Emily’s Cybersecurity Story

After listening to a former USF student Emily’s story about her identity online being used, I reflected on the experience by answering these questions…

  1. What are your reactions to her story?

During the video as Emily was telling her story, It wasn’t surprising to hear that something like what happened to her went on. I watch a lot of “Catfish” on MTV so these types of stories are very familiar to me. However, one thing that shocked me about Emily’s story, in particular, is the fact that “Courtney” was using cancer and chemotherapy to manipulate people she came across. I guess you just don’t think that there are people out there that would use such extreme stories and tactics to trick people, but stories such as this really shed light on the amount of manipulation there is online and in the world.   

  2. What did you learn from her story?

While I have already been aware of my use of Facebook and Instagram, and not sharing too much personal information that people can use, I have not been so smart when it comes to who I friend or let follow me. Hearing Emily explain who she befriends on these social media accounts opened my eyes to where from now on, I’m going to be more careful about who I friend and give access to. Her statement regarding how she will only friend those who she has conversations with in real life and not a stranger who she may happen to have a couple of mutual friends with is something that I will start following. I also learned from Emily’s story that this situation can happen to absolutely anyone. Emily said to herself that she never thought it would happen to her, but then her neighbor used her identity for 2 years!

3. How might you use this story to inform your life or that of others?

I am the older sister to twin 11-year-old girls and I am very protective of them. I find myself giving them advice about so many things regarding talking to strangers on the Xbox, or what to do if they get kidnapped, and other situations like that. It’s only recently that they are starting to get into the whole social media world with TikTok accounts and Instagrams. After hearing Emily’s story I feel like telling them what not to do online, and the amount of information they share would be very beneficial to help prevent something like this happening to them.

CHoMP Method

This weeks assignment was to paraphrase a given text using the CHoMp method. This method is a great way to eliminate any unintentional plagiarism. In this post is the final paraphrased version of the text.

Pedaste, M., Mäeots, M., Siiman, L.A., de Jong, T., van Riesen, S.A.N., Kamp, E.T., Manoli, C.C., Zacharia, Z.C., & Tsourlidaki, E. (2015). Phases of inquiry-based learning: Definitions and the inquiry cycle. Educational Research Review, 14, 47-61. doi:10.1016/j.edurev.2015.02.003.

The Inquiry Cycle is a popular teaching technique within schools, however, we are beginning to see it used in other areas of work. Because of this, the Inquiry Cycle is continuously improving with the technology developments that move it along. When it is used, there is a general “framework” that includes phases from the first step to the last step to make the cycle systematic. These phases include Orientation, Conceptualization, Investigation, Conclusion, and Discussion. Often times, these phases are organized deeper into sub-phases. Since the Inquiry Cycle is used in more ways other than teaching, there are many different frameworks that may or may not include each phase. Some of them may even be in a different order, however, the Discussion phase is most likely present at all times as it connects all of the other phases together.