| Lesson Plan |
| Grade: |
Date: 25/02/2026 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand minimising the potential danger of using online gaming including not using real names, not giving out personal or financial data |
Learning Objective/s:
- Describe common risks associated with online gaming such as identity theft, financial fraud, phishing, malware, and cyber‑bullying.
- Explain key safety practices including using pseudonyms, protecting personal details, securing financial information, and enabling two‑factor authentication.
- Apply a safe‑gaming checklist to create a secure gaming profile and adjust privacy settings.
- Evaluate real‑world scenarios and determine appropriate actions like reporting abuse or blocking users.
|
Materials Needed:
- Projector and screen
- Whiteboard and markers
- Printed safe‑gaming checklist handouts
- Internet‑enabled computers or tablets
- Sample gaming profile screenshots
- Kahoot/quiz platform or paper quiz sheets
- Exit‑ticket cards
|
Introduction:
Start with a quick poll: How many students play online games each day? Share a recent headline about a gaming‑related scam to highlight relevance. Explain that today they will learn how to protect their identity and finances while gaming, and they will be assessed by completing a safety checklist and analysing a case study.
|
Lesson Structure:
- Do‑now (5') – Students list any personal information they think they share in online games.
- Mini‑lecture (10') – Present common risks and safety practices using slides.
- Checklist activity (15') – In groups, students complete the printed safe‑gaming checklist for a sample profile.
- Case‑study discussion (10') – Analyse “The Pseudonym Problem” (Emma) and identify what went wrong.
- Practical demo (10') – Show how to set a pseudonym, adjust privacy settings, and enable 2FA on a mock account.
- Quick quiz (5') – Kahoot or paper quiz to verify understanding of key concepts.
- Exit ticket (5') – Each student writes one personal action they will implement for safer gaming.
|
Conclusion:
Recap the main safety steps: use a pseudonym, keep personal and financial data private, secure accounts, and only download from trusted sources. Collect exit tickets to gauge individual commitments. For homework, students will create or revise their own gaming profile on a device, applying the checklist and documenting the changes.
|