week 3

1/16/2020 Topic: Week 3 – Discussion 1

https://ashford.instructure.com/courses/57785/discussion_topics/1614954?module_item_id=2922178 1/2

Don't use plagiarized sources. Get Your Custom Essay on
week 3
Just from $13/Page
Order Essay

This is a graded discussion: 1 point possible due Jan 14

Week 3 – Discussion 1 61 61

Your initial discussion thread is due on Day 1 (Tuesday) and you have until Day 7 (Monday) to respond
to your classmates. Your grade will reflect both the quality of your initial post and the depth of your
responses.

Week 3 Current Events Forum [WLOs: 1, 2, 3, 4] [CLOs: 1, 2, 5]

This current events forum is an opportunity to explore the current and constantly evolving world of
technology with your online community of learners. Each week you will research, summarize, and link
to an article (https://community.canvaslms.com/docs/DOC-10617-4212717417) or embed a video
(https://guides.instructure.com/m/4152/l/724196-how-do-i-embed-a-video-in-a-page-in-a-course) resource
that highlights your current event for the week. Think about the topic in terms of your own personal,
academic, and professional life.

https://community.canvaslms.com/docs/DOC-10617-4212717417

https://guides.instructure.com/m/4152/l/724196-how-do-i-embed-a-video-in-a-page-in-a-course

1/16/2020 Topic: Week 3 – Discussion 1

https://ashford.instructure.com/courses/57785/discussion_topics/1614954?module_item_id=2922178 2/2

Replies are only visible to those who have posted at least one reply.

Search entries or author

 Reply

This week’s current event is: Online Privacy and Security.

Your initial post is due no later than Day 1, and it must be a minimum of 150 words. You will not be able
to see the posts of your peers until you have posted in this forum. Respond to at least two other
classmates by Day 7. Each response should be a minimum of 50 words.

This is a student engagement activity that encourages you to freely interact with your classmates
without the presence of the instructor.

Go to top of page

Unread  

1/16/2020Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 1/19

This is a graded discussion: 6 points possible due Jan 16

Week 3 – Discussion 2 23 23

Your initial discussion thread is due on Day 3 (Thursday) and you have until Day 7 (Monday) to respond to your
classmates. Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to
the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will
be evaluated.

Digital Trails [WLOs: 1, 2, 3, 4] [CLOs: 1, 2, 3, 5]

Prepare: Prior to beginning work on this discussion, carefully read Module 6, Section 6.1 in your
course textbook, as well as the Week 3 Instructor Guidance.

Reflect: When you walk on the beach, you usually leave behind your footprints in the sand. Online,
you also leave a footprint (or trail) when using digital technology. Your computer and the websites
you visit create digital footprints of where you have been. Sometimes, this tracking is helpful to us.
For example, if you leave a website and return later, you can simply pick up where you left without
having to start over. At other times, these electronic trails could pose a security threat to you and
your computer. Take some time to reflect on what you learned about how leaving a digital trail could
both help and hurt you.

Write: Using the information you read in Section 6.1 of your course textbook, address the following:

Describe two digital footprints you have left within the last week. Analyze each one for potential
risk on a scale of 1-10, 1 being low risk and 10 being high risk.
Write about a situation in which you or someone you know was a victim of a privacy, safety, or
security breach online. Describe the situation and how it was eventually resolved.
Put your name into at least two different search engines (Google, Bing, Dogpile, Yahoo,
Ask.com, and DuckDuckGo are some popular ones) and review your own digital trail. Pretend
you are a potential employer. What observations could you make about your own online
presence? Note: If you have a common name, you may need to add additional search terms or
experiment with different search terms, such as the city in which you live (e.g., Dan Smith
Clinton, Iowa).
Now that you have explored your own digital trail, identify at least three steps you can take to
enhance your privacy, safety, and security on the web.

Your post should be at least 250 words.

Respond to peers: Review your classmates’ posts and respond to at least two of your peers by
Day 7. Think about what you learned about digital trails from reading about your classmate’s digital
trails. Consider sharing tips on how to use digital footprints wisely. Each response should be a
minimum of 75 words.

https://ashford.instructure.com/courses/57785/external_tools/retrieve?display=borderless&url=https%3A%2F%2Fcontent.ashford.edu%2Flti%3Fbookcode%3DSole.2605.16.2%26navPointId%3Dmod6.1

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 2/19

Search entries or author

 Reply

Stuck on a problem? Don’t skip that assignment – click the button to chat with a live
tutor. It is free and here to help you now.

Go to top of page

Unread    Subscribe

(https:// Michael Diaz (https://ashford.instructure.com/courses/57785/users/227653)
Jan 6, 2020

CLICK TO EXPAND / COLLAPSE

In this day and age leaving behind digital foot prints is something we all do so often. Even without
realizing it, we can be traced by the simplest thing. In the last week I know I have left many foot prints
behind. The foot print I leave behind most often is my online shopping. The last purchase I mad was from
Ebay and it was for a new motorcycle seat. Of course my social media then got flooded with Ebay
suggestions and things about motorcycles. It’s a little tricky on how to rate this foot print because it
depends what you take as a risk. If being targeted for ads is a risk for you then this may be rated a 8 or 9.
For me I can rate this foot print around a 3 because I know it’s a legit website where the most harm that
could potentially come from it is me having to scroll past a few ads. Another foot print I have left recently is
tagging myself and friends at a local bar. Now this I can say is easily rated a level 8 because of the
security risks that other people will know where I was and when I was there. I try not to tag myself or
others in locations for this reason but occasionally it does slip.

Working in a bank, we deal with a lot of fraud. A common case I come across is someone buying
something online from a website that wasn’t real and then having their information stolen. This is a major
form of security breach because people are losing their hard earned money to scammers that have no
regard for anyone else’s financial well-being. The way these cases get resolved for my clients is our back
office starts an investigation process where they verify the clients claim. They check the legitimacy of the
website and the end goal is to get our client’s their funds returned and hopefully have them spread the
word about these fraudulent sites.

My name is pretty common but even so I only use one social media platform. When searching for myself a
few old pictures surfaced that I may have been tagged in but lucky for me nothing was obscene. My only
social media is Facebook so when I finally found myself you can see that there isn’t anything on there that
would turn away a potential employer. I don’t have as much of an online presence as most of my friends
do and for this I’m grateful. Regardless of the size of my online presence, I can still take precautions for
safety. One would be to never post anything to personal online such as bank info or addresses. Another
would be to constantly change my password. All too often we see celebrities getting hacked so one can
only imagine how easy it must be for the average person to also get hacked. Finally I think censoring

https://ashford.instructure.com/courses/57785/external_tools/856

https://ashford.instructure.com/courses/57785/users/227653

https://ashford.instructure.com/courses/57785/users/227653

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 3/19

 Reply

photos and status updates is important. We constantly see the younger generation posting many obscene
photos or statuses that give off the wrong impressions of who they really are.

(https:/ Debra Eden (https://ashford.instructure.com/courses/57785/users/226626)
Jan 8, 2020

CLICK TO EXPAND / COLLAPSE
 Reply

Michael,

I appreciated your comments on the shopping as I did the same thing and while I appreciate the shirt
suggestions, I now cannot click on anything without them showing up. I also have a credit union
employment background and have seen a lot of fraud. Most of the people recovered their funds due to
the fact that I worked for an amazing credit union with a very good fraud team but it still was a very
stressful time for them. There were other times where we could not help people and they ended up losing
their savings or dumping their checking into the negative due online fraud schemes.

I would definitely agree with you that today’s Facebook users oftentimes do not think before posting. They
just post on a whim or to impress without any thought of the consequences. Today’s employers do check
online before hiring. My daughter was a hiring manager for her company and the first thing they did was
check Facebook on potential candidates. Several people’s applications went straight from hand to trash
can due to poor online choices.

(https:/ Stephanie Collins (https://ashford.instructure.com/courses/57785/users/227383)
Yesterday

CLICK TO EXPAND / COLLAPSE

Hi, Michael!

Digital Footprints – How will your posts affect your future? (https://lhslance.org/2015/news/digital-
footprints-will-posts-affect-future/)

“63% of hiring managers decide not to hire an applicant because of something they found
questionable on a social networking site” (Credit) (https://lhslance.org/2015/news/digital-footprints-
will-posts-affect-future/) .

I think it is great that you only use one social media platform, it limits the information that can surface when
a potential employer seeks information about you to determine if you have a professional image. The
digital footprint we leave online can exist for many years and affecting our reputation and a company’s
reputation.

Because so much of our data directly reflects the outcomes of job opportunities, it is important to consider
these 10 helpful steps to maintain professionalism.

https://ashford.instructure.com/courses/57785/users/226626

https://ashford.instructure.com/courses/57785/users/226626

https://ashford.instructure.com/courses/57785/users/227383

https://ashford.instructure.com/courses/57785/users/227383

Digital Footprints: How will your posts affect your future?

Digital Footprints: How will your posts affect your future?

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 4/19

 Reply

(https:// Debra Eden (https://ashford.instructure.com/courses/57785/users/226626)
Jan 8, 2020

CLICK TO EXPAND / COLLAPSE

I think I have left a lot more digital footprints this week than I realized. I know one was an online shopping
website for shirts. This was due to a popup that came up while reading a news article. It showed some

https://ashford.instructure.com/courses/57785/users/226626

https://ashford.instructure.com/courses/57785/users/226626

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 5/19

 Reply

shirts that I thought were cute so I clicked on it. Safety rating on this is around a 3 since it was a
reputable site but I have been reaping the consequences of my little online shopping trip since now
everything I look at has that same company right in the middle of it with more shirts like the one I looked
at. One other footprint I have left this week is reading some news articles that automatically come up on
my phone at lunch. Since we live in Corpus Christi near the ocean, I like to read articles relating to marine
life. Once again, this is a low risk footprint around a 3. I was once again, however, inundated by news
articles about marine life afterwards.

Before moving to Corpus Christi, we lived in Albuquerque, New Mexico. My daughter had a friend whose
mom was single. She was communicating with a man over the internet who convinced her that he really
wanted to meet her and needed money to travel. She took the bait and sent him thousands of dollars
from her daughter’s college fund. I’m not sure if this provided him a link into her bank account information
but I do know that the situation caused her family a lot of grief and financial issues including compromising
her daughter’s college fund which was never recovered.

I put my name into DuckDuckGo and Dogpile. Apparently, I have some friends not even I knew about. It
did get my name right most of the time and my age unfortunately. If they were going to lie about me, they
could have at least made me younger. I didn’t find anything a potential employer would find alarming. I
guess I am not that interesting and since I don’t Facebook, there aren’t any juicy, embarrassing posts to
dig up.

The one thing I found out by searching myself was that it listed how many footprints I had left. Although I
hadn’t gone anywhere dangerous, there were certain articles I followed that led to other spam so I need to
update my settings. I need to be sure I watch what news articles I read so as not to be led into infected
sites. I also need to update my privacy settings so people cannot see my financial portrait (i.e. what I
owe, where my mortgage is, etc.) My financial details need to stay private.

(https:/ Stephanie Collins (https://ashford.instructure.com/courses/57785/users/227383)
Yesterday
CLICK TO EXPAND / COLLAPSE

Hi, Debra!

What You Should Know About the Potential Risks of Online Shopping
(https://smallbizclub.com/technology/ecommerce/know-potential-risks-online-shopping/)

I also complete a lot of my shopping online, I have always thought the convenience outways the risk.
However, this class has taught me the potentially harmful realizations about the danger of using banking
information online.

https://ashford.instructure.com/courses/57785/users/227383

https://ashford.instructure.com/courses/57785/users/227383

https://smallbizclub.com/technology/ecommerce/know-potential-risks-online-shopping/

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 6/19

 Reply

The article I attached communicates about the possible risks we could encounter when shopping online.

Identity Theft
Credit Card Fraud
Adware and Malware
Fake Online Stores
Overpayment

Cybercriminals also pose a real security threat by using methods such as a Trojan Horse. Consumers
could possibly open a disguised email and open the dangerous link because the advertised product
caught their attention. Maintaining caution and directing typing in the URL into the address bar can reduce
the risk of visiting an infected site.

-Stephanie

(https:// Stephanie Collins (https://ashford.instructure.com/courses/57785/users/227383)
Saturday

CLICK TO EXPAND / COLLAPSE

I left a digital footprint this week by shopping online at Amazon. I would consider this a medium risk with a
rating of 5 because I entered my debit card information to complete the transaction for my items. I took
caution when encountering pop-up ads and made sure the URL was correct before logging into my
account. I also left a digital footprint by paying my phone bill online. I would consider this a higher risk with
a rating of 8 because I connected my checking account information for the money to withdrawn. I paid my
bill through the iOS app on my phone and did not encounter being redirected to any other websites when I
needed to enter my billing information.

There have been many times that I have received a message on Facebook Messenger from someone on
my friend’s list that contained a link and asked if the video was mine. This is a common phishing scam,
when a person opens the link, it will take them to a fake YouTube page and request that they download
required updates to view the video. These links attempt to have individuals download malware to their
computers. When I receive these messages, I immediately delete the message and do not open the link
to avoid download potentially harmful software. I included an image of a similar message that I received.

My Facebook and Twitter accounts were the first two links that appeared when I searched my name and
city through Google’s search engine. When I completed the same search using Bing, the search engine
was not as accurate as Google and did not locate any of my accounts or find any information about me. I
take caution to avoid making posts that will reflect on me in a negative way. When I use my social media
accounts, I post pictures of my family and interact with friends. If an employer reviewed my social media
platforms, my image would not reflect poorly on the company because I avoid using vulgar language and
posting irresponsible images.

The three steps I can take to enhance my privacy, safety, and security on the web:

https://ashford.instructure.com/courses/57785/users/227383

https://ashford.instructure.com/courses/57785/users/227383

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 7/19

 Reply

Install security software/firewall on my laptop and update the software regularly to reduce potential
risks.
Adjust my social media account settings from public to private.
Avoid opening emails and text messages that are from an unknown sender.

(https:/ Kimberly Adams (https://ashford.instructure.com/courses/57785/users/227062)
4:49pm

CLICK TO EXPAND / COLLAPSE
 Reply

Hello Stephanie,

It sounds like you have the right idea on protecting your digital security and privacy. I would like to say
that all of my accounts are private but I know that my LinkedIn and my Instagram are not, but I do know
that I do not share anything on them that would do anyone any good. Updating passwords regularly and
not saving card information is another great way to protect yourself. Be mindful of the security that you
install a lot of them can be hacked fairly easily.

Be prepared!

~Kimberly

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 8/19

(https:// Mary Ball (https://ashford.instructure.com/courses/57785/users/226760)
Tuesday

CLICK TO EXPAND / COLLAPSE

A couple of digital footprints that I left behind is I have purchased several items from Amazon, it is like my
favorite place to do online shopping. I would rate this at a 9 because I leave my card payment info stored
to my account for easier access being that I make multiple purchases from Amazon a week. Amazon
does have it where I have to provide my password to make a purchase, so it makes me feel at ease
leaving my card info stored. This is the only place I choose to do this with. By saying that I leave my card
info in place, I have set up with my bank a high fraud alert, anything that is purchased, whether it is 1.00
or 100.00 or more I get a notification, and can easily stop any transaction that I see that wasn’t myself or
my spouse.

One other digital footprint that I have left behind, is I love to decorate my house. So I am forever searching
the web for ideas on how to switch up my home. I don’t tend to make purchases, so I rate this at 1 since I
never have to put in any kind of personal information into any of the places that I search.

I am not sure if many of you are aware of the Equifax data breach of many of its consumer’s social
security numbers, names, etc including mine along with my husbands and a lot more, information was
leaked out. During the process, Equifax offered it’s consumers up to 250.00 or to have 6 months of free
credit security. I already have free credit security through Credit Karma, so I opted for the up to 250.00,
which I have yet to receive anything, and I’m not really looking for it to come, as the settlement is to be
divided between everyone who opted for the cash settlement.

One other way just yesterday that I had a security breach was I had received an email that my Amazon
account had been placed on hold and that any prior purchases had been canceled until I completed an
Identity form. In this form, it asked for my name, address and social. That caught my attention quickly and
I called Amazon and they confirmed it to be a scam. So had I went through and filled out the information,
whoever was on the other end would have had my info and been able to do whatever they please with it. I
will upload the exact email to the bottom of this post that I got so you can see if you’ve ever received this
from Amazon.

I searched my name with my maiden name and my married name, and on Spokeo, it brought me up with
my maiden name and had so much information about myself I was a bit shocked. From my current
address, and the last 3 addresses that I lived in, to 3 possible phone numbers, my email and listed some
of my family members. This website pulled up the exact location of the house I’m living in now. The link is
listed below to show you just how much info others can have with just the search of your name.

Link (https://www.spokeo.com/Mary-Hayes/Washington/Tacoma/p40180254443)

I also searched my name with Bing but didn’t find much other than my Facebook account.

I believe that if an employer wanted to search my name, they wouldn’t find any negative things to use
against me. I strictly use my Facebook for personal and family reasons, and never post anything vulgar or
anything that would make a company think twice about hiring me.

Three different ways to enhance my privacy:

https://ashford.instructure.com/courses/57785/users/226760

https://ashford.instructure.com/courses/57785/users/226760

https://www.spokeo.com/Mary-Hayes/Washington/Tacoma/p40180254443

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 9/19

1. Start using unique passwords that would be hard for others to predict.
2. Clearing my Cache more often, I tend to not do that a lot but learning to do this will help protect my

information from just lurking around in my Web history.
3. Turning off the “save password” When you use this feature it saves and stores your passwords

allowing you to use them across all browsers and devices.

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 10/19

 Reply

(https:/ Debra Eden (https://ashford.instructure.com/courses/57785/users/226626)
Tuesday

CLICK TO EXPAND / COLLAPSE
 Reply

Mary,

I think we all have shopped on Amazon without really thinking of the risk we may be taking with our
financial information. I like that you mentioned text alerts related to your bank account. That is something
we recommended to our members when I worked in the credit union. Usually when my text alert goes off,
it is within 30 minutes or less of any card activity. At that point, everyone involved can be protected
whether it be us as the customer or the company that is not going to lose merchandise. I think that is a
really great fraud protection to bring out.

(https:/ Stephanie Collins (https://ashford.instructure.com/courses/57785/users/227383)
7:55am

CLICK TO EXPAND / COLLAPSE

Hi, Christy!

https://ashford.instructure.com/courses/57785/users/226626

https://ashford.instructure.com/courses/57785/users/226626

https://ashford.instructure.com/courses/57785/users/227383

https://ashford.instructure.com/courses/57785/users/227383

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 11/19

 Reply

Identifying Emails from Amazon (https://www.amazon.com/gp/help/customer/display.html?
nodeId=201909120)

The image of the email you shared looks very realistic. For the consumer’s privacy, Amazon will never
request sensitive information such as social security numbers, tax ID, or bank account numbers (Credit).

(https://www.amazon.com/gp/help/customer/display.html?nodeId=201909120)

Automatic Strong Passwords (https://www.macrumors.com/how-to/automatic-passwords-and-auditing-
in-ios-12/)

I am also guilty of saving my passwords in webpages. My MacBook Pro remembers all of my passwords
and allows me to log into webpages using my fingerprint. I’ve always enjoyed this feature because I don’t
have to remember what my password is for specific accounts. This laptop contains a feature that will
suggest a strong password for me, the password contains many alphabetical and numerical characters
that would be difficult for a cybercriminal to guess. If I choose to use the suggested passwords, I can use
my fingerprint on my laptop or face ID on my iPhone. I think this feature lowers the risk of my passwords
being stolen because I don’t have to physically type them out anymore.

https://www.amazon.com/gp/help/customer/display.html?nodeId=201909120

https://www.amazon.com/gp/help/customer/display.html?nodeId=201909120

https://www.macrumors.com/how-to/automatic-passwords-and-auditing-in-ios-12/

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 12/19

(https:/ Teyauna Carter (https://ashford.instructure.com/courses/57785/users/226844)
1:40pm

CLICK TO EXPAND / COLLAPSE
 Reply

Hello ! I’m guilty as well. I try to keep the same password for everything I create because it’s so much
easier. Taking the easy way out huh? Even my debit cards all have the same pin #. Even someone so
close shouldn’t have all your personal pin #’s or passwords. I also always save my passwords rather its on
my personal computer, work computer or even on my phone. My house alarm code is even the same as
my debit cards pin number. Now that I realized that I have done some online purchases at work on the
computer I need to find away to change my password and not save it. All it takes is for 1 person to log on
and see my account information pulled up and there goes me being in a financial bind.

(https:// Aaron Zerfoss (https://ashford.instructure.com/courses/57785/users/227168)
Yesterday

CLICK TO EXPAND / COLLAPSE
 Reply

The only digital trail I could think of is the one where I wanted to see how much my paycheck is from my
job. It leaves a digital footprint on my phone because I also sometimes forget to log out of which would be
high on the risk scale because the website shows all my personal information when it comes to
employment.

My mother had her card information stolen by a drive through clerk at Burger King. She realized this by a
purchase that was done not by her from a company in Australia. The suspicion on why she believed it
was her was because she took her card and took a minute to give it back.

A lot more information comes up then I want it too. My family information addresses I lived at and old
phone numbers. Even with my father it goes a little before paying for it my dad’s criminal record with the
search of my name. I don’t recommend the name but oddly one website shows a girlfriend I had years
ago even though I wasn’t with her for a long period of time.

This is something I’m unsure on how to fix. I feel like theirs a way I can contact people to have my
information taken off the internet. But I feel it’s through employers, income tax, rental properties that had
my name a part of it. Luckily, I don’t have a criminal record that can fall back on me. But I have heard
family members criminal records could possibly hurt other people in your family especially close family
members.

https://ashford.instructure.com/courses/57785/users/226844

https://ashford.instructure.com/courses/57785/users/226844

https://ashford.instructure.com/courses/57785/users/227168

https://ashford.instructure.com/courses/57785/users/227168

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 13/19

(https:/ Teyauna Carter (https://ashford.instructure.com/courses/57785/users/226844)
1:29pm

CLICK TO EXPAND / COLLAPSE
 Reply

Good evening, I agree. On LinkedIn, a bunch of my family information came up that included previous and
current addresses and phone numbers. Ii is also a few people that showed up that has the same last
name as me (which I still go by my married name) but I never heard of these people before. This is kind of
putting people in harms way. Supposedly I was beefing with someone and they can not get to me but see I
have family members I’m attached to that lives local and go after them. This is the exact way I found out
that my daughter’s dad is married. I just went on the google and put in his name and Lord behold his name
popped up and I clicked on it, there it was a recent picture with him and her on it.

(https:// Teyauna Carter (https://ashford.instructure.com/courses/57785/users/226844)
1:21pm

CLICK TO EXPAND / COLLAPSE

One of 2 digital footprints I have recently left behind was signing up for a meal prep order. I got an email
about a keto meal prep that will help me lose weight without starving myself and was interested in joining.
I signed up to have meals delivered and paid the fee. Later when I went into my Facebook page, I started
seeing different ads for weight loss. I also left my footprints by ordering a sweat band from Amazon. Now
I have so much spam/junk mail about work out DVD’s. It’s almost like an email party lol. I never have had
a problem using Amazon nor Ebay as far as having my account being used by anyone else or my account
being double charged. I would rate both of these as low, somewhere between 2-4 being that I have
always used Amazon & reading the reviews for the Keto meal prep, it seem to have 5 star ratings.

Last year, my campaign American Express Travel reached a security breach and because there are 8
other campaigns on the same floor, they felt obligated to shut down the departments just in case the
hacker/hackers decided to hack their systems as well. We work with a lot of people personal information.
The moment we started receiving calls about unauthorized charges, the company immediately shut down
the campaign for 5 weeks and discontinued all card holders cards until futher investigation. Once the
investigation was finalized, we were able to reverse those charges and run business as usual. I honstly
enjoyed those weeks free of NO work.

My name is popular, but the spelling is unique. I have seen it spelled Tiana, Tiona, Tianna etc but not like I
spell mine Teyauna . I put my name in DuckDuckgo and it the Mylife profile. It does a picture of me about
9 years ago and pretty much all of the information is accurate with the exception of me being Caucasian. I
also placed my name in LinkedIn and there everything is accurate except I no longer work as an Account
Manager at Aarons Sales and Lease. I if was an employer, the observations I can make will be this
individual doesn’t have a lot going on in her life, she has been at 1 job a good period of time and with the
income she is currently making the company will need to compete.

https://ashford.instructure.com/courses/57785/users/226844

https://ashford.instructure.com/courses/57785/users/226844

https://ashford.instructure.com/courses/57785/users/226844

https://ashford.instructure.com/courses/57785/users/226844

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 14/19

 Reply

Three steps I would take to protect my online privacy , safety and is security is be mindful of what is being
posted by myself or being tagged in others post on social media. Letting everyone know your every move
and where about is not safe. Be mindful when doing online shopping, all websites are not legitimate
websites. Your bank accounts can easilybe hacked and someone can access your account and take all
money. Last be careful when opening up spam mail. Some emails are not safe, this is a way for hackers
to access your data base.

(https:/ Mary Ball (https://ashford.instructure.com/courses/57785/users/226760)
3:01pm

CLICK TO EXPAND / COLLAPSE
 Reply

Hi Teyaune-

It is interesting to read about what companies have to do to protect themselves. I never really imagined
just what length they have to go through. I’m sure you enjoyed that workless moment. But I bet when you
got back it was like a crazy madhouse.

I love your name, the way it is spelled is very unique. I have a son named Brinxley and everyone always
speaks how unique his name is. I’ve actually googled his name and there’s nothing on him or anyone with
that name, except for my husband’s papa’s obituary where his name was listed as his great-grandson.

I also catch myself tagging me at places and didn’t realize the danger in it. Especially being alone.

I enjoyed reading a little bit about your work and name- Best wishes- Christy

(https:/ Kimberly Adams (https://ashford.instructure.com/courses/57785/users/227062)
4:41pm

CLICK TO EXPAND / COLLAPSE

Teyaune,

It makes me think about how webhooks and data are used when we purchased something online. The
information is stored and used to ‘make’ your browsing more personalized to you. This is kind of creepy to
me, how much information is collected. It’s not just online that you have to worry about your information
being hacked or compromised, it’s in stores as well. Think about the target breach that happened many
years ago, back in 2013. https://www.lifelock.com/learn-data-breaches-target-data-breach-victims-
could-get-up-to-10000.html (https://www.lifelock.com/learn-data-breaches-target-data-breach-victims-
could-get-up-to-10000.html) We go into the store thinking we are safe, but we never are. Your card
information goes into a system that transports your card data online to their processor and then it gets
sent to your bank for approval and then back to the processor and then back to the store, all in the matter
of seconds. That’s a lot of hands in the pot!

Be mindful.

https://ashford.instructure.com/courses/57785/users/226760

https://ashford.instructure.com/courses/57785/users/226760

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

https://www.lifelock.com/learn-data-breaches-target-data-breach-victims-could-get-up-to-10000.html

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 15/19

 Reply

Kimberly

(https:// Kristy Schuerman (https://ashford.instructure.com/courses/57785/users/226756)
1:43pm

CLICK TO EXPAND / COLLAPSE
 Reply

Two digital footprints that I left behind this past week would be having a group chat on Instagram and I
was also did online shopping. I would say that chatting with my friends on Instagram I would consider
a 1 because we were not sharing any personal information but I would consider my online shopping a
9 or 10 due to the fact that all I had to do was enter a code and all of my saved information populated.
A situation in where someone I know personally was a victim of a security breach, that person was my
brother. He had his social security number stolen which meant that these people were opening up
credit cards in his name and spending a lot of money all over California and mind you we lived in Ohio.
We eventually got it all resolved through the banks and the social security office but he still to this day
has an alert on his social security number that whenever it is run, he gets a phone call verifying that he
gave permission.
The first observation that I found when searching my name online is that my LinkedIn profile comes up
and shows a picture of me along with where I work at currently. The second thing that I noticed was
when I was in high school and ran track and field my records are recorded on their website. For a
potential employer I feel like my name search is not very threatening.
After exploring my digital trail I believe that I can put less personal information out there, make sure to
always be aware of what people are posting of you on social media and to go back to the websites
where I know I have personal information saved and make it so it is less descriptive.

(https:/ Mary Ball (https://ashford.instructure.com/courses/57785/users/226760)
2:50pm

CLICK TO EXPAND / COLLAPSE

Hi Kristy-

I too have had my social stolen, it was so hectic, even filing my taxes was insane. I had to wait for a pin to
verify my own taxes. I can’t imagine what these people think that they will not get caught. Maybe not right
away, but eventually they will.

I also leave my information for easy online shopping. Now that I see how risky it can be, I’ve taken all my
debt information out. Except with Amazon, I’m having a hard time cutting that one loose because I shop
there a pretty good bit, and the hassle of loading my card number each time would be so repetitive.

I enjoyed reading your discussion.

https://ashford.instructure.com/courses/57785/users/226756

https://ashford.instructure.com/courses/57785/users/226756

https://ashford.instructure.com/courses/57785/users/226760

https://ashford.instructure.com/courses/57785/users/226760

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 16/19

 Reply

Best wishes- Christy

(https:/ Kimberly Adams (https://ashford.instructure.com/courses/57785/users/227062)
4:23pm

CLICK TO EXPAND / COLLAPSE
 Reply

Hey Christy,

If you are super worried about your amazon you can use a prepaid card as your default card on file
and then only enter your true card number when you buy things!

Hope that helps!

~Kimberly

(https:/ Kimberly Adams (https://ashford.instructure.com/courses/57785/users/227062)
4:31pm

CLICK TO EXPAND / COLLAPSE
 Reply

Kristy,

It’s insane the amount of information that we save, online. Think about your mobile banking apps or your
information that we save for online bill pay. All of that information is stored and used for later moments in
time. What happens if someone hacks your accounts? Did you know that if you leave your bluetooth on,
on your phone that your device now becomes hackable and the cards you store in your Apple, Samsung
or Google pay now is free information for someone to copy and use at their choice.

Be careful out there not everyone has your best interest at heart.

~Kimberly

(https:// Merisa Hamzic (https://ashford.instructure.com/courses/57785/users/26525)
4:12pm

CLICK TO EXPAND / COLLAPSE

Week 3. Discussion 2.

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/26525

https://ashford.instructure.com/courses/57785/users/26525

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 17/19

 Reply

Two digital footprints that I left on my work computer were a couple of weeks ago, it was my bank and
online shopping. I have a very busy life and most of my shopping is online and my debit card is always
linked to my account. So all of my information is saved onto my work computer. I think another digital print
is the social media that we use and how we always post pictures. My work computer contains all of my
billing and all my finances. The big one is Facebook for me, I use some of the apps through my Facebook
account and my debit card is linked to that.

My mother and I were both victims of a privacy and safety breach. My mom had her identity-stolen a
couple of months ago, and we had to change all of her documents and banking information. She used her
laptop computer for online shopping, paying bills and one day she let someone borrow the computer at
work and after her identity was stolen. We had to call the credit company and the social security
administration to let them know.

I have used Bing and Google, I searched my name and so many things came up, my social media
accounts, white pages with phone number and addresses. I am very careful what I post on social media
so nothing bad came up.

After all this, I can start deleting cookies and cash after using the internet, I will not be saving my
passwords, make my social media accounts private, I will not be storing and linking my debit card to my
online shopping sites. I will definitely not have Facebook liked through my apps and my card.

(https:// Kimberly Adams (https://ashford.instructure.com/courses/57785/users/227062)
4:21pm

CLICK TO EXPAND / COLLAPSE

A great example of a digital footprint that is low risk is when I have left this week is my search for what
type of plants that I can plant that will help ward off mosquitos. Which by the way would be lavender or
marigolds, I have killer skeeters at my home. A high-risk footprint I have left this past week could be
paying my mortgage or logging into my bank account. That is a lot of data to be collected and just left for
anyone to grab.

I teach in a contact center that processes payments for many online companies and every class I ask the
question about, who has been the victim of a data or privacy breach? Every class someone has a story to
tell. Whether it has been their card has been compromised or their identity is stolen. We, then talk about
how did you fix it? Most say they call the bank and dispute the card transaction or they have to file many
complaints to the credit bureaus to get it taken care of. Once you have been violated it’s hard to get your
life back.

I used DuckDuckGo and Google, which by the way I have never heard of, but I searched my current full
name with and without my middle name searched many and many pages and returned nothing. I
searched my first married name and maiden name all the same way and found nothing. I used my current
town, old towns even the town that I grew up in and still nothing. I did find a lot of people with almost or
the same name. My name is pretty common. When I played detective, and I went to town like a crazy ex-

https://ashford.instructure.com/courses/57785/users/227062

https://ashford.instructure.com/courses/57785/users/227062

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 18/19

 Reply

girlfriend or one that is headed that way because she thinks something is going on. I found nothing. When
I sign up for things I don’t use my real name, I normally use some type of pen name. I don’t want you to
find me.

Now that I know more about my security I will continue to do most things the same. I will continue to use
a pen name, delete my cache, cookies, browser history, and be mindful of the things I post, sites I search
and be mindful of ways I use the internet.

(https:// Amy Bryant (https://ashford.instructure.com/courses/57785/users/227350)
4:40pm

CLICK TO EXPAND / COLLAPSE
 Reply

It is so easy to leave a digital footprint without thinking of the repercussions. We are usually safe and
comfortable in our home, maybe even in our bed. We choose different websites to surf Facebook, Yahoo,
Google, and many more. We do these things without a second thought. Most of us feel that we are safe
because we are alone, and no one could see us do such activities. This past week I was on Facebook
and yahoo. I would rate my Facebook interaction a three or a four as I participated in a political post. I
usually do not do these things because I do not see the point in them. But then again, if I don’t stand for
something, I will fall for anything. I rate it in these terms as I didn’t take part in the conversation. I just
liked the post, and I read the comments. I was enlightened about the feelings of two sides taking part in a
debate. I know that even though a friend of mine posted it to a private friend group that an employer can
see that I liked the post. If said employer was not for diversity, they could use that information against me.
Thankfully though, I work for an employer that not only encourages diversity, but they require new hires to
take part in diversity training.

The second digital footprint was on the site of yahoo. I would rate it a one because I just clicked on what
was happening with Megan and Harry. I don’t see how reading this article could put me at risk. But
anything can happen. When I looked myself up online, I used several search engines, Yahoo, bing, and
duck go. I am not sure if I did it right because I was unable to find very much when it came to my digital
imprint. Nothing more than the city I used to live in and the city I live in now. It also showed the people I
am associated with and my close relatives. What I found on these searches was that they would only go
so far before I would have to pay money to see my history. I am not willing to pay for that information.
However, going forward, I will take these steps to protect my digital identity. I will change all of my
passwords to something hard to guess. I will change my emails that I give to cultural sights to a fake
name. I will turn off my location services, and I won’t post my address or phone numbers on any public
forum. I will take care of my photo’s I have online and make them private or get rid of them. There are so
many measures we need to take to protect ourselves. I am glad for this class to open my eyes so I can be
a more responsible digital citizen.

https://ashford.instructure.com/courses/57785/users/227350

https://ashford.instructure.com/courses/57785/users/227350

1/16/2020 Topic: Week 3 – Discussion 2

https://ashford.instructure.com/courses/57785/discussion_topics/1614972?module_item_id=2922179 19/19

1/16/2020Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 1/7

GEN 102: DIGITAL LITERACY FOR LIFE AND THE

WORKPLACE

WEEK 3: THE DIGITAL ENVIRONMENT

Instructor Guidance

Introduction

Congratulations! You have reached the halfway point of GEN102! During our third week together, we
focus on communication. The way you communicate can show credibility and be used as a persuasive
tool. The way you communicate also shows an understanding of certain concepts and professionalism.
This is why it is important to know which types of communication methods you should use and when.
Communicating with your professor will be much different from how you communicate with your friend. In

Resume

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 2/7

Week 3, you will explore different forms of communication and determine which communication method
is best to use for specific situations.

This week you will also learn about a darker side to the internet. While the internet is a great tool for
knowledge and access to resources, you also leave digital footprints that have identifying information. It
is important to understand the precautions you can take to help ensure you are not a victim of a cyber-
crime and how you can minimize your risks when using the internet. This week you will learn how to
protect your privacy, safety, and security when online.

Week 3 Learning Activities

Discussion: Current Events Forum

The growth of technology has impacted almost every area of our lives. It has impacted the way we
communicate, work, shop, go to school and manage our day to day lives. However, along with the
increased efficiency and convenience that technology facilitates, we end up sharing quite a bit of our
personal information online. Because of this, it is important more than ever to understand the threats to
online privacy and security. This current events forum is an opportunity to explore this issue with your
peers.

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 3/7

The topic for Week 3 is: “Online Privacy and Security”. Every day you hear numerous reports about
data breaches, privacy invasions, the changing interpretations in the law, and the steps individuals,
businesses, and governments are taking in relation to security and privacy online. For this forum, you will
research current articles about online privacy and security and select one that appeals to you.
Summarize the article and include the link, and then share your personal thoughts on what you’ve read.
You are only required to respond to two classmates but the more responses you post, the more enriching
the experience. Your instructor will not be present in the forum; however, he or she will review your post
and assign a point value to your effort.

Discussion: Digital Trails

This discussion task asks you to reflect on the ways in which leaving a digital trail could both help and
hurt you. As we go about our everyday lives, we create digital footprints through social media and
technologies such as GPS systems, credit cards, and mobile devices. In a sense, we automatically
sacrifice some privacy as we shop, communicate, conduct business, and surf online. An example of this
is Liz in the video below. As she goes about her day, she leaves clues about her online behaviors and
spending habits through her digital footprint.

Social, Smart, Secure. Tips for Staying Safe OnlineSocial, Smart, Secure. Tips for Staying Safe Online

https://www.youtube.com/watch?v=GCWBf7WKYyA

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 4/7

These digital trails can be advantageous. By using cookies to collect small pieces of information about
our online activity, marketers can build demographic profiles and use them to enhance and personalize
your shopping experience online. Credit card companies can monitor card usage to minimize instances
of fraud. Manufacturers can track registered buyers to warn them about defective products and promote
consumer safety. There are many more advantages to leaving digital trails, but can you think of how they
affect our privacy, safety, or security?

For this discussion, you will describe two digital footprints you have left recently and analyze their level of
risk. You will also share a situation in which you or someone you know was a victim of a privacy, safety,
or security breach online and explain how the situation was eventually resolved.

This week, you will also put your name into several search engines and review your own digital trail. Be
sure to describe what you found and identify three steps you can take to protect your privacy on the web.
Remember to respond to at least two peers in this exercise.

Week 3 Quiz

This quiz will focus on the required readings and videos listed in the required resources section of the
Week 3 overview as well as information contained in this guidance.

Hot on Your Trail: Privacy, Your Data, and Who Has Access Hot on Your Trail: Privacy, Your Data, and Who Has Access ……

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 5/7

You may take the quiz up to two times. This quiz utilizes a test bank, so each attempt may contain
different questions. Your highest score will be the grade recorded in the gradebook.

Week 3 Checklist

Use this checklist to help keep yourself on track! I recommend printing the checklist with corresponding
due dates and keeping it near your computer.

✓ Week 3 Learning Activities Due Date

Review and Reflect on Instructor Guidance Tuesday – Day 1

Post Initial Response to Discussion 1- Current Events Forum Tuesday – Day 1

Read Assigned Readings and View Assigned Videos
No later than Day

3

Post Initial Response to Discussion 2- Digital Trails Thursday-Day 3

Complete Week 3 Quiz Monday- Day 7

Post two responses to peers in Discussion 1 Monday- Day 7

Post two responses to peers in Discussion 2 Monday- Day 7

Key Terms

APA Style: Developed by the American Psychological Association, the rules and guidelines for writing
used by Ashford University.

Browser Cookie: A computer file containing a small piece of data that is stored in a web browser while
(and sometimes after) a user is browsing the website. It records information about the user and the
user’s activity on the site. Also known as a tracking cookie.

Computer Virus: A software program that, when installed on a computer, creates copies of itself and
often modifies other computer programs or files or performs harmful activities such as destroying data or
damaging computer hardware. When such a program is installed, it is said to “infect” the computer.

Computer Worm: A type of malware that scans your computer for holes or openings in your security
system. The worm enters through one of these holes and, on a computer network, can copy itself from
machine to machine.

Cookie Profiling: The use of browser cookies to track personal information about a user who visits a
website and to create a record of that user’s activity online; this record is commonly used by marketers,

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 6/7

so they can market products and services to the user more effectively the next time he or she visits the
website.

Data Aggregator: An individual or company that makes money by collecting and compiling data and
information about people from the web and selling it to others.

Digital Footprint: The electronic trail of digital data about you and your computer that you leave on the
web as you browse from one website to another.

Domain Name: A name assigned to a website and linked to the website’s IP address that has two parts:
a web page name and a web extension. Also known as host.

Firewall: A network security software system that monitors incoming and outgoing information and
protects the computer network from harmful information from other computers or other networks such as
the Internet.

Host: See domain name.

IP Address: Internet protocol address; a series of numbers assigned to every digital device when it is
manufactured and to every site on the World Wide Web. These numbers are recorded on the device and
on the site when the two are connected. Thus, every website has a record of the devices that have
visited, and every device has a record of every website it has visited.

Malware : Harmful software programs that are intended to interfere with other computer systems and
disrupt their operations, gather sensitive information, or cause other types of damage to the system. Also
known as spyware.

Paraphrase: The act of writing someone else’s ideas in one’s own words.

Pop-up ads: A form of online advertising on the World Wide Web designed to attract readers by
displaying specific ads to them when they browse pages on the web.

Pornography: Printed or visual material that contains explicit descriptions or displays of sexual organs
or activity that is intended to create sexual excitement.

Scam: A dishonest plan, especially one to get money from other people by misleading or tricking them.

Spam: E-mails that are sent, usually to large numbers of people on the Internet, that are not requested
and often not wanted.

Spyware: See malware.

Tracking Cookie: See browser cookie.

Trojan horse: A type of malware that disguises itself as one type of program but is actually a different
type of program. The Trojan horse is usually spread when a computer user opens an e-mail attachment
or downloads a file that contains the malware.

Uniform Resource Locator (URL): See web address.

1/16/2020 Week 3 – Instructor Guidance: GEN102: Digital Literacy for Life and the Workplace (GEN1951A)

https://ashford.instructure.com/courses/57785/pages/week-3-instructor-guidance?module_item_id=2922177 7/7

Web Address: A standardized address or path to locate documents and other resources on the World
Wide Web. Also known as uniform resource locater (URL).

Web Extension: The part of the domain name that indicates the type of organization or institution the
website represents or the country designation for that website.

Web Page Name: The name or title of any page on the World Wide Web that is given to it to make it
easier to find than having to type in the web address/URL.

References

GEN102 Week Three: Express Yourself: What NOT to do in the Digital Environment.

(2016). [Interactive media]. Bridgepoint Education, San Diego, CA.
My top ten quotes on communication (https://www.virgin.com/richard-branson/my-top-10-quotes-

on-communication) . (n.d). Retrieved from https://www.virgin.com/richard-branson/my-top-
10-quotes-on-communication (https://www.virgin.com/richard-branson/my-top-10-quotes-on-
communication)

Reveal. (2013, September 30). Hot on Your Trail: Privacy, Your Data, and Who Has Access to It
[Video file]. Retrieved from https://www.youtube.com/watch?v=bqWuioPHhz0

Social Media. (2012, May 7). Social, Smart, Secure. Tips for Staying Safe Online [Video

file]. Retrieved from Social, Smart, Secure. Tips for Staying Safe Online
(https://www.youtube.com/watch?v=GCWBf7WKYyA)

Sole, K., & Jackson, K. L. (2016). Fundamentals of digital literacy
(https://ashford.instructure.com/courses/57785/external_tools/retrieve?
display=borderless&url=https%3A%2F%2Fcontent.ashford.edu%2Flti%3Fbookcode%3DSole.2605.1
6.2) [Electronic version]. Retrieved from https://content.ashford.edu/

https://www.virgin.com/richard-branson/my-top-10-quotes-on-communication

https://www.virgin.com/richard-branson/my-top-10-quotes-on-communication

https://www.youtube.com/watch?v=GCWBf7WKYyA

https://ashford.instructure.com/courses/57785/external_tools/retrieve?display=borderless&url=https%3A%2F%2Fcontent.ashford.edu%2Flti%3Fbookcode%3DSole.2605.16.2

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 1/23

By Kathy Sole, Ashford University

Learning Objectives

After reading this module, you should be able to

Describe three ways you leave an electronic trail when you go online with your computer or other device.

Module 6
Digital Privacy and Security

Ingram Publishing/Thinkstock

(http://content.thuzelearning.com/books/Sole.2605.
16.2/sections/mod06intro#mod06intro)

Introduction
(http://content.thuzelearning.com/books/Sole.2605.

16.2/sections/mod6.1#mod6.1)

6.1 Leaving a Trail on
the Web

(http://content.thuzelearning.com/books/Sole.2605.
16.2/sections/mod6.2#mod6.2)

6.2 Remaining Safe
and Secure Online

(http://content.thuzelearning.com/books/Sole.2605.
16.2/sections/mod6.3#mod6.3)

6.3 Other Actions You
Can Take to Protect

Your Privacy

(http://content.thuzelearning.com/books/Sole.2605.
16.2/sections/mod06summary#mod06summary)

Summary &
Resources

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod06intro#mod06intro

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.1#mod6.1

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.2#mod6.2

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.3#mod6.3

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod06summary#mod06summary

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 2/23

Name four types of websites of which you should be especially cautious online and explain at least four
ways you can minimize your risks on them.
Explain the primary types of security software you should have installed on your computer to protect
yourself and your data.
Identify steps you can take to protect your privacy, safety, and security when using a shared computer and
receiving spam.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 3/23

Patrick Lux/Stringer/Getty Images News

Ill-intentioned computer hackers work to steal
others’ personal, account, and credit card
information, so it’s important to protect
yourself by taking the simple precautions
outlined in this module.

Introduction: Understanding Online Bene�its and Risks

Computer technology allows us to instantaneously touch
base with family and friends, hear their voices, and even see
their faces when they are hundreds or thousands of miles
away. We have the entire world’s library of information at
our �ingertips, and we can earn a college degree without
moving away from home or spending hours traveling to and
from a classroom. Unfortunately, there is a dark side to this
technology, as well. The Internet has been used to spew hate
speech, display horri�ic images of death and terror, and
allow criminals opportunities to take advantage of well-
meaning people.

At 24, Maddie is one of the younger students at Ashford. She
grew up with computers and has used them all her life.
From the LeapPad educational toys her parents bought her
when she was a toddler, to the DVD player she and her
siblings used to watch movies in the backseat of the car, to
the iPod she used as a teenager to listen to music, Maddie has always used electronic devices for entertainment.
She does not think much about the computers she has around her; they are an everyday part of her life. However,
because she takes them for granted, she is not always aware of online dangers. Without realizing it, she sometimes
behaves in ways that make her vulnerable to having her personal information captured and perhaps having her
identity stolen, her bank account emptied, and her credit ruined.

While you may not be able to protect yourself from every crime, you don’t have to make it easy for thieves to take
advantage of you. It’s similar to how you can’t be 100% sure your car will not be stolen, but you should avoid
leaving the car unlocked with keys in the ignition and shopping bags on the front seat. Don’t make it easy for
thieves to steal information from your computer or your other digital devices, either. In this module, we discuss
how you leave information about yourself online. We will also give you some simple precautions you can take to
help ensure you are not the next cybercrime victim.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 4/23

When you shop online, connect with friends on social media, log in to a sports website to catch up on the latest
scores, or search for information on the web, you leave an electronic trail that others may be able to follow to
discover where you have been and what you did there. This trail constitutes your digital footprint; it is digital
data that you leave behind, and it is often permanent. Even if you think you erased or deleted �iles or turned off
your computer, the data remains and can often be retrieved. Like �ingerprints, digital footprints are unique to
every device, so it is possible to trace computer, tablet, and cell phone activity. Therefore, you should act as though
everything you share online is permanent.

How do you leave this trail, and how do others follow it? How can they use what they learn to harm you? We
examine these issues in this section, along with privacy, safety, and security issues to keep in mind when you go on
online. We will also share with you some steps you can take to protect yourself and your data.

When you use electronic technology, digital footprints are created in two ways: (a) by your computer itself,
through its IP address, and (b) by the websites you choose to visit, which generate a browser history and what are
called cookies. Let’s look at these two methods and examine the pros and cons of digital footprints.

Your Trail of IP Addresses and Domain Names

Every computer has an Internet protocol address or IP address. The IP address is a series of numbers such as
192.168.0.1 that is assigned by an Internet service provider or private network administrator. The IP address does
not indicate who is using the device, but when you open a browser and enter the web, the IP address and location
of your computer are sent to every website you visit. In this way your movements on the web can be tracked. This
tracking may offer you some bene�its. For example, websites may recognize you if you have visited before and
streamline your online shopping experience. Or your IP address may help investigators �ind your electronic device
if it is lost or stolen.

Every website is also assigned an IP address, which speci�ies where on
the web the site is located. For example, the Ashford University website
has the IP address of 199.73.44.51. Because it is easier to remember
names than a series of numbers, the website is also given a domain
name (also called the host), and the IP address is linked to that domain

6.1 Leaving a Trail on the Web

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 5/23

Bloomberg/Contributor/Getty Images

Every website you visit becomes part
of your digital footprint.

name. To �ind out what your IP address is, follow the instructions in A
Closer Look: What Is Your Computer IP Address?.

Domain names have two parts: the web extension and the web page
name. The web extension indicates the type of organization or
institution the website represents or the country designation, such as
.us (United States). For example, the domain name for Ashford’s website
is www.ashford.edu (http://www.ashford.edu) . In this domain name, the
web page name is “w w w.ashford” and the web extension is “.edu” (see
Table 6.1). When you use a web browser to �ind a website, you can
locate that website by using either the domain name or the IP address.
Like snow�lakes, no two domain names or IP addresses are the same, so
every website has a record of every computer that has visited.

Table 6.1: Common web extensions

Web
extension

Meaning

.com Commercial website; commonly used to show a business on the web

.edu An educational organization, usually a college or university

.gov Government entities in the United States

.mil Used by U.S. military units

.org Organization; often used by nonpro�it organizations or trade groups

.biz Used by many small businesses on the web

.info A resource site on the web

.net Usually an Internet service provider or other company involved in the web; also used by some
businesses

A Closer Look: What Is Your Computer IP Address?

Retrieve the IP address of the computer you are using (and the domain name server or ISP associated with
that IP address) by logging on to http://www.ip-tracker.org (http://www.ip-tracker.org) . When the web
page opens, your computer IP address will appear in the box above the red box labeled “Lookup IP
Address With IP Lookup.” Click the red box, and a new page should appear that displays two smaller red
boxes that display IP lookup location information for your IP Address and extra IP lookup �inder
information. Scroll down to view how much information is on the Internet about the computer you are
using. You can also look up a website and obtain its IP address at http://www.ip-tracker.org/locator/ip-
lookup.php (http://www.ip-tracker.org/locator/ip-lookup.php) .

Re�lection Questions

1. What new information did you learn from this exercise about electronic tracking? What surprised
you most about the information you found?

2. What types of information have you shared on the Internet that might be harmful to you if it was
tracked back to your computer IP address and shared publicly?

http://www.ashford.edu/

http://www.ip-tracker.org/

http://www.ip-tracker.org/locator/ip-lookup.php

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 6/23

The Trail of URLs in Your Computer History

In addition to an IP address, every website also has a web address. This web address, also called a uniform
resource locator (URL), indicates the path someone would follow to locate a speci�ic page on a website. Like your
home address, the web address is necessary for someone to locate information on the World Wide Web.

When you visit a website, its URL is recorded in your computer browser history �iles. You can see some of this
historical record yourself by clicking the down arrow at the end of the address bar at the top of any page of your
web browser. Law enforcement of�icials and investigators often obtain court orders to search the computers of
crime suspects for evidence. They can often retrieve the entire history �ile on the computer and determine what
websites users of that computer have visited.

Let’s look at some examples of the way a URL is structured. Figure 6.1 is an example of the URL for a page on the
Ashford University website that discusses transfer credits.

Figure 6.1: The structure of a URL

While it might look like a random assortment of letters, a URL is really a detailed path to a
speci�ic �ile or web page.

URLs can sometimes be quite long, but the �ive main elements of the URL for web documents are the same as the
Ashford example. For instance, if someone wanted to learn how to become an elementary school teacher in
California, the California Commission on Teacher Credentialing has posted that information at this URL:
http://www.ctc.ca.gov/credentials/teach-elementary.html (http://www.ctc.ca.gov/credentials/teach-
elementary.html) . The elements of this URL are explained in Table 6.2. Note: A URL is not case sensitive, which
means you can type it either in all caps or in lowercase letters. For consistency, however, we suggest you always
type it in lowercase letters.

Table 6.2: The elements of the web address or URL for http://www.ctc.ca.gov/credentials/teach-
elementary.html

Element Description

http:// Indicates the protocol to be used to access a �ile, usually hypertext transfer protocol (http).
This protocol (or https:// for secure sites) tells you that this information is on the World
Wide Web.

www. A reference to the World Wide Web. Note: This abbreviation is optional; sometimes domain
names do not include it.

.ctc California Commission on Teacher Credentialing (a division of the domain).

.ca State of California domain/host name.

.gov/ Web extension for a government website.

credentials/teach
-elementary.html

The path to the speci�ic page where the elementary school credentialing information is
located.

http://www.ctc.ca.gov/credentials/teach-elementary.html

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 7/23

Figure 6.2: Computer temporary
Internet �iles

Accessing this window (on Microsoft computers)
allows you to delete cookies from your computer
hard drive, which can help maintain privacy
online.

From Microsoft.

Adapted from Digital Literacy Standard Curriculum Version 4. (2015). Retrieved June 02, 2016, from https://www.microsoft.com/en-
us/DigitalLiteracy/curriculum4.aspx#interenetwww (https://www.microsoft.com/en-us/DigitalLiteracy/curriculum4.aspx#interenetwww)

The Trail of Browser Cookies

When your computer browser accesses a website for the �irst time, the website sends back its IP address and
other information to help the browser navigate the site and perform certain functions. The browser creates a
small text �ile, called a browser cookie or a tracking cookie, that contains information such as your computer IP
address, which website pages you viewed, and how long you stayed on each page.

Cookies can often be very helpful to you. They make using the web easier in many ways. Some cookies, for
example, store information so that if you leave a web page and return later, you can pick up where you left off
browsing the site, without having to start over. If you are on a secure website (https://), however, the site will
create another type of cookie so that when you close your browser or the website is inactive for a certain period
of time, the site will be closed to protect your data. You must then log in and enter your password again to
continue.

Cookies come in several different forms. Some are temporary and
usually are deleted when you leave the website. Examples of these
and other temporary Internet �iles are shown in Figure 6.2.
Temporary cookies are used for situations such as helping you
with online shopping. For example, when you select an item from
a website to purchase and add it to your shopping cart, a cookie
allows you to save the item while you continue shopping the site
for additional products. That way, you do not have to go through a
separate checkout process for each item (WiseGEEK, 2015).
Temporary cookies are also used by some websites to display
items you have previously viewed, so you can �ind them again if
you wish. Although these cookies may be temporary, they still
leave an electronic trail. If you do not purchase an item you
viewed, you might get an e-mail from the retailer the next day
asking if you would consider purchasing the item and perhaps
even offering you a discount.

Most cookies, however, are not temporary; they are permanently
stored on your computer hard drive. If you delete them, they will
be created again if you go back to that website in the future. This
type of cookie is typically stored on your computer hard drive,
with a matching �ile kept on the website computer system.
Permanent cookies allow a website to remember your name and
password the next time you log in or to store your credit card
information and retain your billing and shipping address for
purchases. Permanent cookies also allow retailers to create an account for you and show you a history of all items
you have purchased from them.

By themselves, cookies are not harmful. As we have seen, they can make it easier for you to use the web. However,
be cautious about cookies because you may not know what information is being collected and how it may be used.
For example, some websites do not stop collecting information about you, even when you sign out of your account.
They use a technique called cookie pro�iling to “follow you around” and gather information wherever you go on
the web. They may sell this information to a third party, called a data aggregator, which makes money by
collecting and compiling data and information about people from the web and selling it to others. Aggregators can
create a pro�ile of you and your buying habits over months or even years. The pro�ile may include information
about your age, income, and even your sexual orientation, with amazing accuracy. Marketers then use the pro�ile
to create pop-up ads on your browser to display products that may be of interest to you (“Cookie Pro�iling,”

https://www.microsoft.com/en-us/DigitalLiteracy/curriculum4.aspx#interenetwww

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 8/23

2013). As discussed in A Closer Look: See Your Electronic Trail, you might �ind clear evidence of this once you start
looking for it.

Cybercriminals can also steal cookies to acquire your credit card information, Social Security number, user names,
passwords, and bank information. Permanent cookies also can accumulate on your hard drive and slow down
your computer system. If your computer does not seem to be responding as fast as it used to, you might try
clearing temporary Internet �iles. For instructions, refer to the Solving Computer Technical Problems section in
Module 3.

Remember that if you delete permanent cookies, your actions may clear your stored passwords, credit card
information, or the options you previously chose for speci�ic websites. You will then have to reenter this
information when you visit these websites again. It is always important to save your log-ins and passwords
somewhere, such as in a hard-copy printout or a specialized password management software program.

Privacy Online

A Closer Look: See Your Electronic Trail

Want to see your cookies in action? Try this experiment: Just for fun, browse for a hotel in a vacation spot
you would like to visit. Try a couple of websites such as Travelocity and Expedia and compare prices for a
few different hotels. Then, if you have one, open your Facebook account. Do you notice any hotel
advertisements?

As an alternative, go online and search two or three websites for an automobile or major appliance such as
a washer or dryer, refrigerator, or stove. Spend a few minutes comparing the features of two or three
models you like. Then wait a day and go online again. Do you notice ads on your browser for the item you
shopped or one similar to it? These activities demonstrate that, from following your online trail, marketers
have learned you are interested in a particular locale or product. They then usually try to encourage you to
book the lodging or buy the product with their advertisements.

Re�lection Questions

1. Do you �ind these ads useful, or do they bother you? Explain your reasoning.
2. Some browsers and security software allow you to block pop-up ads. What might be some

advantages and disadvantages of doing so?
3. Do you think dynamic pricing strategies are fair or unfair to consumers? Explain your answer.

Share an example of an instance in which you noticed a dynamic pricing strategy or have been
encouraged to purchase because of it.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 9/23

Caia Images/SuperStock

When you are researching, working,
or perusing websites, approach
certain sites cautiously to avoid being
scammed.

When online, your safety and security can be put at risk both by what you do and what you fail to do. In this
section, we discuss actions you can take to protect your personal safety and security on the Internet, and we
recommend some software we believe is an essential investment for your safety, security, and peace of mind. Let’s
begin by looking at speci�ic types of websites where you should be especially careful.

Websites to Approach Cautiously

People who are looking to perpetrate a scam—a way to get money from
another person by deceiving them—or to inappropriately access
someone’s personal information or engage in another illegal activity
tend to be attracted to websites that have large numbers of users and
where personal information is readily available. For this reason, you
need to be especially cautious when you access the following types of
sites, which are some of the most common targets for fraud and
criminal activity.

Dating Websites
Online dating sites are extremely popular today, and many people have
successfully found a romantic partner online. However, users should be
cautious about how much personal information they disclose about
themselves on these sites. The Privacy Rights Clearinghouse
(http://www.privacyrights.org (http://www.privacyrights.org) ), a
nationally recognized consumer education group that advocates for online privacy, warns that users have no right
to privacy or con�identiality for any information or photos they have posted and that the dating sites may sell this
information to others for advertising or marketing purposes. User information can also be subpoenaed and used
in insurance claims, lawsuits, and divorce and child custody proceedings. Make sure you read the privacy policies,
terms, and conditions carefully (Privacy Rights Clearinghouse, 2015).

6.2 Remaining Safe and Secure Online

http://www.privacyrights.org/

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 10/23

Gary A. Conner/age fotostock/SuperStock

Online classi�ied ad sites such as
Craigslist are great tools for �inding
jobs, housing opportunities, or goods
and services. However, these sites can
also be full of scammers who post
fake ads. Be aware of what to look
out for when using these sites.

Dating websites are also very attractive to sexual predators, felons, and stalkers, who use them to search for
potential victims. The U.S. Department of State receives thousands of complaints per year from people who have
been scammed out of money online—some by potential romantic partners. Someone, for example, can create a
false identity, spend time gaining your trust or “falling in love with you” online, and then ask for money for some
type of emergency. Many of these scammers are in countries outside of the United States, so recovering lost money
is almost impossible. Always trust your instincts if you are uncomfortable meeting someone or do not think they
are being entirely honest with you. Don’t provide your full name, address, or phone number until you feel safe
about your prospective date, and always make sure you arrange to meet people in a public place during the day,
not in the evening (Privacy Rights Clearinghouse, 2015).

Visit http://www.onlinedatingsafetytips.com/Top10Scams.cfm
(http://www.onlinedatingsafetytips.com/Top10Scams.cfm) for more information about common Internet dating scams.

Classi�ied Advertising Websites
For decades, people have sold unwanted items through classi�ied ads.
For the most part, these transactions are an excellent way to connect
buyers and sellers. Whether the advertisement has been placed in a
newspaper or online through a website such as Craigslist, you are
meeting strangers, in person, in your home. So you must be especially
carefully. Scams as a result of fake job postings and sale of stolen or
counterfeit goods and crimes ranging from threats to assaults, property
damage, and theft have all resulted from such situations. Problems with
these websites often result because these are private transactions
between individuals and do not have the same protection from fraud
and loss as do transactions through commercial stores and reputable
retail websites. They also do not have the protection from secure online
payment websites and credit card companies.

In February 2015 Fox News in Connecticut (FOX CT) reported the
Better Business Bureau guidelines shown in Table 6.3 to protect
consumers from the dangers associated with classi�ied ads (Schwartz,
2015).

You can learn more about classi�ied ad fraud at
http://www.craigslist.org/about/scams
(http://www.craigslist.org/about/scams) .

Table 6.3: Do’s and don’ts for online classi�ied ads

Do Don’t

Talk with the person �irst on the phone before meeting
with him or her. It is a red �lag if the other person
refuses to speak with you by phone before the
transaction.

Don’t agree to offers that involve shipping; criminals
often send or receive stolen or counterfeit
merchandise or illegal materials in this manner.

Meet in a public place, if possible, and trust your
instincts if something seems suspicious.

Don’t go alone. Take someone else with you if you
can.

http://www.onlinedatingsafetytips.com/Top10Scams.cfm

http://www.craigslist.org/about/scams

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 11/23

Do Don’t

Accept payment in cash only. Don’t accept cashier’s checks, certi�ied checks, or
money orders. They may be counterfeit, and wire
transfer or preloaded debit cards may not be
legitimate.

Always check a company’s website or call to con�irm a
job opening before meeting with someone for a
potential job interview.

Don’t assume that all job opening notices are
legitimate. They may be fake notices that are fronts
for other purposes.

Always drive by and view any property you are
interested in buying or renting before you agree to the
transaction.

Don’t buy or rent property sight unseen. Criminals
have been known to post photos of property that
belongs to someone else.

Gaming Websites
Many people enjoy playing interactive games such as Words With Friends or popular games produced by
companies such as PopCap, Y8, Pogo, or Zynga. These games can be played against people you know or whom you
have never met who just happen to be online when you want to play. Some of these games include gambling—with
real money changing hands; others are just for fun. In a massively multiplayer online game (MMO or MMOG) and a
massively multiplayer online role playing game (MMORPG), you may play against a large online community of
anonymous strangers and have unmoderated discussions, which pose a danger of inadvertently giving away
personal information about yourself (Get Safe Online, 2015). Some of the hidden dangers of such sites are outlined
here.

Until they download a particular game, many people are unaware that a game contains violent or sexual
content. If you have children who can access your computer, you can set parental controls on your
Windows or Mac OS X operating system to prevent access to sites that have such games.
Most of these websites allow you to assume a false identity. So you never know if you are online with a
sexual predator or other person who is interested in more than just playing games.
Do not download “cheats” (offers to buy programs or �iles that claim to give you an advantage over other
players). They may contain malware or computer viruses.
Play only authorized versions of a game, which you have purchased from a reputable source and for
which you have a software license. Do not use pirated copies of games, which are illegal, can incur criminal
penalties, and may contain malware.
Play online games only when you have updated antispyware and antivirus software running and an
effective �irewall—which is a network security software system that protects the computer network from
harmful information from other computers or the Internet—on your computer.
Choose a user name that does not reveal any personal information, and don’t put any revealing personal
information on your game pro�ile.
Use strong passwords that make it dif�icult for hackers to �igure out. Use the tips in Strategies for Success:
Tips for Creating Strong Passwords to create your passwords.
Watch out for scams and cons that can occur when online game players try to sell or buy items outside the
computer game, in the real world (Get Safe Online, 2015).

Strategies for Success: Tips for Creating Strong Passwords

Computer hackers who learn your password can access your bank accounts, medical records, and
other personal information. You can never completely guarantee that your information will be
secure, and most likely you will not use all the information shown in Table 6.4 to protect yourself.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 12/23

However, the more mistakes in the “Don’ts” column that you avoid and the more suggestions under
the “Instead” column you use, the greater password security you will have (Lemos, 2015).

Table 6.4: Do’s and don’ts for creating strong passwords

Don’ts Instead. . .

Don’t use short, 3- to 5-letter
passwords.

The longer the password the better. Use from 6 to 12 characters
in your passwords.

Don’t use common words or
phrases such as password or
iloveyou as your password.

Avoid real words, if possible. If you use an actual word, make it
unusual or one that is unique to you.

Don’t use all letters. Use a combination of letters, numbers, and symbols and special
characters such as & or %.

Don’t use consecutive, easy-
to-guess letter or number
combinations such as abcdef,
123456, or abc123.

Make your passwords random; mix up letters, numbers, and
symbols into a random sequence.

Don’t use the same
password for multiple
websites. If you duplicate
passwords, you run the risk
of having more of your
personal information stolen.

Have different passwords for different websites.

Don’t use a personal
password at work.

Use different personal and work passwords. It is bad enough if
someone steals your personal information, but don’t run the risk
that the thief could access your employer’s computer system as
well.

Don’t use words related to
yourself such as your
address, phone number, or
birthday.

After trying easy-to-guess passwords, hackers often use public
information about you for clues to your passwords. Use the tips
in this table instead.

Don’t use simple passwords
so you can memorize them.

If you keep passwords simple to easily remember them, you also
make them easy to hack. Instead, use a variety of complex
passwords, create a list of them, and keep the list in a secure
place at home or online on a secure password management
program such as Norton Identity Safe, Dashlane, LastPass, or
RoboForm.

Don’t use the same
password for �inancial
information that you use for
social media, games, and
shopping.

Develop a three-tier password system: (a) longer, more complex
passwords for �inancial data, (b) a different set of long, complex
passwords for social media and games, and (c) a third set of
somewhat easier passwords for other websites.

Don’t use names of family
members or pets as
passwords.

Use a line from a song you like, and make your password the
�irst letter of each word, substituting numbers for some of the
words. Thus, the Beatles’ song “Yellow Submarine” might become
waliays25ys.

Don’t use the same
passwords forever.

Change your passwords every few months.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 13/23

Re�lection Questions

1. Have you used any of the strategies listed? If so, which ones worked best for you?
2. What strategies have you developed that have worked for you, other than those listed?

Also, be especially cautious of �inancial loss or theft when
purchasing game elements using real cash. The cost of
buying “extras” with online games can add up quickly and
substantially. Last, but certainly not least, be careful of
developing an online gaming addiction. One of the biggest
dangers of these games is that you can waste many hours
playing and actually become addicted to them and avoid
other important aspects of your life (Get Safe Online, 2015).

Pornographic Websites
Pornography can be de�ined as visual or printed materials
that contain explicit displays or descriptions of sexual
organs or activities intended to stimulate erotic feelings or
sexual excitement. Because the Internet is international, no
one set of laws applies everywhere to the publication,
distribution, purchase, or possession of Internet
pornography. In the United States, the public, lawmakers,
and the courts have battled for decades over clearly de�ining what is pornographic and whether pornography is
protected by the First Amendment to the U.S. Constitution as free speech or is obscene and not protected.

Child pornography, however, is treated severely under both federal and state laws and is not protected under First
Amendment rights. Federal laws consider child pornography to be a form of child sexual exploitation and de�ine it
as any visual depiction of sexually explicit conduct involving a minor (someone younger than 18 years old).
Federal law prohibits any person from producing, distributing, importing, receiving, or possessing any image of
child pornography. Violation of these laws is punishable by �ines and a prison sentence that can range from a
minimum of 5 years to life imprisonment (U.S. Department of Justice, 2015).

To control access to pornographic material on your computer, you can purchase software applications called
antipornography �ilters. Examples include NetDogSoft’s Anti-Porn Filter, which attempts to block sites of this
nature from appearing on your computer. Some safety and security software also allow you to set parental
controls on your computers and phone to control access to certain material, and computer operating systems have
privacy settings and parental control features that can help. However, it is important to realize that no �ilter is
100% effective in blocking pornography.

Computer Threats

As a public space, the web can be a very useful way to �ind
information, shop, �ind entertainment, and stay connected
with family and friends. However, it can also be a mine�ield
with hidden dangers you must be aware of and protect
yourself against. In addition to privacy issues and the
dangers of identity theft, other safety and security threats
are common in today’s electronic world. In this section, we
discuss other types of threats that exist when you use digital

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 14/23

J.r. Bale/Hemera/Thinkstock

Installing security software isn’t enough to
protect your computer. You have to take the
time to update the software and scan it
regularly.

devices and actions you can take to protect yourself and
your data to minimize your chances of becoming a victim.

Some of the hazards you encounter might simply result in
inconvenience or temporarily crash your computer or
mobile device. Others, however, can permanently damage
your computing devices or seriously harm you, your family,
your reputation, or your �inances. The best defenses are
knowledge and preventive action.

Maddie knew about the possibility of some of the threats we
discuss here. So she purchased security software when she
bought her computer. However, the software recommended
that she regularly install updates and scan her computer to
ensure that she was protected from new, recently discovered
threats. These tasks were time-consuming, so Maddie put
them off. The night before a paper was due in one of her
online classes, she downloaded information from the web
that contained a nasty computer virus. The virus infected
her computer system, and her word processing software
would not work. Luckily, Maddie had made a backup version
of her paper a few days before, and a friend let her borrow
a computer for the evening. However, Maddie pulled an all-
nighter to re-create 3 days’ worth of work she had done on
the paper so she could submit it on time. Maddie learned the
hard way about the importance of performing regular maintenance on her computer to reduce her vulnerability to
threats.

Luckily, as fast as clever computer hackers and other malicious people devise ways to threaten your online safety
and security, equally clever people �ind ways to combat these threats. Let’s examine the types of electronic threats
that exist and ways you can prevent them or minimize your risk of exposure to them. In this section we refer
primarily to computers, but it is important to remember that you are vulnerable to the same threats we discuss
here when you download applications, or apps, for any of your mobile electronic devices.

Malware/Spyware
Malware, also called spyware, is a secret program that runs in the background when you are on your computer. It
gathers information about you and then shares it with others without your permission. Tracking cookies, which we
discussed earlier in this module, might be considered a type of spyware because they monitor your activity. The
information spyware collects about you might be used to track your movements on the web and then used later to
decide what type of pop-up ads to send to you. However, it can go beyond simple monitoring and be dangerous to
your personal and computer safety and security. Some spyware or malware can change your computer settings,
interfere with your ability to control your computer, or install new software on your computer that you have not
authorized. Spyware can also redirect your browser’s home page and adjust the settings so it is dif�icult for you to
change it back. It can also cause computer crashes.

You can protect yourself from most malware/spyware by making sure you have a �irewall on your network router
that protects your computer from others trying to get in and by installing a comprehensive security program on
your computer. Some popular security software packages are programs such as Norton Security, McAfee Internet
Security, and Kaspersky Total Security. These packages often include protection against multiple threats to your
computer, including various types of malware/spyware and computer viruses discussed in the next section. Once
you have installed this software, make sure to set the program to automatically install updates at least weekly, and
perform a full computer system scan every month to make sure you continue to be protected. You can learn more
about malware/spyware and how to protect your computer from the Microsoft Safety & Security Center at

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 15/23

Ullstein bild/Getty Images

Computer viruses can spread through links or
attachments in e-mail or instant messages, so
do not click on anything that looks unfamiliar
or that is received from someone you don’t
know.

https://www.microsoft.com/en-us/safety/pc-security/spyware-whatis.aspx (https://www.microsoft.com/en-
us/safety/pc-security/spyware-whatis.aspx) .

Computer Virus
We all know what a human virus is, which is why we cringe when someone sneezes too close to us. A computer
virus can be equally damaging, and you should take precautions to protect your computer. Hundreds of thousands
of viruses exist, and your computer can become infected when you download software, open e-mail, or copy an
infected �ile to your computer. A computer virus can corrupt or delete data on your computer, use your e-mail
program to send messages containing a virus to people on your e-mail contact list, or even erase all the �iles on
your computer hard drive. You can often recognize you have a computer virus when your computer does not
operate normally and performs strange, unwanted actions such as typing rows of the same letter or opening web
pages or programs on its own.

Computer viruses are often spread through attachments or
links in e-mail messages or through instant messaging.
Never open an attachment on an e-mail from someone you
do not know or an attachment you do not expect, and do not
click on a message or a link in an e-mail from someone who
is unfamiliar to you. Viruses can also be disguised as funny
images, greeting cards, or audio and video �iles and can be
hidden in free software or other �iles you download from
the Internet.

If you accidentally open a �ile or a link containing a virus,
you will usually be protected if you have up-to-date antivirus
software installed on your computer. McAfee, Kaspersky,
Avira, Norton, Bitdefender, Webroot, and ESET are some
highly regarded antivirus software programs that are
available for both the Mac OS X and the Windows computer
operating systems. They may also be bundled together with
malware/spyware protection software. Be sure to research
any software you use or purchase beforehand to determine
how well it is rated and whether it is recommended by

websites or people you trust.

Having a virus on your computer is not an acceptable excuse for turning your assignments in late. So make sure
you install a strong antivirus software program to protect your computer if you accidentally open a �ile that
contains a virus.

Trojan Horse
A

Trojan horse

is a type of malware that disguises itself as one type of program but is actually a different type of
program. For example, the software may claim to be a game, but when you install it on your computer it does
damage, such as erasing your hard drive. Trojan horses can infect other �iles throughout your computer and even
send important information over the Internet and allow the creator of the Trojan horse to control your computer,
slow its activity, or crash the machine.

Unlike a virus, a Trojan horse does not reproduce itself on its own. The creator of the Trojan horse must convince
you to download and consciously or unconsciously install the program. This is usually done when you open an e-
mail attachment that contains the malware or download a �ile that is unsafe. A good malware software security
program installed on your computer will protect against most Trojan horses. However, remember to open e-mails
or e-mail attachments and download �iles only from trusted sources.

https://www.microsoft.com/en-us/safety/pc-security/spyware-whatis.aspx

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 16/23

Stuart Jenner/iStock/Thinkstock

Computer worms are another type of threat to
your computer. What is at least one step you
can take to avoid getting a computer worm?

Computer Worm
A computer worm is another type of malware that scans
your computer for security holes. These security holes can
be created when a new threat appears and you have not
updated your security software. The worm enters the
computer through one of these holes and reproduces itself,
infecting other programs on your computer. A worm has the
ability to copy itself from machine to machine. It uses up
computer processing time and often carries payloads of
other malware that damage your computer or your �iles. It
can go throughout a computer network, including the
Internet, and infect hundreds of thousands of computers.

In 2001 a worm called Code Red was predicted to do so
much damage that it was feared the Internet would grind to
a halt (Brain & Fenlon, 2015). Luckily, this did not occur, but
imagine if a worm attacked a cell phone network today. The
danger of this is real, and you should be sure to protect all
your electronic devices, including your cell phone, from
malicious attacks. Discuss security software options with your Internet service provider or cell phone provider.

Phishing Scheme
Earlier in this module, we discussed phishing as one of the top �ive social media scams. Phishing schemes can take
place through e-mail, as well. For example, someone may e-mail you and offer to send you money if you send them
a “good faith” deposit �irst. Or someone may claim to be from the fraud department of your credit card company
and ask you to reply to the e-mail with some personal information. E-mail antispam �ilters (discussed later in this
module) may catch e-mail messages coming from phishers. But the U.S. Computer Emergency Readiness Team says
the best way for you to beat phishers at their own game is to be wary and never give out your personal or
�inancial information online (Brain & Fenlon, 2015).

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 17/23

Jupiterimages/Stockbyte/Thinkstock

Despite the possible threats online,
the Internet is a great place to learn,
shop, and connect with people
around the world.

If you want to use all the wonderful opportunities on the Internet to learn, shop, connect with family and friends,
and share your ideas with people around the world, you must accept some loss of privacy. For example, if you
want to make an online purchase, you must enter your credit card information into a website.

Millions of people purchase goods and services online, do their banking
online, post photos of their family, and do a multitude of other things on
the web every day with no problems. How do they use the Internet and
still protect their privacy and their most sensitive personal information
—such as their Social Security number, bank account and credit card
numbers, log-in identi�ications, and passwords—from unauthorized
people and organizations? The answer is by taking simple, basic
precautions, some of which are listed here.

On the home page of the browsers you use, search the settings
or menu for “Safety,” “Privacy,” or “Preferences” to locate
instructions to modify the degree of privacy you want for
Internet browsing or the type of content you will accept from a
website.
Download programs only from websites you trust. If you are
not sure, search the name of the program on the web to see if
anyone has reported it contains spyware or is a scam.
Always read all the security warnings, license agreements, and
privacy statements included with any software you download;
make sure you can accept all conditions.
When you purchase anything online or use a website that
requires you to enter any �inancial information, make sure that
website has a URL that begins with ht t ps : // (a secure
website). Such websites may also have a padlock icon at the
bottom of the page.
Never click “Agree” or “OK” to close a window. Instead, click the
“X” in the corner of the window or press Alt+F4 on your

6.3 Other Actions You Can Take to Protect Your
Privacy

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 18/23

Britt/iStock/Thinkstock

With two thirds of all e-mail being spam, it’s
necessary to �ind ways to avoid these
unsolicited and potentially dangerous
messages.

keyboard.
Be careful of “free” music and �ile-sharing programs. Make sure
you understand what conditions or additional software are
included with the free program.

Privacy on Shared Computers

When you use a computer at work or at a public library, make sure you have permission to use it for your
intended purpose and remember that the computer owner has the right to access all data and information on that
computer. To ensure privacy, even on your own personal computer, two good rules of thumb are to never share
personal identi�ication information or �inancial information in an e-mail and never write anything you would be
embarrassed to have someone �ind and read later. As the old saying goes, “It’s better to be safe than sorry.”

Dealing With Spam

E-mail is the most popular form of online communication, but not all electronic messages involve subjects you
want to read about. The computer security software company Kaspersky recently reported that 66.76% of all e-
mail messages in 2014 were spam (Vergelis, Shcherbakova, & Demidova, 2015). Spam is an unsolicited and
undesired or illegal e-mail message.

Not all spam is a computer threat. Many of the e-mails
categorized as spam are legitimate and legal advertisements
for products and services. However, they are e-mail
messages that you did not request or are for products or
services you may not want, and they intrude on your
privacy. Their biggest threats are that they �ill up your e-mail
inbox and take a great deal of your time to review each time
you check your e-mail. These spam e-mail messages arrive
daily often because marketers have sold your e-mail address
to third parties, who use these addresses to search for new
customers.

Some spam might appear to be from a legitimate company
but was actually sent by someone else; it may contain
destructive malware/spyware or a computer virus. A new
form of these destructive e-mail messages appear to be sent
from smartphones or from your cell phone company but are
actually fake cellular company messages and may carry
malware or viruses.

The following are some tips to help you avoid getting malware/spyware or computer viruses through your e-mail
and to minimize the unwanted and intrusive e-mail messages that clog your inbox.

Go to the Help menu on your e-mail program and search using the word “privacy” to �ind your e-mail
privacy options. Review these options and determine the degree of privacy you want to set for your e-mail
program.
Go back to the Help menu on your e-mail program and search using the term “junk e-mail” to learn how to
change the program’s �ilters to recognize potential spam and download it to your junk mail folder instead
of your e-mail inbox. Make sure to check this folder frequently for any mail that should not have been sent
to the junk folder. Right-click such messages, select “junk e-mail,” and add the sender to your “safe sender”
list so the message will go to your inbox in the future.
Do not try to unsubscribe from spam or junk mail. These messages are often sent randomly. By
unsubscribing, you con�irm to the sender that yours is a legitimate e-mail account. This can create more

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 19/23

spam for you, or your address may be sent to third parties and you may receive e-mail from them.
Do not click on attachments in unsolicited e-mails unless you are sure they are safe.
Do not click on links inside e-mails. Instead, type the URL directly into your browser. If the link is not safe,
your browser should alert you to that fact.
Consider having a free, disposable e-mail address you can use for sur�ing the Internet without having
messages sent back to your home e-mail address. You can obtain free e-mail accounts on Yahoo! and Gmail
for this purpose.

Account Security

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 20/23

Summary & Resources

Module Summary
Computer technology and the Internet offer tremendous bene�its in your personal and professional lives. With
only a few keystrokes, you can shop online, pay your bills, make restaurant reservations, or chat with friends. You
can work from home, earn a degree without ever setting foot on a college campus, and have entire libraries of
information at your �ingertips. But these bene�its also come with some risks. Fortunately, by understanding how
online technology works and taking some simple precautions, you can enjoy the bene�its without worrying about
your personal safety or the safety of the information you create and store on your digital devices.

One of the best ways you can protect yourself is to remember that the data and information you create could be
permanent, and it may be retrieved from your digital devices years after it was created. Whenever you go online,
you leave an electronic trail of where you have been—a digital footprint that enables others to retrace the steps
you took and learn a great deal of information about you. This trail is created by the unique IP address of your
computer, the IP addresses of websites you visit, and small text �iles called browser cookies that record additional
personal information about you.

It pays to be cautious when you receive messages, via e-mail or social media websites, from people you do not
know. You should avoid responding to these messages or clicking on attachments or links in the messages unless
you know they are safe. Dating websites, classi�ied advertising sites, media-sharing sites, gaming sites, and
pornographic sites require extra caution to make sure you protect your personal identity and privacy.

You must also make sure to protect your digital equipment from unwanted intrusions and threats such as
malware/spyware, computer viruses, computer worms, and phishing schemes by installing security software and
updating it regularly. With these few cautions in mind and these few protections in place, you can rest easily and
feel free to explore the vast resources available to you in this exciting digital age.

Critical-Thinking Questions
1. What are the most important bene�its electronic technology has provided in your life?
2. What do you like most about online tracking, and what is the most annoying or bothersome aspect of this

type of tracking?
3. Have you used any classi�ied advertising websites to buy or sell merchandise? What do you think of such

websites, and how well did they work for you?

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 21/23

Key Terms
Click on each key term to see the de�inition.

browser cookie
A computer �ile containing a small piece of data that is stored in a web browser while (and sometimes after) a
user is browsing the website. It records information about the user and the user’s activity on the site. Also
known as a tracking cookie.

computer virus
A software program that, when installed on a computer, creates copies of itself and often modi�ies other
computer programs or �iles or performs harmful activities such as destroying data or damaging computer
hardware. When such a program is installed, it is said to “infect” the computer.

computer worm
A type of malware that scans your computer for holes or openings in your security system. The worm enters
through one of these holes and, on a computer network, can copy itself from machine to machine.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 22/23

cookie pro�iling
The use of browser cookies to track personal information about a user who visits a website and to create a
record of that user’s activity online; this record is commonly used by marketers, so they can market products
and services to the user more effectively the next time he or she visits the website.

data aggregator
An individual or company that makes money by collecting and compiling data and information about people
from the web and selling it to others.

digital footprint
The electronic trail of digital data about you and your computer that you leave on the web as you browse from
one website to another.

domain name
A name assigned to a website and linked to the website’s IP address that has two parts: a web page name and a
web extension. Also known as host.

�irewall
A network security software system that monitors incoming and outgoing information and protects the
computer network from harmful information from other computers or other networks such as the Internet.

host
See domain name.

IP address
Internet protocol address; a series of numbers assigned to every digital device when it is manufactured and to
every site on the World Wide Web. These numbers are recorded on the device and on the site when the two are
connected. Thus, every website has a record of the devices that have visited, and every device has a record of
every website it has visited.

malware
Harmful software programs that are intended to interfere with other computer systems and disrupt their
operations, gather sensitive information, or cause other types of damage to the system. Also known as spyware.

pop-up ads
A form of online advertising on the World Wide Web designed to attract readers by displaying speci�ic ads to
them when they browse pages on the web.

pornography
Printed or visual material that contains explicit descriptions or displays of sexual organs or activity that is
intended to create sexual excitement.

scam
A dishonest plan, especially one to get money from other people by misleading or tricking them.

spam
E-mails that are sent, usually to large numbers of people on the Internet, that are not requested and often not
wanted.

spyware
See malware.

tracking cookie
See browser cookie.

Trojan horse

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 23/23

A type of malware that disguises itself as one type of program but is actually a different type of program. The
Trojan horse is usually spread when a computer user opens an e-mail attachment or downloads a �ile that
contains the malware.

uniform resource locator (URL)
See web address.

web address
A standardized address or path to locate documents and other resources on the World Wide Web. Also known
as uniform resource locater (URL).

web extension
The part of the domain name that indicates the type of organization or institution the website represents or the
country designation for that website.

web page name
The name or title of any page on the World Wide Web that is given to it to make it easier to �ind than having to
type in the web address/URL.

Flashcards for Key Terms
A computer file containing a small piece of data that is stored in a web browser while (and
sometimes after) a user is browsing the website. It records information about the user and
the user’s activity on the site Also known as a tracking cookie

Click card to see term ?

Choose a Study ModeView this study set

https://quizlet.com/

https://quizlet.com/144483493/fundamentals-of-digital-literacy-chapter-6-flash-cards/

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy