, it provides a valuable foundation for understanding the technologies used to protect data online.
Provides a comprehensive overview of the Fourth Industrial Revolution, including its impact on technology, society, and the economy. While not specifically focused on personal data, it offers a valuable context for understanding the broader challenges and opportunities posed by the digital age.
Explores the possible futures of humanity, including the role of technology in shaping our destiny. While not specifically focused on personal data, it offers a valuable perspective on the broader implications of the digital age.
Provides a valuable perspective on the challenges and opportunities of innovation in the digital age. While not specifically focused on personal data, it offers insights that are relevant to the course.
Provides a valuable perspective on the challenges and opportunities of entrepreneurship in the digital age. While not specifically focused on personal data, it offers insights that are relevant to the course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Teaching Impacts of Technology: Data Collection, Use, and Privacy.
Teaching Impacts of Technology: Fundamentals
Most relevant
Teaching Impacts of Technology: Workplace of the Future
Most relevant
Teaching Impacts of Technology: Relationships
Most relevant
Teaching Impacts of Technology: Global Society
Most relevant
Capstone Project: Teaching Impacts of Technology
Most relevant
Green IT and Technology Sustainability: The Big Picture
Most relevant
Cloud Computing Fundamentals: Governance, Risk,...
Tableau Desktop Specialist - Understanding Dimensions vs....
Quantum Computing: Executive Briefing
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser