Curated OER
Have I Been Hacked?
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson plan, students explain the ethical issues about hacking. They graph and analyze their experimental results.
Curated OER
Hack Attack
Students explore the recent hacker attacks on e-commerce sites by comparing and contrasting security issues in traditional commerce and e-commerce companies, determining solutions for security issues that face both types of companies.
Curated OER
Curious? "Hack Away" Computer Activity
In this computer worksheet, students complete 3 multiple choice questions about computer hacking. Page contains multiple links to additional activities.
Curated OER
What is a Computer Crime?
An important lesson plan on cybercrimes is here for you. In it, young computer users learn about how people commit crimes on computers by hacking into accounts, and stealing personal information from people. Some excellent discussion...
Curated OER
Cartoons for the Classroom: The Climate Change Debate
Is global warming all smoke and mirrors? Find out what your scholars think with this handout, which has them analyzing two political cartoons on the topic. Background information gives context, detailing the computer hacking during the...
Curated OER
Breaking News English: Forty Million Credit Cards Hacked
In this English worksheet, students read "Forty Million Credit Cards Hacked," and then respond to 47 fill in the blank, 7 short answer, 20 matching, and 8 true or false questions about the selection.
Curated OER
Cyber-crime
Students discuss what types of Internet activity are or should be considered criminal, examine how criminal prohibitions against certain types of Internet activity are best implemented in law, determine whether computer crimes are unique...
Curated OER
Tinker Toys
Students explore various computer items. They describe possible alternative uses for computer technology. Students explore the practice of "reverse engineering." They write an opinion essay on the ethics behind "reverse engineering."
Curated OER
Teaching The Personality Profile
Students write a comprehensive personality profile feature that demonstrates knowledge of the Wall Street Journal formula of feature writing and the concept of show, don't tell. They experience a press conference interview situation.
Curated OER
Lessons Using the Science Fiction Genre
Students can practice "The Lost Art of Imagination" when they delve into the science fiction genre.
Curated OER
Bias vs. Perspective: An Inevitable Aspect of Journalism?
High schoolers explore the types of media that U.S. teens prefer the ways in which viewers identify and account for journalistic bias. They explore the ways in which media shapes one's opinion or affects their judgment.
Technovation
Curiosity Machine: Challenges: Hack a Box
Can you make a box that only you know how to open and is safe from hackers? In this challenge, students will build a box with the help of this site. Site includes a lesson plan, tips, and a place for students to document their...
Other
How to Become a Hacker
This site contains a description of and the issues surrounding hacking.
University of California
University of California, Berkeley: Computer Hacking and Ethics
This article explores the topic of computer hacking and suggests ways of dealing with it in the educational setting.
Mocomi & Anibrain Digital Technologies
Mocomi: Hacking and Viruses: Facts
Learn all about hacking. Find out about spam, viruses, how to protect your computer, and how to tell if your computer has been hacked.
Common Sense Media
Common Sense Media: Cyber Smart! Student Curriculum Lesson: Can You Hack It? [Pdf]
Students learn that computers and electronic files are property and explore the reasons for, consequences, and ethics of teen hacking. This ISTE-aligned lesson plan for Grades 6-8 includes student activity and Home Connection sheets....
Other
Great Hackers
This article explores the controversies surrounding and the rationale for computer hacking.
Youngzine
Youngzine: Yahoo: A Breach From the Past
Everyday companies are being hacked. A recent hack was done to Yahoo! databases. Find out how easily hackers break into websites and ways we can protect ourselves from online theft.
BBC
Bbc News: Heartbleed Bug: What You Need to Know
Learn about the ways in which the Heartbleed bug has impacted internet security and what you can do to browse more safely.