Digital Literacy, Online Safety and Ethics

KS3

CO-KS34-D003

Being responsible, competent and creative users of information and communication technology; understanding the implications of technology for individuals and society; using technology safely, respectfully and responsibly.

National Curriculum context

Digital literacy at KS3 and KS4 encompasses both practical competence with digital tools and critical understanding of the social, ethical and safety implications of digital technology. Pupils are expected to use technology creatively and responsibly to create digital artefacts of real value, selecting appropriate tools for specific purposes. Online safety at this stage addresses more sophisticated threats and issues: identity fraud, manipulation, extremist content, digital rights and privacy. The ethical dimensions of computing - the impact of algorithmic decision-making, data surveillance, automation and artificial intelligence on individuals and society - become increasingly important and contested topics that pupils need conceptual tools to engage with. Responsible digital citizenship involves both protecting oneself and contributing positively to digital communities.

1

Concepts

1

Clusters

1

Prerequisites

1

With difficulty levels

AI Direct: 1

Lesson Clusters

1

Evaluate the social and ethical impact of computing technology

practice Curated

Ethics, privacy and the social impact of computing is the sole concept in this domain at KS3/4. It covers both the practical digital literacy skills and the deeper ethical analysis of algorithmic decision-making, surveillance and AI that characterise computing citizenship at secondary level.

1 concepts Perspective and Interpretation

Teaching Suggestions (3)

Study units and activities that deliver concepts in this domain.

Cyber Security and Online Safety

Computing Discussion and Debate
Pedagogical rationale

KS3 online safety escalates from KS2's personal safety focus to understanding the technical and social dimensions of cyber security. Pupils learn how attacks work (phishing, social engineering, malware, SQL injection at a conceptual level), why passwords are important (hashing, brute force), and how organisations protect data (encryption, firewalls, access control). Understanding the attack surface makes pupils more effective at protecting themselves and prepares for GCSE content on ethical hacking and network security.

Human Rights: What Are They and Why Do They Matter?

Ethics of AI and Digital Technology

Computing Discussion and Debate
Pedagogical rationale

Artificial intelligence, algorithmic bias, surveillance capitalism, and automation are the defining ethical challenges of contemporary computing. KS3 pupils need conceptual tools to critically evaluate these technologies rather than passively consuming them. Case studies (facial recognition bias, social media algorithms, autonomous vehicles, deepfakes) develop ethical reasoning skills. Connecting to Citizenship (rights, law, democracy) and RS (ethics, moral reasoning) creates genuinely cross-curricular learning.

Persuasive and Argumentative Writing Human Rights: What Are They and Why Do They Matter?

Web Development: HTML, CSS and JavaScript

Computing Practical Application
Pedagogical rationale

Web development fulfils the NC requirement for a second programming language and produces a visible, shareable outcome. HTML (structure), CSS (presentation), and JavaScript (behaviour) demonstrate separation of concerns -- a fundamental software engineering principle. Building a multi-page website with interactive elements (form validation, image galleries, responsive layout) requires all three languages working together. Every website pupils use daily is built with these technologies, making the learning immediately relevant.

Prerequisites

Concepts from other domains that pupils should know before this domain.

Concepts (1)

Ethics, Privacy and the Social Impact of Computing

knowledge AI Direct

CO-KS34-C004

Computing technologies are transforming society in profound ways, creating new opportunities and new risks. Algorithmic decision-making - using programs to make or assist decisions about credit, employment, criminal sentencing, medical diagnosis - raises questions about fairness, transparency and accountability when algorithms encode or amplify biases. Mass surveillance enabled by digital data collection challenges privacy and civil liberties. Automation threatens some forms of employment while creating others. Artificial intelligence raises questions about responsibility, creativity and the nature of intelligence. At KS3 and KS4, pupils develop the conceptual tools to engage with these ethical and social dimensions of computing as informed citizens.

Teaching guidance

Use real-world case studies to anchor abstract ethical discussions: algorithmic bias in hiring tools, facial recognition errors, data breaches. Teach pupils to identify stakeholders in technology systems and whose interests may be served or harmed. Develop vocabulary for ethical analysis: fairness, accountability, transparency, consent, privacy. Explore both the benefits and the risks of AI, social media and surveillance technologies. Connect to legal frameworks: GDPR, computer misuse legislation, intellectual property. Encourage pupils to evaluate technology critically rather than accepting or rejecting it wholesale.

Vocabulary: ethics, privacy, surveillance, algorithm, bias, fairness, transparency, accountability, artificial intelligence, automation, data, consent, right, responsibility, impact
Common misconceptions

Pupils may assume that algorithms are neutral because they are mathematical. The data used to train machine learning models reflects historical human decisions and can encode and amplify historical biases. The idea that privacy is only a concern for people with 'something to hide' is common but misguided; developing nuanced understanding of privacy as a social good prevents this. Technology is neither inherently good nor bad; its impacts depend on how it is designed, deployed and governed.

Difficulty levels

Emerging

Knows that personal information should be kept private online and recognises obvious online risks (e.g., sharing passwords), but does not understand the broader social or ethical dimensions of computing.

Example task

Give two reasons why you should not share your password with friends.

Model response: 1) If a friend knows your password, they could access your accounts and read private messages, change your settings or post things pretending to be you. 2) Even if your friend is trustworthy, they might accidentally reveal the password to someone else, or their own device could be compromised, exposing your password to hackers.

Developing

Understands key concepts such as data privacy, digital footprint and intellectual property, and can identify ethical issues in straightforward scenarios involving technology.

Example task

Explain what a 'digital footprint' is and why it matters for your future.

Model response: A digital footprint is the trail of data you leave behind when using the internet: social media posts, comments, photos, search history, website visits, and online purchases. It matters because this data is often permanent and searchable. Employers routinely search candidates' social media before hiring — a post made at age 14 could affect a job application at age 25. Universities, landlords and even potential partners may search your name. Your digital footprint also determines what advertisements and content you are shown, as companies build profiles from your data to target you commercially.

Secure

Analyses the social impact of computing technologies including algorithmic bias, surveillance and automation, using structured ethical frameworks to evaluate benefits and harms to different stakeholders.

Example task

An AI system is used to decide which job applicants are invited to interview. Explain how this could be biased and identify who might be harmed.

Model response: The AI system is trained on historical hiring data — data about which candidates were previously selected by human recruiters. If those recruiters had biases (conscious or unconscious) — for example, preferring candidates from certain universities, with certain names, or of certain genders — the AI will learn to replicate those biases, encoding them into its algorithms. The system might systematically disadvantage: women (if the company historically hired mainly men); ethnic minorities (if names associated with certain backgrounds were previously filtered out); people with non-traditional career paths (if the training data only includes conventional backgrounds). The harm is significant: qualified candidates are rejected not because they are unsuitable but because the AI has learned to discriminate. The bias is harder to detect than human bias because the algorithm appears objective — people trust 'the computer said no' more than 'the manager said no'. Stakeholders harmed: rejected candidates (denied opportunities), the company (misses diverse talent), and society (systemic inequality is reinforced and automated at scale).

Mastery

Evaluates complex ethical dilemmas in computing with nuance, considers multiple perspectives and competing values, proposes governance frameworks, and connects technical decisions to their societal consequences.

Example task

Should governments have the ability to access encrypted messages to prevent terrorism? Argue both sides and state your position with justification.

Model response: For government access: terrorism, child exploitation and organised crime use encrypted messaging to coordinate harmful activities. If law enforcement cannot access these communications even with a court order, serious crimes may go undetected and lives may be lost. Democratic societies already permit surveillance warrants for phone calls and letters — encrypted digital communication should not be exempt from the rule of law. Against government access: creating a 'backdoor' in encryption that the government can access fundamentally weakens the encryption for everyone. Security researchers have consistently demonstrated that any backdoor intended for government use can be discovered and exploited by criminals and hostile states. The same weakened encryption would compromise the communications of journalists protecting sources, political dissidents in authoritarian regimes, businesses protecting trade secrets, and ordinary citizens' private conversations. Once a backdoor exists, there is no way to guarantee it is used only by authorised parties. My position: strong encryption without backdoors should be maintained. The security of billions of private communications should not be compromised because a small number of criminals use the same technology. Alternative investigative methods (metadata analysis, undercover operations, device seizure with warrants) can address criminal use without weakening the infrastructure that protects everyone. The history of surveillance powers shows consistent mission creep — powers granted for terrorism are routinely expanded to lesser offences.

Delivery rationale

Computing concept — inherently digital subject with strong tool support.