Creative Constructor
Lab Virtual
Leadership Exchange
at ISTELive 21
Edtech Advocacy &
Policy Summit

Hackers in the World

Participate and share

Participate and share : Poster

Sunday, June 23, 7:00–8:30 pm
Location: Posters: Level 4, Terrace Ballroom Lobby, Table 18

Mehek Ahuja Vij   Rebeca Blanco Villamil   Laura Carazo Ureña   Ana Sofia Mena Álvarez   Alejandra Sancho Martín   Ivonne Velasco  
Learn about a lesson where we research which countries are most and least vulnerable to hacking and examine how they can avoid attacks. Then we explain how to prevent hacker attacks on our computers.

Audience: Teachers, Teacher education/higher ed faculty, Technology coordinators/facilitators
Skill level: Beginner
Attendee devices: Devices not needed
Participant accounts, software and other materials: none
Focus: Digital age teaching & learning
Topic: Digital citizenship
Grade level: 6-8
Subject area: Social studies, Computer science
ISTE Standards: For Students:
Digital Citizen
  • Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
  • Students demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
Knowledge Constructor
  • Students evaluate the accuracy, perspective, credibility and relevance of information, media, data or other resources.
Additional detail: Student presentation

Proposal summary

Purpose & objective

The word hacker in recent years has been constantly pronounced and the consequences that the activity of these people has left in the world is shocking. The objective of this project is to investigate which are the countries in the world which is more attacked by hackers, to whom these attacks are directed, because they attack those countries and because they do not attack other countries in the world. What to do to prevent being hacked and what are the countries in the world that have more protection against these types of activities.
The students investigated in digital and non-digital media, interviewed specialists in the field and people who know how to perform this type of activity, conclude the research presenting statistics of the attacks of hackers in the world using Google Drive, Word and Excel, propose alternatives of prevention of attacks using the social networks in diverse languages for knowledge of the whole world, use Google Chrome to translate the investigation.

Supporting research

-Lakhani, K. R., & Wolf, R. G. (2003). Why hackers do what they do: Understanding motivation and effort in free/open source software projects.
-McClure, S., Scambray, J., Kurtz, G., & Kurtz. (2009). Hacking exposed: network security secrets and solutions.
-Himanen, P. (2002). La ética del hacker y el espíritu de la era de la información.
-Jurgenson, J. L. A. G., & Luis, J. (2003). Cómo hacer investigación cualitativa: fundamentos y metodología. México: Paidós.

More [+]


Mehek Ahuja Vij, Instituto Rosedal Lomas
Rebeca Blanco Villamil, Instituto Rosedal Lomas
Laura Carazo Ureña, Instituto Rosedal Lomas
Ana Sofia Mena Álvarez, Instituto Rosedal Lomas
Alejandra Sancho Martín, Instituto Rosedal Lomas
Ivonne Velasco, Cumbres International School Lomas

She graduated with honors from the National Autonomous University of Mexico in the degree of Pedagogy and holds a master´s degree in education from the Inter-American University for Development with the specialty of technology applied to education. She has taught technology classes from preschool to high school, robotics in lower, middle and high school, courses and workshops to adults in schools, companies and at the Tecnológico de Monterrey campus in Mexico City.

People also viewed

Creativity, the Thread of the 5 C's
ISTE19 Hackathon
Transforming Students from Passengers to Drivers with Mastery-Based Learning