The document discusses cybercrime and how to protect yourself online. It includes transcripts from two listening exercises that provide statistics about cybercrime and discuss how to evaluate the reliability of information sources. Recommendations are given for protecting personal information and recognizing credible citations.
The document discusses cybercrime and how to protect yourself online. It includes transcripts from two listening exercises that provide statistics about cybercrime and discuss how to evaluate the reliability of information sources. Recommendations are given for protecting personal information and recognizing credible citations.
The document discusses cybercrime and how to protect yourself online. It includes transcripts from two listening exercises that provide statistics about cybercrime and discuss how to evaluate the reliability of information sources. Recommendations are given for protecting personal information and recognizing credible citations.
1. Did any of the statistics surprise you? Why? / Why not?
2. How could you protect yourself from the crimes described? 3. What other types of cybercrime have you heard of? CRIME DOESN’T PAY Video Before you watch Video While you watch Video After you watch Cybercrime Listening 1 Vocabulary preview Listening 1 Vocabulary preview Listening 1 Vocabulary preview Listening 1 Before you listen Listening 1 Global listening Listening 1 Close listening Listening 1 Close listening Listening 1 Close listening Listening 1 Critical thinking Study skills Being a good listener Study skills Being a good listener Protect yourself online Listening 2 Vocabulary preview Listening 2 Vocabulary preview Listening 2 Vocabulary preview Listening 2 Before you listen Listening 2 Global listening Listening 2 Global listening Listening 2 Global listening Listening 2 Close listening Quotations from reliable sources are often used to support a speaker’s argument. When quoting, speakers have a responsibility to name the original speaker or publisher of the information. This is called citing the source. Listeners need to be able to recognize citations in order to know whether information comes from the speaker or an outside source. Study the following examples of citations. Notice the signals that introduce them. Listening 2 Close listening Listening 2 Close listening Critical thinking Evaluating source reliability When evaluating the strength of an argument, it’s important to think about the source of any information being presented. In the academic world, the following sources are usually considered reliable: government or university publications; well-regarded magazines such as Scientific American or Consumer Reports; well-known newspapers like the New York Times; and web addresses ending in .gov or .org. The following sources may not be reliable: websites for commercial products, personal blogs, and non- academic magazines. To evaluate the reliability of a source, ask yourself these questions: 1. Who wrote or published the information, and what are their qualifications? A reliable source should be a person or publication accepted as an expert in the field. 2. When was the information published? Outdated information is usually not considered reliable. 3. Is the information objective, or is it written with the purpose of trying to persuade people to behave or think in a certain way? Critical thinking Evaluating source reliability
Source Qualification Date published
Bill Laberis, the journal former editor-in-chief of the 2015 (1) ___________________ journal Computer World Business Insider respected magazine (2) ___________________ (Not given, but reputation is (Not given) (3) ___________________ well known) Federal Trade US government agency Commission responsible for (Not given) (4) ___________________ Consumer Reports well-known consumer protection organization (5) ___________________ Krystal Merton (6) ___________________ at (Not given) Pennbrook University Director of Conrad Stewart (7) ___________________ at the (Not given) Mayweather Institute in New York.