Digital Literacy, Online Safety and Ethics
KS3CO-KS34-D003
Being responsible, competent and creative users of information and communication technology; understanding the implications of technology for individuals and society; using technology safely, respectfully and responsibly.
National Curriculum context
Digital literacy at KS3 and KS4 encompasses both practical competence with digital tools and critical understanding of the social, ethical and safety implications of digital technology. Pupils are expected to use technology creatively and responsibly to create digital artefacts of real value, selecting appropriate tools for specific purposes. Online safety at this stage addresses more sophisticated threats and issues: identity fraud, manipulation, extremist content, digital rights and privacy. The ethical dimensions of computing - the impact of algorithmic decision-making, data surveillance, automation and artificial intelligence on individuals and society - become increasingly important and contested topics that pupils need conceptual tools to engage with. Responsible digital citizenship involves both protecting oneself and contributing positively to digital communities.
1
Concepts
1
Clusters
1
Prerequisites
1
With difficulty levels
Lesson Clusters
Evaluate the social and ethical impact of computing technology
practice CuratedEthics, privacy and the social impact of computing is the sole concept in this domain at KS3/4. It covers both the practical digital literacy skills and the deeper ethical analysis of algorithmic decision-making, surveillance and AI that characterise computing citizenship at secondary level.
Teaching Suggestions (3)
Study units and activities that deliver concepts in this domain.
Cyber Security and Online Safety
Computing Discussion and DebatePedagogical rationale
KS3 online safety escalates from KS2's personal safety focus to understanding the technical and social dimensions of cyber security. Pupils learn how attacks work (phishing, social engineering, malware, SQL injection at a conceptual level), why passwords are important (hashing, brute force), and how organisations protect data (encryption, firewalls, access control). Understanding the attack surface makes pupils more effective at protecting themselves and prepares for GCSE content on ethical hacking and network security.
Ethics of AI and Digital Technology
Computing Discussion and DebatePedagogical rationale
Artificial intelligence, algorithmic bias, surveillance capitalism, and automation are the defining ethical challenges of contemporary computing. KS3 pupils need conceptual tools to critically evaluate these technologies rather than passively consuming them. Case studies (facial recognition bias, social media algorithms, autonomous vehicles, deepfakes) develop ethical reasoning skills. Connecting to Citizenship (rights, law, democracy) and RS (ethics, moral reasoning) creates genuinely cross-curricular learning.
Web Development: HTML, CSS and JavaScript
Computing Practical ApplicationPedagogical rationale
Web development fulfils the NC requirement for a second programming language and produces a visible, shareable outcome. HTML (structure), CSS (presentation), and JavaScript (behaviour) demonstrate separation of concerns -- a fundamental software engineering principle. Building a multi-page website with interactive elements (form validation, image galleries, responsive layout) requires all three languages working together. Every website pupils use daily is built with these technologies, making the learning immediately relevant.
Prerequisites
Concepts from other domains that pupils should know before this domain.
Concepts (1)
Ethics, Privacy and the Social Impact of Computing
knowledge AI DirectCO-KS34-C004
Computing technologies are transforming society in profound ways, creating new opportunities and new risks. Algorithmic decision-making - using programs to make or assist decisions about credit, employment, criminal sentencing, medical diagnosis - raises questions about fairness, transparency and accountability when algorithms encode or amplify biases. Mass surveillance enabled by digital data collection challenges privacy and civil liberties. Automation threatens some forms of employment while creating others. Artificial intelligence raises questions about responsibility, creativity and the nature of intelligence. At KS3 and KS4, pupils develop the conceptual tools to engage with these ethical and social dimensions of computing as informed citizens.
Teaching guidance
Use real-world case studies to anchor abstract ethical discussions: algorithmic bias in hiring tools, facial recognition errors, data breaches. Teach pupils to identify stakeholders in technology systems and whose interests may be served or harmed. Develop vocabulary for ethical analysis: fairness, accountability, transparency, consent, privacy. Explore both the benefits and the risks of AI, social media and surveillance technologies. Connect to legal frameworks: GDPR, computer misuse legislation, intellectual property. Encourage pupils to evaluate technology critically rather than accepting or rejecting it wholesale.
Common misconceptions
Pupils may assume that algorithms are neutral because they are mathematical. The data used to train machine learning models reflects historical human decisions and can encode and amplify historical biases. The idea that privacy is only a concern for people with 'something to hide' is common but misguided; developing nuanced understanding of privacy as a social good prevents this. Technology is neither inherently good nor bad; its impacts depend on how it is designed, deployed and governed.
Difficulty levels
Knows that personal information should be kept private online and recognises obvious online risks (e.g., sharing passwords), but does not understand the broader social or ethical dimensions of computing.
Example task
Give two reasons why you should not share your password with friends.
Model response: 1) If a friend knows your password, they could access your accounts and read private messages, change your settings or post things pretending to be you. 2) Even if your friend is trustworthy, they might accidentally reveal the password to someone else, or their own device could be compromised, exposing your password to hackers.
Understands key concepts such as data privacy, digital footprint and intellectual property, and can identify ethical issues in straightforward scenarios involving technology.
Example task
Explain what a 'digital footprint' is and why it matters for your future.
Model response: A digital footprint is the trail of data you leave behind when using the internet: social media posts, comments, photos, search history, website visits, and online purchases. It matters because this data is often permanent and searchable. Employers routinely search candidates' social media before hiring — a post made at age 14 could affect a job application at age 25. Universities, landlords and even potential partners may search your name. Your digital footprint also determines what advertisements and content you are shown, as companies build profiles from your data to target you commercially.
Analyses the social impact of computing technologies including algorithmic bias, surveillance and automation, using structured ethical frameworks to evaluate benefits and harms to different stakeholders.
Example task
An AI system is used to decide which job applicants are invited to interview. Explain how this could be biased and identify who might be harmed.
Model response: The AI system is trained on historical hiring data — data about which candidates were previously selected by human recruiters. If those recruiters had biases (conscious or unconscious) — for example, preferring candidates from certain universities, with certain names, or of certain genders — the AI will learn to replicate those biases, encoding them into its algorithms. The system might systematically disadvantage: women (if the company historically hired mainly men); ethnic minorities (if names associated with certain backgrounds were previously filtered out); people with non-traditional career paths (if the training data only includes conventional backgrounds). The harm is significant: qualified candidates are rejected not because they are unsuitable but because the AI has learned to discriminate. The bias is harder to detect than human bias because the algorithm appears objective — people trust 'the computer said no' more than 'the manager said no'. Stakeholders harmed: rejected candidates (denied opportunities), the company (misses diverse talent), and society (systemic inequality is reinforced and automated at scale).
Evaluates complex ethical dilemmas in computing with nuance, considers multiple perspectives and competing values, proposes governance frameworks, and connects technical decisions to their societal consequences.
Example task
Should governments have the ability to access encrypted messages to prevent terrorism? Argue both sides and state your position with justification.
Model response: For government access: terrorism, child exploitation and organised crime use encrypted messaging to coordinate harmful activities. If law enforcement cannot access these communications even with a court order, serious crimes may go undetected and lives may be lost. Democratic societies already permit surveillance warrants for phone calls and letters — encrypted digital communication should not be exempt from the rule of law. Against government access: creating a 'backdoor' in encryption that the government can access fundamentally weakens the encryption for everyone. Security researchers have consistently demonstrated that any backdoor intended for government use can be discovered and exploited by criminals and hostile states. The same weakened encryption would compromise the communications of journalists protecting sources, political dissidents in authoritarian regimes, businesses protecting trade secrets, and ordinary citizens' private conversations. Once a backdoor exists, there is no way to guarantee it is used only by authorised parties. My position: strong encryption without backdoors should be maintained. The security of billions of private communications should not be compromised because a small number of criminals use the same technology. Alternative investigative methods (metadata analysis, undercover operations, device seizure with warrants) can address criminal use without weakening the infrastructure that protects everyone. The history of surveillance powers shows consistent mission creep — powers granted for terrorism are routinely expanded to lesser offences.
Delivery rationale
Computing concept — inherently digital subject with strong tool support.