You are on page 1of 8

UNIT PLAN (INFORMATION TECHNOLOGY)

Unit Title
Ethics in Technology

Unit Summary
This unit deals with the proper use of language tones, security and legal
issues on the Internet

Curriculum Links
ICT Curriculum Module 6 of the ICT Curriculum: Ethics in Technology

Year Level 2015


FORM 1
Approximate Time Needed
Total (7) lessons spread over (7) 35-40 min periods. (Two double periods and
five single periods.)
Standards/Syllabus Outcomes
On completion of this Unit, students should be able to understand proper
Netiquette skills, Security issues on the internet and how to advise teenagers
to practise them.
Curriculum-Framing Questions
Essential Question

Essential Question
Are there Safety issues in using the Internet?

1 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

Unit Questions

Why is proper netiquette necessary?


How can I prevent cyberbullying?
How can I deal with cyberbullying?
Why do I have to protect my data?
Why are there security issues on the internet?
How can I protect my digital data on the internet?
How can I practise safe online socialising?
Why it is important to have a software licence?

Content Questions

What is Netiquette?
What is Cyberbullying?
What are some forms of Cyberbullying?
What impact cyberbullying has on students?
What advice can I give to someone who is a victim of
cyberbullying?
What is a Software licence?
What are the different types of Software licenses?
What is the difference between free and open-source?

What are the legal issues in relation to the usage


of software?
What is copyright?
What are copyright laws?
What are the consequences of violating copyright
laws?
What is Piracy?
What is Hacking?
What is Plagiarism?

2 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

Before Unit Work


Begins
K-W-L Chart

While Students Work


on Unit

After Unit Work


Ends

Role playing

Assessment(demonstrat
e understanding)

Written/Oralassessment
Observation, Socratic
Seminar
Unit Details
1.

Netiquette (1 period)

This lesson focuses on the use of the K-W-L chart


where students will be taught how to list what
they know already about Internet Safety, under
the K column, what they want to know under the
W column and later in the class they will list what
they have learnt under the L column.

2.
Cyberbullying
period)

(1

K-W-L chart used at the beginning of


the unit find out students knowledge
on Internet Safety
Explain the term Netiquette
- Explain the term Etiquette
before introducing Netiquette to
the students
Demonstrate the proper use of
- language tones
- Capital letters
- Punctuation
- Symbols
- Photos by showing examples

This lesson will use an active learning approach


such as role playing in groups. Each group will be
provided with a brochure on information about
Cyberbullying. They will prepare their own script
on one of the forms of cyberbullying and act it out
in the classroom. Peer Assessment will be used to
assess each group.

3 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

Explain the term Cyberbullying


- Explain the term Bullying before
introducing
a definition
of
Cyberbullying

Distinguish
the
different
Cyberbullying.
- Flaming
- Harassment
- Masquerading
- Outing
- Exclusion

Evaluate a situation on Cyber bullying and give


relevant advice to the victim.

forms

of

3.
Create a poster on
Cyber
Bullying (1 period)
This lesson will be hands on activity on their
laptops. Students will use Microsoft Word. This
lesson will be a revision lesson on Cyberbullying
and also to reinforce the topic.

4.
Security Issues (1
period)

This lesson will be done by rearranging the


classroom in a semi-circle and conducting a
Socratic Seminar session. The teacher will prepare
a list of questions before hand to conduct this
lesson effectively.

5.

Passwords and

Convince the school population the


importance of Cyberbullying through
the proper use of
- Font
- Font size
- Font color
- The use of appropriate pictures

Explain the term Security


- Virus protection
- Firewalls
- Computer Hackers
Explain how security is important
online

4 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

Socialising
online (2 periods)

Describe the different ways data can


be protected online
In this lesson the teacher will show a short video
clip on Identity theft and email scams especially
on social networking sites. Following the video a
discussion will take place and students will then
be required to write a journal.

6.
Legal ethical issues in
using
Software (1 period)

Explain the term passwords


- how passwords are used
- how passwords are created
- the importance of changing
passwords frequently
Explain identity theft
- How Identity theft occurs
- Who is at risk for identity theft
- the dangers of Email scams and
online socialising

This lesson involves Cooperative learning whereby


students will be placed in groups to conduct
research on Software Licence and its types. Peer
Assessment will be used to assess the findings of
the research.

7. Copyright Laws (2 periods)

Explain the term legal


Explain licence
- Software licence
- The importance of software
licence
- The different types of software
licence
- The purpose of using the
different types of software
licence
- Software Installation Key

In this lesson a Socratic seminar will also be done


with arranging a semi-circle in the classroom. A
short story using the terms Copyright, hacking,
plagiarism and piracy will be given to the students
for discussion.
5 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

8. Evaluation (2 periods)

Explain what is Copyright?


- copyright laws
- consequences of violating
copyright laws
Explain Software piracy
- Registration key
- Imprisonment for using pirated
software
Explain Plagiarism
- Consequences of plagiarism

A written evaluation based on the entire unit will


be given to the students at the end of the unit to
assess their understanding of Ethics in
Technology.
Student Prerequisite
Skills

Reading and Writing Skills


Computer literacy skills
Oral Communication Skills

Students Prior
Knowledge

Occupational Health and Safety


regulations as it relates to
ergonomics in the workplace

Teachers Professional
Learning

Comprehensive Knowledge on Ethics


in Technology as it relates to
teenagers
Current knowledge on OSHA
Use of Web 2.0 Technology tools

Teaching and Learning Activities

Strategies
Oral questioning, brainstorming, Cooperative learning and peer assessment,
role playing, observation, Socratic Seminar
Accommodations for Diverse Needs
Students with Special Needs
6 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

Students will be placed in Cooperative Groups where they will be able to learn
from each other Teacher will meet with special needs students during their
free periods. During class sessions teacher will provide guidance where
necessary.
Gifted Students
Students will be assigned to take the lead role in group activities and assist
their peers where necessary
Materials and Resources Required for Unit
Technology
Hardware

Computer/Laptop

Projector

Technology
Software

Windows Operating System

Internet Browser

Windows Media Player

Microsoft Office Suite

Printed Materials

K-W-L Charts
activity sheets
questioning sheets
test sheets
Peer Assessment Sheets

Other Resources
Unit Author
First and Last
Name

Leena Balkaran

School District

Victoria

7 | Page

UNIT PLAN (INFORMATION TECHNOLOGY)

School Name

San Fernando West Secondary School

School Address

Farah Street, Les Effort West, San Fernando

8 | Page

You might also like