All resources in Oregon Personal Financial Education

Remix of "Feeding the Hungry with Food Stamps Program"

(View Complete Item Description)

This is a remix of "Feeding the Hungry with Food Stamps Program". This resource is the beginning of a list of identifying areas in the resource that need additional resources to create a more pluralistic understanding of the ways our nation can feed all people. The original resource from Digital Public Library of America can be found here: https://www.oercommons.org/courses/feeding-the-hungry-with-food-stamp-programs

Material Type: Primary Source

Authors: Joanna Schimizzi, Christina M Spears

Cybersecurity-Online Identity Theft

(View Complete Item Description)

This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.

Material Type: Activity/Lab, Homework/Assignment

Author: Amy J Ramson

Who Commits Identity Theft And what Could Its Negative effects

(View Complete Item Description)

When you, for the most part, consider data fraud, you picture a decrepit criminal, a person who has stolen your data. In any case, this picture is normally inaccurate. Identity theft criminals are regularly a great deal more commonplace and can be your family, companions and even individuals from your congregation. Being wary and cautious with your data is fundamental to averting fraud.

Material Type: Textbook

Author: Jack Peter

Data Mining

(View Complete Item Description)

A number of successful applications have been reported in areas such as credit rating, fraud detection, database marketing, customer relationship management, and stock market investments. This course will examine methods that have emerged from both fields and proven to be of value in recognizing patterns and making predictions from an applications perspective. We will survey applications and provide an opportunity for hands-on experimentation with algorithms for data mining using easy-to- use software and cases.

Material Type: Full Course

Author: C4DLab University of Nairobi

Impersonation and Identity Theft

(View Complete Item Description)

A lot of what we do online requires having digital accounts. So how do we keep those accounts (and our personal information) secure? And what could happen if we don't? In this lesson, students will learn about the potential impacts of impersonation and identity theft, and review strategies to strengthen their cybersecurity skills.

Material Type: Lesson

Author: Common Sense Education