Topicmb0d62c945d39a2fd_1528449000663_0Topic

Consequences of online threats and ways of avoiding them

Levelmb0d62c945d39a2fd_1528449084556_0Level

Second

Core curriculummb0d62c945d39a2fd_1528449076687_0Core curriculum

Grades IV‑VI

III. Using the computer, digital devices and computer networks. The student:

2) uses a computer network (a school network, the Internet):

a) for finding needed information and educational resources by navigating between web sites,

V. Compliance with law and safetysafetysafety principles. The student:

1) uses technology in accordance with the accepted principles and law;

2) recognizes and respects the right to data and information privacy and the right to intellectual property;

3) identifies threats associated with the common access to technology and information and describes the methods of avoiding them.

Timingmb0d62c945d39a2fd_1528449068082_0Timing

45 minutes

General objectivemb0d62c945d39a2fd_1528449523725_0General objective

Safe usage of the Internet.

Specific objectivesmb0d62c945d39a2fd_1528449552113_0Specific objectives

1. Identifying web threats.

2. Protecting against web threats.

Learning outcomesmb0d62c945d39a2fd_1528450430307_0Learning outcomes

1. The student identifies web threats.

2. The student applies security measures while using the Internet.

Methodsmb0d62c945d39a2fd_1528449534267_0Methods

1. Discussion.

2. Learning through observation.

Forms of workmb0d62c945d39a2fd_1528449514617_0Forms of work

1. Individual work.

2. Class work.

Lesson stages

Introductionmb0d62c945d39a2fd_1528450127855_0Introduction

The teacher initiates a short discussion. The students revise what they usually use the Internet for.

The Internet is very useful. However, in order to benefit from it, you must have some knowledge and follow a set of specified principles. Not all information found on the Internet is reliable and up to date and its usage is associated with some online threatsthreatsthreats. The Internet, as any other tool, may be used for abuse.

Proceduremb0d62c945d39a2fd_1528446435040_0Procedure

Task

The teacher divides the students into four gropus. The task of the first two groups is to identify as many advantages of using the Internet as possible (including social networks, instant messengers, online games and e‑commerce services, e.g. online shops and Internet auctions). The task of the other two groups is to identify threatsthreatsthreats and risksrisksrisks associated with the use of the Internet. Each group is handed a big cardboard to note their observations. After completing the task the students compare the results of their work.

[Interactive illustration]

The examples of web threatsthreatsthreats.

While using the Internet, you can be exposed to content that you would not like to do with, such as:

- content encouraging to violence,

- content promoting attitudes and behaviours that pose risk to health, e.g. gambling, drugs, anorexia, encouraging to join cults etc.,

- content encouraging to committing crimes,

- content approving racial discrimination.

Part of these materials are placed online illegallyillegallyillegally, other, though harmful to younger Internet users, conform to the law. You can come across most of them accidentally. Therefore the ability to critically assess online content is very important.

Another threat is using the Internet illegallyillegallyillegally. First of all you have to remember that not all online content is free. You have already learnt that computer programmes, films, music or books are published on the Internet under licenceslicenceslicences. These materials are copyrighted. It is important to conform to the copyrightcopyrightcopyright. When you download files from illegal sources, you:

- break the law, which may entail legal consequences,

- expose your computer to threatsthreatsthreats posed by hackers (viruses, Trojan horses, which cracked programmes may be infected with).

While using web portals, remember that you cannot trust every person you meet online. Somebody may want to obtain information about you, or even harm you. Never make appointments with people met online without your parents consent.

[Illustration 1]

In the event of online threat you can seek help by calling on 116‑111. You will also find useful information on the web site of the Empowering Children Foundation.mb0d62c945d39a2fd_1527752263647_0In the event of online threat you can seek help by calling on 116‑111. You will also find useful information on the web site of the Empowering Children Foundation.

[Illustration 2]

Task

Consider whom could you contact in the situations listed below. Who could solve the problem the best and the quickest? Create a multimedia presentation which could offer guidelines for your school mates.

1. Someone is recording you with their mobile phone without your consent.

2. Someone attacks you on the Internet.

3. You receive unpleasant text or multimedia messages.

4. Someone intimidates or blackmails you.

5. Someone has placed information about you on the Internet which is false or posted without your consent.

6. Someone has broken into your account, e.g. on a social network.

Lesson summarymb0d62c945d39a2fd_1528450119332_0Lesson summary

Memorisemb0d62c945d39a2fd_1527752256679_0Memorise

1. Tell your parents that you want to meet a person whom you know only from the Internet.mb0d62c945d39a2fd_1527752256679_01. Tell your parents that you want to meet a person whom you know only from the Internet.

2. When you receive information that embarrasses you, tell about it someone you trust.mb0d62c945d39a2fd_1527752256679_02. When you receive information that embarrasses you, tell about it someone you trust.

3. Do not trust strangers. Be cautious when someone wants to learn too much about you (e.g. your name, telephone number, address).mb0d62c945d39a2fd_1527752256679_03. Do not trust strangers. Be cautious when someone wants to learn too much about you (e.g. your name, telephone number, address).

Selected words and expressions used in the lesson plan

copyrightcopyrightcopyright

illegallyillegallyillegally

licenceslicenceslicences

risksrisksrisks

safetysafetysafety

threatsthreatsthreats

mb0d62c945d39a2fd_1527752263647_0
mb0d62c945d39a2fd_1527752256679_0
mb0d62c945d39a2fd_1527712094602_0
mb0d62c945d39a2fd_1528449000663_0
mb0d62c945d39a2fd_1528449084556_0
mb0d62c945d39a2fd_1528449076687_0
mb0d62c945d39a2fd_1528449068082_0
mb0d62c945d39a2fd_1528449523725_0
mb0d62c945d39a2fd_1528449552113_0
mb0d62c945d39a2fd_1528450430307_0
mb0d62c945d39a2fd_1528449534267_0
mb0d62c945d39a2fd_1528449514617_0
mb0d62c945d39a2fd_1528450135461_0
mb0d62c945d39a2fd_1528450127855_0
mb0d62c945d39a2fd_1528446435040_0
mb0d62c945d39a2fd_1528450119332_0
safety1
safety

bezpieczeństwo

Rawk78sRsCYfR1
wymowa w języku angielskim: safety
threats1
threats

zagrożenia

RrwHU6V0nSkOe1
wymowa w języku angielskim: threats
risks1
risks

niebezpieczeństwa

R1NzGVkanb8M01
wymowa w języku angielskim: risks
illegally1
illegally

nielegalnie

RJRgL4CSpnpEf1
wymowa w języku angielskim: illegally
licences1
licences

licencje

R1S1xWE4B06151
wymowa w języku angielskim: licences
copyright1
copyright

prawa autorskie

R1NMk2PbQc0931
wymowa w języku angielskim: copyright