Objectives | |
This lesson encourages students to examine the reasons behind their Internet usage and how they spend their time online in order to raise awareness and self-criticism. ![]() | |
![]() |
Description | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
1) Activity - The Ultimate Website Award (P.4 - S.3) Approximate time needed: 25 minutes Aim: Procedures:
Analysis: Resources:
2) Activity - The Cyber Ethics Survey (P.4 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
| |||||||||||||||||||||||||||||||||||||
![]() |
Remarks | |
This lesson acts as a warm up for the following CESY lessons. Teachers may complete both of the activities or select one activity for the purpose of arousing students' interest in discussing their Internet experiences. | |
![]() |
Objectives | |
This lesson encourages students to examine the reasons behind their Internet usage and how they spend their time online in order to raise awareness and self-criticism. ![]() | |
![]() |
Description | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
1) Activity - The Ultimate Website Award (P.4 - S.3) Approximate time needed: 25 minutes Aim: Procedures:
Analysis: Resources:
2) Activity - The Cyber Ethics Survey (P.4 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
| |||||||||||||||||||||||||||||||||||||
![]() |
Remarks | |
This lesson acts as a warm up for the following CESY lessons. Teachers may complete both of the activities or select one activity for the purpose of arousing students' interest in discussing their Internet experiences. | |
![]() |
Objectives | |
This lesson encourages students to examine the reasons behind their Internet usage and how they spend their time online in order to raise awareness and self-criticism. ![]() | |
![]() |
Description | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
1) Activity - The Ultimate Website Award (P.4 - S.3) Approximate time needed: 25 minutes Aim: Procedures:
Analysis: Resources:
2) Activity - The Cyber Ethics Survey (P.4 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
| |||||||||||||||||||||||||||||||||||||
![]() |
Remarks | |
This lesson acts as a warm up for the following CESY lessons. Teachers may complete both of the activities or select one activity for the purpose of arousing students' interest in discussing their Internet experiences. | |
![]() |
- Teachers
- Students
- Knowledge Base - Laws and Legislation
- IT Security - Antivirus Software
- IT Security - Cookies
- IT Security - Encryption
- IT Security - Filtering Software
- IT Security - Firewall
- IT Security - POP3
- IT Security - Public Key Infrastructure (PKI)
- IT Security - Secure Sockets Layer
- IT Security - Two Factors Authentication
- IT Security - Wireless connection
- Parents

- 01 - 'What and Why' in the use of Internet
- 02 - Overview of CESY
- 03 - Networking Basics
- 04 - Crime Rating
- 05 - Intellectual Property Rights
- 06 - Net-community
- 07 - Reliability of information and trustworthiness of humankind on the Internet
- 08 - Overuse of the Internet
- 09 - Advancement of technology
- 10 - Promotion of Cyber Ethics in school context and at home
