The focus on dental care is strong, but since it comes up so often, you could probably highlight it in the introduction so learners know how it is going to be a key part of the course. I would suggest clarifying early on that the course covers both general care and dental health in depth. This would help learners understand how the subtopics are connected from the start.
Clarifying Questions
For the H5P quizzes, when you say âinstant feedbackâ, will the learners just be told whether theyâre correct/incorrect or will they be given explanations for incorrect answers? Doing so would be good to further support learning and understanding of key concepts.
For the formative assessment how will the quizzes be different from the multiple choice quiz. Do the learners have to do a blog post and a quiz for each module or is it just one of them?
Alignment
We found your activities to be well structured and designed in relation to the learning objectives outlined in your chart. Each activity is relevant and clearly builds learners’ knowledge of pet care. Additionally, structuring your learning activities to suit the needs of various learning types (visual, auditory, and kinesthetic) makes your learning resource accessible for all. The interactive aspect of your activities helps promote learner engagement in the resource as well.
I like how each learning outcome is tied to an activity and a resource. I would suggest making sure that each formative and summative assessment clearly maps to a specific learning outcome, so learners can see how they will be evaluated. Also, ensure by double-checking that LO2âs dental health focus is reinforced in both the formative and summative assessment.
Interactivity
The use of H5P quizzes, drag and drop tasks and the care plan template provide a good base for engagement. You might consider adding at-least one scenario based activity where learners make decisions and see the impact because this will encourage application rather than just recall. Additionally, quick, low effort interactive check-points (1-2 question quizzes) could also help with maintaining momentum.
Inclusivity
UDL could be improved by including the ability to print out materials for learners who face technological barriers or prefer to use a paper version for their learning.
Technology Use and Rationale
Could you incorporate a template or theme that is screen reader friendly to accommodate more learners who may require this tool?
Presentation
For the assessment of the learners we think an area of improvement would be adding more detail in the grading criteria aspect. More specifically, adding sample grading criteria, a rubric, or proficiency indicators would further develop your draft.
Citations
Good work, your overview is detailed and goes over a variety of factors contributing to the healthy life of a pet. Your reference to an academic source (Chowdhury, 2023; Martins et al., 2023) further strengthens the need for preventative pet care. However, one of your sources Martins 2023 focuses on health benefits for pet owners. I believe that adding a different source could strengthen your overview. You might consider reviewing the citation format for uniformity. Also, please make sure every visual and video you include is backed by a citation.
1. What kind of interaction would the video require from your students? Does it force them to respond in some way (inherent)?
The video describes what manipulation tactics scammers will use to appeal to people and also lists out real-world examples to familiarize learners with how phishing works. In doing so, it inherently prompts learners to reflect on their own online habits and see if their current habits would make them susceptible to falling for similar phishing attempts. Additionally, by listening to the examples listed in the video, it makes them think “have I ever received a similar message before?” This initiates a personal connection between the video and the learners, and sparks engagement without any explicit prompts.
2. In what way are they likely to respond to the video on their own, e.g., make notes, do an activity, or think about the topic (learner-generated)?
Learners may naturally take notes while watching the video, mentally compare the video’s tips with their prior knowledge, or think back to times when they received suspicious messages. By getting learners to think about their current level of knowledge about phishing, it primes them for active participation later on in the learning resource activities.
3. What activity could you suggest that they do after they have watched the video (designed)? What type of knowledge or skill would that activity help develop? What medium or technology would students use to do the activity?
After watching the video, learners can complete our “Phish or Legit?” activity that asks them to analyze message intent and structure. The activity will incorporates examples from the video as well as our own curated set of messages. In doing so, it reinforces pattern recognition skills, encourages them to apply what they have learned, and promotes self-reflection. The exercise will be completed on our online interactive learning resource which supports immediate practice and reinforcement of new concepts.
4. How would students get feedback on the activity that you set? What medium or technology would they and/or you use for getting and giving feedback on their activity?
Students would get automatic feedback after submitting their answers (correct/incorrect) and would also get written explanations of why each example was or was not phishing. Learners could also share their feedback about the activities in an online discussion forum, which promotes learner to learner learning.
How will your interactive learning resource specifically ensure that the needs of all learners can be met?
Our group designed our interactive learning resource, Phishing and How to Protect Yourself, with inclusivity in mind to ensure that the needs of all learners are met. We recognized that learners have diverse needs, learning styles, and digital literacy levels and structured our activities and assessments accordingly.
In the “Activities and Assessment” part of our learning resource, we designed four learning activities with active learning strategies in mind. For example, “Phish or Legit?” is a timed activity that asks for learners to drag and drop real and simulated phishing emails into “Phish” or “Legit” categories. This activity mimics real inbox scanning and provides experiential learning for both visual and kinesthetic learners. Moreover, the “Credibility Detective” activity supports analytical thinkers by guiding them through a checklist they must then use to evaluate different sources in order to determine their credibility.
We also prioritized differentiated instruction when creating our learning resource. The Stanford Center for Teaching and Learning describes differentiated instruction as “[involving] teaching in a way that meets the different needs and interests of students using varied course content, activities, and assessments.” Our activities are scaffolded and begin with simpler tasks, like identifying red flags, before moving on to more complex tasks like analyzing psychological manipulation tactics and verifying suspicious content. In doing so, we allow learners to build confidence at their own pace before tackling the harder activities. Additionally, the “Tactic Decoder” activity allows learners to work in groups, which may benefit those who struggle with individual tasks or those who learn better with group discussions.
To ensure equity and digital accessibility throughout our learning resource, we incorporated real-life examples that could easily happen to anyone, such as malicious emails being sent to your inbox. Additionally, we tried to use plain language to explain concepts in layman’s terms. In doing so, we reduced the amount of technical jargon used so our learning resource can be easily understood by people of varying educational and technical backgrounds. We also addressed common misconceptions in the beginning (e.g. “phishing only happens through email”) to challenge assumptions and broaden our learners’ awareness.
Finally, our assessment plan uses a mix of formats (MCQ, T/F, scenario-based, and matching) to accommodate different strengths. Furthermore, we developed our scoring system to offer constructive feedback to learners and emphasize clear performance thresholds. By offering these performance thresholds, it encourages learners to continue their progress and identify areas of strength while also recognizing where further review or practice is needed. Our approach supports a growth mindset and empowers learners to view assessment as an opportunity for improvement rather than a final judgement of their digital literacy skills.
With the rise of online scams and phishing attempts, scammers have become more sophisticated with the manipulation tactics they employ to swindle people out of their hard-earned money or steal sensitive information. As such, it is now more important than ever to educate learners about the risks and equip them with the critical thinking skills necessary to protect themselves from these phishing attempts. For my chosen instructional approach, I explored inquiry-based learning and how it can be effectively applied to teaching about phishing and online scams.
Inquiry-based learning comes from the constructivist learning theory and encourages students to explore real-world problems by asking questions and using critical thinking to shape their answers. Instead of passively listening to content, it facilitates active learning by getting learners to interact with the world and explore topics (Weller).
This approach aligns well with the topic of phishing because recognizing online scams requires more than just memorizing warning signs. To be digitally literate and proficient in recognizing scams, one also must know how to critically evaluate messages, links, and sources. In an inquiry-based digital literacy lesson, students might ask questions like “Why do people fall for phishing emails?” or “What makes a scam convincing?” From there, learners could investigate real-world examples of phishing attempts, compare their characteristics, and identify patterns between attempts.
Additionally, an inquiry-based learning lesson on phishing encourages students to take control of their own digital agency. Rather than just being told what a scam looks like, they learn how to recognize suspicious cues through their own exploration. This promotes lasting skills that will help students protect themselves from phishing attempts and online scams for the rest of their lives.
In our interactive learning resource, one of the activities we have planned is to show students a series of legitimate and phishing emails. From there, they will be asked to determine which are scams and why. This activity promotes pattern recognition and self-reflection as the learner has to analyze message intent and structure.
An inquiry-based learning approach empowers learners to think critically, ask questions, and remain skeptical of online content. It encourages active participation in the learning process and helps develop the kind of digital literacy skills needed to protect oneself from online scams.
In Tyler’s blog post, he talks about a learning experience he had in a first year course that he is particularly fond of. He notes that the course’s constructivist design and strong teacher support created a positive and supportive learning experience. I relate to this experience because we’re actually both in the HINF program and I remember taking the exact programming course he’s talking about. I also really enjoyed the design of the course and felt very supported in my learning journey. The constructivist design encourages students to problem-solve with the guidance of the teacher, rather than just passively absorb the information being taught.
Additionally, Tyler mentions how motivation is a key factor in all the good learning experiences he’s had. I heavily relate to this because when I am naturally motivated to learn the concepts in the class, I find myself doing much better not only in terms of my grades but also in how deeply I understand and retain the material. Motivation drives me to engage more actively, ask questions, and seek out additional resources if needed. It also makes the learning process feel more rewarding and less like a chore. I believe that when a course is designed with a student’s intrinsic motivation in mind, it can make a huge difference in how successful and meaningful the learning experience becomes for them.
Melissa Liao, Tyler Termehr, Shweta Nagdev, James Kuzyk
Course Information
Overview
Ever since the internet was first made there has been an arms race between cyber criminals and tech companies for your information. Over the years there are many techniques cyber criminals have used to obtain your personal information. One of the most long standing and effective techniques is phishing. Phishing is when: âattackers attempt to steal the userâs credentials using fake emails or websites or both.â1 The email looks very similar to a source the user trusts or that is credible. The aim is to have people click on a link that incorrectly takes them to the fraudsterâs web page, or to open an attachment that infects their computers. 2 Once in this âfake siteâ people enter valuable passwords or access into their banking accounts or other important data. A phishing attack does not require sophisticated knowledge, so it is relatively easy for criminals to do it. Phishing exploits the fact that the human is the weakest link in well built systems. This is why it is so long standing and ever-present. It is very difficult for a tech company to prevent a human from being tricked. Even though phishing emails can be obvious, it is very different for a tech company to block every single email due to the sheer number of attacks. The best way to combat phishing is to be aware of it, and to know and understand the red flags so that as a user you are able to recognize it.
1. Gupta, B.B., Arachchilage, N.A.G. & Psannis, K.E. (2018) âDefending against phishing attacks: taxonomy of methods, current issues and future directionsâ. Telecommun Syst67, 247â267. https://doi.org/10.1007/s11235-017-0334-z
2. Ferreira A, Teles S (2019) âPersuasion: How phishing emails can influence users and bypass security measuresâ. Int J Hum-Comput St 125: 19â31.
Common Misconceptions
Misconception #1: âScams are easily recognizable and only gullible people fall for phishing attempts.â
Why itâs wrong:
Many people overestimate their ability to spot phishing attempts and believe that scams are obvious or poorly written. Additionally, they believe that only gullible people are susceptible to falling for these scams. However, this is simply not the case as modern phishing tactics are now highly sophisticated, often going as far as imitating legitimate organizations by replicating their logos, language style, and personalized language.
Common Mistakes:
Clicking on malicious links in emails or text messages that appear to be from trusted sources (such as delivery services, banks, workplace)
Ignoring red flags like spelling errors in the messages or incorrect domain name
Misconception #2: âPhishing only happens through email.â
Why itâs wrong:
Phishing can happen in various ways and is not exclusive to emails. SMS phishing (smishing), voice phishing (vishing), and even social media scams are all on the rise. People who only look out for suspicious emails may be vulnerable to phishing attempts on other platforms.
Common Mistakes:
Trusting all messages on platforms like Instagram, WhatsApp, or text messages that ask for personal information or urgently ask you to take immediate action
Believing that verification codes sent by text are always secure
Rationale
Phishing scams are a type of scam where a person is tricked into revealing private and sensitive information to an entity posing as a trustworthy source. Our rationale for choosing this topic is that online scamming is costing Canadians tens of millions of dollars each year (Source) and phishing attacks are becoming more common and complex. The aspect that we find most interesting in this topic is the new ways in which phishing attacks occur. For example, âquishingâ which is phishing using a QR code is a newer type of attack, which leads people who scan the code to a fraudulent website or to download malware. We are also interested in the role that AI will play in these scams, as social engineering is key to phishing, and with AI tools such as voice generation and deepfakes, as well as improved email wording and structure it only becomes easier for scammers to gain trust.
Course Learning Objectives and Outcomes
Big Ideas
Big Idea #1: Keeping yourself safe from online scams requires critical thinking and constant vigilance.
We must always stay cautious as online scams often exploit human behaviour as well, not just technical security flaws. Being secure online means staying alert, questioning messages, and recognizing the different manipulation tactics employed by scammers.
Learning Outcomes:
Learners will be able to analyze the structure and intent behind phishing messages
Learners will be able to identify common psychological tactics used in scams, such as urgency, fear, or authority
Big idea #2: Digital literacy includes the ability to evaluate and verify information online.
Recognizing scams is a key part of digital literacy, and includes being able to evaluate the credibility, origin, and authenticity of information online.
Learning Outcomes:
Learners will be able to evaluate the credibility of emails, messages, and websites using specific criteria (such as domain names/URL structure, sender details, grammar, tone)
Learners will be able to apply strategies to verify suspicious online content (like hovering over links, checking with official sources first, etc.)
Lesson Topics and Format
1. Anatomy of a Phishing Message
Structure of a typical phishing message: Subject line, Sender address, Body, Links
Key red flags to look for: Mismatched URLs, Urgent or threatening tone, Grammatical and spelling errors
Real vs. fake message examples
Include example videos (e.g. Youtube clips showing phishing analysis)
2. Psychological Manipulation in Scams
Common psychological tactics: Urgency, Fear, Authority, Scarcity, Greed
Examples of each tactic in real scam messages
Why these tactics work on the human brain
Real-life scam scenarios or victim testimonials
3. Evaluating Credibility of Online Information
Domain names and URL structure: Differences between legitimate and scam websites (e.g .gov vs .xyz)
Sender or author details: Look at full email address, not just display name
Website and news credibility: Is the organization/publisher well-known and reputable?
Grammar, spelling, and tone: Professional vs. sloppy writing
Design and visual cues: Consistency, branding, and polish vs. poor formatting and broken elements
4. Verification Strategies:
Techniques to actively investigate suspicious content: Hovering over links to view actual URLs, Searching online to cross-check claims or sender identity, Reverse image search (e.g., Google Lens or TinEye), Checking with official sources or contact numbers
5) Consequences of Falling for a Scam
Possible outcomes: Identity theft, Financial loss, Emotional stress and loss of trust
Recovery steps: – Reporting to authorities (e.g., cybercrime unit, bank, email provider) – Freezing accounts or replacing cards – Emotional and support resources
Learning activities that allow learners to explore, experiment and actively engage with the concepts and prepare to be assessed.
Activity 1: Phish or Legit? (Drag and Drop Activity)
Learners are presented with a series of real and simulated emails and messages. For each, they must drag and drop the message into either âPhishâ or âLegitâ categories. Learners have to decide within 15â30 seconds to simulate real inbox skimming.
Follow-up Prompts-
What red flags tipped you off about this message?
Did anything make you second-guess your decision?
Objective: allows pattern recognition, self-reflection. The learner has to analyze message intent and structure.
Activity 2: Tactic Decoder
In small groups, learners will receive flashcards with scam messages and psychological tactics (urgency, fear).
In their groups, they have to match each scam message to the primary psychological tactic it uses. They need to justify their reasoning and also define how these psychological tactics impact the human brain.
Extension activity- Groups vote on the most manipulative message and explain why.
Activity 3: Credibility Detective
In pairs, learners are given 2 website links and 2 suspicious online visuals (e.g. viral social media posts, doctored images, or clickbait headlines).
Use an advanced credibility checklist to evaluate each source across multiple dimensions:
URL/domain structure and origin
Author/sender transparency
Language style, bias, and emotional tone
Visual and design cues, including image manipulation
Presence or absence of verifiable contact or source information
Task: For each item, assign a credibility rating from 1 (highly suspicious) to 5 (highly credible) but you must defend your score using at least three pieces of evidence from the content itself.
Activity 4: Fact or Fraud?
A relay-style challenge where teams of 4 race to verify whether certain content is real or fake. Prompts could include:
A viral message about a security breach
A suspicious-looking promotional deal
A shocking news headlines
Tools allowed: Google, official websites, âhover overâ techniques, fact-checking sites. Scoring: Fastest accurate team wins; bonus points for citing official sources.
Assessment Plan
Phishing and Online Scam Assessment Plan:
Format: 12 MCQ, T/F, matching, scenario-based questions on phishing and online scam scenarios (Google form)
Time allotted: 30 mins
Purpose: To assess learnersâ understanding of various phishing techniques, psychological manipulation tactics, credibility evaluation, and verification strategies.
Learning Outcomes Assessed:
Analyze the structure and techniques used in phishing messages
Identify psychological manipulation tactics (such as fear, urgency, etc.)
Evaluate the credibility of online content using specific criteria
Apply verification strategies to investigate suspicious content
Consists of 1 mcq,1 t/f, and 1 scenario-based question to test proficiency in learning outcome 1
Section II: Psychological Tactics in Phishing (3 questions)
Consists of 1 mcq,1 t/f, and 1 matching question to test proficiency in learning outcome 2
Section III: Evaluating Credibility (3 questions)
Consists of 1 mcq,1 t/f, and 1 scenario-based question to test proficiency in learning outcome 3
Section IV: Verification Techniques (3 questions)
Consists of 1 mcq,1 t/f, and 1 scenario-based question to test proficiency in learning outcome 4
Scoring and Feedback:
For each question answered correctly, learners will be awarded 1 point, for a maximum of 14 possible points awarded. Learners will be assessed for proficiency based on the following thresholds:Â
12-14: Strong digital literacy
9-11: Satisfactory with room for improvement, needs attention
<9: Recommend revisiting learning activities and revising key concepts
How would the learning be designed differently by a behaviorist, a cognitivist, and a constructivist? Scenario: A high school social study teacher is planning a class on climate change.
Behaviorist
If a behaviorist were to instruct a high school teacher on how to plan a class on climate change, they would urge the teacher to focus on observable performance and utilize different stimuli to shape learning. Behaviorists believe that “learning is accomplished when a proper response is demonstrated following the presentation of a specific environmental stimulus” (Ertmer and Newby). The learner responds to environmental conditions rather than actively exploring or engaging with them.
When designing the learning plan, the teacher should first evaluate learners to decide how to start their instruction and which reinforcers will be most effective for them. From there, the learner should be clearly shown the desired response and what conditions must be present for the response to occur. The instruction should be centered around presenting the target response and then giving the learner opportunities to practice the response. Additionally, the instruction should make use of cues in order to prompt the delivery of the response, and pair that with reinforcement for the correct responses.
Key Points for a Behaviorist Instruction Design Plan on Climate Change:
clear delivery of structured content, like through lectures or videos
use different stimuli like quizzes, flashcards, or MCQ tests to give learners the chance to practice the correct response
provide immediate feedback to reinforce correct behavior and correct errors early on
The goal of this learning design plan is to condition students to remember key facts and repeat the desired responses.
Cognitivist
If a cognitivist were to instruct a high school teacher on how to plan a class on climate change, they would urge the teacher to promote mental processing in areas like thinking and problem solving in their lesson plan. Similarly to behaviorism, cognitivism also stresses the importance of “practice with corrective feedback” (Ertmer and Newby). Most importantly, the cognitivist would emphasize teaching learners how to meaningfully organize and relate new information with their existing knowledge of topics.
Key Points for a Cognitivist Instruction Design Plan on Climate Change:
use different cognitive strategies, like framing, outlining, mnemonics, and concept mapping to help students structure their knowledge
emphasize schemas to help students integrate new information into what they already know
design learning environments that recognize and accommodate each learner’s unique experiences, which affects their learning outcomes
The goal of this learning design plan is to help students build and organize their mental structures to enhance their understanding and retention of the material.
Constructivist
If a constructivist were to instruct a high school teacher on how to plan a class on climate change, they would urge the teacher generate a learning plan that “equates learning with creating meaning from experience” (Ertmer and Newby). Rather than focusing on transferring facts to a learner, constructivist instruction encourages the application of concepts to solve real-world problems. Learning is seen as an active process in which students construct knowledge through inquiry and collaboration with their peers.
Key Points for a Constructivist Instruction Design Plan on Climate Change:
design a project-based learning activity, like having students design a climate action plan for their school
use group work, debates, or role-playing to highlight different perspectives
encourage students to ask questions, investigate, and draw conclusions from their findings
The goal of this learning design plan is to promote deep, meaningful learning by getting students to work together through real-life experiences.
Works Cited
Ertmer, P. A., & Newby, T. (2018). Behaviorism, Cognitivism, Constructivism: Comparing Critical Features From an Instructional Design Perspective. Foundations of Learning and Instructional Design Technology: Historical Roots and Current Trends. https://edtechbooks.org/lidtfoundations/behaviorism_cognitivism_constructivism
Recent Comments