Cybersecurity, Web Searches and Bias
Lesson Length 1 60-minute class session Purpose: The purpose of this lesson is to learn how to determine the main ideas from digital sources. Students will identify the site content and information on bias. Students will synthesize their findings from three websites, cite examples, and provide their own analysis in a 5-minute speech. Objectives By the end of this lesson, students will be able to:
Resources, Materials, and Equipment
Student Laptops, Data Projector Collaboration: Teacher and Library/Media Specialist model recording data related to site content and bias. Educators monitor student guided practice as they record data and analyze three sites while composing a 5-minute speech. Assessment The student work on the Advance Organizer and the 5-minute speech (using the Rubric) show their ability to analyze websites and look for information on bias. Standards (from the MI or other state standards) Computer Systems Networking and Telecommunications Consolidated Standards (2011)M Recognize and analyze potential IT security threats to develop and maintain security requirements.
Reading and/or Writing CC.9-10.R.I.7 Integration of Knowledge and Ideas: Analyze various accounts of a subject told in different mediums (e.g., a person’s life story in both print and multimedia), determining which details are emphasized in each account. CC.9-10.W.9 Research to Build and Present Knowledge: Draw evidence from literary or informational texts to support analysis, reflection, and research. Listening and Speaking CC.9-10.SL.2 Comprehension and Collaboration: Integrate multiple sources of information presented in diverse media or formats (e.g., visually, quantitatively, orally) evaluating the credibility and accuracy of each source. AASL Shared Foundation Shared Foundation: INQUIRE, think critically, and gain knowledge. 1.1 Domain/Competency: THINK 1.1.5 Evaluate information found in selected sources on the basis of accuracy, validity, appropriateness to needs, importance, and social and cultural context. 1.1.6 Read, view, and listen for information presented in any format (e.g., textual, visual, media, digital) in order to make inferences and gather meaning. Shared Foundation: CURATE, draw conclusions, make informed decisions, apply knowledge to new situations, and create new knowledge. 2.1 Domain/Competency: THINK 2.1.2 Organize knowledge so that it is useful. Process Motivation Show the “Cybersecurity 101” video (3:52) to students and have them discuss ideas about cybersecurity. Talk about privilege by working in Cybersecurity field and the importance of the work. Student-Friendly Objectives
Presentation Distribute Advance Organizer. Explain what to look for to complete the organizer. Educators model with the website and complete Advance Organizer:https://www.cnbc.com/2019/07/17/ai-has-a-bias-problem-that-can-be-a-big-challenge-in-cybersecurity.html Educators model how to cite a website as a source. Show students the list of 20 Cybersecurity Websites, with groups reviewing different websites. Distribute Rubric for 5-Minute Speech. Explain what to complete, including a citation for sources. (Refer back to model.) Give students time to work using their laptops. Teacher and Library/Media Specialist monitor students as they work, providing further instruction, as needed. Student Participation or Practice Procedures
Guided Practice Educators monitor student data collection, completeness of the Advance Organizer, and work on 5-minute speech. Closure Educators facilitate student sharing of their 5-minute speeches. Student self-evaluates using the rubric. Reflection Educators discussion with students: What did you learn about Cybersecurity? What did you learn about bias and Cybersecurity? What did you learn about the main ideas on websites? Extensions Educators could explore extension ideas: having a guest speaker on cybersecurity, providing a real example of cybersecurity and letting students work on solutions, and emphasizing the privilege and responsibility that comes with this knowledge and expertise. |