10
-NiE ,
23 AUGUST 2017
ADVANCED Honesty
NiE Activity 1 Critical thinking ● Identify ● Reason
● Measure ● Organise
Creative thinking ● Imagine ● Brainstorm
● Connect ● Invent
It’s a fake world IT’S a fake world out there. First, there were fake wigs, then came fake eyelashes and fake toupees. Next came fake wine and fake body parts. Now, we even have fake relationships (think mail-order bride scams)! There are also recent videos on social media showing fake milk, fake eggs, fake rice and fake cement.
In groups of four, scan The Star for items or concepts that have been counterfeited over the years (many examples have already been listed above). You have five minutes to complete the task. When your teacher says that time is up, compile the items. Which group has the highest number? Check the answers as a class. What types of items do you have that other groups do not?
NiE Activity 2 Critical thinking ● Identify ● Reason
● Measure ● Organise
Problem solving
Creative thinking ● Imagine ● Connect ● Brainstorm
● Question ● Recreate ● Research ● Present
Rampant these days are scams run by ruthless criminals. Such criminals are trying to take on “fake” personalities by stealing other people’s identities. This is known as identity theft. Millions of people around the world have become victims of identity theft through physical theft, hacking and phishing, to name a few. It is a fastgrowing crime. Identity theft is when a person acquires and uses your name (address and MyKad) in order to apply for a credit card or purchase products in your name.
Communicating ● Oral
● Aural
Collaborating ● Listen
● Compromise
● Contribute respectfully
● Attain goal
Phishing, as defined by Oxford Dictionary, is the fraudulent practice of sending e-mails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Here’s a story about an identity theft that was reported in The Star a while back. Before your teacher begins reading it aloud, cut out the trafficlight cards: red, amber and green (refer to the illustration). As the story is read, your teacher will stop when
she feels there is an action (or ought to be an action) the character must take. Your teacher will facilitate by asking the question, “If there is an action he must take, what must it be?” A volunteer must answer the question. If you agree with the answer, show your green light. If you disagree with it, display your red light. If you disagree with the action taken by the victim, express your opinion with your traffic lights. The discussion will continue in this manner until the next critical point.
IT Manager falls victim to identity theft PETALING JAYA: It all started with a barred handphone line, but a quick call to check with his service provider revealed something much more sinister – identity theft and credit card fraud. IT manager Pang, 44, was out for a jog on Aug 16 last year when he realised that there was no service on his work phone. After two hours without any change in status, Pang called his service provider to check. But to his surprise, the agent told him that the records showed that Pang had changed his SIM card at the provider’s outlet at eCurve that afternoon. He was informed that someone using his details via a temporary IC had initiated the change. “I tried to figure out why anyone would want my number. Then I remembered a credit card that I had yet to receive,” said Pang. His fears were confirmed when his checks showed that not only had the credit card been delivered, but it was also activated via SMS, before seven transactions were made. The total transactions amounted to RM26,428 and all were made that day. A police report was made at the Damansara station the following day and the bank nullified the seven transactions after Pang showed proof, including CCTV footage of the thieves when they used his card. On Jan 6, Pang received two overdue bills from a different telco, citing outstanding broadband and phone bills amounting to RM1,420.
Activity Break into groups of three. Your teacher will randomly assign each group one of the following questions:
Group 1: Describe why it is important to protect one’s financial documents or identity.
Group 2: What can you do to protect your identity from being stolen?
Group 3: What steps should you take if your identity is stolen?
Group 4: What kinds of phishing tactics are used online?
Each group has 10 minutes to discuss before sharing their answers in class.