Please enable JavaScript to use CodeHS

Arkansas 9-12 Standards Mapping

to

Fundamentals of Cybersecurity

122 Standards in this Framework 66 Standards Mapped 54% Mapped to Course


Standard Lessons
CSL1.1.1 Leverage problem-solving strategies to solve problems of level-appropriate complexity. NOTE: Some problem-solving strategies may include but are not limited to recursion, iteration, Agile method, 6-step engineering design process, and waterfall.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
  8. 22.10 Loop and a Half
  9. 23.1 Control Structures Challenges
CSL2.1.1 Leverage problem-solving strategies to solve problems of level-appropriate complexity. NOTE: Some problem-solving strategies may include but are not limited to recursion, iteration, Agile method, 6-step engineering design process, and waterfall.
  1. 4.4 Branching
  2. 21.1 Challenge Problems
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.7 For Loop Practice
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
  8. 23.1 Control Structures Challenges
CSL3.1.1 Leverage problem-solving strategies to solve problems of level-appropriate complexity. NOTE: Some problem-solving strategies may include but are not limited to recursion, iteration, Agile method, 6-step engineering design process, and waterfall.
  1. 4.4 Branching
CSL4.1.1 Leverage problem-solving strategies to solve problems of level-appropriate complexity. NOTE: Some problem-solving strategies may include but are not limited to recursion, iteration, Agile method, 6-step engineering design process, and waterfall.
  1. 4.4 Branching
CSL1.1.2 Compare and contrast multiple representations of problem-solving logic. NOTE: Some representation methods may include but are not limited to documentation, backlog, sprints, decision matrix, design brief, flowchart, and pseudocode.
  1. 4.6 Organizational Techniques
CSL2.1.2 Analyze multiple representations of problem-solving logic. NOTE: Some representation methods may include but are not limited to documentation, backlog, sprints, decision matrix, design brief, flowchart, and pseudocode.
  1. 4.6 Organizational Techniques
CSL3.1.2 Design multiple representations of problem-solving logic used to solve a problem of appropriate complexity. NOTE: Some representation methods may include but are not limited to documentation, backlog, sprints, decision matrix, design brief, flowchart, and pseudocode.
  1. 4.6 Organizational Techniques
CSL4.1.2 Critique multiple representations of problem-solving logic used to solve a problem of appropriate complexity. NOTE: Some representation methods may include but are not limited to documentation, backlog, sprints, decision matrix, design brief, flowchart, and pseudocode.
  1. 4.6 Organizational Techniques
CSL1.1.3 Analyze and implement collaborative methods in problem solving of level-appropriate complexity. NOTE: Some implementation methods may include but are not limited to paired programming, distributive (divide & conquer), and redundant parallel.
CSL2.1.3 Analyze and implement collaborative methods in problem solving of level-appropriate complexity. NOTE: Some implementation methods may include but are not limited to paired programming, distributive (divide & conquer), and redundant parallel.
CSL3.1.3 Analyze and implement collaborative methods in problem solving of level-appropriate complexity. NOTE: Some implementation methods may include but are not limited to paired programming, distributive (divide & conquer), and redundant parallel.
CSL4.1.3 Analyze and implement collaborative methods in problem solving of level-appropriate complexity. NOTE: Some implementation methods may include but are not limited to paired programming, distributive (divide & conquer), and redundant parallel.
CSL1.1.4 Recognize processes and techniques for troubleshooting of level-appropriate complexity. NOTE: Some processes and techniques for troubleshooting may include but are not limited to tracing; debugging; identification/removal of malware; and error-classification including syntax, logic, runtime, and off-by-one errors.
CSL2.1.4 Recognize processes and techniques for troubleshooting of level-appropriate complexity. NOTE: Some processes and techniques for troubleshooting may include but are not limited to tracing; debugging; identification/removal of malware; and error-classification including syntax, logic, runtime, and off-by-one errors.
CSL3.1.4 Recognize processes and techniques for troubleshooting of level-appropriate complexity. NOTE: Some processes and techniques for troubleshooting may include but are not limited to tracing; debugging; identification/removal of malware; and error-classification including syntax, logic, runtime, and off-by-one errors.
CSL4.1.4 Recognize processes and techniques for troubleshooting of level-appropriate complexity. NOTE: Some processes and techniques for troubleshooting may include but are not limited to tracing; debugging; identification/removal of malware; and error-classification including syntax, logic, runtime, and off-by-one errors.
CSL1.1.5 Decompose a problem of level-appropriate complexity into more simple, solvable parts. NOTE: Solvable parts may include but are not limited to methods, functions, and subroutines with and without parameters.
  1. 21.1 Challenge Problems
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.9 While Loops
  6. 22.10 Loop and a Half
CSL2.1.5 Decompose a problem of level-appropriate complexity into more simple, solvable parts. NOTE: Solvable parts may include but are not limited to methods, functions, and subroutines with and without parameters.
  1. 21.1 Challenge Problems
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.9 While Loops
  6. 22.10 Loop and a Half
CSL3.1.5 Decompose a problem of level-appropriate complexity into more simple, solvable parts. NOTE: Solvable parts may include but are not limited to methods, functions, and subroutines with and without parameters.
CSL4.1.5 Decompose a problem of level-appropriate complexity into more simple, solvable parts. NOTE: Solvable parts may include but are not limited to methods, functions, and subroutines with and without parameters.
CSL1.2.1 Interpret logical expressions using Boolean operators (e.g., AND, NOT, OR, XOR)
  1. 22.1 Booleans
  2. 22.2 Logical Operators
  3. 22.3 Comparison Operators
CSL2.2.1 Interpret logical expressions using short-circuit evaluation
  1. 22.3 Comparison Operators
CSL1.2.2 Classify the types of information that can be stored as variables (e.g., Booleans, characters, integers, floating points, strings)
  1. 4.1 Programming Concepts
CSL1.2.3 Identify mathematical concepts (e.g., random number generation, vocabulary) related to computer science
  1. 22.8 Random Numbers
CSL2.2.3 Recognize the similarities and differences between mathematics and computer science algorithms
CSL3.2.3 Demonstrate basic encryption (e.g., block cipher, Caesar cipher)
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
CSL2.2.4 Discuss the concept of abstraction
CSL3.2.4 Analyze the concepts of abstraction as modeling and abstraction as encapsulation
CSL4.2.4 Use the concepts of abstraction as modeling and abstraction as encapsulation
CSL2.2.5 Perform simple operations with base10, base2, and base16 numbers. NOTE: Some operations may include but are not limited to addition, subtraction, and conversion.
  1. 10.2 Notational Systems
CSL4.2.5 Perform simple operations with base10, base2, base8, and base16 numbers. NOTE: Some operations may include but are not limited to addition, subtraction, and conversion.
  1. 10.2 Notational Systems
CSL1.2.6 Demonstrate operator (e.g., +, -, /, %, concatenation) precedence in expressions and statements. NOTE: Some examples of operator precedence and assignment may include but are not limited to inside-out, order of operations, and x = 1 is not the same as 1 = x.
CSL2.2.6 Demonstrate operator (e.g., math, pow, sqrt) precedence in expressions and statements. NOTE: Some examples of operator precedence and assignment may include but are not limited to inside-out, order of operations, and x = 1 is not the same as 1 = x.
CSL1.3.1 Define, store, and manipulate primitive data. NOTE: Primitive data can include, but is not limited to, bool, char, double, float, int. Defining and storing can include, but are not limited to, modifiers such as final, private, protected, public. Manipulating data can include, but is not limited to, arranging (including stacking and queuing), casting, rearranging, sorting.
CSL2.3.1 Define, store, and manipulate linear data. NOTE: Linear data can include, but is not limited to, arrays, lists, strings, vectors. Defining and storing can include, but are not limited to, modifiers such as final, private, protected, public. Manipulating data can include, but is not limited to, arranging (including stacking and queuing), casting, rearranging, sorting.
CSL3.3.1 Define, store, and manipulate structured data and objects. NOTE: Structured data can include, but is not limited to, arrays, classes, linked lists, multidimensional arrays, structs, user-defined classes. Objects can include, but are not limited to, constructors, data members, methods, pass-by-value/pass-by-reference parameters. Defining and storing can include, but are not limited to, modifiers such as final, private, protected, public. Manipulating data can include, but is not limited to, arranging (including stacking and queuing), casting, rearranging, sorting.
  1. 4.5 Arrays and Objects
CSL4.3.1 Create a program to store and manipulate various data. NOTE: Structured data can include, but is not limited to, arrays, classes, linked lists, multidimensional arrays, structs, user-defined classes. Objects can include, but are not limited to, constructors, data members, methods, pass-by-value/pass-by-reference parameters. Defining and storing can include, but are not limited to, modifiers such as final, private, protected, public. Manipulating data can include, but is not limited to, arranging (including stacking and queuing), casting, rearranging, sorting.
  1. 4.5 Arrays and Objects
CSL1.3.2 Compare and contrast level-appropriate numeric and non-numeric data representations. NOTE: Topics could include, but are not limited to, analog vs. digital, ASCII/Unicode, bar codes, compression, encoding, light/pixels, size of file vs. data types vs. storage needed, sound wave/sampling.
  1. 10.3 Data Representation
CSL2.3.2 Compare and contrast level-appropriate numeric and non-numeric data representations. NOTE: Topics could include, but are not limited to, analog vs. digital, ASCII/Unicode, bar codes, compression, encoding, light/pixels, size of file vs. data types vs. storage needed, sound wave/sampling.
  1. 10.3 Data Representation
CSL3.3.2 Compare and contrast level-appropriate numeric and non-numeric data representations. NOTE: Topics could include, but are not limited to, analog vs. digital, ASCII/Unicode, bar codes, compression, encoding, light/pixels, size of file vs. data types vs. storage needed, sound wave/sampling.
  1. 10.3 Data Representation
CSL4.3.2 Compare and contrast level-appropriate numeric and non-numeric data representations. NOTE: Topics could include, but are not limited to, analog vs. digital, ASCII/Unicode, bar codes, compression, encoding, light/pixels, size of file vs. data types vs. storage needed, sound wave/sampling.
  1. 10.3 Data Representation
CSL2.4.1 Analyze the degree to which a computer model accurately represents an actual situation (e.g., Conway’s Game of Life, population growth, predator-prey)
CSL3.4.1 Critique techniques for creating models, simulations, and generating random numbers to be used for data analysis
CSL4.4.1 Create various models and simulations as predictors for probabilistic scenarios (e.g., flip a coin, random walker, roll a die) and/or real-world scenarios (e.g., city population, predator-prey)
CSL1.4.2 Examine the ability of computing technology to create and process Big Data
CSL2.4.2 Determine an appropriate visual representation for given data
  1. 8.3 The Value of Data
CSL3.4.2 Compare and contrast multiple visual representation tools for given data
  1. 8.3 The Value of Data
CSL2.4.3 Implement algorithms to perform data analysis (e.g., longest string, maximum, mean, minimum, range)
CSL1.5.1 Construct and evaluate simple expressions using relational and logical operators
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
CSL2.5.1 Construct and evaluate compound expressions using relational and logical operators
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
CSL1.5.2 Design and implement algorithms that use sequence and selection including nested ifs (e.g., if, if/else, if/else if, switch-case)
  1. 21.1 Challenge Problems
  2. 22.4 If Statements
CSL2.5.2 Design and implement algorithms that use sequence, selection, and iteration including nested loops (e.g., for, for each, while, do while)
  1. 21.1 Challenge Problems
  2. 22.5 For Loops in JavaScript
  3. 22.6 General For Loops
  4. 22.7 For Loop Practice
  5. 22.10 Loop and a Half
CSL3.5.2 Design and implement algorithms that use sequence, selection, iteration and recursion
  1. 4.3 Looping
  2. 4.4 Branching
CSL1.5.3 Illustrate the flow of execution of a program including branching and looping
  1. 4.3 Looping
  2. 4.4 Branching
  3. 4.6 Organizational Techniques
  4. 22.7 For Loop Practice
CSL2.5.3 Illustrate the flow of execution of an increasingly complex program including branching and looping
  1. 4.3 Looping
  2. 4.4 Branching
  3. 4.6 Organizational Techniques
CSL3.5.3 Critically analyze classic search and sort algorithms in different contexts, adapting as appropriate
CSL1.5.4 Evaluate the qualities of level-appropriate algorithms. NOTE: Evaluation tools can include, but are not limited to, a code review and test cases. Qualities can include correctness, usability, readability, efficiency, portability, and scalability.
  1. 21.1 Challenge Problems
CSL2.5.4 Evaluate the qualities of level-appropriate algorithms. NOTE: Evaluation tools can include, but are not limited to, a code review and test cases. Qualities can include correctness, usability, readability, efficiency, portability, and scalability.
  1. 21.1 Challenge Problems
CSL3.5.4 Evaluate the qualities of level-appropriate algorithms. NOTE: Evaluation tools can include, but are not limited to, a code review and test cases. Qualities can include correctness, usability, readability, efficiency, portability, and scalability.
CSL4.5.4 Evaluate the qualities of level-appropriate algorithms. NOTE: Evaluation tools can include, but are not limited to, a code review and test cases. Qualities can include correctness, usability, readability, efficiency, portability, and scalability.
CSL1.5.5 Utilize a systematic approach to detect structural and logic errors
CSL2.5.5 Utilize a systematic approach to detect structural and logic errors
CSL3.5.5 Utilize a systematic approach to detect structural and logic errors
CSL4.5.5 Utilize a systematic approach to detect structural and logic errors
CSL1.6.1 Create programs to solve problems of level-appropriate complexity applying best practices of program design and format (e.g., descriptive names, documentation, indentation, whitespace). NOTE: Problems of varying complexity can include, but are not limited to, encoding, encryption, finding minimum/maximum values, identifying prime numbers, searching and sorting, and solving the Towers of Hanoi.
CSL2.6.1 Create programs to solve problems of level-appropriate complexity applying best practices of program design and format (e.g., descriptive names, documentation, indentation, whitespace). NOTE: Problems of varying complexity can include, but are not limited to, encoding, encryption, finding minimum/maximum values, identifying prime numbers, searching and sorting, and solving the Towers of Hanoi.
CSL3.6.1 Create programs to solve problems of level-appropriate complexity applying best practices of program design and format (e.g., descriptive names, documentation, indentation, whitespace). NOTE: Problems of varying complexity can include, but are not limited to, encoding, encryption, finding minimum/maximum values, identifying prime numbers, searching and sorting, and solving the Towers of Hanoi.
CSL4.6.1 Create programs to solve problems of level-appropriate complexity applying best practices of program design and format (e.g., descriptive names, documentation, indentation, whitespace). NOTE: Problems of varying complexity can include, but are not limited to, encoding, encryption, finding minimum/maximum values, identifying prime numbers, searching and sorting, and solving the Towers of Hanoi.
CSL1.6.2 Utilize functions/methods/procedures to input, output, and manipulate data with and without parameters. NOTE: In conjunction with standards CSL1.3.1 through CSL4.3.1, the goal is to introduce and implement object-oriented programming.
CSL2.6.2 Determine the scope of variables declared in functions/methods/procedures and control structures. NOTE: In conjunction with standards CSL1.3.1 through CSL4.3.1, the goal is to introduce and implement object-oriented programming.
CSL3.6.2 Determine the scope of variables and functions/methods/procedures declared in objects (e.g., public, private, encapsulation). NOTE: In conjunction with standards CSL1.3.1 through CSL4.3.1, the goal is to introduce and implement object-oriented programming.
CSL4.6.2 Determine the scope of variables and functions/methods/procedures defined in abstract classes and interfaces (e.g., encapsulation, inheritance, polymorphism). NOTE: In conjunction with standards CSL1.3.1 through CSL4.3.1, the goal is to introduce and implement object-oriented programming.
CSL1.6.3 Create a program that reads from standard input and writes to standard output
CSL2.6.3 Create a program that reads from a file and writes to a file
CSL4.6.4 Explain advantages and disadvantages of various software life cycle processes (e.g., Agile, spiral, waterfall) by participating on software project teams
CSL2.7.1 Characterize how software and/or hardware is used in industry (e.g., business, government, medical, military, sports)
  1. 10.10 Impact of the Internet
CSL4.7.1 Utilize software and/or hardware to solve various industry-based problems
  1. 12.1 Methodology
  2. 12.2 Support Practice
CSL1.7.2 Identify desired technical and soft skills (e.g., collaboration, communication, problem solving, teamwork) that can be enhanced by computer science
  1. 12.1 Methodology
  2. 12.2 Support Practice
CSL2.7.2 Discuss technical and soft skills honed by computer science
CSL3.7.2 Demonstrate technical and soft skills honed by computer science
CSL4.7.2 Demonstrate technical and soft skills honed by computer science
CSL1.7.3 Discuss diverse careers that are influenced by computer science and its availability to all regardless of background
CSL2.7.3 Analyze a historical timeline of computers and technology
CSL3.7.3 Explore advancing and emerging technologies (e.g., Artificially Intelligent Agents, Robotics, Internet of Things [IoT])
CSL4.7.3 Explain how cutting-edge technology may affect the way business is conducted in the future (e.g., eCommerce, entrepreneurship, payment methods, business responsibilities)
  1. 1.3 Impact of Cybersecurity
CSL1.8.1 Utilize networks to perform level-appropriate tasks
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 10.8 Packets & Protocols
  6. 11.3 Network Devices
  7. 11.5 Network Options
CSL2.8.1 Utilize networks to perform level-appropriate tasks
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 10.8 Packets & Protocols
  6. 11.3 Network Devices
  7. 11.5 Network Options
CSL3.8.1 Utilize networks to perform level-appropriate tasks
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 10.8 Packets & Protocols
  6. 11.3 Network Devices
  7. 11.5 Network Options
CSL4.8.1 Utilize networks to perform level-appropriate tasks
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 10.8 Packets & Protocols
  6. 11.3 Network Devices
  7. 11.5 Network Options
CSL1.8.2 Discuss the role of internet service providers (ISP) in providing connectivity
  1. 10.5 Internet Addresses
  2. 10.8 Packets & Protocols
CSL2.8.2 Discuss the hierarchical nature of networks, subnetworks, and the Internet
  1. 10.5 Internet Addresses
  2. 10.6 Domain Name System (DNS)
  3. 10.8 Packets & Protocols
CSL3.8.2 Analyze how the nature of networks allow for a continual increase in the number of devices
  1. 10.5 Internet Addresses
  2. 10.6 Domain Name System (DNS)
  3. 10.8 Packets & Protocols
CSL4.8.2 Research projects that utilize the power created through the networking of computers to solve level-appropriate problems
CSL1.8.3 Compare and contrast local area networks (LAN) and wide area networks (WAN)
  1. 11.5 Network Options
CSL2.8.3 Identify various common topologies utilized in network implementations
  1. 10.6 Domain Name System (DNS)
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
CSL3.8.3 Analyze the tradeoffs of implementing various common topologies
  1. 10.6 Domain Name System (DNS)
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
CSL4.8.3 Analyze the tradeoffs of implementing increasingly complex topologies
  1. 10.6 Domain Name System (DNS)
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
CSL2.8.4 Identify digital and physical methods used to secure networks
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
CSL3.8.4 Discuss digital and physical methods used to secure networks
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
CSL4.8.4 Design a practical, efficient, and secure network solution (e.g., small office network)
  1. 8.9 Common Security Problems
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
CSL1.8.5 Identify common network protocols (e.g., DNS, HTTP/HTTPS, SMTP/POP/IMAP, Telnet/SSH)
  1. 10.8 Packets & Protocols
  2. 11.5 Network Options
CSL2.8.5 Compare and contrast common network protocols (e.g., DNS, HTTP/HTTPS, SMTP/POP/IMAP, Telnet/SSH)
  1. 10.6 Domain Name System (DNS)
  2. 10.8 Packets & Protocols
  3. 11.5 Network Options
CSL3.8.5 Analyze the Open Systems Interconnect (OSI) Model layers 1-7
CSL4.8.5 Map network operations to the OSI Model
CSL1.9.1 Compare and contrast computer programming paradigms and languages (e.g., text-based, visual, high-level, low-level, object-oriented)
  1. 4.1 Programming Concepts
CSL2.9.1 Compare and contrast the tradeoffs between compiled and interpreted languages
  1. 4.1 Programming Concepts
CSL3.9.1 Discuss considerations when programming for multiple computing platforms (e.g., desktop, mobile, web)
  1. 7.5 Software Licenses
CSL1.9.2 Discuss version control and Integrated Development Environments (IDE)
CSL2.9.2 Use the debugger in an IDE
CSL3.9.2 Use collaboration tools in a group software project (e.g., cloud-based software)
CSL4.9.2 Use version control systems
CSL1.9.3 Classify layers of software (e.g., applications, drivers, operating systems) within various platforms
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
CSL1.9.4 Identify hardware components (e.g., input/output devices, internal organization of a computer, storage devices) of computing technology within various platforms
  1. 10.4 Internet Hardware and Sending Information
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
CSL1.10.1 Categorize the risks associated with the utilization and implementation of digital technology. Legal Physical Psychological Social NOTE: Legal issues include but are not limited to access, AFTRA, copyright, FAA, FCC, hacking, intellectual property, licensure, local computer-use policy, piracy, and plagiarism.
  1. 2.4 Privacy & Security
  2. 2.5 Information Literacy
  3. 2.6 Creative Credit & Copyright
CSL2.10.1 Discuss the effects associated with the use of social media (e.g., global communication, hiring, incarceration, termination)
  1. 2.1 Digital Footprint and Reputation
  2. 2.7 Hacking Ethics
CSL3.10.1 Explain conflicting issues related to creating and enforcing cyber-related laws and regulations (e.g., ethical challenges, policy vacuum, privacy vs. security, unintended consequences)
  1. 2.4 Privacy & Security
CSL4.10.1 Formulate solutions that address the risks associated with extensive use and implementation of digital technology
  1. 2.1 Digital Footprint and Reputation
CSL1.10.2 Discuss issues related to personal security
  1. 2.2 Cyberbullying
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 7.6 Application Security
  5. 7.7 Browser Configuration
CSL2.10.2 Identify components of a digital footprint (e.g., active and passive data) and the lasting impact
  1. 2.1 Digital Footprint and Reputation
CSL3.10.2 Explore the inverse relationship between online privacy and personal security (e.g., convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information)
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
CSL3.10.3 Describe the beneficial and intrusive aspects of advancing and emerging technologies (e.g., Artificially Intelligent Agents, IoT, Robotics, self-aware, Skynet)
CSL4.10.3 Identify the ethical and moral implications encountered in managing and curating knowledge (e.g., harvesting, information overload, knowledge management reposting, sharing, summarizing)