I
Digital Self-Defense
Recognizing Scams and Phishing
- 1. Common Red Flags in Emails and Messages
- 2. Fake Login Pages and Credential Stealing
- 3. Romance, Tech Support, and Investment Scams
- 4. What to Do If You Clicked Something Sketchy
Locking Down Your Devices and Accounts
- 1. Strong Passwords and Password Managers
- 2. Two-Factor Authentication and Why It Matters
- 3. Updating Software and Avoiding Unsafe Apps
- 4. Securing Your Phone, Laptop, and Home Wi-Fi
Privacy and Data Minimization
- 1. How Apps and Sites Track You
- 2. Adjusting Privacy Settings on Major Platforms
- 3. Using VPNs, Private Browsing, and Ad Blockers
- 4. Sharing Less: Thinking Before You Post
II
Information Verification Basics
Quick Checks Before You Believe or Share
- 1. Pause: Emotional Triggers and Urgency
- 2. Check the Source: Who Is Behind This?
- 3. Look for Date, Context, and Original Origin
- 4. Search for Independent Confirmation
Evaluating Sources and Expertise
- 1. Why Source Evaluation Matters
- 2. Credible Institutions vs. Random Accounts
- 3. Signals of Expertise and Peer Review
- 4. Understanding Bias and Editorial Slant
- 5. Separating News, Opinion, and Rumor
- 6. Evaluating Scientific and Health Claims
- 7. Evaluating Government and Official Sources
- 8. Evaluating Social Media as a Source
- 9. Following the Money: Funding and Motivation
- 10. The Ecosystem of Unreliable Sources
- 11. When Experts Disagree
- 12. Building Your Source Evaluation Habits
Tools and Techniques for Verifying Information
- 1. Reverse Image Search and Visual Verification
- 2. Using Fact-Checking Sites Effectively
- 3. Looking Up Claims in Official Databases
- 4. Spotting Manipulated Images and Deepfakes
- 5. Verifying Social Media Claims
- 6. Open Source Intelligence (OSINT) Basics
- 7. Checking Claims About Science and Health
- 8. Verifying News Stories and Sources
- 9. Browser Extensions and Digital Tools
- 10. Dealing with Uncertainty and Ambiguity
- 11. Teaching Verification to Others
- 12. Building Your Verification Workflow
III
Fighting Misinformation
AI, Bots, and Synthetic Media
- 1. What Is Synthetic Media?
- 2. How AI Generates Text
- 3. How AI Generates Images and Video
- 4. How AI Generates and Clones Audio
- 5. Tell-Tale Signs of AI-Generated Content
- 6. Bot Networks and Engagement Farms
- 7. Astroturfing and Manufactured Consensus
- 8. Political Manipulation and Election Interference
- 9. The Trust Crisis: When Nothing Looks Real
- 10. Tools and Techniques for Verification
- 11. Legal, Regulatory, and Platform Responses
- 12. Living in a World of Synthetic Content
Checking Political Claims and Statistics
- 1. How Politicians Use Numbers to Persuade
- 2. Finding Original Data and Reports
- 3. Understanding Polls and Margins of Error
- 4. Recognizing Misleading Graphs and Charts
- 5. Economic Claims: Jobs, GDP, and Cost of Living
- 6. Crime and Safety Claims
- 7. Immigration Claims
- 8. Healthcare and Social Program Claims
- 9. Climate and Environmental Claims
- 10. Education and Budget Claims
- 11. Fact-Checking Organizations and How to Use Them
- 12. Building Your Political Fact-Checking Practice
Being a Responsible Sharer and Helper
- 1. Setting Personal Rules Before You Share
- 2. How to Correct Yourself Gracefully
- 3. Helping Friends and Family Without Shaming Them
- 4. Building Your Own Trusted Information Habits
IV
Planning Complex Work
Pre-Planning and Planning Meetings
- 1. The Initial Contact Call
- 2. The Relationship Framework Meeting
- 3. Expectations Alignment Meetings
- 4. Requirements Discovery Meetings
- 5. Constraints Reality Meetings
- 6. Technology Direction Meetings
- 7. The Schedule and Milestones Meeting
- 8. Procurement and Logistics Meetings
- 9. The Documentation Standards Meeting
- 10. The Progress Review Cadence Meeting
- 11. The Pre-Design Signoff Meeting