
Phish Busters: Game Design Teaching Phishing Awareness
Inquiry Framework
Question Framework
Driving Question
The overarching question that guides the entire project.How can we create an engaging and educational game to help our peers understand the dangers of phishing scams and learn how to protect themselves against identity theft?Essential Questions
Supporting questions that break down major concepts.- What are phishing scams and why are they harmful?
- How can we identify the signs of a phishing scam?
- What strategies can be used to avoid phishing scams and protect personal information?
- How does identity theft occur, and what can be done to prevent it?
- Why is it important to educate others about phishing scams and identity theft?
- How can games be used as an educational tool to teach about technology-related issues?
Standards & Learning Goals
Learning Goals
By the end of this project, students will be able to:- Understand the concept of phishing scams and why they are harmful.
- Identify different signs of phishing scams.
- Develop strategies to avoid phishing scams and protect personal identity information.
- Explain how identity theft occurs and how it can be prevented.
- Design an educational game to teach peers about phishing and identity theft.
- Demonstrate the ability to use technology tools to communicate information on cybersecurity.
ISTE Standards for Students
International Technology and Engineering Educators Association
Computer Science Teachers Association (CSTA) Standards
Entry Events
Events that will be used to introduce the project to studentsEscape Room Adventure: Phishing Edition
Transform the classroom into an escape room with puzzles related to phishing scenarios. As students solve each puzzle, they uncover tips and strategies to avoid scams, which mirrors the mechanics of the game they are to create, making learning both immersive and applicable.Portfolio Activities
Portfolio Activities
These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.Phishing Protection Strategy Builder
Students will explore strategies to avoid phishing scams and protect their personal information, ultimately developing a comprehensive guide that will be used in their game.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA detailed phishing protection strategy guide or infographic.Alignment
How this activity aligns with the learning objectives & standardsAligns with CSTA.2B-NI-05 by addressing threats such as phishing and providing strategies to mitigate them.Rubric & Reflection
Portfolio Rubric
Grading criteria for assessing the overall project portfolioPhishing Protection Strategy Rubric
Understanding of Phishing Scams
This category evaluates the student's grasp of phishing concepts and the ability to articulate why they are harmful.Definition and Explanation
Evaluates how well students define phishing scams and explain their harmful impact.
Exemplary
4 PointsProvides a thorough and clear definition of phishing scams and a comprehensive explanation of their harmful impacts, with relevant examples.
Proficient
3 PointsProvides a clear definition of phishing scams and explains their harmful impacts, with some examples.
Developing
2 PointsProvides a basic definition of phishing scams and a limited explanation of their harmful impacts, with few examples.
Beginning
1 PointsStruggles to define phishing scams and provide any clear explanation of their harmful impacts.
Identification of Signs
Assesses the ability to identify and describe signs of phishing scams.
Exemplary
4 PointsIdentifies and describes multiple signs of phishing scams with clarity and detail.
Proficient
3 PointsIdentifies and describes several signs of phishing scams adequately.
Developing
2 PointsIdentifies some signs of phishing scams with minimal detail.
Beginning
1 PointsStruggles to identify signs of phishing scams.
Development of Strategies
This category assesses the students' ability to develop effective strategies for avoiding phishing scams and protecting personal information.Strategy Effectiveness
Evaluates the practicality and effectiveness of proposed strategies for avoiding phishing scams.
Exemplary
4 PointsProposes innovative and highly effective strategies that demonstrate deep understanding of phishing scam avoidance.
Proficient
3 PointsProposes effective strategies that are appropriate for phishing scam avoidance.
Developing
2 PointsProposes some strategies, but they are partially effective.
Beginning
1 PointsProposes strategies that are generally ineffective or inappropriate.
Clarity and Detail
Assesses the clarity, detail, and presentation of the strategy guide or infographic.
Exemplary
4 PointsPresents information with exceptional clarity and detail, using visuals effectively to enhance understanding.
Proficient
3 PointsPresents information clearly with sufficient detail, and uses visuals appropriately.
Developing
2 PointsPresents information with some clarity, but lacks detail and visual emphasis.
Beginning
1 PointsPresents information unclearly, with little to no detail or supporting visuals.
Integration of Research and Communication Tools
Evaluates how well students integrate research and use technology tools in creating their guides.Research Integration
Assesses the integration of research findings into the final guide or infographic.
Exemplary
4 PointsIntegrates a wide range of well-researched information seamlessly into the guide or infographic.
Proficient
3 PointsIntegrates sufficient researched information into the guide or infographic effectively.
Developing
2 PointsIntegrates some researched information, but with limited effectiveness.
Beginning
1 PointsStruggles to integrate researched information into the guide or infographic.
Use of Technology Tools
Evaluates the effective use of technology in designing the guide or infographic.
Exemplary
4 PointsUtilizes technology tools creatively and effectively to enhance the design and communication of the guide or infographic.
Proficient
3 PointsUses technology tools effectively to design and communicate the guide or infographic.
Developing
2 PointsUses technology tools with limited effectiveness.
Beginning
1 PointsStruggles to use technology tools effectively in the design process.