Unit 4 – Question 1


Question 1: What are some student-friendly “scam scenarios” that you could use in the classroom for encouraging students to critically think about messages they receive? Create your own “fake scam” to share with the community so they can try and spot the tell-tale signs!

  • After capturing their social network account, the scammers will use that account to send their friends, colleagues, and relatives messages to request transfer money. Therefore, many people think that this is their friends and relatives. As a result, they will send money to these accounts that can make them lose a lot of money.
  • When my students confront a phishing application, personal information is usually stolen, such as sensitive information and important data. It usually includes credit cards, private pictures, video, etc.
  • In addition, another type of scam often appears in the kind of comments with links under posts in social accounts, especially on Facebook. When reading these links, some students click out of curiosity. They lead to their Facebook account and allocating personal information. That link also comes with a request to install software such as Flash Player. If the victim installs it on the computer, it will control the whole computer and lose important information and documents stored on the computer.         

In my opinion, I want to advise that my students need to defend themselves by checking to share private information online. Students should not exchange on social networks with unreliable sources.

text-scam.jpg

+ There are no comments

Add yours