Topicm95ffe683047ad935_1528449000663_0Topic

Online safetysafetysafety

Levelm95ffe683047ad935_1528449084556_0Level

Second

Core curriculumm95ffe683047ad935_1528449076687_0Core curriculum

Grades IV‑VI

III. Using the computer, digital devices and computer networks. The student:

2) uses a computer network (a school network, the internet):

a) for finding needed information and educational resources by navigating between web sites,

b) as a communication medium,

c) for working in a virtual environment (on a platform, in a cloud), by following the methods and principles of working in such an environment.

Timingm95ffe683047ad935_1528449068082_0Timing

45 minutes

General objectivem95ffe683047ad935_1528449523725_0General objective

Using the Internet.

Specific objectivesm95ffe683047ad935_1528449552113_0Specific objectives

1. Defining the terms: ‘digital citizendigital citizendigital citizen’ and ‘cyberbullying’cyberbullying‘cyberbullying’.

2. Identifying web threats.

3. Identifying addiction to the computer and the Internet.

Learning outcomesm95ffe683047ad935_1528450430307_0Learning outcomes

The student:

- identifies web threats,

- applies security measures while using the Internet.

Methodsm95ffe683047ad935_1528449534267_0Methods

1. Directed discussion.

2. Learning through observation.

Forms of workm95ffe683047ad935_1528449514617_0Forms of work

1. Individual work.

2. Class work.

Lesson stages

Introductionm95ffe683047ad935_1528450127855_0Introduction

The teacher initiates a directed discussion about what we usually use the Internet for.

- searching for information,
- entertainment – computer games, music, films,
- shopping – e‑shops, online auctions,
- communication – instant messaging, social media,
- education – courses, trainings.

The Internet is very useful. However, in order to benefit from it, you must have some knowledge and follow a set of specified principles. Not all information found on the Internet is reliable and up to date and its usage is associated with some online threats. The Internet, as any other tool, may be used for abuse.

Procedurem95ffe683047ad935_1528446435040_0Procedure

Digital citizendigital citizenDigital citizen:

As you use the Internet more and more often, gradually you are becoming the part of a digital community in which certain principles apply.

The most important ones are:

- to ensure safetysafetysafety while using the Internet,
- to protect one’s privacy,
- to protect one’s reputation.

[Interactive graphics]

Web threats.

In order to use most of the services available on the Internet, a password‑protected user accountaccountaccount is needed. You must ensure that the password is strong and that it is not disclosed to other people.

Task 1

On the Internet the students search for the information about strong passwords. Together they formulate the principles they should follow while creating passwords.

A strong password:

- contains lowercase and uppercase letters, numbers and symbols,
- is of appropriate length,
- does not contain the symbols which may identify you,
- does not contain any proper nouns,
- should be different for every accountaccountaccount,
- is often changed.

Use two‑factor authentication whenever it is possible. It is a security measure that utilizes two steps to log in – first you enter your password and then another factor, e.g. a texted code.

Decide if you want to save your password in a web browser. Whenever you use a public device, do not forget to log out before you leave the computer. Protect your account with the password recovery option. Many services allow to add to the account a recovery telephone number or email address, which enable recovering the forgotten password.

Using mobile devices:

We often use the Internet on mobile devices away from home. Always protect your device against unauthorized access. Most services are available on these devices as applicationsapplicationsapplications that do not require to log in.

Be cautious while downloading films, applications, games and attachments. They can be harmful to your device and disclose your personal data. This way you can download unwanted or potentially dangerous applications or enable somebody access to your accountaccountaccount or event entire device against your will.

Always download applicationsapplicationsapplications from trusted sources (official online shops) and read comments on the security of the application you download. Perform periodical updates of the system. Updating is very important as it can correct the known security defects of the system or applications.

Use antivirus softwareantivirus softwareantivirus software and scan the downloaded files with it.

Be particularly cautious when you connect to the Internet in the unknown network, e.g. when you use a free WiFi. When you use public networks, do not log in to your accounts and do not shop online.

CyberbullyingcyberbullyingCyberbullying is the form of bullying with the use of information technologies, most commonly the Internet. The main forms of cyberbullying include harassment, intimidation, blackmailing, ridiculing, sharing compromising pictures or films. Cyberbullying is a very dangerous practice because of the high speed of spreading information across the Internet, unlimited reach and, as it seems to cyber perpetrators, the anonymity of their actions. Every case of cyberbullying should be reported immediately to an adult – a parent or a teacher.

In the case of online threat you can seek help by calling on: 116‑111.

[Illustration 1]

AddictionsaddictionsAddictions

The computer may be addictive in the same way as alcohol, work or drugs. Children and teenagers are particularly at risk. If you spend on the computer more and more time and lose interest in your other hobbies, think about reducing the time you spend using the computer, online or playing computer games. The symptoms of computer addiction include, among others: inability to concentrate, absent‑mindedness, disconnecting from everyday life, poor school results, weight loss, sweating and emotional disorders.m95ffe683047ad935_1527752263647_0The computer may be addictive in the same way as alcohol, work or drugs. Children and teenagers are particularly at risk. If you spend on the computer more and more time and lose interest in your other hobbies, think about reducing the time you spend using the computer, online or playing computer games. The symptoms of computer addiction include, among others: inability to concentrate, absent‑mindedness, disconnecting from everyday life, poor school results, weight loss, sweating and emotional disorders.

Lesson summarym95ffe683047ad935_1528450119332_0Lesson summary

Use the computer moderately and reasonably. Develop your knowledge constantly since the development of computer science is very dynamic. If in doubt, ask an adult for help and advice. Do not hesitate to report dangerous events to the police or other law enforcement authorities.m95ffe683047ad935_1527752256679_0Use the computer moderately and reasonably. Develop your knowledge constantly since the development of computer science is very dynamic. If in doubt, ask an adult for help and advice. Do not hesitate to report dangerous events to the police or other law enforcement authorities.

Selected words and expressions used in the lesson plan

accountaccountaccount

addictionsaddictionsaddictions

antivirus softwareantivirus softwareantivirus software

applicationsapplicationsapplications

cyberbullyingcyberbullyingcyberbullying

digital citizendigital citizendigital citizen

password strengthpassword strengthpassword strength

safetysafetysafety

m95ffe683047ad935_1527752263647_0
m95ffe683047ad935_1527752256679_0
m95ffe683047ad935_1528449000663_0
m95ffe683047ad935_1528449084556_0
m95ffe683047ad935_1528449076687_0
m95ffe683047ad935_1528449068082_0
m95ffe683047ad935_1528449523725_0
m95ffe683047ad935_1528449552113_0
m95ffe683047ad935_1528450430307_0
m95ffe683047ad935_1528449534267_0
m95ffe683047ad935_1528449514617_0
m95ffe683047ad935_1528450135461_0
m95ffe683047ad935_1528450127855_0
m95ffe683047ad935_1528446435040_0
m95ffe683047ad935_1528450119332_0
safety1
safety

bezpieczeństwo

Rawk78sRsCYfR1
wymowa w języku angielskim: safety
digital citizen1
digital citizen

cyfrowy obywatel

RSsENdyLlhY0q1
wymowa w języku angielskim: digital citizen
cyberbullying1
cyberbullying

cyberprzemoc

ReQy6MAesP3071
wymowa w języku angielskim: cyberbullying
account1
account

konto

R1d1ZLyug0xei1
wymowa w języku angielskim: account
applications1
applications

aplikacje

Rey6rIM2LMNjU1
wymowa w języku angielskim: applications
antivirus software1
antivirus software

oprogramowanie antywirusowe

ROiSkn78RFAYm1
wymowa w języku angielskim: antivirus software
addictions1
addictions

uzależnienia

R184RsQkshRiC1
wymowa w języku angielskim: addictions
password strength1
password strength

siła hasła

RYZv5RpzLam5m1
wymowa w języku angielskim: password strength