You are on page 1of 3

1.

GaPSC Instructional Technology Standards:


Citizen. Educators inspire students to positively contribute and responsibly participate in
the digital world. The program shall prepare candidates who:
(iii) Mentor students in the safe, ethical, and legal practice with digital tools and
protection of intellectual rights and property; and
(iv) Model and promote management of personal data and digital identity and
protect student data privacy.
2. Focus questions:
1. What are the characteristics of a strong password?
2. What is something to avoid when making a safe online profile?
3. What are the characteristics of a secure website?
3. Related questions
1. What are some ways for students to protect their passwords?
2. What should we help students look for when analyzing someone else’s online
profile?
4. Objective(s)
1. Students will be able to identify the components of a strong password.
2. Student will be able to create a safe online profile.
3. Students will be able to analyze websites to determine security.

5. Resources needed
1. Instructor - Microsoft Teams, high speed internet, accounts or access to the
various websites for the activities
2. Attendee – Microsoft Teams, high speed internet, QR code scanner (usually a
smart phone camera works)
6. Activity description – this section should clearly explain what you plan to do during your
session, how you plan on doing it and what features you will use within Microsoft
Teams.
1. Introduction- Introduce myself and the topic of the workshop – digital security
2. Overview of Objectives and Activities
3. Pre-assessment – Attendees will go to Padlet and fill out the “K” and “W”
sections of the KWL chart to help create a snapshot of prior knowledge.
4. Activity 1 – Passwords
1. Look at examples of passwords both weak and strong.
2. Make a word cloud to identify the components of a strong password.
3. With extra time have attendee create (not share) their own example of a
strong password.
5. Activity 2 – Sharing Information Online
1. To determine what type of information is appropriate to share online,
attendees will compare and contrast the differences between 2 profiles
displayed side by side.
2. Students will complete a collaborative T-chart on Jamboard to define the
characteristics of safe and unsafe profiles.
6. Activity 3 – Identifying Secure Websites
1. The teacher will share examples of features of both safe and unsafe
websites.
2. Attendees will go through a website and identify the features that make it
safe.
7. Post-assessment or survey – Attendees will complete the “L” section of the KWL
chart on Padlet to share at least 1 thing they have learned throughout the
workshop.
7. Extension idea(s)
1. Idea 1- Attendees can work together (in 2 large groups) to complete a Frayer
Model on the theme of digital security,
8. Teaching tips
1. Be sure to check all links before presenting.
2. Present information to students open-endly, allow them to come to their on
conclusions through collaborative efforts.
9. EXTRA: description of how you would assess participant learning and evaluate
workshop effectiveness (e.g., pre- and post-assessment, formative assessment, workshop
survey, Q&A session...)
o To evaluate overall workshop effectiveness, I would look at the work samples that
the attendees created throughout the workshop (Padlet, Mentimeter, Jamboard,
etc.). I would consider the learning objectives, the attendee’s working definitions
of digital security, and their work samples to determine how they are aligned.

You might also like