Students investigate how personal information shared online (geotags, emotional posts, family issues) can be used by predators to build a profile of vulnerability. They conduct a mock audit of a fictional social media profile to identify security gaps.

Similar Lessons