ELA9: Identifying Point of View using Cyber Security

Analysis of the Unreliable Narrator with Cyber Security

Author: Andrew Disney
Grade Level: 9-12
Standard Framework: CCSS ELA
Standards: ELA.9.R.1.3: Analyze the influence of narrator perspective on a text, explaining how the author creates irony or satire. ELA.9.R.1.1: Explain how key elements enhance or add layers of meaning and/or style in a literary text. ELA.9.C.1.4: Write expository texts to explain and analyze information from multiple sources, using a logical organization, varied purposeful transitions, and a tone appropriate to the task.
Materials: None

OVERVIEW

Activity Overview:

Analysis of the Unreliable Narrator with Cyber Security

Meta description

  • Grade Level : 9-12
  • Subject Area: Computer Science, Reading/Language Arts
  • Cybersecurity Concept:
    • Integrity
  • Computer Science Domains:
    • Algorithms and Programming, Impacts of Computing
  • Computer Science Principles:
    • Communicating About Computing
  • Materials:
    • None
  • Considerations:
    • GenCyber 6-Concept “The Hand” Index Finger - Confidentiality (shh!!) Ring Finger - Integrity Thumb - Availability (Thumbs up / Good to go!) Middle - Think Like an Adversary Pinky - Keep it Simple Palm - Defense in Depth

Lesson Plan

Overview

Analysis of the Unreliable Narrator with Cyber Security

PRE/POST-TEST

Analyze the impact of narration in a text and its subsequent meaning. Apply the Cyber Security Concept of “The Hand” to investigate the reliability of narration. Connecting the impact of the narration through the lens of cyber security (use textual evidence and deeper inference). Background information should be provided to students to support a deeper analysis and connections to inferences.

OBJECTIVES

Analyze the impact of narration in a text and its subsequent meaning. Apply the Cyber Security Concept of “The Hand” to investigate the reliability of narration. Connecting the impact of the narration through the lens of cyber security (use textual evidence and deeper inference). Background information should be provided to students to support a deeper analysis and connections to inferences.

CATCH/HOOK

Can we identify and define the narrator of a text utilizing the basic tenets of cyber security.

ACTIVITY INSTRUCTIONS

Class #1: Introduction/Discussion of narration and Cyber Security/GenCyber 6-Concept Class #2: Introduction/Discussion of “An Occurrence at Owl Creek Bridge” Class #3: Introduction/Discussion of “Eve’s Diary” Class #4: Introduction/Discussion of “The Cask of Amontillado” Class #5: Introduction/Discussion of “Circuit City”

ELA9_ Identifying Point of View using Cyber Security - Andrew Disney.pdf

REVIEW

Written Assessment of selected text

STANDARDS

ELA.9.R.1.3: Analyze the influence of narrator perspective on a text, explaining how the author creates irony or satire. ELA.9.R.1.1: Explain how key elements enhance or add layers of meaning and/or style in a literary text. ELA.9.C.1.4: Write expository texts to explain and analyze information from multiple sources, using a logical organization, varied purposeful transitions, and a tone appropriate to the task. FL