Also in this section

Upper Key Stage 2 E-Safety - Mini Topic
E-Safety and Digital Citizenship

This topic offers an engaging way to cover the vital subject of e-safety. Through the creation of a cyber-safety game, understand the following key areas: the meaning of cyber-bullying and its consequences and outcomes; the importance of privacy settings and keeping passwords safe; the pitfalls of sharing photographs and videos; the phrase ‘Think before you send’; the meaning and importance of emojis; and the hidden costs of app usage and in-app purchasing. Finally, review all you have learned by inviting guests into the classroom to play the cyber-safety game.

Session 1 Communications: Emojis, Text-talk and Phishing

Objectives

Computing

  • Be responsible, competent, confident and creative users of information and communication technology.
  • Evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems.

Lesson Planning

Reflect on the phrase ‘Think before you send’; consider the meaning and importance of emojis and text-talk; understand and spot the features of phishing emails.

Teaching Outcomes:

  • To consider the impact of electronic communication content.
  • To explore the meaning of emojis and text-talk and their impact when communicating.
  • To identify features of phishing emails.

Children will:

  • Consider the phrase ‘Think before you send’ and the possible impact of emojis and text-talk.
  • Explore the meaning of emojis and text-talk/abbreviations.
  • Identify the features and implications of a phishing email.

You Will Need

You do not need any particular resources for this session.

Session 2 Research, Rights and Reliability

Objectives

Computing

  • Be responsible, competent, confident and creative users of information and communication technology.
  • Evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems.

Lesson Planning

Understand the implications of copyright and fair dealing for images and text online; spot reliable and unreliable websites.

Teaching Outcomes:

  • To understand the terms copyright, plagiarism and fair dealing.
  • To know the features of reliable and unreliable websites.

Children will:

  • Understand that online copyright laws protect intelligent property (their own and others).
  • Know copyright, plagiarism and fair dealing rules.
  • Identify features of a reliable and unreliable website.

Provided Resources

  • Three sample texts
  • Photo scenarios
  • Wikipedia challenge

You Will Need

You do not need any particular resources for this session.

Session 3 Gaming, Online Friends and Privacy

Objectives

Computing

  • Be responsible, competent, confident and creative users of information and communication technology.
  • Evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems.

Lesson Planning

Understand the hidden costs of app usage and in-app purchasing; explore the social networking and gaming world and consider the importance of privacy and personal information.

Teaching Outcomes:

  • To understand the hidden costs of app usage and In-app purchasing.
  • To explore information sharing and privacy settings.
  • To understand that people we meet online might not be who they say they are.
  • To explore what information and images we should and should not share online.

Children will:

  • Understand the hidden costs of app usage and in-app purchasing.
  • Know when sharing of personal information is and is not safe.
  • Recognise privacy settings and the value of implementing them.
  • Identify information that is safe to share and what is not safe to share online.

Provided Resources

  • Friend request ‘profiles’ and key questions
  • Privacy scenarios
  • Sharing Personal Information

You Will Need

You do not need any particular resources for this session.

Session 4 Passwords and e-safety experts

Objectives

Computing

  • Be responsible, competent, confident and creative users of information and communication technology.
  • Evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems.

Lesson Planning

Learn about the importance of creating effective passwords and keeping them safe; review e-safety issues.

Teaching Outcomes:

  • To understand the importance of keeping passwords safe.
  • To identify the features of a strong password.
  • To consolidate understanding of e-safety.

Children will:

  • Understand the importance of keeping passwords safe.
  • Understand how to generate effective and secure passwords.
  • Explore a range of online safety issues to consolidate learning .

You Will Need

You do not need any particular resources for this session.

Session 5 Cyber Bullying and Reporting

Objectives

Computing

  • Be responsible, competent, confident and creative users of information and communication technology.
  • Evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems.

Lesson Planning

Explore the similarities and differences between bullying and cyber- bullying. Review the importance of e-safety; discuss and write rules for digital citizenship; design a cyber-safety board game or online quiz for your class and others to see if they are e-safe.

Teaching Outcomes:

  • Cyber-Bullying Scenarios.
  • Quiz/game instructions.
  • Board game elements.

Children will:

  • Understand what is meant by cyber-bullying and explore the similarities and differences to bullying.
  • Discuss cyber-bullying scenarios.
  • Create an online quiz or a real board game that explores e-safety and digital citizenship.

You Will Need

You do not need any particular resources for this session.