{"id":436,"date":"2021-07-28T20:55:11","date_gmt":"2021-07-28T18:55:11","guid":{"rendered":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/?page_id=436"},"modified":"2021-07-28T20:56:34","modified_gmt":"2021-07-28T18:56:34","slug":"lernabschnitt-4-analyse-der-exif-szenarios","status":"publish","type":"page","link":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/entwuerfe\/versteckte-meta-daten-und-datenschutz\/lernabschnitt-4-analyse-der-exif-szenarios\/","title":{"rendered":"Lernabschnitt 4: Analyse der EXIF-Szenarios"},"content":{"rendered":"<br \/>\n<h2 style=\"margin-left: 40.0pt;margin-right: 10.0pt;text-align: justify;text-indent: -36.0pt\">Leitidee<\/h2>\n<p class=\"MsoNormal\" style=\"margin-left: 10.0pt;margin-right: 10.0pt;text-align: justify\">Durch die Analyse von Szenarien der Mitsch\u00fclerinnen und Mitsch\u00fcler, bekommen die Sch\u00fclerinnen und Sch\u00fcler weitere Anhaltspunkte, welche Daten miteinander verkn\u00fcpft werden k\u00f6nnen und worauf sie zuk\u00fcnftig achten sollten. Durch die detektivische Arbeit sollen die Sch\u00fclerinnen und Sch\u00fcler intrinsisch motiviert werden, sich mit dem Unterrichtsgegenstand auseinander zu setzen.<\/p>\n<h2 style=\"margin-left: 40.0pt;text-align: justify;text-indent: -36.0pt\">Standardbezug<\/h2>\n<p class=\"MsoNormal\" style=\"text-align: justify;margin-left: 10.0pt\"><b> Informatik, Mensch und Gesellschaft<\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify;margin-left: 10.0pt\">Die Sch\u00fclerinnen und Sch\u00fcler k\u00f6nnen<\/p>\n<ul>\n<li class=\"MsoNormal\" style=\"text-align: justify;margin-right: 10.0pt\">diskutieren und bewerten wesentliche Aspekte des Datenschutz- und Urheberrechts anhand von Anwendungsf\u00e4llen,<\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify;margin-right: 10.0pt\">ziehen R\u00fcckschl\u00fcsse f\u00fcr das eigene Verhalten beim Einsatz von Informatiksystemen,<\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify;margin-right: 10.0pt\"><span style=\"text-indent: -18pt\">konzipieren Ma\u00dfnahmen zur Realisierung von <\/span>Datensicherheit f\u00fcr konkrete Anwendungsf\u00e4lle, insbesondere Zugriffskontrolle.<\/li>\n<\/ul>\n<h2 style=\"margin-left: 40.0pt;text-align: justify;text-indent: -36.0pt\">Unterrichtsverlauf<\/h2>\n<table class=\"MsoTableGrid\" style=\"border-collapse: collapse;border: none\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;background: #BDD6EE;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Zeit in min<\/p>\n<\/td>\n<td style=\"width: 238.5pt;border: solid windowtext 1.0pt;border-left: none;background: #BDD6EE;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Inhalt<\/p>\n<\/td>\n<td style=\"width: 151.05pt;border: solid windowtext 1.0pt;border-left: none;background: #BDD6EE;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Medien und Sozialform<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;border-top: none;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">5<\/p>\n<\/td>\n<td style=\"width: 238.5pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Begr\u00fc\u00dfung und Kl\u00e4rung des Stundenablaufs.<\/p>\n<\/td>\n<td style=\"width: 151.05pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Plenum<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;border-top: none;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">45<\/p>\n<\/td>\n<td style=\"width: 238.5pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Die SuS bekommen Ordner mit den entwickelten Szenarien geteilt und analysieren diese innerhalb der Gruppe. Sie vermerken sich, welche Personen sie zu den einzelnen Szenarien zuordnen w\u00fcrden und bereiten sich darauf vor, ihre Schlussfolgerungen anhand von Daten zu erl\u00e4utern.<\/p>\n<\/td>\n<td style=\"width: 151.05pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">PC \/ Gruppenarbeit<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;border-top: none;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">25<\/p>\n<\/td>\n<td style=\"width: 238.5pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Jede Gruppe pr\u00e4sentiert ein Szenario mit ihren zugeh\u00f6rigen Schlussfolgerungen von der Klasse und die zugeh\u00f6rige Gruppe l\u00f6st auf, welche Daten und Informationen enthalten sind. Abschlie\u00dfend benennen und begr\u00fcnden sie damit wer der\/die Autor\/in der Bilder ist.<\/p>\n<\/td>\n<td style=\"width: 151.05pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Ggf. Smartboard \/ Plenum<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;border-top: none;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">10<\/p>\n<\/td>\n<td style=\"width: 238.5pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Die SuS leiten Regeln daf\u00fcr ab, wie sie sich davor sch\u00fctzen k\u00f6nnen, dass aus ihren Bildern solche Szenarien erstellt werden k\u00f6nnen.<\/p>\n<\/td>\n<td style=\"width: 151.05pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Gruppenarbeit<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 63.55pt;border: solid windowtext 1.0pt;border-top: none;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"169\">5<\/td>\n<td style=\"width: 238.5pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"636\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Besprechung der Gruppenarbeit.<\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">M\u00f6gliche Ergebnisse:<\/p>\n<ol>\n<li>GPS ausschalten,<\/li>\n<li>Dienste zum Bilder senden gr\u00fcndlich ausw\u00e4hlen,<\/li>\n<li>darauf achten, welche verschiedenen Inhalte an der gleichen Stelle preisgegeben werden bzw. welche Dienste zusammenh\u00e4ngen,<\/li>\n<li>Bilder sparsamer versenden,<\/li>\n<li>genau \u00fcberpr\u00fcfen welche Informationen bspw. im Hintergrund des Bildes enthalten sind.<\/li>\n<\/ol>\n<\/td>\n<td style=\"width: 151.05pt;border-top: none;border-left: none;border-bottom: solid windowtext 1.0pt;border-right: solid windowtext 1.0pt;padding: 0cm 5.4pt 0cm 5.4pt\" valign=\"top\" width=\"403\">\n<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;text-align: justify;line-height: normal\">Plenum<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Leitidee Durch die Analyse von Szenarien der Mitsch\u00fclerinnen und Mitsch\u00fcler, bekommen die Sch\u00fclerinnen und Sch\u00fcler weitere Anhaltspunkte, welche Daten miteinander verkn\u00fcpft werden k\u00f6nnen und worauf sie zuk\u00fcnftig achten sollten. Durch die detektivische Arbeit sollen die Sch\u00fclerinnen und Sch\u00fcler intrinsisch motiviert werden, sich mit dem Unterrichtsgegenstand auseinander zu setzen. Standardbezug Informatik, Mensch und Gesellschaft Die Sch\u00fclerinnen [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":308,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-436","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/pages\/436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/comments?post=436"}],"version-history":[{"count":1,"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/pages\/436\/revisions"}],"predecessor-version":[{"id":437,"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/pages\/436\/revisions\/437"}],"up":[{"embeddable":true,"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/pages\/308"}],"wp:attachment":[{"href":"https:\/\/medienwissenschaft.uni-bayreuth.de\/inik\/wp-json\/wp\/v2\/media?parent=436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}