Documente Academic
Documente Profesional
Documente Cultură
Ford
Erin Allen EDUC 5311
12th Grade Career Development II
Lesson Cycle
Concept: Recognizing methods of identity theft & proactive/reactive measures for better security
(6) The student recognizes the dangers of identity theft. The student is expected to:
Materials: Graphic organizer, PowerPoint presentation, Internet access, post-it notes, pens/markers, timer,
library catalog database
Write objective on the board as a hint to todays Read todays objective while classroom
career development lesson. Have a student read listens to student and teachers instruction
aloud to the class todays objective. following. Receive blank post-its and begin
the ID game (instructions under The
ID Game (5 minutes max.) teacher will column).
Question: How did it make you feel not Students will return to their seats. Have
being able to figure out who you were? students take out notes from previous
lesson unit on resumes, tax documents (W-
Possible answers: frustrated, unsure of their 4s, W4s, 1099s, etc.), and take notes.
person, etc. Students will understand how this personal
information ties in to TEKS 127.14 (c) (6)
Possible question: How did this game relate to (A) and how we can best protect ourselves
identity theft? into developing their careers.
Teacher Input:
Pass out graphic organizer. Have students, in Use a blank graphic organizer to complete
their own words, define identity theft on the by end of lesson.
graphic organizer. Open PowerPoint titled
Identity Theft 2017. Notes and possible Define identity theft on the first line of
questions are available on each slide if needed the graphic organizer.
(refer to notes section below each slide). This
discussion will continue for 10 minutes On slide #2: TSW write the official
(approx. 1 min per slide), having the students definition of identity theft on the second
engaging with questions and polls/stats. line graphic organizer.
12th Grade Career Development II Dr. Ford
Erin Allen EDUC 5311
Take notes on the numerous methods that
Slide #2: Have students write the official criminals may use to steal ones identity,
definition of identity theft on the second and TSW engage by asking questions or
blank line. providing answers to teacher or other
student questions.
Identity theft is defined as the fraudulent
acquisition and use of a person's private
identifying information, usually for financial
gain.
Guided Practice:
Guide students through red flags often seen in Take notes during teachers guided practice
phishing e-mails, highlighting those red flags on the phishing method commonly used by
(Guided Practice: slide #12-14 on Identity Theft criminals online. Since education is key in
ppt). By the click of each mouse, I have terms of protecting your online or physical
allowed for an animated circle to highlight the personal identity, this is important with
red flags. Once pointing out a list of red flags identifying/being knowledgeable of the
from previous example, give students a few risks and ways to stay safe.
email examples and have them decide if this is
a legitimate email or not. Be guided through with the teachers
example on utilizing our school database
Using our schools online research database, and online government resources so that
Teacher will model how to find possible
12th Grade Career Development II Dr. Ford
Erin Allen EDUC 5311
solvents for decreasing identity theft relating to they can look up preventative approaches
phishing attacks: for the independent practice.
Independent Practice:
Closure:
Timed Pair Share: With assigned partner, Listen to teacher for instructions on the
students are required to share their thoughts on Timed Pair Share activity.
the questions below, following a 30 second
think time alone. Following the 30-second Based on the information weve learned in
think time, Partner A will share their thoughts this lesson about identity theft and
for 30 seconds while Partner B listens. After 30 prevention, the student and their partner
seconds, the partners will switch roles. will share their thoughts on the teachers
closing question(s). As an exit ticket, TSW
Teachers closing question: reiterate what their teammates response
was to teachers closing questions on a
With your partner, discuss why your piece of paper. TSW hand teacher the piece
personal identity is important and name of paper on their way out. Students are
proactive approaches you will use to required to have their name and teammates
better secure your personal information. name on paper.
References:
http://www.iii.org/fact-statistic/identity-theft-and-cybercrime
http://tarleton.edu/library/databases.html