2. Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provide..
2. Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
Start by discus..
3. Share an activity idea or classroom resource that you have found online or created yourself that involves primary students exploring pr..
As a part of Cyber Security and Awareness, it is important that students are taught about the importance of strong passwords to help keep ..
There are countless ways humans leave traces of personal information with the use of technology. For example, responding to scam emails, t..
Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
- Reflect f..
I fount this video that was really informative and delivered the information in a way suite..
Students need to understand why making stronger passwords for keeping personal information safe, is effective. This activity invites stude..
I found an activity that focuses on finding the hidden message in a digital photo. This activity demonstrates to students, taht by them ta..
Teaching students about using technology safely is important. Preparing students with the knowledge and unnderstanding to keep safe is vit..
The eSafety Commissioner website has multiple resources for teachers to help improve a students knowledge and understanding of how to be c..
GCF Global has a tutorial exploring Internet Safety and could be used as a resource for teachers to help educate primary school teachers o..
There are countless ways individuals leave traces of their personal identity using technology. Some examples include shopping online and s..
I found this resource from the E-saftey commissioners website…
I found this teaching resource from the..
I found the above resource f..
Response to option 1.
Attached is a great acronym to use in the classroom in regards to technology ethics and overall internet safety.
Response to option 3.
Cyber attacks are occurring more often then not in today’s society, with hackers using technology as a way of acc..
Ensuring that the networks and the vast range of technological devices we use are protected from attacks, can be referred to as ‘Cyber Sec..
Response to Question 1.
There are many ways that us as humans can leave traces of important information through the usage of technologi..