Skip to content

Understanding Digital Citizenship and Online SafetyActivities & Teaching Strategies

Active learning builds lasting digital judgment because students need repeated practice applying abstract rules to real online situations. Role-plays and station tasks move students beyond listening to making choices, which research shows strengthens transfer of knowledge to their own screens.

Primary 6English Language4 activities30 min45 min

Learning Objectives

  1. 1Evaluate the potential risks and benefits of sharing personal information online, citing specific examples of privacy breaches and positive online connections.
  2. 2Analyze strategies for verifying the credibility of online sources, such as identifying biased reporting or fake news indicators.
  3. 3Justify the importance of respectful online communication by comparing constructive dialogue with cyberbullying scenarios.
  4. 4Identify common types of misinformation and disinformation encountered on social media platforms.
  5. 5Demonstrate how to adjust privacy settings on a simulated social media profile to protect personal data.

Want a complete lesson plan with these objectives? Generate a Mission

35 min·Pairs

Role-Play: Online Scenarios

Divide class into pairs to act out scenarios like receiving a suspicious friend request or spotting fake news. One student responds while the partner observes and suggests improvements. Debrief as a class to discuss respectful replies and privacy choices.

Prepare & details

Evaluate the potential risks and benefits of sharing personal information online.

Facilitation Tip: During the role-play, assign clear roles such as the sharer, the bystander, and the moderator to keep scenarios focused and inclusive.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
45 min·Small Groups

Stations Rotation: Source Verification

Set up stations with articles: one fake news, one credible report, one opinion piece, one ad. Groups rotate, use checklists to evaluate credibility, and note evidence. Share findings in a whole-class gallery walk.

Prepare & details

Analyze strategies for verifying the credibility of online sources and news.

Facilitation Tip: For the station rotation, place a timer at each station and require groups to document their verification steps in a shared checklist for accountability.

Setup: Tables/desks arranged in 4-6 distinct stations around room

Materials: Station instruction cards, Different materials per station, Rotation timer

RememberUnderstandApplyAnalyzeSelf-ManagementRelationship Skills
40 min·Small Groups

Formal Debate: Sharing Personal Info

Form teams to debate 'Share or not: posting school photos online.' Provide pros and cons cards. Teams prepare arguments, present, and vote with justifications linked to privacy risks.

Prepare & details

Justify the importance of respectful communication in online interactions.

Facilitation Tip: While designing posters, supply a rubric with three categories: safety message, visual clarity, and audience appeal to guide students' creativity.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
30 min·Small Groups

Campaign Design: Digital Etiquette Posters

In small groups, students design posters showing respectful online communication rules. Include examples of misinformation spotting. Present and critique peers' work for clarity and impact.

Prepare & details

Evaluate the potential risks and benefits of sharing personal information online.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management

Teaching This Topic

Experienced teachers approach this topic by first normalizing mistakes students make online—identity theft, oversharing—so reflection feels safe, not punitive. They balance caution with agency by teaching selective sharing as a skill, not just a rule. Research suggests pairing concrete examples with peer feedback to build empathy and critical habits.

What to Expect

Successful learning looks like students confidently explaining why certain posts or profiles are risky, citing specific privacy features or source checks from the activities. They should also justify respectful responses in discussions and design posters that clearly communicate digital safety messages to peers.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Source Verification Station Rotation, watch for students who assume bright, colorful websites are always reliable.

What to Teach Instead

Have groups compare two articles on the same topic—one bright and one plain—using the verification checklist, then discuss which visual cues misled their initial trust.

Common MisconceptionDuring Role-Play: Online Scenarios, watch for students who believe privacy settings make all data sharing safe.

What to Teach Instead

In the data breach scenario, include a moment where students simulate checking app permissions and see how settings can fail, prompting reflection on long-term risks.

Common MisconceptionDuring Campaign Design: Digital Etiquette Posters, watch for students who think anonymous online comments have no real consequences.

What to Teach Instead

Ask students to include a 'victim's perspective' section in their posters, describing how rudeness might affect someone, using examples from their role-play reflections.

Assessment Ideas

Exit Ticket

After Station Rotation: Source Verification, provide a short online news article and ask students to write two sentences explaining one strategy they would use to check its credibility and one sentence describing a potential risk of sharing the article without verification.

Discussion Prompt

After Role-Play: Online Scenarios, pose the question: 'Imagine a classmate posts a rumor about another student online. What are three specific, respectful ways you could respond to this situation?' Facilitate a class discussion, guiding students to consider different approaches and their potential impact.

Quick Check

After Campaign Design: Digital Etiquette Posters, present students with three different social media profile scenarios. For each, ask them to identify one piece of information that is safe to share publicly and one piece that should be kept private, explaining their reasoning.

Extensions & Scaffolding

  • Challenge early finishers to design a short animated video explaining one privacy setting or verification step for their peers.
  • Scaffolding: Provide sentence starters for the debate, such as 'I agree because...' and 'I disagree because...' to support structured arguments.
  • Deeper: Invite a local cybersecurity professional to review student posters and give feedback on real-world accuracy.

Key Vocabulary

Digital FootprintThe trail of data a person leaves behind when they use the internet, including websites visited, emails sent, and information submitted online.
CyberbullyingThe use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
MisinformationFalse or inaccurate information that is spread, regardless of intent to deceive.
DisinformationFalse information deliberately and strategically spread in order to influence public opinion or obscure the truth.
Privacy SettingsControls offered by online services that allow users to manage who can see their information and how it is used.

Ready to teach Understanding Digital Citizenship and Online Safety?

Generate a full mission with everything you need

Generate a Mission