
Email Detective: Spotting Phishing Scams
Inquiry Framework
Question Framework
Driving Question
The overarching question that guides the entire project.How can we, as digital detectives, identify and protect ourselves from phishing threats in the digital world?Essential Questions
Supporting questions that break down major concepts.- What are the common characteristics of phishing emails?
- How can identifying phishing clues help protect personal information?
- What strategies can be used to verify the authenticity of an email?
- Why is it important to critically analyze digital communications?
- How does phishing impact individuals and organizations?
Standards & Learning Goals
Learning Goals
By the end of this project, students will be able to:- Students will learn to identify key characteristics of phishing emails.
- Students will develop skills to critically analyze digital communications.
- Students will understand the importance of protecting personal information online.
- Students will practice strategies to verify the authenticity of emails.
- Students will explore the impact of phishing on individuals and organizations.
ISTE Standards for Students
Common Core Standards English Language Arts
Entry Events
Events that will be used to introduce the project to studentsThe Mysterious Email Challenge
Students receive a mysterious email hinting at a secret code that unlocks a special event or prize. To uncover the code, they must collaborate to distinguish the phishing clues from authentic elements within the email. This scenario taps into students' natural curiosity and problem-solving instincts.Portfolio Activities
Portfolio Activities
These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.Phishing Clue Collector
Students will explore real and phishing emails to identify common phishing elements. This activity introduces students to the subtle art of detecting fraudulent digital communications.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA completed checklist identifying phishing clues found in each email example.Alignment
How this activity aligns with the learning objectives & standardsAligns with ISTE-1.2.b (safe online behavior), ISTE-1.7.b (safe interactions), and CCSS.ELA-LITERACY.RI.6.1 (citing evidence).Credibility Checker
Students will evaluate the credibility of emails by researching and applying critical analysis techniques. This ensures students learn the importance of verifying information in emails.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA report documenting the credibility evaluation of each investigated email.Alignment
How this activity aligns with the learning objectives & standardsAligns with ISTE-1.4.b (managing risks in technology) and CCSS.ELA-LITERACY.RI.6.7 (integrating information).Phishing Impact Explorer
In this activity, students will research and present case studies showing the impact of phishing on individuals and organizations. This step enhances understanding of the real-world implications of phishing.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA presentation on a phishing case study showing its impact and possible prevention strategies.Alignment
How this activity aligns with the learning objectives & standardsSupports ISTE-1.4.b (risk management) and provides real-life context for understanding the effects of phishing.Digital Detective Role-play
Students engage in a role-play activity where they act as digital detectives to apply their knowledge of phishing threats in simulated scenarios.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA group presentation highlighting identified phishing tactics and recommended preventive strategies.Alignment
How this activity aligns with the learning objectives & standardsAligns with ISTE-1.2.b and ISTE-1.7.b by promoting safe technology use and collaborative problem-solving.Rubric & Reflection
Portfolio Rubric
Grading criteria for assessing the overall project portfolioDigital Forensics and Phishing Awareness
Understanding of Phishing Concepts
Assesses students' ability to understand and explain phishing and its characteristics.Identification of Phishing Clues
Measures students' ability to recognize and list common phishing elements in various digital communications.
Exemplary
4 PointsAccurately identifies all phishing clues across a wide variety of examples, demonstrating a deep understanding of phishing techniques.
Proficient
3 PointsCorrectly identifies most phishing clues in provided examples, showing a solid understanding of common phishing tactics.
Developing
2 PointsRecognizes some phishing clues but misses several important ones, indicating an emerging understanding of phishing.
Beginning
1 PointsStruggles to identify phishing clues, showing limited understanding and needing additional guidance.
Explanation of Phishing Impact
Evaluates students' ability to articulate the effects of phishing on individuals and organizations.
Exemplary
4 PointsProvides a comprehensive explanation of phishing impacts, supported by detailed real-world examples and preventive strategies.
Proficient
3 PointsExplains phishing impacts with relevant examples, offering clear preventive strategies in understanding outcomes.
Developing
2 PointsDiscusses phishing impacts with basic examples, identifying some preventive strategies but lacking depth in analysis.
Beginning
1 PointsGives limited explanation of phishing impacts with few examples or preventive strategies, requiring more support.
Skills in Verifying Information
Evaluates ability to verify the authenticity of digital communications using appropriate tools and strategies.Use of Verification Techniques
Assesses proficiency in applying digital tools and resources to evaluate the credibility of email senders and content.
Exemplary
4 PointsSkillfully applies a wide range of verification methods, demonstrating authority in digital literacy and thoroughness in information validation.
Proficient
3 PointsEffectively uses several verification methods to assess digital content authenticity, with consistent accuracy.
Developing
2 PointsApplies some verification methods, but with inconsistent results, indicating developing digital literacy skills.
Beginning
1 PointsStruggles with verification techniques, presenting few accurate validations, and needs substantial guidance.
Presentation and Collaboration Skills
Evaluates communication and teamwork in presenting findings and collaborating effectively in group settings.Quality of Presentation
Assesses clarity, organization, and engagement in presenting case study findings and phishing strategies.
Exemplary
4 PointsDelivers clear, well-organized, and engaging presentations with effective use of multimedia and eloquent delivery.
Proficient
3 PointsPresents information clearly and logically, engaging the audience with relevant content and satisfactory delivery.
Developing
2 PointsPresents content somewhat clearly, with some organizational or delivery issues that detract from audience engagement.
Beginning
1 PointsDelivers fragmented or unclear presentations, struggling to maintain audience interest and coherence.
Contribution to Group Work
Evaluates teamwork, contribution to group tasks, and supportiveness in collaborative activities.
Exemplary
4 PointsConsistently demonstrates leadership, collaboration, and responsiveness, contributing meaningfully to group goals.
Proficient
3 PointsActively participates and collaborates effectively, showing reliability and cooperation in group tasks.
Developing
2 PointsParticipates in group activities but inconsistently contributes or engages, indicating developing collaboration skills.
Beginning
1 PointsRarely engages in group activities, needing significant guidance to participate and cooperate effectively.