Want to create interactive content? It’s easy in Genially!

Get started free

Key activity: Digital survival manual

Dulce Andrea Rodríguez Velázquez

Created on October 21, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Audio tutorial

Pechakucha Presentation

Desktop Workspace

Decades Presentation

Psychology Presentation

Medical Dna Presentation

Geometric Project Presentation

Transcript

Digital survival manual

TEAM 4

Dulce Andrea Rodríguez Velázquez, Ximena Pérez Carrillo , Daniela Hérnandez Landa

A01739809

A01739219

A01739603

November 15th, 2024

- Leonardo AI. (2024). Leonardo AI [Artificial intelligence platform]. Image generated using the prompt “Create a dynamic superhero with the extraordinary ability to hack the systems with a mental connection to the internet. Red hair with streaks of earthy brown, and piercing eyes with an intense, golden-brown iris, resembling warm honey, radiating intelligence,” by Leonardo Ai, 2022 (https://app.leonardo.ai/)

Star

Story

Real Name

Logo

Super Power

Leonardo AI. (2024). . Superhero with a black suit with blue lines. https://app.leonardo.ai/canvas

FIREWALL

Story

Real name

Logo

Superpower

Leonardo Ai. (2023).(Version 2) [Make an image of a boy who wears glasses and likes computers]. https://leonardo.ai Leonardo Ai. (2023). (Version 2) [Image of a superhero that uses digital power and has a purple and green suit,make him strong and with a mask ].https://leonardo.ai

Cyber sentinel

Story

Real name

Logo

Powers

Intext

Digital World

Information Privacy

Collaborative Tools

Digital Security

Learning Management Systems

Phishing

Intellectual Property

Ethics in the use of information

Copyright

Plagiarism

References

Digital World

Relationship with superheroes

DEFINITION: The "digital world" refers to the global environment shaped by digital technologies that permeate everyday life. This world encompasses the virtual spaces created by computers, the internet, and digital networks, influencing how we work, communicate, and interact with information. As a result, human experiences, both personal and professional, are increasingly mediated by digital tools and platforms, ranging from social media to online banking and e-commerce (Lengsfeld, 2018).

HISTORICAL CONTEXT

SUGGESTIONS

Information Privacy

específicos

Relationship with superheroes

HISTORICAL EXAMPLES: The CCPA, passed in 2018, strengthened data privacy rights for California residents. It gave consumers more control over their personal information, including the right to know what data is being collected, the ability to opt-out of data sales, and the right to request the deletion of personal data. This law has set a precedent in the U.S., with other states adopting similar frameworks to protect information privacy (Consumer Federation of California, 2020).

SUGGESTIONS:- Ensure that privacy settings are properly configured on social media and other online accounts. Regularly review and update permissions to limit the access third-party apps have to personal data.

Digital security

Relationship with superheroes

DEFINITION: Digital security, also known as information security, is the practice of protecting digital information from unauthorized access, use, disclosure, disruption,modification, or destruction. (EC-Council University, n.d)

HISTORICAL CONTEXT

SUGGESTIONS

Plagiarism

específicos

Relationship with superheroes

HISTORICAL EXAMPLES: Barack Obama: During his campaign, Barack Obama faced accusations of plagiarism from rival Hillary Clinton, who claimed he copied words from Governor Deval Patrick. Patrick responded by saying the accusation was unfair and excessive, noting that both candidates were just trying to win votes. He explained that while Obama's 2004 campaign used the slogan "Yes We Can," he had also used similar phrases in 2006. Clinton countered that if a campaign relies on words, they should be original. Patrick disagreed, saying that great ideas matter more than just words and that they often share common themes. He also mentioned his strong bond with Obama over the past 15 years, saying such accusations are common in politics. In the end, Obama admitted he should have given Patrick proper credit for his words.

SUGGESTIONS:- Site your source - Include quotations - Use a plagiarism checker (Grammarly, n.d).

Ethics in the use of information

Relationship with superheroes

DEFINITION: Ethics in the use information means to use the information appropriately and ethically in order to be used responsibly. This idea is approached in two ways: first, by addressing the problems of copyright and plagiarism. Giving credit where credit is due and appropriately referencing other people's work are vital (Information Literacy, 2024).

HISTORICAL CONTEXT

SUGGESTIONS

Phishing

específicos

específicos

Relationship with superhe roes

HISTORICAL EXAMPLES: In recent years, many organizations have recognized the threat of phishing and implemented comprehensive training programs to educate employees about how to identify and respond to phishing attempts. For example, companies like Google and Microsoft have launched internal campaigns that simulate phishing attacks to test and improve employee awareness. As a result, organizations have seen a significant decrease in successful phishing attempts, as employees become more vigilant and knowledgeable about identifying suspicious emails and messages. This proactive approach has led to a culture of cybersecurity awareness that benefits both the organization and its employees. (KnowBe4, 2023)

SUGGESTIONS:- Develop and implement educational campaigns for employees and the general public to raise awareness about phishing tactics and how to identify them. Utilize workshops, webinars, and interactive training sessions to engage participants.

Collaborative Tools

Relationship with superheroes

DEFINITION: Collaboration broadly describes how different people work together on a shared project. But in the context of digitalisation in companies of all sizes, we talk about digital collaboration. This relates to technology-supported remote collaboration between teams working in apaperless office–relying on collaboration tools. (D.velop g, n/d)

HISTORICAL CONTEXT

SUGGESTIONS

Learning Management Systems

específicos

Relationship with superheroes

HISTORICAL EXAMPLES: The University of Phoenix has been a pioneer in using LMS for online education since the early 2000s. They leveraged their proprietary LMS, which enabled flexible learning opportunities for adult learners, providing access to course materials, discussion forums, and assessments. The implementation of their LMS significantly increased enrollment and student retention rates. It also allowed for a more personalized learning experience, accommodating the diverse needs of their student population. (University of Phoenix, n.d)

SUGGESTIONS:Comparative Analysis Conduct a comparative analysis of various LMS platforms (e.g., Moodle, Blackboard, Canvas, Google Classroom) to evaluate their features, user experiences, and suitability for different educational contexts (K-12, higher education, corporate training).

Intellectual Property

Relationship with superheroes

DEFINITION: Any creative work, including books, artwork, inventions, designs, names, symbols, pictures, computer code, etc., is considered intellectual property. Copyright, trademarks, and patents are all covered under intellectual property law, which was established to safeguard creators (University of Pittsburgh, 2024)

HISTORICAL CONTEXT

SUGGESTIONS

Copyright

Relationship with superheroes

HISTORICAL EXAMPLES: Vanilla v. Queen and David Bowie Ice: Copyright and music go hand in hand like Sonny and Cher. The most well-known copyright cases are those involving rock icons David Bowie and Queen and rapper Vanilla Ice. If the first few seconds of Ice's 1990 smash song "Ice Ice Baby" sounded like Queen and Bowie's "Under Pressure," you're not the only one. Bowie and Queen filed a copyright infringement lawsuit. Although Ice acknowledged that his song borrowed "Under Pressure," he claimed that the bass line set it apart. They reached an out-of-court settlement. Ice credited Queen and Bowie with authoring the song.

SUGGESTIONS:- Understand what copyright laws protect - Do not copy anything Don’t use any content without consent

PRINCIPAL PAGE

References

Abion Legal. (n.d.). Famous trademark cases and what to learn from them. Retrieved October 23, 2024, from https://abion.com/famous-trademark-cases-and-what-to-learn-from-them/Airways Magazine. (2015, December 18). How the Wright brothers' patent battle shaped American aviation. Retrieved October 23, 2024, from https://www.airwaysmag.com/legacy-posts/wright-brothers-patent Allen, Dyer, Doppelt + Gilchrist, P.A. (n.d.). Tips for avoiding copyright infringement. Retrieved from https://allendyer.com/tips-for-avoiding-copyright-infringement/ ANEPSA. (n.d.). Differences between IMP/ and INDAUTOR. Retrieved October 23, 2024, from https://anepsa.com.mx/en/differences-between-impi-and-indautor/ Cadwalladr, C., & Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-electionCalifornia Department of Justice. (n.d.). Top ten facts about identity theft. Office of the Attorney General. Retrieved from https://oag.ca.gov/idtheft/facts/top-ten Centers for Disease Control and Prevention. (n.d.). Historical perspective on unethical studies: The Tuskegee syphilis study. PubMed Central. Retrieved from https://pmc.ncbi.nlm.nih.gov/articles/PMC11060189/#:~:text=Historical%20perspective,the%20U.S.%20Public%20Health%20ServiceCisco. (n.d.). What are password security and protection? Retrieved from https://www.cisco.com/c/en/us/products/security/what-are-password-security-and-protection.htmlCisco. (n.d.). What is malware? Retrieved from https://www.cisco.com/site/us/en/learn/topics/security/what-is-malware.html-c Consumer Federation of California. (2020). California Online Privacy Protection Act (CalOPPA). Retrieved from https://consumercal.org/about-cfc/cfc-education-foundation/california-online-privacy-protection-act-caloppa-3/Cornell University. (n.d.). What is Turnitin? Teaching and Learning Services. Retrieved from https://teaching.cornell.edu/learning-technologies/assessment-tools/turnitin Creative Commons. (n.d.). About Creative Commons. Retrieved from https://creativecommons.org/about/ CrossPlag. (2023). Most famous cases of plagiarism. Retrieved from https://crossplag.com/most-famous-cases-of-plagiarism Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). Understanding website certificates. Retrieved from https://www.cisa.gov/news-events/news/understanding-website-certificates#:~:text=If%20a%20website%20has%20a,actually%20belongs%20to%20that%20organization

NEXT

PRINCIPAL PAGE

DataShield Corp. (n.d.). The 5 worst cases of identity theft ever. Retrieved from https://datashieldcorp.com/5-worst-cases-of-identity-theft-ever/#:~:text=In%202001%2C%20Abraham%20Abdallah%20duped%20several%20credit,sitting%20at%20home%20in%202003%20when%20policeDeNicola, L. (2023). How to manage your privacy settings on social media. Retrieved from https://www.experian.com/blogs/ask-experian/how-to-manage-your-privacy-settings-on-social-media/ D.velop AG. (n.d.). Digital collaboration tools. Retrieved from https://www.d-velop.com/solutions/digital-collaboration-tools Dublin City Schools. (n.d.). Google classroom. Retrieved from https://www.dublinschools.net/GoogleClassroom Duignan, B. (2024). Dot com bubble. Retrieved from https://www.britannica.com/money/dot-com-bubble EC-Council University. (n.d.). What is digital security: Overview, types, and application. Retrieved from https://www.eccu.edu/blog/technology/what-is-digital-security-overview-types-and-application/El Comercio. (2023, January 27). Mydoom: El virus que causó una pandemia informática y fue el más caro de la historia. Retrieved from https://elcomercio.pe/tecnologia/actualidad/mydoom-el-virus-que-causo-una-pandemia-informatica-y-fue-el-mas-caro-de-la-historia-espana-estados-unidos-Ethics.org. (n.d.). Reducing risk: Free toolkit for organizations. The Ethics & Compliance Initiative. Retrieved from https://www.ethics.org/resources/free-toolkit/reducing- Experian. (n.d.). What is identity theft? Retrieved from https://www.experian.com/blogs/ask-experian/what-is-identity theft/#:~:text=Identity%20theft%20occurs%20when%20someone,and%20more%20without%20your%20consentFederal Trade Commission. (n.d.). How to recognize and avoid phishing scams. Retrieved from https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing- Freedom Forum. (n.d.). Famous copyright cases. Retrieved from https://www.freedomforum.org/famous-copyright-cases/ GitHub. (n.d.). The second half of software supply chain security on GitHub. Retrieved from https://github.blog/security/supply-chain-security/the-second-half-of-software-supply-chain-security-on-github/Google. (2017). Google Docs phishing attack exposed. Retrieved from https://www.google.com Google. (2023). Sharing documents securely. Retrieved from https://support.google.com Google. (n.d.). Google Workspace for Education overview. Retrieved from https://edu.google.com/workspace-for-education/editions/overview/

NEXT

FORMER

PRINCIPAL PAGE

Grammarly. (n.d.). 5 most effective methods for avoiding plagiarism. Retrieved from https://www.grammarly.com/blog/plagiarism/5-most-effective-methods-for-avoiding-plagiarismGreenberg, A. (2018). The untold story of NotPetya, the most devastating cyberattack in history. Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/Help Net Security. (2018). Chrome starts marking all HTTP sites as "Not secure". Retrieved from https://www.helpnetsecurity.com Hern, A. (2021, October 5). Facebook outage: What went wrong and why did it take so long to fix? The Guardian. Retrieved from https://www.theguardian.com/technology/2021/oct/05/facebook-outage-what-went-wrong-and-why-did-it-take-so-long-to-fixHunt, T. (2015, August 19). Inside the Ashley Madison data breach. Troy Hunt Blog. Retrieved from https://www.troyhunt.com/ashley-madison-data-breach-q/ IB Systems. (2015, November 11). The evolution and continued existence of Lotus Notes. Retrieved from https://www.ibsi-us.com/2015/11/the-evolution-and-continued-existence-of-lotus-notes/International Intellectual Property Alliance. (2023). 2023 Special 301 Report: Mexico. Retrieved October 23, 2024, from https://ipa.org/files/uploads/2023/01/2023MEXICOSPEC301-1.pdfIris Identity Protection. (n.d.). Write your own life story: Martin Guerre. Retrieved from https://www.irisidentityprotection.com/blog/write-your-own-life-story/#:~:text=Martin%20Guerre.%20Born%20a%20French%20peasant%2C%20Martin,in%201548%2C%20never%20to%20be%20seen%20againKaspersky. (2023). Two-factor authentication and why it's important. Retrieved from https://support.kaspersky.com/help/KPM/Mac10.2/en-US/251389.htm KnowBe4. (2023). The importance of security awareness training. Retrieved from https://www.knowbe4.com/security-awareness-training Krebs, B. (2016). TeslaCrypt ransomware authors call it quits, release master key. Retrieved from https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and- Krebs, B. (2017). WannaCry ransomware and its impact. https://krebsonsecurity.com/tag/wannacry/ Leiner, B. (1997). A brief history of the internet. https://www.internetsociety.org/internet/history-internet/brief-history-internet/ Leonardo Ai. (2023).(Version 2) [Make an image of a boy who wears glasses and likes computers]. https://leonardo.ai Lengsfeld, J. (2018). Digital Era Framework. https://joernlengsfeld.com/en/publication/digital-era-framework/ Liu, H. (2015). Challenges and issues in the use of learning management systems: A review of literature. International Journal of Information and Education Technology, 5(5), 396–400. https://doi.org/10.7763/IJIET.2015.V5.591

FORMER

NEXT

PRINCIPAL PAGE

Mansour, R. (2023). Iraq 20 years on: Insider reflections on the war and its aftermath. https://www.chathamhouse.org/2023/03/iraq-20-years-insider-reflections-war-and-its-aftermath/how-misinformation-defeatedMicrosoft. (2022). How to protect your device with Windows Security. https://support.microsoft.com/en-us/windows/help-protect-my-device-with-windows-security- Microsoft. (2022). Protect yourself from phishing. https://support.microsoft.com/en-us/windows/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184- Musgrove, M. (2024). Famous cases of information security breaches. Syteca.https://www.syteca.com/en/blog/real-life-examples-insider-threat-caused-breaches National Security Agency. (n.d.). The German Enigma Machine. National Cryptologic Museum. https://www.nsa.gov/about/cryptologic-heritage/center-cryptologichistory/pearl-harbor-review/enigma-machine/Outlier Patent Attorneys. (n.d.). Patent licensing: What is a patent license?. Retrieved October 23, 2024, from https://outlierpatentattorneys.com/patent-licensePBS NewsHour. (2014, May 30). Los Angeles schools' iPads rollout struggles with implementation issues. PBS. https://www.pbs.org/newshour/nation/los-angelesschools-ipads-implementationPerroth, N. (2016, December 14). Yahoo says 1 billion user accounts were hacked. The New York Times. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html Peters, J. (2019). A brief history of data ethics. DATAVERSITY. https://www.dataversity.net/a-brief-history-of-data- Ponemon Institute. (2014). 2014 Cost of Data Breach Study: United States. https://www.ponemon.org/news-updates/blog/security/ponemon-institute-releases-2014- Ponemon Institute. (2018). 2018 Cost of Data Breach Study. https://www.ponemon.org Robinson,L.(2023). The Long Shadow of the Iraq War: Lessons and Legacies Twenty Years Later. https://www.cfr.org/article/long-shadow-iraq-war-lessons-and-legacies-twenty-years-laterRosas, A. (2024, February 21). Luismi vs. Miguel Alemán Heredia. El Heraldo de México. Retrieved October 23, 2024, from https://heraldodemexico.com.mx/opinion/2024/2/21/luismi-vs-miguel-aleman-heredia-579656.htmlShopify. (n.d.). What is a trademark?. https://www.shopify.com/blog/what-is-a-trademark Stanford University. (n.d.). The Xerox PARC visit. Retrieved October 23, 2024, from https://web.stanford.edu/dept/SUL/sites/mac/parc.html Smowl. (2024). What is a digital fingerprint? Smowl.net. https://smowl.net/en/blog/what-is-a-digital-fingerprint/

NEXT

FORMER

PRINCIPAL PAGE

Symantec. (2011). W32.Stuxnet dossier. https://www.security.com/threat-intelligence/stuxnet-dossier-espionage Twitter. (2020). Bitcoin scam investigation. https://www.dfs.ny.gov/Twitter_Report TechTarget. (n.d.). What is a learning management system (LMS)? https://www.techtarget.com/searchcio/definition/learning-management- The Norwegian National Research Ethics Committees. (n.d.). The history of research ethics. The Research Ethics Library. https://www.forskningsetikk.no/en/resources/the-research-ethics-library/introduction/the-history-of-research-ethics/Trademarkroom. (n.d.). Choosing a trademark for your brand. https://trademarkroom.com/blog/item/choosing-trademark-for-your-brand/University of Pittsburgh. (n.d.). Copyright & intellectual property: Definitions. https://pitt.libguides.com/copyright/definitions University of Oxford. (n.d.). Plagiarism. Oxford Student Academic Guidance. https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism#:~:text=%E2%80%9CPresenting%20work%20or%20ideas%20from,your%20work%20withUniversity of Phoenix. (n.d.). University of Phoenix: Leading the way in online education. https://www.phoenix.edu/blog/the-future-of-online-education.html United Nations University. (2021). The global e-waste monitor 2021: Quantities, flows, and the circular economy (No. 5). https://globalewaste.org Wikimedia Commons. (n.d.). Commons: Licensing. Wikimedia Commons. https://commons.wikimedia.org/wiki/Commons:Licensing Wikipedia contributors. (n.d.). List of major Creative Commons licensed works.https://en.wikipedia.org/wiki/List_of_major_Creative_Commons_licensed_works Young Scot. (n.d.). #DigiKnow: Cyber scams. Young Scot. https://young.scot/get-informed/digiknow-cyber-scams/ Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon. Crown. https://www.docdroid.net/JhkoIKe/kim-zetter-countdown-to-zero-day-stuxnet-and-the-launch-of-the-worlds-first-digital-weapon-crown-publishers-2014-pdfZetter, K. (2016, July 25). How the hackers stole the DNC's data. Wired. https://www.wired.com/2016/07/hackers-stole-dnc-data/

FORMER

HISTORICAL EXAMPLES - World War II: Two significant turning points in the history of research ethics are the Manhattan Project, which developed atomic bombs, and the scientific tests carried out on prisoners of war in concentration camps.(Ruyter, 2019).

HISTORICAL EXAMPLES - This poor handling of security and slow response made many people lose trust in Yahoo. The company's value dropped, and they ended up being sold to Verizon for a much lower price. This case shows how ignoring digital security can lead to big problems. It teaches us how important it is to protect user data, respond quickly to security issues, and be transparent with customers when things go wrong. (Perroth, 2016)

HISTORICAL EXAMPLEThe ARPANET, developed in the late 1960s by the U.S. Department of Defense's ARPA, was an early example of the digital world. It introduced packet-switching technology, enabling efficient and secure data transmission. ARPANET's success led to the creation of TCP/IP protocols, forming the basis of the modern internet and revolutionizing global communication and technological innovation (Leiner, 1997).

HISTORICAL EXAMPLES 1. Anne's Statute (1710): Before the United States was even established, the British government passed the Statute of Anne, which is frequently cited as the first copyright law in history. This rule was first passed by the British Parliament in 1710 in reaction to the pervasive book and literary piracy that was occurring at the time. Before this, authors could not stop others from creating and selling copies of their works without their consent because they lacked legal protection for them. By giving writers a brief period of copyright protection, the Statute of Anne altered that and established the framework for contemporary copyright regulations.

HISTORICAL EXAMPLES - Ford's attempt to implement an ERP system without properly aligning team collaboration led to project delays and cost overruns. Poor user training and resistance to change caused the project to fail. (Sanka, 2023)