Lesson Plan
Curated OER

Writing a Mystery Story

For Teachers 11th - 12th
Students examine the elements of mystery stories and read Rage in Harlem. In reciprocal teaching groups, they discuss the author's development of the story, and complete dialectical journals.
Lesson Plan
Curated OER

Revising Your Mystery Story

For Teachers 11th - 12th
Students edit and improve their short stories by examining character description, dialogue, and plot elements. In peer editing groups they correct gramatical and spelling errors. they read aloud their new story drafts.
Lesson Plan
Curated OER

Get a Clue: What is There and What Isn't

For Teachers 5th - 10th
Students practice the ability to examine and analyze evidence and extract information that eventually leads to deductive conclusions. After evaluating the objects discovered in a box, students write a one-page reflection paper of their...
Lesson Plan
Curated OER

Who Stole My Salad?

For Teachers 8th
Eighth graders explain how protein is made in the cell. In this biology lesson, 8th graders translate RNA and DNA using an internet database. They determine the thief based on evidence collected.
Website
US Department of Justice

U.s. Department of Justice: Computer Crime and Intellectual Property Section

For Students 9th - 10th
Discover information about computer crime, intellectual property, electronic evidence and other high-tech legal issues. Explore documents, reports, white papers, manuals, etc.
Website
Other

National Conference of State Legislatures: Computer Crime Statutes

For Students 9th - 10th
This resource contains a listing by state of laws concerning computer hacking and unauthorized access.
Unit Plan
Department of Defense

Do Dea: Spreadsheet Software Applications: M1: L1: Computer Essentials

For Students 9th - 10th
In Module 1 Lesson 1 of this course, students are introduced to the basic functions of computer system components, to some technical vocabulary, and they will learn about computer security, privacy, and crimes. They will also learn how...
Activity
Indiana University

The Case of the Missing Computer Chip

For Teachers 9th - 10th
Have your teams of students solve the simulated crime scene using clues presented in this thorough forensic lesson plan.
Website
Other

International High Technology Crime Investigation Association

For Students 9th - 10th
This site is devoted to high technology crime investigations and contains training and seminars as well as a variety of resources.
Website
Other

Streetlaw: Criminal Law and Juvenile Justice

For Students 9th - 10th
The chapters of this unit on criminal law and juvenile justice are as follows: "Crime in America," "Introduction to Criminal Law," "Crimes Against the Person," "Crimes Against Property," "Defenses," and "The Criminal Justice Process: The...
Website
NC State University

North Carolina State University: Ethics in Computing

For Students 9th - 10th
This site contains a repository of information about a variety of computer ethics topics.
Lesson Plan
Common Sense Media

Common Sense Media: Cyber Smart! Student Curriculum Lesson: Can You Hack It? [Pdf]

For Teachers 6th - 8th
Learners learn that computers and electronic files are property and explore the reasons for, consequences, and ethics of teen hacking. This ISTE-aligned lesson plan for Grades 6-8 includes student activity and Home Connection sheets....
Website
Get Safe Online

Get Safe Online: Videos

For Students 9th - 10th
There are many security threats today associated with internet use. This site presents some online videos that discuss security issues such as online rip-off schemes, protecting privacy, and protecting your computer from online attacks.
Website
Other

Dfrws (Digital Forensic Research Workshop)

For Students 9th - 10th
This site provides a variety of resources and information about digital forensics.
Website
Other

National Cyber Forensics & Training Alliance

For Students 9th - 10th
This site contains information about advanced training, security awareness in an effort to reduce cyber vulnerability, forensic and predictive analysis and lab analysis.
Website
Other

Interhack: Internet Firewalls Fa Qs

For Students 9th - 10th
Answers dozens of questions about internet firewalls.
Website
Other

Anonymity and Privacy on the Internet

For Students 9th - 10th
A site that gives information on how to be anonymous and how to secure communications and files on the internet.
Unit Plan
TED Talks

Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It

For Students 9th - 10th
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
Article
New York Times

New York Times: India's Call Center Talents Put to a Criminal Use: Swindling Americans

For Students 9th - 10th
[Free Registration/Login Required] The availability of computer-savvy, young, English-speaking job seekers and efficient technology have contributed to the growth in cyber fraud against Americans.
Article
Other

Symantec: Steganography Revealed

For Students 9th - 10th
This article provides an overview of steganography as well as steganographic tools and techniques.
Website
Get Safe Online

Get Safe Online: What Are the Risks?

For Students 9th - 10th
There are many ways for online criminals to take advantage of internet users. They may invade your privacy, steal your identity, rob you of your wealth, and infect your computer. This site provides links to information that can be used...
Handout
Wikimedia

Wikipedia: Steganography

For Students 9th - 10th
This site contains a Wikipedia description of steganography.
Handout
Other

Safe teens.com: Online Safety Project

For Students 9th - 10th
Find information on the internet as well as guidelines to follow in order to make surfing a fun and safe experience. The site also provides a link for parents to help them with children that will be using the internet.
Article
Other

Department of Homeland Security: Protect Myself From Cyber Attacks

For Students 9th - 10th
Use these steps to help devise a solution to counter a cyber attack.

Other popular searches