Code of ethics statements to introduce into my classroom:
- Be respectful with technology equipment
- Think and re-think before you po..
- Keep your personal information private.
- Just because you are behind a computer screen does not mean you can treat people any diffe..
Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
These two resources from the eSafety website, ‘Be Deadly Online’ and ‘Making Good Choices Online’ are great tools for teaching students ab..
The government eSafety resource ‘Hectors World’ includes a series of engaging lesson plans, videos and activities that demonstrate the imp..
This is a fun YouTube video about password safety. The Password Rap is a catchy song that runs through h..
the esafety website provides an array of exercises that students can work thro..
This resources teachers students how to be safe and secure onli..
Be Secure is a great classroom resource from the Government eSafety website. This resource has great videos, activities and lesson plans t..
Cyber Security is protecting computers, networks, programs and data from digital attacks. Cyber Awareness is knowing how to behave and act..
Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provide a ..
- Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online..
Useful resource here:
- Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
- Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
Below is a link to a website/ article for teaching a topic related to cyber ethics .
Resources that may be helpful within the classroom in teaching students about information sharing and internet safety is -https://kidsheal..
Below is a link to classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
It contains meth..
There are a variety of ways of how information can be extracted from data. As discussed in the primary MOOC, the example of images is well..