You are on page 1of 4

May 6, 2022

Lesson Plan in Empowerment Technology

At the end of the lesson, students will be able to:

I. OBJECTIVES

CONTENT STANDARD: the learner demonstrates understanding of the several problems that
Information and Communication Technology has created in their generation.

PERFORMANCE STANDARD: the learner transfers learning by composing a reflective essay on how
Information and Communication Technology can change the world for better or for worse.

LEARNING COMPETENCIES:

1. __________________: Empowerment Technology

II.CONTENT: Disadvantages of ICT

III. LEARNING RESOURCES:

A. References:
1. Module

Other References:

1. https://www.youtube.com/watch?v=Y7zNlEMDmI4
2. https://www.youtube.com/results?search_query=cybercrimes+in+the+philippines
3. https://www.youtube.com/watch?v=tKOeloKIe8Y
4. https://www.youtube.com/watch?v=xR02CQCgcNM
5. https://wordwall.net/resource/31893271/computer-4/disadvantages-of-ict

B. Materials: laptop, handouts, mobile phone.

IV.PROCEDURE:

A. Preliminary Activity
 Ask the students to pray
 Greetings
 Checking of attendance
 Review of the previous lesson
B. Establishing the purpose of the lesson.
 Ask the students if they have idea about the logo being presented
 Ask if they are using it or not.

C. Presenting examples and instances in the lesson

 The reality about the existence of disadvantage and misuse of Technology ;

D. Determining the definition of CYCERCRIME

 Let the students determine what cybercrime is.


 Introduction to the existence of different kinds of Cybercrimes.

E. Discussing the TOP 10 MOST Common Cybercrimes

 Present to the students;


1. Phishing/Spoofing
a. Ask someone to read the definition
b. Differentiate the two
c. Give example of the difference
d. Ask someone whom is willing to volunteer as a “victim” for PHISHING
2. Blackmail/Extortion
a. Ask someone to read the definition
b. Give an example or further explain the concept.
c. Give a little advise to avoid the latter from happening
3. Accessing Stored Communications/Hacking
a. Ask someone to read the definition
b. Give a brief explanation about the famously known crime “hacking”
c. Site the most famous example of hacking for students to better understand the
idea.
4. Sports Betting
a. Ask someone to read the definition
b. Give a brief explanation about the online betting crime.
c. Site the most famous example of sports betting.
5. Non-Delivery of Merchandise
a. Ask someone to read the definition
b. Give a brief explanation about the concept of “scam”
c. Site the most famous example of scamming.
6. Electronic Harassment
a. Ask someone to read the definition
b. Give a brief explanation about the concept of “act of cyberbullying”
c. Site an example of the crime stated
7. Child Pornography
a. Ask someone to read the definition
b. Site the law that protects victims from the said crime :
Republic Act 9775: Anti-Child Pornography Act of 2009
8. Prostitution
a. Ask someone to read the definition
b. Define the crime by differentiating the actual prostitution to an online prostitution.
9. Drug Trafficking
a. Ask someone to read the definition
b. Define the crime by differentiating the actual crime to an online Drug Trafficking.
10. Criminal Copyright Infringement
a. Ask someone to read the definition
b. Define the piracy act being committed widely by everyone even if it is unintentional.
c. Site examples of the crime stated.

F. Give a statement that would support the earlier topic wherein students can relate and protect
themselves while exercising their freedom without harming others.

G. Discussion of how to Combat Cybercrimes

a. Network Security

o Site the different “security measures”


o Explain encryption for better understanding

b. Investigation

o Explain the process of the investigation virtually and how authorities trace criminals
through IP address.

c. Penalties

o Explain the two possible penalties being given to offenders.


H. Application on Daily life.

 Ask the students if they had an experience with any of those cybercrimes being stated and give
them advice on how they can avoid it and what they should do when those crimes happened
thus, advise students to not do those crimes to others.

I. Evaluating Learning. (Quiz)

 Send the link to the students and give them maximum of 5 minutes in answering.
o https://wordwall.net/resource/31893271/computer-4/disadvantages-of-ict

J. Assignment.

From what we have learned, write a reflective essay on how Information and Communication
Technology can change the world for better or for worse.

Prepared by: BONIFACIO, SHASHI MAE C.

You might also like