Objectives | |
This lesson teaches students to discern the reliability of information found online and be prudently suspicious about trusting people met online. Students will learn a conscious and objective attitude to online encounters. | |
![]() |
Description | ||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||
1) Activity - True or False? News articles and weblogs (S.1 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
2) Game - True or False? (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: 3) Game - Online Killer (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: | ||||||||||||||||||||||||||||||||||
![]() |
Objectives | |
This lesson teaches students to discern the reliability of information found online and be prudently suspicious about trusting people met online. Students will learn a conscious and objective attitude to online encounters. | |
![]() |
Description | ||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||
1) Activity - True or False? News articles and weblogs (S.1 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
2) Game - True or False? (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: 3) Game - Online Killer (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: | ||||||||||||||||||||||||||||||||||
![]() |
Objectives | |
This lesson teaches students to discern the reliability of information found online and be prudently suspicious about trusting people met online. Students will learn a conscious and objective attitude to online encounters. | |
![]() |
Description | ||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||
1) Activity - True or False? News articles and weblogs (S.1 - S.3) Approximate time needed: 40 minutes Aim: Procedures:
Analysis: Resources:
2) Game - True or False? (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: 3) Game - Online Killer (S.1 - S.3) Approximate time needed: 20 minutes Aim: Procedures:
Analysis: | ||||||||||||||||||||||||||||||||||
![]() |
- Teachers
- Students
- Knowledge Base - Laws and Legislation
- IT Security - Antivirus Software
- IT Security - Cookies
- IT Security - Encryption
- IT Security - Filtering Software
- IT Security - Firewall
- IT Security - POP3
- IT Security - Public Key Infrastructure (PKI)
- IT Security - Secure Sockets Layer
- IT Security - Two Factors Authentication
- IT Security - Wireless connection
- Parents

- 01 - 'What and Why' in the use of Internet
- 02 - Overview of CESY
- 03 - Networking Basics
- 04 - Crime Rating
- 05 - Intellectual Property Rights
- 06 - Net-community
- 07 - Reliability of information and trustworthiness of humankind on the Internet
- 08 - Overuse of the Internet
- 09 - Advancement of technology
- 10 - Promotion of Cyber Ethics in school context and at home
