Cybersmart Challenge
About this resource
Target audience
Level
Lower primary, Middle primary, Upper primary
Keywords
Type of resource
Video, teacher guide, lesson plans, certificates
Timeframe
35 to 45 mins: 3 x videos from 5 to 10 minutes, lesson plans 15 to 45 minutes
Australian curriculum
Key learning areas
General capabilities
* Age recommendations are indicative only. The programs have been successfully used by students outside these age ranges. Cybersmart and Cybersmart Hero may be suitable for younger children.
Key outcomes
Students will be better equipped to understand and manage key online safety issues, including inappropriate or unwanted contact, cyberbullying and the risks of sharing images online.
Using this resource
There are three modules, which can be used as standalone lessons or as a series. When used as a series, they foster a deeper understanding of online safety.
Select a module, show the students the video, and use the relevant lesson plan to facilitate activities and discussion. Students can be presented with a certificate at the end of the session.
You can also send your students the link to the student homepage and let them explore on their own.
Structure
The three teaching modules are:
- Cybersmart Forever (35 to 45 mins) focusing on the risks of sharing images online
- Cybersmart Detectives (30 to 45 mins) focusing on privacy, personal information and inappropriate or unwanted contact
- Cybersmart Hero (35 to 45 mins) focusing on cyberbullying and the role of the bystander
Materials: 3 x teacher guides, 3 x lesson plans, 3 x student certificates or download under individual topics below.
Cybersmart Forever (35-45 mins)
Key issues
Privacy and personal information, cyberbullying, respectful online behaviour, inappropriate or unwanted contact
Key outcomes
By the end of this unit of work, students will be able to:
- identify how to safely share content/images online
- describe and use strategies to protect their content/images online
- understand risks of friending strangers online
- recognise when to seek help with online dilemmas
Activity
- Part 1 (10 to 15 mins): Show the students the animation and lead a discussion based on suggested questions provided.
- Part 2 (45 mins, immediately after part 1 or as a separate lesson): Students work through a range of images deciding whether to post, share or delete. Students share ethical dilemmas they have thought about or experienced online, and consider the ethical issues posed in the video by taking the perspective of different characters.
Downloads
Media
Cybersmart Detectives (30-45 mins)
Key issues
Inappropriate or unwanted contact, privacy and personal information, respectful online behaviour, accessing support
Key outcomes
By the end of this unit of work, students will be able to:
- identify what personal information is safe to put online
- describe and use strategies in situations where they feel uncomfortable or unsafe online
- recognise that people they meet online may pretend to be someone else
- seek assistance if things go wrong online
Activity
- Part 1 (20 to 25 mins): Show the students the animation and lead a discussion based on suggested questions provided.
- Part 2 (30 mins, immediately after part 1 or as a separate lesson): Students create a personal profile suitable to be posted online. Students create a list of trusted people they would contact if an online experience made them uncomfortable.
Downloads
Media
Cybersmart Hero (35-45 mins)
Key issues
Respectful online behaviour, cyberbullying, bystanders, accessing support
Key outcomes
By the end of this unit of work, students will be able to:
- identify what cyberbullying is
- describe and use strategies in situations where they feel cyberbullied
- recognise when to seek help in cyberbullying situations
- be a positive bystander in a cyberbullying situation
Activity
- Part 1 (20 to 25 mins): Show the students the animation and lead a discussion based on suggested questions provided.
- Part 2 (30 mins, immediately after part 1 or as a separate lesson): Students identify and discuss whether a range of scenarios are examples of cyberbullying, bullying, or not bullying.