Curated OER
Writing a Mystery Story
Students examine the elements of mystery stories and read Rage in Harlem. In reciprocal teaching groups, they discuss the author's development of the story, and complete dialectical journals.
Curated OER
Revising Your Mystery Story
Students edit and improve their short stories by examining character description, dialogue, and plot elements. In peer editing groups they correct gramatical and spelling errors. they read aloud their new story drafts.
Curated OER
Get a Clue: What is There and What Isn't
Students practice the ability to examine and analyze evidence and extract information that eventually leads to deductive conclusions. After evaluating the objects discovered in a box, students write a one-page reflection paper of their...
Curated OER
Who Stole My Salad?
Eighth graders explain how protein is made in the cell. In this biology lesson, 8th graders translate RNA and DNA using an internet database. They determine the thief based on evidence collected.
US Department of Justice
U.s. Department of Justice: Computer Crime and Intellectual Property Section
Discover information about computer crime, intellectual property, electronic evidence and other high-tech legal issues. Explore documents, reports, white papers, manuals, etc.
Other
National Conference of State Legislatures: Computer Crime Statutes
This resource contains a listing by state of laws concerning computer hacking and unauthorized access.
Department of Defense
Do Dea: Spreadsheet Software Applications: M1: L1: Computer Essentials
In Module 1 Lesson 1 of this course, students are introduced to the basic functions of computer system components, to some technical vocabulary, and they will learn about computer security, privacy, and crimes. They will also learn how...
Indiana University
The Case of the Missing Computer Chip
Have your teams of students solve the simulated crime scene using clues presented in this thorough forensic lesson plan.
Other
International High Technology Crime Investigation Association
This site is devoted to high technology crime investigations and contains training and seminars as well as a variety of resources.
Other
Streetlaw: Criminal Law and Juvenile Justice
The chapters of this unit on criminal law and juvenile justice are as follows: "Crime in America," "Introduction to Criminal Law," "Crimes Against the Person," "Crimes Against Property," "Defenses," and "The Criminal Justice Process: The...
NC State University
North Carolina State University: Ethics in Computing
This site contains a repository of information about a variety of computer ethics topics.
Common Sense Media
Common Sense Media: Cyber Smart! Student Curriculum Lesson: Can You Hack It? [Pdf]
Learners learn that computers and electronic files are property and explore the reasons for, consequences, and ethics of teen hacking. This ISTE-aligned lesson plan for Grades 6-8 includes student activity and Home Connection sheets....
Get Safe Online
Get Safe Online: Videos
There are many security threats today associated with internet use. This site presents some online videos that discuss security issues such as online rip-off schemes, protecting privacy, and protecting your computer from online attacks.
Other
Dfrws (Digital Forensic Research Workshop)
This site provides a variety of resources and information about digital forensics.
Other
National Cyber Forensics & Training Alliance
This site contains information about advanced training, security awareness in an effort to reduce cyber vulnerability, forensic and predictive analysis and lab analysis.
Other
Anonymity and Privacy on the Internet
A site that gives information on how to be anonymous and how to secure communications and files on the internet.
TED Talks
Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
New York Times
New York Times: India's Call Center Talents Put to a Criminal Use: Swindling Americans
[Free Registration/Login Required] The availability of computer-savvy, young, English-speaking job seekers and efficient technology have contributed to the growth in cyber fraud against Americans.
Other
Symantec: Steganography Revealed
This article provides an overview of steganography as well as steganographic tools and techniques.
Get Safe Online
Get Safe Online: What Are the Risks?
There are many ways for online criminals to take advantage of internet users. They may invade your privacy, steal your identity, rob you of your wealth, and infect your computer. This site provides links to information that can be used...
Other
Safe teens.com: Online Safety Project
Find information on the internet as well as guidelines to follow in order to make surfing a fun and safe experience. The site also provides a link for parents to help them with children that will be using the internet.
Other
Department of Homeland Security: Protect Myself From Cyber Attacks
Use these steps to help devise a solution to counter a cyber attack.