Close message Due to scheduled maintenance on Friday 19th April 2024 between 7:00PM and 9:00PM AEST, the Scootle website may face disruption in service. We apologise for any inconvenience caused.

Search results

Listed under:  Society  >  Citizenship  >  Law  >  Crime  >  Crime prevention  >  Security  >  Data security
Listed under:  Technologies  >  Information and communication technologies  >  Data storage  >  Data security
Online

Filter bubbles, bias, rabbit holes and nudging

This lesson focuses on the AI systems that recommend content in various applications that students use on a day-to-day basis. It draws on students’ ethical understandings during analysis of these systems. This lesson was developed by the Digital Technologies Institute in collaboration with the Digital Technologies Hub.

Assessment

Network infographic

Throughout the lesson sequence, students keep and maintain a reflection log with key content to inform the development of an infographic.

Text

Newsletter – July 2019

This newsletter from the Digital Technologies in Focus project includes information about an On Country staff development day with Leonara District High School, cybersecurity, the Australian Curriculum, and useful resources.

Text

Exploring digital systems unplugged: networks: years 5-6

This PDF provides activities in which students identify features of digital systems, and create models to demonstrate their operations. Students are encouraged to demonstrate their understanding of Domain Name Servers (DNS), routing, and transmission control and internet protocols (TCP/IP).

Downloadable

Questacon Cyber Castle Challenge

Embark on an exhilarating virtual adventure that will ignite young minds and equip them for the digital frontier. The Questacon Cyber Castle Challenge is a FREE Minecraft: Education game and resources to engage students in cyber security concepts and skills of the future.

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...