somerset  · web view2019. 2. 1. · hectobyte scheme of work. these resources are a starting...

41
1 10/07/2022

Upload: others

Post on 22-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 3: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

HectoBYTE Scheme of WorkThese resources are a starting point for ongoing work around e-safety.

They will need to be reinforced with repeated practical activities tailored to meet individual needs.

Some learners may take messages literally. Care will have to be taken to customise messages according to learning needs

HectoBYTE award in e-sense – Older Students with Learning Difficulties

3 24/05/2023

Page 4: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

These suggestions for teaching episodes are not prescriptive but show how the HectoBYTE objectives could be delivered. Educators should customize the teaching and learning to suit the needs of their learners.

The e-Safety Project team have also lots of material at: http://www.em-esafetyproject.co.uk/

4 24/05/2023

Page 5: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

If you have any suggestions for resources or work to be added please send your ideas to [email protected]

5 24/05/2023

Page 6: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Passwords

Obj

ectiv

es

Bronze Silver Gold Keep their passwords private (g1) Keep personal information and passwords private

(t1) Know how to choose a secure password (p1)

Can recognise and explain the need for different passwords and can describe how passwords are sometimes broken (z1)

6 24/05/2023

Page 7: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Passwords

Obj

ectiv

es

Bronze Silver Gold

Sugg

este

d Te

achi

ng

BRONZEUse http://www.healthypasswords.com/content.Healthy_Passwords_Why_Are_Passwords_Important.html to inform your discussion as why passwords are important.At the simplest level learners could either set a PIN number on their phone or log onto the network/website.Discuss how they could remember their password and why they should not share it with anyone.

Look at the materials and lesson plans at http://www.childnet-int.org/kia/toolkit/ for other ideas

SILVERVisit How Strong is my password http://howsecureismypassword.net/ or https://www.microsoft.com/en-gb/security/pc-security/password-checker.aspx to find out the

7 24/05/2023

Page 9: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Personal Information

Obj

ectiv

es

Bronze Silver Gold Begin to understand what personal information is and

who you can share it with (g5) Understand that personal information they put online

can be seen and used by others (t8)

Keep personal information and passwords private (t1) Make sure a supporter knows what they are doing and

how to report concerns (t4)

Evaluate the risks associated with the sharing of personal information in a digital environment (yp4)

Identify and explain measures used to protect themselves against danger when using social media. (z5)

9 24/05/2023

Page 10: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEShow http://www.bbc.co.uk/cbbc/clips/p00nxz6y - Horrible HistoriesCreate cards with the words First name, surname, address, nickname, mobile phone number, user name, passwords things I like and other items of personal information. Distribute them to the learners and ask questions such as Which information could we share with family? Which information could I share with a friend? Which information could I share with a stranger? Which information could I share with an online contact?Have discussions about the issues and complete some role plays to reinforce (you might like to set up a private blog to see if they can work in an online environment).

Look at the materials and resources on http://www.thinkuknow.co.uk/11_16/new/social-networking/ for other ideasLook at the materials and resources on http://www.chatdanger.com/ for other ideas

SILVERShow the video at the bottom of the page at: http://www.em-esafetyproject.co.uk/tell. Follow the discussion points.

GOLD10 24/05/2023

Page 12: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Virus and malware protection

Obj

ectiv

es

Bronze Silver Gold Recognise warning messages that might appear

and how to report these (h1) Recognise risks when using technologies in an

online environment and the need for virus and malware checkers (e1)

Aware of the function of some common types of computer viruses and discuss the implications when failing to protect against them (yp3)

12 24/05/2023

Page 13: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEShow the video at http://www.youtube.com/watch?v=G-Mvh0I3mdw. Ask the question what is a virus?

SILVERLook at http://www.ehow.com/how-does_4672456_virus-affect-computer-functions.html. Get the learners to write a bit about the differences between a Trojan, Worm and email attachment.

Look at the materials and resources at http://www.childnet-int.org/sorted/ for other ideas.

GOLDLet the learners at the desktop simulation ‘Take the Grapple Challenge at the bottom of the page at http://www.northerngrid.org/resource/take-the-grapple-challenge

13 24/05/2023

Page 15: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Use of EquipmentBronze Silver Gold

15 24/05/2023

Page 16: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Obj

ectiv

es

Are aware that they can use the Internet to play and learn (m2)

Begin to recognize the need for responsible use of ICT equipment (k1)

Learn to share equipment and take turns (m7) Recognise the Internet as an exciting place to be

but understand the need for balance in how they spend their time and make good choices about age appropriate activities (g6) –especially with YouTube (h5)

Understand the need for rules to keep them safe when exchanging ideas online (t3)

Know that they can use online tools to collaborate with others and the importance of doing this responsibly, choosing age appropriate websites (t9)

Understand appropriate and inappropriate use of the Internet including excessive use (p2)

Recognise the risks and rewards of using Internet communication tools and understand how to protect themselves and the devices they use. (p3)

Recognise their own right to be protected from the inappropriate use of technology by others and their responsibility to report concerns. (p4)

Use technology equipment independently and safely without issue over a period of time (h3)

16 24/05/2023

Page 17: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEPlay games on the Internet e.g. http://www.bbc.co.uk/cbbc/games/Ask them to share their experiences: Was it fun? Did they share with others?Get them to come up with a set of rules that they should follow when on the internet.

What are their favourite types of videos that they watch on YouTube?What do they do if the come across a video that makes them feel uncomfortable?

SILVERExamine the resources at http://www.thinkuknow.co.uk/11_16/control/

Get the learners to create a survey of their friends on how much time they spend online and on their phones? From this discuss how time is too much?

Create a video about a topic.17 24/05/2023

Page 19: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Safe Communication

Obj

ectiv

es

Bronze Silver Gold Begin to be aware who it is safe to communicate

with (k6) Begin to recognize they can send information

about themselves to someone else (k9) – especially with VOIP (Skype) and Social Networks (h2)

Begin to recognize the need to know who it is they are sharing their learning online and recognize the difference between real and imaginary experiences (g2)

Recognize the need to know who it is they are sharing their online experiences with (h4)

19 24/05/2023

Page 20: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEUsing walkie talkies/mobile phones/Skype/webcam learner is involved in a role play conversation with a hidden supporter. Supporter attempts to get personal information from learner.

Look at the material at: http://www.childnet-int.org/kia/toolkit/ on Grooming and Jenny’s story.

SILVERPlay games where you are playing against real people eg http://www.arcademicskillbuilders.com/games/kitten-match/kitten-match.html or http://tutpup.com/ (easy peasy level). These games are okay but what about game such as World of Warcraft and other Multi Role playing games? Make a list of the dangers.

GOLDWatch the video at the bottom of the page at http://www.em-esafetyproject.co.uk/take-care Why did Zoe make the decision not to share her phone number?

20 24/05/2023

Page 22: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Plagiarism, copyright and Footprint

Obj

ectiv

es Bronze Silver Gold Recognise the effect their writing or images might

have on others (t10) Be aware of the how the sharing of files between

peers can contradict copyright restrictions (e8) Evaluate the benefits and dangers of having a

digital footprint. (yp9)

22 24/05/2023

Page 23: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEUse the Moral Compass materials at: https://slp.somerset.org.uk/sites/edtech/eSafety/Forms/AllItems.aspx?RootFolder=/sites/edtech/eSafety/Teaching%20and%20Learning/Moral%20Compass&InitialTabId=Ribbon.Document&VisibilityContext=WSSTabPersistence to explore the question of what is correct to post or text

SILVERUse the lesson plan at Copyright at http://www.childnet-int.org/kia/toolkit/ to explore copyright

GOLDDraw a foot on a piece of A4 paper and ask the learners to write down any place on the internet where there would be personal information about them. The discuss.Look at the resources on http://www.kidsmart.org.uk/digitalfootprints/

Look at the resources on http://www.kidsmart.org.uk/filesharing/Look at the resources on http://www.kidsmart.org.uk/music/

23 24/05/2023

Page 25: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Reporting Concerns

Obj

ectiv

es

Bronze Silver Gold Make sure a supporter knows what they are

doing and how to report concerns (t4) Recognise the behaviours that contribute to

cyber-bullying (e11) Describe the impact of cyber-bullying on the

recipient (e12)

Explain the variety of behaviours that contribute to cyber-bullying. (z10)

Explain the impact of Cyberbullying on the recipient and identify the media through which cyber-bullying often occurs (e.g. social networking, mobile phones). (z11)

Recognise and interpret the social impact of cyber-bullying and identify processes and support systems that exist to help reduce the harmful impact of cyber-bullying. (yp11)

25 24/05/2023

Page 26: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEMake a list of the things that the learner could do with technology. Divide these up into those that have no interaction with others and those that do.Add to the list the always in which the learner could report if there was something that made them feel uncomfortable. You might like to use http://www.thinkuknow.co.uk/11_16/report/

SILVERUse the resources at http://www.childnet-int.org/kia/toolkit/ Cyber Bullying to inform the learners about hurt and pain that can be caused by cyberbullying

GOLDExplore the idea of using learner voice to create an e-safety charter

26 24/05/2023

Page 28: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Excessive use of technology

Obj

ectiv Bronze Silver Gold

Recognise excessive use of computers and others devices and begin to consider the need to protect those devices (t6)

Can explain their use of technology and can rationalise the possible impact of excessive use (z12)

Identify and explain the consequences of excessive use of technology on themselves and others (yp12)

28 24/05/2023

Page 29: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEList all the items of technology that the learner uses. Ask the question which one could the learner not do without. How do they protect these devices, both physically and with virus checkers etc.

SILVERComplete a survey of the time that the learners spend on technology. Highlight those that take the largest amount of time. If the use is excessive what could be the dangers. Discuss

GOLDResearch and make a presentation on the effects that the introduction of mobile phones have had on society.

29 24/05/2023

Page 30: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Health and Safety at Work

Obj

ectiv

es

Bronze Silver Gold Follow a set of guidelines to access technology

comfortably with adult support (h6) Follow a set of guidelines to access technology

comfortably with increased independence (h7) Know the health risks associated with prolonged

use of computers in the work environment (RSI, posture, work-space design, impact on vision and time spent at a computer). (ym10)

Examine the use of ICT in different business settings and the health implications associated with this. (yd10)

30 24/05/2023

Page 31: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

It is very important that the individual’s needs are taken into consideration when dealing with this section.

BRONZEIndividual’s are involved in constructing their own set of guidelines.

SILVERInvestigate the assistive technologies for others. How could they help.

GOLDUse the information at http://www.bbc.co.uk/schools/gcsebitesize/ict/implications/3healthandsafetyrev1.shtml to explore what the Health and Safety at Work. Get the learners to make suggestions for their learning space.

31 24/05/2023

Page 32: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Reliability, Validity and Bias

Obj

ectiv

es

Bronze Silver Gold Know they can find information from different

sources (k10) Are aware of some sources of information and

preferred activities (k11) Recognise different types of content on websites

(e.g. adverts, links) and know that some things may not be true or safe (g10)

Recognise that information on websites may not be accurate or reliable and may be used for manipulation, persuasion or promote bias (t11)

Recognise that websites have an author and an audience and some people may publish content that is not accurate. They understand reasons why people might publish content that is not reliable and know they need to check and critically evaluate information. (p8)

32 24/05/2023

Page 33: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEAll sit around and design a personal webpage that has some untruths. People have to identify the lie.

SILVERLook at http://zapatopi.net/treeoctopus Investigate website and discuss reliability. How can we check whether a website is reliable?Use a games website which contains adverts or YouTube. Can the children recognise what to click on to play a game/video and what is an advert? eg http://www.earlylearninghq.org.uk/

GOLDUse the resources at http://www.digitaldisruption.co.uk/ to explore propaganda on the web

33 24/05/2023

Page 34: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Commercial Use of Data

Obj

ectiv

es

Bronze Silver Gold Experience methods used by commercial sites used

to collect data (h8) Describe and explain an awareness of methods

used by commercial sites to collect and store information about users to help them target their business activities. (e.g. Facebook, YouTube and Google) (e16)

Demonstrate an understanding of how illegal activity such as phishing and email scams can extract personal information from legitimate websites (ym13)

34 24/05/2023

Page 35: Somerset  · Web view2019. 2. 1. · HectoBYTE Scheme of Work. These resources are a starting point for ongoing work around e-safety. They will need to be reinforced with repeated

Sugg

este

d Te

achi

ng

BRONZEFind out what a cookie is? How does they work?

SILVERUse the ideas in lesson 1 from teach-ict http://www.teach-ict.com/ks3/year9/impact_ict_society/ict_society.htm to explore the use of loyalty cards in supermarkets.

GOLDUse the material at http://www.childnet.com/sorted/spamphishing.aspx to explore Spam and Phising. Make a list of the things that the learners should look for in a spam email.

35 24/05/2023