Developing DIGITAL INTELLIGENCE: DQ
  • Welcome
    • Meet the webmaster
    • Personal Philosophy >
      • Values Education >
        • Freerice: Help feed the world's hungry
        • Rule: Be Kind >
          • Be Kind Online
    • Create safe learning environment >
      • Creating a Growth Mindseet >
        • Thinking: Creative & Critical
      • Class breaks
      • Adjustments for students with special needs
    • Assessment tools
    • FREE software for students
    • ACTIVITIES >
      • Kinder ICT Activities
      • Year 1 Activities
      • Year 2 Student assessment
      • Year 3 Activities
      • Year 4 Activities
      • Yr 5 & 6 Activities
    • My Neighbourhood
    • Assessments & Reports
    • Cross Curriculum Priorities >
      • Sustainability
      • Indigenous Priority >
        • Aboriginal Student resources
  • ICT Capability
    • Applying social & ethical protocols & practices when using ICT >
      • Digital Intelligence (DQ) & Digital Citizenship teaching resources
      • Recognise intellectual property >
        • Copyright >
          • Find copyright free images & pictures
        • Creative Commons >
          • Clip art Sources
        • Plagiarism
        • Piracy
      • Apply personal security protocols >
        • Password development
        • Cyberthreats >
          • Phishing via email
          • Computer viruses, malware & trojans
      • Apply digital information security practices >
        • DQ & Cybersafety by class >
          • Cybersafety K-2
          • Cybersafety K-2
          • Cybersafety Stage 1 Year 1
          • Cybersafety Stage 1 Year 2
          • Cybersafety Stage 2 Year 3 >
            • Cybersafety Budd:e
          • Cybersafety Years 4,5 & 6 >
            • Stage 3 Cybersafety & Cyberbullying >
              • Web Evaluation
              • Critical Thinking
        • Cybersafety teaching resources >
          • Cybersafety Assessment
          • Safer Internet Day >
            • Be Kind Online
          • Cybersafety Online Games
          • Cyberbullying
        • Cybersafety 4 parents
      • Identify the impacts of ICT in society >
        • Technology in past
        • Robots & Robotics
        • Virtual Tours & Cams >
          • Panda Watch
    • Investigating with ICT >
      • Define and plan information searches >
        • Research >
          • World Wide Web & Browsers
          • WONDERING >
            • Genius Hour
            • videos from canada film
            • Google Earth >
              • Google Earth- Panyee Soccer Club
      • Locate, generate and access data and information >
        • Excel-Working with data
        • Oliver library management system
    • Creating with ICT >
      • Generate & express ideas, plans & processes
      • Generate solutions to challenges and learning area tasks that arise from learning activities.
      • Use ICT to create digital multimodal forms of expression
      • FUN & CREATIVITY >
        • Avatars >
          • Brain fun games
          • Build Your Wildself
          • Create a superhero avatar instructions >
            • Save your Superhero avatar >
              • Superhero resources & ideas
          • Voki
        • 3D creations
        • Alphabet activities
        • Animation >
          • Animation: Scope & sequence
        • Audio & Sound Resources
        • Booktrailers >
          • Booktrailers -How to create
        • Create a superhero trailer
        • Digital Storytelling >
          • Book Creator
          • Culture Street Picture Book Maker
          • MS PowerPoint
          • My Storymaker
          • JellyBean online book maker
          • Storybird
          • Tellagami
          • Zoo Burst
        • Graph making
        • Origami figures
        • Paint
        • Persuasive Posters
        • Posters >
          • Glogster EDU
          • Thinglink
        • Sketchnoting
        • Sketch Up
        • Text generators
        • Weebly website creation >
          • Website enhancements
          • Digital Portfolio
    • Communicating with ICT >
      • Select & evaluate data >
        • Evaluating websites
      • Understand computer mediated communications
      • Blogs and Blogging
      • Book Reviews
      • Collaborate, share and exchange
      • CLOUD BASED
      • Netiquette
      • email >
        • Send & Receive email
      • Padlet
      • WORD >
        • Working in word
        • Newspaper Report
    • Managing & Operating ICT >
      • Select and use hardware and software >
        • WINDOWS 10
        • HELP I'm having trouble >
          • Computer shortcuts
          • Computer tips & tricks
        • Mouse Control & Use >
          • Click & drag mouse: puzzles
          • Making Music with my mouse
          • Mouse Control Lessons in Word
        • Keyboarding & Typing >
          • Alphabet for Keyboarding
        • Audio tools & sites
      • Understand ICT systems >
        • Parts of a Computer >
          • What's Inside a Computer?
        • Computer & Technology terms
        • What is the internet?
      • Manage digital data >
        • Log on Log off computers >
          • Student portal
          • GSuite was GAFE
        • Save, save, save >
          • Open a file within a program >
            • Tidy up your Udrive
      • Websites for teaching ICT
      • BYOD
  • Digital resources to support:
    • English >
      • Reading matters >
        • Premier's Reading Challenge
        • Reading fluency
        • Authors >
          • 2015 Bookweek
      • Reading Online Fiction & Non fiction >
        • EPIC
        • Premier's Reading Challenge
        • Reading on iPad
      • Heroes and Superheroes
      • Monsters >
        • Story Monster
      • Spelling
      • Student's Interactives
      • Visual Literacy >
        • Visual Design
        • Visual Literacy S3
        • Wordseye
    • Geography >
      • Maps
    • History >
      • Celebrations & Commemorations >
        • ANZAC DAY >
          • ANZAC DAY Indigenous priority
          • ANZAC DAY for students
        • Australia Day
        • Christmas
        • Diwali
        • Easter
        • Harmony Day
        • Mother's Day
        • National Simultaneous Storytime
        • National Threatened Species Day
        • Olympics
        • Reconciliation
        • Remembrance Day
        • SBPS Spring Fete & Art Show
        • Year 4 excursion
    • Maths sites >
      • Counting activities
      • Maths halves
      • Flip, Slide, Turn
      • Graph making
    • PDHPE >
      • Personal Choices >
        • Road Safety >
          • Bike Safety >
            • Bikes: Past, Present & Future
        • Hygiene-Clean Hands
        • SunSmart Protection Curriculum >
          • SunSmart Protection Resources
          • SUNSMART Padlet
        • Water safety >
          • Water safety websites
    • Science & Technology-NEW >
      • Science & Technology resources >
        • Science & Technology fun & games
        • Exploring Biomes & Habitats around the world >
          • Marine studies >
            • Plastics in our Oceans
            • Plastic in our oceans resources
            • Marine Creatures Videos >
              • Sea Turtles
              • Turtles
      • STEAM apps & resources
      • Coding & Computational Thinking Skills >
        • Coding Resources >
          • Coding with Scratch
          • CODING for kids
        • Weather >
          • Student surveys
        • 3D printing
    • Digital Literacy Staff resources >
      • Staff Professional Learning
      • Webtools
      • Critical Thinking
  • Competitions for students
    • Word Mania
  • Library
  • Video tools and resources
  • Benefits of using your libraries
  • Teacher Talk v2
  • Advice for parents

Apply personal security protocols

The Technology Tail: A Digital Footprint Story (Communicate with Confidence) 
Paperback – September 1, 2017
by Julia Cook (Author),‎ Anita DuFalla (Illustrator)
 A cute, creative story about children and their texts, tweets, posts and pics. Don t be mean and irresponsible!

That is the straight-to-the-point advice Screen has for young readers who are active on social media. Whether tapping out messages on their computers, tablets or phones, Screen wants kids to know their words will follow them for life, creating a digital trail that can't be erased.

A timeless message to a new generation just learning how to navigate the fast-changing digital age. Written for children in grades 1-6, this storybook uses rhymes and colourful illustrations to grab their attention.

There are also tips for parents and teachers who want to reinforce kindness and respect in a high-tech world.   Amazon 
Picture
Picture
Once Upon a Time... Online: Happily Ever After Is Only a Click Away!
Hardcover – December 27, 2016
by David Bedford  (Author),‎ Rosie Reeve (Illustrator)
But I Read It on the Internet! (Mrs. Skorupski Story) Hardcover – February 14, 2013by Toni Buzzeo  (Author),‎ Sachiko Yoshikawa (Illustrator)

Hunter and Carmen disagree whether George Washington really had wooden teeth, and Mrs. Skorupski encourages them to research the story on the internet and use her "Website Evaluation Gizmo" to evaluate websites and come up with the correct answer.

Once upon a time, a laptop arrived in Fairy-tale land... A happily ever after is only a click away!
​Find out what happens when our favourite fairy-tale characters receive a laptop and learn a lesson in online safety. 
Picture
Picture
Picture
Picture
Use the quizzes either pre-movie and /or after movie and discussion.
Picture
DISCUSS with students:
"What is a stranger?"
 "What kinds of things should we not tell a stranger?".
"What kinds of things are OK to tell a stranger?"
Explain that certain kinds of information won't put students in harm's way.
 "Are there strangers online?"

do not share personal information

What is personal information?
Discuss with the students what is meant by ‘personal information’.
  • First name,
  • Middle name,
  • Surname,
  • Address,
  • Home town,
  • Post code,
  • School name,
  • Age,
  • Date of Birth,
  • Family Members,
  • Friends,
  • Photos...
  • Could someone use them to identify / contact you?
What types of personal information would you share with different people?
  • Their doctor,
  • A famous sports star,
  • Their teacher
  • Their favourite singer,
  • A taxi driver,
  • A friend's grandad.

Is it OK to give other people's personal information away without their permission?


Picture
Picture
This activity reinforces messages about personal safety and protective measures for dealing with strangers online.
​Cybersmart Detectives is easy to facilitate and provides an excellent opportunity to address some of the 'Personal, Social and Community Health' content in the Health and Physical Education curriculum.

Cybersmart Detective Teaching notes

Email phishing and spam

Spam is unsolicited bulk junk emails which use up valuable space and time.

Phishing emails are potentially harmful exposing our system to viruses and other damaging
​.

You are requested to delete these messages. Here are some suggestions on recognising and managing spam and phishing emails: 
  • If you don't recognise the sender or the subject looks suspicious, delete the message without opening it.
  • Never open attachments links in messages from strangers, or even suspicious-looking messages from people that you know.
  • Never reply to spam messages or attempt to contact the sender.
  • Be careful who you give your email address to.
  • Never confirm details like account numbers or passwords.
  • If you believe the email may be genuine, contact the institution and confirm its validity.

secure sites

Picture
Look at the security symbol in the url (address)Some websites will display a lock symbol in the address bar. This is most commonly seen with certain types of websites, like online stores and banking sites.
​
This means the website is using an HTTPS connection, which makes it safe to enter your personal information.

You won't see this symbol on all websites, and that's OK—not all websites need this extra layer of security.
However, you should avoid entering any sensitive information, such as your credit card number, if you don't see this symbol in the address bar.

Turning off email images
Spam messages often contain images that the sender can track. When you open the email, the images will load and the spammer will be able to tell if your email works, which could result in even more spam.
You can avoid this by turning off email images.
​Let's look at how to do this in Gmail, but remember that the process will vary depending on your email service.
Picture

phishing


Phishing scams are messages that try to trick you into providing sensitive information.
These often appear to come from a bank or another trusted source, and they'll usually want you to re-enter a password, verify a birth date, or confirm a credit card number.
Phishing messages may look real enough at first glance, but it’s surprisingly easy for scammers to create convincing details.

other email scams 

Picture
Spam and phishing are common problems, but there are many other types of email scams you may encounter.
Some will promise to give you a lot of money if you advance a small amount upfront.
​Others may pretend to be from people you know in real life, and they'll often ask you to send money or download an attached file.

As with spam and phishing scams, remember to trust your best judgement.
You should never send someone money just because you've received an email request.
You should also never download email attachments you weren't expecting because they might contain malware that could damage your computer and steal your personal information.
Thanks to 
http://www.gcflearnfree.org/​

GCFLearnFree.org
Powered by Create your own unique website with customizable templates.