Web Privacy Page LabCreated 22 October 2003. Updated: 20 October 2004

Web Privacy Page Lab

J. Schaefer

  1. Create an Internetsubfolder of CS101 on your H-drive.
  1. Create a PrivacyPage subfolder of the Internet folder.
  1. Open a browser window and go to the Documents page of CS 101, Under Internet Information, find the reference to a "skeleton web page" and click on the (.htm) link. The page will open in new window. Use File, Save as to save a copy of this file in your PrivacyPage subfolder as PrivacyA.htm.
  2. Still in Internet Explorer, click on File and Open which should produce an Open pane. Click on Browse and select the PrivacyA.htm file from yourH drive. Press Open, and click on OK to open the file in the browser window.
  1. Use a file listing folder,then right-click on PrivacyA.htm. In the options menu, select Open with and select MSFrontPage.
  1. Shrink each window, the browser and the Front Page windows, using the Restore / Maximize button in the upper-right corner of each window.
  2. Resize and position both windows so they are side-by-side. When you have this done, call me to initial your lab checklist. Have the checklist ready and a pen out. However, continue with your work while I make my way around the lab.
  1. In the FrontPage window containing PrivacyPageA.htm, click on the Splittab. Change the title information to: Your Privacy is in Jeopardy!, and
  1. Find the Authorcomment under “Document properties and replace the generic information with you name. Also, change “Last Author.”
  1. Change the Companyinfo to Rhode IslandCollege. Click OK. Save in the PrivacyPage subfolder as PrivacyB.htm
  1. Click on the browser window. In the location box, change the A in the file name to B, PrivacyB.htm. Press Enter to load the page. You should see "Your Privacy is in Jeopardy!" in the title position at the top left of the browser window.
  1. In the FrontPage window, use the triple-click to change the large header text to Your Privacy is in Jeopardy!
  1. Select all the material starting after the header down to, and including “(golfing?!).” and delete it.
  1. Select the paragraph beginning with "If you are not…" and delete it.
  1. Select the paragraph beginning with “The address tag is used …” and delete it.
  1. Select the last sentence, “If you examine …” and delete it.
  1. Save the file as ...... PrivacyC.htm
  1. Click on the browser window. In the location box, change the B in the file name to C, PrivacyC.htm. Press Enter to load the page. You should see a page very reduced in size from the original skeleton.
  1. In the “Send comments …”sentence, change the information to reflect today’sdate as the creation date, and change “YourName” to your real name.
  1. Before you can change “YourEmailAddress” that is underlined with a squiggly red line, you must right-click it, and then left-click Ignore All. Now it should be blue.
  1. Right-click the blue YourEmailAddress and left-click Hyperlink properties. Replace “YourEmailAddress” with your real e-mail address. Click OK

  2. Select Format, Background, Fill Effects, Colors and select a color for a background.The background can be changed later.
  3. Save as...... PrivacyD.htm.
  4. Click on the browser window. In the location box, change the C in the file name to D, PrivacyD.htm. Press Enter to load the page. What now remains is mainly an unordered list skeleton, <UL> … </UL>, bracketing nine (9) list items, <li> </li>.

We'll continue in lab two with additional material to complete the page about Privacy.Save your work and folders from the H drive to your A:\ drive.

Web Privacy Page Lab 2

  1. Reopen your PrivacyPage subfolder of your Internet folder.
  2. Open PrivacyD.htm of the previous lab in a FrontPage window.
  3. Save this file as PrivacyE.htm within the PrivacyPage subfolder.
  4. View the HTML in FrontPage. Find the Keywordscomment and enter: Internet, Privacy, web, identity, theft, security You may think of other keywords to enter.
  1. Still viewing the HTML, change the Commentsinformation to
    This is a page of links to sites about privacy and identity theft. We hope it will inform you what to do before your identity is compromised or stolen, and some steps to take after it happens. Learn to protect yourself.
  1. Save this file within the PrivacyPage subfolder as...... PrivacyF.htm.
  1. Open a browser window. Resize and reposition this window and the FrontPage window so that both are visible.
  2. Type in the first URL, from the list provided, in the Location box of the browser window and press Enter. This allows you to verify in real-time if the web address is valid.
  3. Click once in the location box to highlight the address in blue. Copy the address using Edit, Copy or use the two-key combination, Ctrl + C
  4. Now move to the FrontPage window. Right-click the first ClickableText in the unordered list of generic links. Please note that if the ClickableText is underlined with a squiggly red line, you need to right-click and select Ignore All. FrontPage treats this string as a misspelled word and you won’t be able to alter the hyperlink properties until you tell FrontPage to ignore this string!

  1. Select Hyperlink, and then Edit Hyperlink. In the URL box of the “Edit Hyperlink” window, Paste,Ctrl + V, the address just copied from the browser window. In the “Text to display:” box, enter a word, or words, that you want the user to click on to “activate the link,” that is, cause the browser to link to the URL associated with the clickable text.

  1. Use the browser window information to guide you in selecting ClickableText, Preamble and Postamble material to complete each list item.
  2. Repeat this process for at least eight (8) web sites.
  3. Provide preamble and/or postamble material for at least 4 of the links.
  4. As you modify the page, frequently Save as Privacyx.htm within the PrivacyPage subfolder, that is, modify the file name often to safely keep the work you have done so far. Name the last file as PrivacyPage.htm
  1. To view your changes, modify the file address in the browser window to Privacyx.htm. After each change and save, use the Refresh or Reload feature of the browser to see your changes reflected in the also emerging web page!

Save your work and folders from the H drive to your A:\ drive.

Submit your disk and checklist in your folder for a lab grade.

jas::W:\www\cs101\InternetDocs\Privacy\PrivacyPage_Full.doc<(1)>

Web Privacy Page ChecklistCreated 22 Oct 2003. Updated: 20 October 2004

Checklist Web Privacy Page Name ______

____1.Create an Internet subfolder of your CS101 folder.

____2.Create a PrivacyPage subfolder of the Internet folder of CS101.

____3.Open the file SkeletonPage.htm and save a copy of it in your Privacy subfolder as PrivacyA.htm

____4.Open PrivacyA.htm in a browser window.

____5.Open PrivacyA.htm in a FrontPage window.

____6.Shrink the browser window and the FrontPage window.

____7.Resize and position the windows to be adjacent to each other (vertically or horizontally). Requires my initials.

____8.In the PrivacyA.htm file Properties window, replace Title information, Subject(CS101),

____9.Author identity (you), and

____10.Company information (Rhode IslandCollege)...... PrivacyB.htm

____11.Replace header information

____12.Delete the described material following the header

____13.Delete the "You may copy…" sentence

____14.Delete the last paragraph...... PrivacyC.htm

____15.Change address information: name, date created and date updated

____16.Change address information: email address and link information

____17.Select a texture for the background...... PrivacyD.htm

____/17 Total

Return

Check List with your named filled in. [-1 point if no check list is returned]

Disk

jas::W:\www\cs101\InternetDocs\Privacy\PrivacyPage_Full.doc<(1)>

Web Privacy Page ChecklistCreated 22 Oct 2003. Updated: 20 October 2004

Checklist Web Privacy Page con’t

____18.Change Properties: Change keywords

____19.Change Properties: Change description...... PrivacyF.htm

[18] Replace skeleton “links” with Privacy related links & text at least 8 times Privacyx.htm

URL (16)plusClickablePreamblePostamble....(8)

____20.______.....(1)

____21.______.....(2)

____22.______.....(3)

____23.______.....(4)

____24.______.....(5)

____25.______.....(6)

____26.______.....(7)

____27.______.....(8)

____28.Save last file as ...... Privacy.htm

____/ 27 [Overall Total 44 ]

Return

Checklist with your named filled in. [-1 point if no checklist is returned]

Disk

jas::W:\www\cs101\InternetDocs\Privacy\PrivacyPage_Full.doc<(1)>

<(1)>

Internet Links to Some Social Issues

For more information, use any search engine and search for the strings:

+Carnivore +privacy

“identity theft”

“internet privacy”

“digital divide”

+internet +“social change”

Carnivore

How Stuff Works: How Carnivore Works

Carnivore Diagnostic Tool-FBI

Carnivore FAQ

Carnivore, Freedom Of Information Act Litigation, EPIC

Identity Theft

Federal Reserve Bank of Boston, Identity Theft brochure, PDF.

ID theft Home, Federal; Trade commission

Identity Theft Data Clearinghouse

Identity Theft What is it - Van Wyhe Group Article

Identity Theft The New Endorsement - Van Wyhe Group Article

Identity Theft What to Do if it Happens to You

Identity Theft Coping with What to Do When an Imposter Strikes

Identity Theft Prevention, Tips and Protection to Protect your Privacy

US Dept of Justice Id Theft & Fraud

Privacy

Privacy in the Digital Age

Internet & Privacy RIC

Privacy Rights Clearinghouse

Kidz Privacy

CASPIAN Consumers Against Supermarket Privacy

Personal Info Protection & Electronic Documents Act - Privacy Commissioner of Canada

FCIC Privacy Choices for Your Personal Financial Information

Privacy Resources

Other

Computers in Developing Countries

for Engineering & Science

IEEE SSIT

Fight Spam on the Internet!

Implications of Information Technology

Spam Letters

ChatDanger

Cookie Central

Internet and Computer-Mediated Communication

Digital Divide Network

EFFweb Electronic Frontier Foundation

Sex, Censorship, and the Internet

CAF - Computers and Academic Freedom

Technology and Culture, Postcolonial and Hypertext Theory, Cyberfiction, Electronic Revolution

Copyright and Intellectual Property Resources

Cyberspace Law (GeorgetownUniversity)

Inventing the Future

From Big Brother to Electronic Panopticon

Hacking Lexicon

William Dutton, Social Implications of Information and Communication Technologies

jas::G:\CS101\SocialIssuesMarks.docCreated 29 November 2003.Reformatted 20 Oct 2004