Online safety: Digital Technologies

Explore content

Digital Technologies

The Australian Curriculum: Digital Technologies can provide students with practical opportunities to develop design thinking skills. When working with and building digital systems, the design thinking process places the user and their safety at the forefront of the design. The subject helps students to become innovative creators of digital solutions, effective users of digital systems, and critical consumers of information conveyed by digital systems. Digital Technologies delivers authentic learning challenges that foster curiosity, confidence, persistence, innovation, creativity, respect and cooperation. These qualities, supported by appropriate online behaviour, enrich the development of information systems to make sense of complex ideas and relationships.

Digital Technologies requires the communication and the collaboration of local, regional and global citizens who are capable of actively and ethically communicating and collaborating.  Online safety awareness assists students to identify risks, social contexts and legal responsibilities when engaging online. At the same time, Safety by Design principles place the safety and rights of users at the centre of the design, development and deployment of digital technologies. Authentic consultation, typically in groups throughout the design process, encourages students to build empathy, develop respectful relationships and conflict management skills, and ensure that digital solutions are appropriate. The Digital Technologies curriculum is designed for students from Foundation to Year 8. This subject is offered as an elective to students In Years 9 and 10.

Please select the Year Levels to view the content

Content descriptions with elaborations:

Create interactive solutions for sharing ideas and information online, taking into account safety, social contexts and legal responsibilities (ACTDIP043)

  • investigating legal responsibilities of organisations regarding the storage, communication and disposal of personal and organisational data, for example the Australian Privacy Principles as they apply to intellectual property
  • applying techniques to make ethical decisions when faced with dilemmas about security and ownership of data, for example selecting an action that results in the greatest benefit for the most number of people; avoiding the use of photos of deceased persons from Aboriginal and Torres Strait Islander communities

Content descriptions with elaborations:

Plan and manage projects using an iterative and collaborative approach, identifying risks and considering safety and sustainability (ACTDIP044)

  • investigating major causes of threats to data, for example human actions such as losing a storage device, disclosing passwords, theft and fraud

Content descriptions with elaborations:

Create interactive solutions for sharing ideas and information online, taking into account safety, social contexts and legal responsibilities (ACTDIP043)

  • investigating legal responsibilities of organisations regarding the storage, communication and disposal of personal and organisational data, for example the Australian Privacy Principles as they apply to intellectual property
  • applying techniques to make ethical decisions when faced with dilemmas about security and ownership of data, for example selecting an action that results in the greatest benefit for the most number of people; avoiding the use of photos of deceased persons from Aboriginal and Torres Strait Islander communities

Plan and manage projects using an iterative and collaborative approach, identifying risks and considering safety and sustainability (ACTDIP044)

  • investigating major causes of threats to data, for example human actions such as losing a storage device, disclosing passwords, theft and fraud

Content descriptions with elaborations:

Evaluate critically how student solutions and existing information systems and policies, take account of future risks and sustainability and provide opportunities for innovation and enterprise (ACTDIP042)

  • examining the ICT policy for schooling and evaluating the impact on education
  • reviewing the 'terms of use' policies of social media networks and predicting ways in which these can support advocacy of change and protection of individuals and societies
  • reviewing state, national and regional policies and analysing the potential impact of each. Examples of policies include: Australian Government Protective Security policy Framework, the Australian Government ICT Sustainability Plan 2010-2015; the Green Growth policy in Korea and the Korean National Strategy for Sustainable Development

Plan and manage projects using an iterative and collaborative approach, identifying risks and considering safety and sustainability (ACTDIP044)

  • investigating major causes of threats to data, for example human actions such as losing a storage device, disclosing passwords, theft and fraud

Content descriptions with elaborations:

Evaluate critically how student solutions and existing information systems and policies, take account of future risks and sustainability and provide opportunities for innovation and enterprise (ACTDIP042)

  • examining the ICT policy for schooling and evaluating the impact on education
  • reviewing the 'terms of use' policies of social media networks and predicting ways in which these can support advocacy of change and protection of individuals and societies
  • reviewing state, national and regional policies and analysing the potential impact of each. Examples of policies include: Australian Government Protective Security policy Framework, the Australian Government ICT Sustainability Plan 2010-2015; the Green Growth policy in Korea and the Korean National Strategy for Sustainable Development

Create interactive solutions for sharing ideas and information online, taking into account safety, social contexts and legal responsibilities (ACTDIP043)

  • investigating legal responsibilities of organisations regarding the storage, communication and disposal of personal and organisational data, for example the Australian Privacy Principles as they apply to intellectual property
  • applying techniques to make ethical decisions when faced with dilemmas about security and ownership of data, for example selecting an action that results in the greatest benefit for the most number of people; avoiding the use of photos of deceased persons from Aboriginal and Torres Strait Islander communities

Plan and manage projects using an iterative and collaborative approach, identifying risks and considering safety and sustainability (ACTDIP044)

  • investigating major causes of threats to data, for example human actions such as losing a storage device, disclosing passwords, theft and fraud