Professional Documents
Culture Documents
9003-002
Professor Heather Hill
November 24 2017
PRIVACY MATTERS 2
Table of Contents
Program Title ..... 3
Audience 3
Program Outcomes .... 3
Program Agenda ..3
Hand Out ...8
Analysis of Outline ..9
Student Learning ...9
Student Outcomes. 9
Maintaining Attention... 9
Active Learning .........10
Evaluative Measures ..10
Annonymous Survey........10
Professor Feedback .... 11
Future of the Presentation ...11
Reflection ... 11
References ..... 13
Appendices . 15
PRIVACY MATTERS 3
Program Title
Privacy Matters
Audience
The Audience is first year classes at Western University. This program was originally
designed with the purpose of a guest lecture to an Introduction to Womens Studies class,
however, can be applicable for all students at the first to possibly fourth year level.
Program Outcomes
1. Students will develop an understanding of what privacy and surveillance means,
specifically within their own lives.
2. Students will explore resources to protect their personal information online.
3. Students will be challenged to relate concepts learned to their own personal experiences.
Program Agenda
This program will follow a power point presentation located in Appendix A.
Outline
1. Introduce yourself. (approx. 2 mins.)
a. Include your title as an academic librarian, education, and related experience to
qualify yourself to speak on online privacy.
2. Introduce the presentation (approx. 5 mins.)
a. Sample Script: I am going to give you some tools to critically think about
privacy issues and what these issues mean for you individually. I hope to persuade
you to examine what private information about yourself is online, and give you a
few tools to try to limit this information.
3. Engage the class in critical thinking questions. Generate discussion (approx. 15 mins.).
a. Pose questions getting the class to first break into groups of 4-5. Depending on
the physical structure of the classroom.
i. What does privacy mean to you?
ii. How does privacy online affect you?
iii. Were there any moments you felt your privacy had been invaded online?
iv. What current strategies do you use online to protect your privacy?
v. do you think everyone should a right to privacy?
PRIVACY MATTERS 4
b. circulate the classroom looking to make sure everyone is on track. Ask questions
and engage in groups conversation when appropriate.
c. Regather class. Each question again but to the group and see if you can get a
group to say what they spoke about.
i. Prompt responses to challenge their point to highlight the nuance of
privacy issues, specifically when posing the question should everyone
have a right to privacy.
d. Ask show of hands questions.
i. Show of hands, how many of you currently use tools online to protect
your privacy.
i. Ask if anyone wants to share any tools they use. Hopefully
gathering a discussion of the previous experience, they have on the
subject.
ii. Show of hands, how many of you feel in control of what information is
retrievable and collected on yourself online
4. Case studies on invasions of privacy highlighting pervasiveness and social consequences
(approx. 10 mins):
a. Standard Innovation
i. Canadian company creators of Smart Vibrators involved in a 3.75-million-
dollar lawsuit.
ii. Their blue tooth enabled WeVibe when connected with the accompanying
phone app was tracking private data, and was hackable.
iii. The WeVibe connect function was designed as a way for couples in long
distance relationships.
iv. Did not state they were tracking information.
v. Private information on intimate moments were being tracked and the data
was being saved. It was unclear as to what it was being used for, or
intended on being used for.
b. Facebook
i. Had a preference for advertisers to exclude specific Ethnic Affinities.
ii. Ethnic affinities were determined based on data collected about the user.
PRIVACY MATTERS 5
a. Tor Network
i. An alternative browser which makes it difficult for anyone to track you
ii. The network sends your signal through to 3 different locations creating
b. DuckDuckGo
i. DuckDuckGo is a search engine that does not track you.
ii. Your searches will not be tailored to your location or your previous
searches.
PRIVACY MATTERS 7
Hand out
Privacy M atters!
by Andrea McDonald
Arguing that you dont care about the right to privacy because you have
nothing to hide, is no different than saying you dont care about free speech
because you have nothing to say.
-Edwar d Snowden
A trail of data (information) left by ones activity in a The combination of the word producer and
digital environments. consumer. A Prosumer assists in the creation and
consumption of a product.
_____________________________
PRIVACY MATTERS 9
Analysis of Outline
Student Learning
I am basing my outline on Robert Gagnes (1985) Nine Events of Instruction, while
incorporating additional instructional methods to cater specifically to my audience and my
material. As Crane states, it is best not to advocate one learning theory but stress that
instructional strategy and content depend on the level of the learners (2017, 27). According to a
study done by the Pew Research Centre in 2015 young adults are the more likely to take actions
to preserve their privacy online then other generations (Rainie, 2015). It is essential to not
patronize the students, but rather look to expand on what they might currently know. This is why
I have structured a class discussion towards the beginning of the class. By generating discussion
early, I allow the students to develop knowledge from their peers, rather than solely from the
instructor.
Student Outcomes
I am hoping to not only teach students skills on maintaining privacy, but to engage
students to critically examine current privacy issues online. Karen Markey and Chris Leeder note
that there are three approaches to conceptualizing and teaching information literacy: as a set of
attributes, as knowledge construction, or as enabling critical thinking (2014, 24). Currently,
most information literacy programs view information literacy as a set of attributes. However,
conceptualizing information literacy as a skill, and instructing through skills based learning, has
been seen to lack the promotion of critical reflection on why students benefit from information
literacy skills. (Markey and Leeder, 2014).
I will be enabling critical thinking by asking students to reflect on how they view
privacy, presenting them with current case studies, and asking them to begin to think about what
information they currently have public. I will then put a minor focus on skills that they may use
depending on how they conceptualize privacy.
Maintaining Attention
Mariann Lkse et al. in Teaching Information Literacy in Higher Education mention
attention selectivity, claiming that clear goals will help promote top-down processing, allowing
the larger concepts to be retained first followed by any other additional stimuli (2017). By
mentioning the goal of the presentation early, addressing step two of Gagnes Nine Events of
PRIVACY MATTERS 10
Instruction, the outcomes will become clear to the students helping maintain attention.
I began the presentation by appealing to the attention of the learners, both by asking
questions specifically to engage existing knowledge, and by addressing a taboo topic. I hope to
shock the students in a way where they will remain attentive, and to appeal specifically to a first
year Womens Studies class.
Active Learning
According to Mariann Lkse et al., active learning activities benefit learners by engaging
them within the learning process itself (2017). My engagement activities allow the learners to
develop a sense of vulnerability and oddness in verbalizing their online activity. This activity
should engage students to develop a sense of sensitivity to the information they place online.
This presentation focuses on active learning through providing a learning environment
that encourages participation. It is important to consider, while this is an introductory class, this
age range is already using additional privacy measures online (Rainie, 2015). Promoting an
active learning style is essential for this presentation to build off students existing knowledge and
experiences. It would not be helpful for the instructor to present without an understanding of the
specific class.
By providing multiple opportunities for engagement I am hoping to avoid passive
learning. Each response from a student will be met without judgement, with a response of
encouragement, or challenging them to look deeper into their contribution.
Evaluative Measures
Anonymous Survey
There will be a small survey, found in Appendix B, distributed at the end of the lecture.
This survey will be printed on paper with three surveys to a page and cut earlier. The survey will
help dictate the effectiveness of presentation, and will determine future tactics to better the
success of the program. The survey will focus on how the presentation effects students learning
within their program and in every-day life.
Professor Feedback
A follow up email will be sent to professors. The sample email may be found in
Appendix C. This email will begin with a thank you and then briefly and generally ask for
feedback. This email will give feedback leaving time to evaluate long term effectiveness of the
PRIVACY MATTERS 11
class. It is important to consider the professor most likely will not have been at the class, and to
not specifically ask them for personal feedback.
As most staff and faculty do have a significant amount of emails, we will not rely heavily
on this feedback, but rather regard it as supplementary to the student feedback. If there is an
opportunity to follow up with the professor face-to-face, that would be preferred.
Future of the Presentation
After evaluating the success of this program, our D.B. Weldon will consider expanding
the program. Results from student surveys and from possible professor feedback, will be
compiled and evaluated. If the Womens Studies class presentation is successful, we will
consider expanding the program to alternative first year classes.
Reflection
Through planning this instruction, I have learned that effective instruction does not rely
heavily on lecturing and multiple concepts. Effective instruction, specifically within information
literacy, should be a way of engaging learners critical thinking skills. I planned my lesson
considering the learner, the end goal or product, and the evaluation and assessments (Fulton
and McGinness, 2016, 28). I am hoping to present a learning experience specifically to a first
years Womens Study class, on privacy concerns, with the assumption that this class may or may
not already obtain a variety of knowledge on this topic. I attempted to gear my lesson towards
those at a higher level of education, using Mariann Lkse et al. in Teaching information literacy
in higher education as a resource which allowed me to adjust my presentation from less of a
lecture, to more of a collaborative learning environment conducive to the learning styles of
adults (2017).
I based most of my format related decisions on Robert Gagnes (1985) Nine Events of
Instruction found in Cranes book How to teach: A practical guide for librarians. First
gain[ing] the attention of the learner and stimulated prior learning through the introductory
participation and the scandalized examples; then informing the objective; followed by
presenting new content on Edward Snowden, digital footprints, and prosumers. The activity of
sharing information with a partner, writing students digital footprints, and briefly discussing how
this activity went follows Gagnes steps f5 and 6 in guided learning and eliciting
performance. The task allows them to form their own conclusions, specifically personalized to
themselves, and their own information, applying principles and issues previously stated. I then
PRIVACY MATTERS 12
provide feedback through the form of suggestions, providing students with a few tools to help
them gain some privacy online. Lastly, steps 8 and 9 are done throughout the class through
participation and providing brief feedback during the two activities. (Crane, 2014).
My original intent was to present a number of different concepts, methods, and skills to
protect online privacy and conclude with a single group activity. However, upon reading the
literacy surrounding pedagogy, information literacy, and online privacy I found lecturing to be a
technique that would not be effective. I tried to focus on engaging in critical thinking before
presenting possible new skills. This method allows students to understand not only that
additional online privacy measures exist, but why they exist, and why or why not one would use
these methods. Of course, it was necessary to incorporate sections of the lesson where there was
new content, however, after reflecting on the literature, I managed to cut a significant number of
theoretical concepts.
References
The following sources were helpful in developing knowledge on Privacy and
Surveillance.
Andrews, L. B. (2013). I know who you are and I saw what you did: social networks and the
death of privacy. New York: Free Press.
Batra, N. D. (2008). Digital freedom: how much can you handle? Lanham: Rowman &
Littlefield.
Bogart, N. (2017, March 14). Canadian sex toy maker settles $4M lawsuit claiming We-Vibe
tracked private data. Retrieved November 22, 2017, from
https://globalnews.ca/news/3308543/we-vibe-privacy-lawsuit-settlement/
Chaykowski, K. (2016, November 11). Facebook to ban 'Ethnic Affinity' targeting for housing,
employment, credit-related ads. Retrieved November 22, 2017, from
https://www.forbes.com/sites/kathleenchaykowski/2016/11/11/facebook-to-ban-ethnic-
affinity-targeting-for-housing-employment-credit-related-ads/#3c7e776d4442
Fulton, C., & McGuinness, C. A. (2016). Digital detectives: solving information dilemmas in an
online world. Cambridge, MA: Chandos Publishing.
Greenberg, J., & Hier, S. P. (2009). Surveillance: Power, Problems, and Politics. Vancouver:
University of British Columbia Press.
Lamdan, S.S. (2015). Social media privacy: a rallying cry to librarians. Library Quarterly 85(3):
261-277.
Rainie, L. (2016). The state of privacy in post-Snowden America. The Pew Research Center.
Markey, K., Leeder, C., & Rieh, S. Y. (2014). Designing online information literacy games
students want to play. Lanham: Rowman et Littlefield.
Sample Lesson Plan #2. (PDF)
PRIVACY MATTERS 15
Appendix B
This is a sample survey. This survey is to be completed by patrons using an opt-in method.
Dear Students, you are invited to participate in the following survey: Assessment of Protecting
Privacy presented by The D.B. Weldon Library. This survey is entirely confidential and
voluntary. We are currently looking to evaluate the effectiveness of this program on your
everyday life and your studies at Western University.
Appendix C
Sample Email:
Thank you for allowing me to talk to your class. I hope (you and) your students found the
presentation to be helpful. (A sentence relating specifically to the how the class went.)
Please feel free to pass my contact information to any students looking for further information on
the subject.
Thank you,
Andrea McDonald