Phish Busters: Game Design Teaching Phishing Awareness
Created byAllison McCrary
1 views0 downloads

Phish Busters: Game Design Teaching Phishing Awareness

Grade 6Technology2 days
The 'Phish Busters: Game Design Teaching Phishing Awareness' project tasks sixth-grade students with creating an engaging educational game that informs peers about the dangers of phishing scams and identity theft. Through researching effective strategies for identifying and avoiding phishing attacks, students develop a comprehensive phishing protection strategy guide. Key activities include an escape room-inspired entry event and the integration of technology tools to enhance communication and design. The project culminates in students reflecting on their learnings and personal strategies for cybersecurity protection.
Phishing ScamsIdentity TheftGame DesignCybersecurity EducationTechnology IntegrationResearch SkillsEducational Games
Want to create your own PBL Recipe?Use our AI-powered tools to design engaging project-based learning experiences for your students.
πŸ“

Inquiry Framework

Question Framework

Driving Question

The overarching question that guides the entire project.How can we create an engaging and educational game to help our peers understand the dangers of phishing scams and learn how to protect themselves against identity theft?

Essential Questions

Supporting questions that break down major concepts.
  • What are phishing scams and why are they harmful?
  • How can we identify the signs of a phishing scam?
  • What strategies can be used to avoid phishing scams and protect personal information?
  • How does identity theft occur, and what can be done to prevent it?
  • Why is it important to educate others about phishing scams and identity theft?
  • How can games be used as an educational tool to teach about technology-related issues?

Standards & Learning Goals

Learning Goals

By the end of this project, students will be able to:
  • Understand the concept of phishing scams and why they are harmful.
  • Identify different signs of phishing scams.
  • Develop strategies to avoid phishing scams and protect personal identity information.
  • Explain how identity theft occurs and how it can be prevented.
  • Design an educational game to teach peers about phishing and identity theft.
  • Demonstrate the ability to use technology tools to communicate information on cybersecurity.

ISTE Standards for Students

ISTE.6.CC.3a
Primary
Students plan and employ effective research strategies to locate information and other resources for their intellectual or creative pursuits.Reason: Students need to research phishing scams and identity theft to create an educational game.
ISTE.6.CC.6a
Primary
Students choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication.Reason: Students need to select appropriate platforms and tools to design and communicate their game.

International Technology and Engineering Educators Association

ITEA.6-8.3
Secondary
Students will develop an understanding of the role of society in the development and use of technology.Reason: Understanding phishing and identity theft involves learning about societal impacts of technology use.

Computer Science Teachers Association (CSTA) Standards

CSTA.2B-NI-05
Primary
Students discuss threats to personal safety and the potential impact of various types of threats on society, including phishing and identity theft.Reason: Directly addresses threats like phishing and identity theft, aligning with project objectives.

Entry Events

Events that will be used to introduce the project to students

Escape Room Adventure: Phishing Edition

Transform the classroom into an escape room with puzzles related to phishing scenarios. As students solve each puzzle, they uncover tips and strategies to avoid scams, which mirrors the mechanics of the game they are to create, making learning both immersive and applicable.
πŸ“š

Portfolio Activities

Portfolio Activities

These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.
Activity 1

Phishing Protection Strategy Builder

Students will explore strategies to avoid phishing scams and protect their personal information, ultimately developing a comprehensive guide that will be used in their game.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research different strategies for identifying and avoiding phishing scams online.
2. Create a list of do's and don'ts for safe online behavior regarding phishing and identity protection.
3. Develop a visual guide or infographic summarizing these strategies.

Final Product

What students will submit as the final product of the activityA detailed phishing protection strategy guide or infographic.

Alignment

How this activity aligns with the learning objectives & standardsAligns with CSTA.2B-NI-05 by addressing threats such as phishing and providing strategies to mitigate them.
πŸ†

Rubric & Reflection

Portfolio Rubric

Grading criteria for assessing the overall project portfolio

Phishing Protection Strategy Rubric

Category 1

Understanding of Phishing Scams

This category evaluates the student's grasp of phishing concepts and the ability to articulate why they are harmful.
Criterion 1

Definition and Explanation

Evaluates how well students define phishing scams and explain their harmful impact.

Exemplary
4 Points

Provides a thorough and clear definition of phishing scams and a comprehensive explanation of their harmful impacts, with relevant examples.

Proficient
3 Points

Provides a clear definition of phishing scams and explains their harmful impacts, with some examples.

Developing
2 Points

Provides a basic definition of phishing scams and a limited explanation of their harmful impacts, with few examples.

Beginning
1 Points

Struggles to define phishing scams and provide any clear explanation of their harmful impacts.

Criterion 2

Identification of Signs

Assesses the ability to identify and describe signs of phishing scams.

Exemplary
4 Points

Identifies and describes multiple signs of phishing scams with clarity and detail.

Proficient
3 Points

Identifies and describes several signs of phishing scams adequately.

Developing
2 Points

Identifies some signs of phishing scams with minimal detail.

Beginning
1 Points

Struggles to identify signs of phishing scams.

Category 2

Development of Strategies

This category assesses the students' ability to develop effective strategies for avoiding phishing scams and protecting personal information.
Criterion 1

Strategy Effectiveness

Evaluates the practicality and effectiveness of proposed strategies for avoiding phishing scams.

Exemplary
4 Points

Proposes innovative and highly effective strategies that demonstrate deep understanding of phishing scam avoidance.

Proficient
3 Points

Proposes effective strategies that are appropriate for phishing scam avoidance.

Developing
2 Points

Proposes some strategies, but they are partially effective.

Beginning
1 Points

Proposes strategies that are generally ineffective or inappropriate.

Criterion 2

Clarity and Detail

Assesses the clarity, detail, and presentation of the strategy guide or infographic.

Exemplary
4 Points

Presents information with exceptional clarity and detail, using visuals effectively to enhance understanding.

Proficient
3 Points

Presents information clearly with sufficient detail, and uses visuals appropriately.

Developing
2 Points

Presents information with some clarity, but lacks detail and visual emphasis.

Beginning
1 Points

Presents information unclearly, with little to no detail or supporting visuals.

Category 3

Integration of Research and Communication Tools

Evaluates how well students integrate research and use technology tools in creating their guides.
Criterion 1

Research Integration

Assesses the integration of research findings into the final guide or infographic.

Exemplary
4 Points

Integrates a wide range of well-researched information seamlessly into the guide or infographic.

Proficient
3 Points

Integrates sufficient researched information into the guide or infographic effectively.

Developing
2 Points

Integrates some researched information, but with limited effectiveness.

Beginning
1 Points

Struggles to integrate researched information into the guide or infographic.

Criterion 2

Use of Technology Tools

Evaluates the effective use of technology in designing the guide or infographic.

Exemplary
4 Points

Utilizes technology tools creatively and effectively to enhance the design and communication of the guide or infographic.

Proficient
3 Points

Uses technology tools effectively to design and communicate the guide or infographic.

Developing
2 Points

Uses technology tools with limited effectiveness.

Beginning
1 Points

Struggles to use technology tools effectively in the design process.

Reflection Prompts

End-of-project reflection questions to get students to think about their learning
Question 1

Reflect on your understanding of phishing scams before and after completing the Phish Busters project. How has your perspective changed?

Text
Required
Question 2

On a scale of 1 to 5, how confident do you feel in identifying phishing scams after participating in this project?

Scale
Required
Question 3

What were the most challenging aspects of designing an educational game about phishing and how did you overcome them?

Text
Optional
Question 4

How important do you think it is to educate others about phishing scams and identity theft?

Multiple choice
Required
Options
Not important
Somewhat important
Important
Very important
Extremely important
Question 5

What strategies will you personally implement to protect yourself from phishing and identity theft online?

Text
Optional