8.3 Digital Citizens

In this unit you will become a campaigner for people to become better digital citizens. You will learn about the ethical, environmental and legal impact of digital devices and internet, you will look at cyber security and e-safety.
You will develop a range of products to help with your campaign. such as a Digital Poster, Flyer, leaflet as well as your own logo.

Unit Resources

Sections

Success Criteria

Time Frame

1.5 - 2 Lessons
2 Lessons
5.Discuss the impact that ethical issues surrounding computing technologies has made on society.
4.Explain the ethical issues surrounding computing technologies.
3.Describe two positive/negative impacts computing technology has made.
2. Define the term ethics and computer ethics.
2 Lessons
5.Discuss the impact that environmental  issues surrounding computing technologies has made on society.
4.Explain positive and negative environmental
impacts computer technology has made.
3.Describe some of the environmental impacts computer technology has made on society.
2. List  environmental impacts on society.
2 Lessons
Create a flyer that discusses the impact that ethical and environmental issues surrounding computing technologies has made on society.
Create a flyer that explains positive/negative ethical and environmental impacts computer technology has made on society.
Create a flyer that describes some of the environmental impacts computer technology has made on society.
1 Lesson

5. Discuss how issues related to the use of information affect an organisation.

4. Explain the main offences related to the use of information.
3.Describe the Data Protection and Computer Misuse Acts.
1 Lesson

5. Discuss how issues related to each Act affect an organisation.

4.Explain the  main  offences  related to each Act.

3.Desribe  the Digital Economy Act. 

3.Desribe  the copyright, Designs and Patents Act.

2 Lessons

5. Discuss  methods of preventing cyber security threats.

4.Explain five types of malicious codes.

4.Explain three types of social engineering techniques.

3.Describe different cyber security threats.