SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Cyberbullying &
                 Social-networking




By Dalal Annous 10714044 &
Tiffany Kennedy 10715050
   What is cyberbullying?
    “Cyberbullying is commonly defined as the use of
     information and communication technologies to
     support repeated and deliberate hostile behaviour
     intended to harm others. It is sometimes used as an
     extension to other forms of bullying, and can result in
     the target of bullying experiencing social, psychological
     and academic difficulties ” (Australian Communications
     and Media Authority ACMA, 2011, para.2).
   What is social networking?
    “The use of Web sites or other online technologies to
     communicate with people and share information,
     resources, etc” (Dictionary.com, 2011, para.2).
1. Never share personal information online.
2. Create strong passwords and change them
   regularly.
3. Be careful of what you upload, these will always
   be accessible.
4. Avoid joining any online hate groups,
   inappropriate websites or participate in any
   illegal activities.
5. Don‟t befriend anyone you don‟t know in the
   real world.
6. If you are uncomfortable or find something
   disturbing, always tell an adult immediately.
Class: 6 E Date: May 2, 2011 KLA: COGS- Australian Government & digital citizenship
  Time: 11:30 – 12:30pm
 This lesson is contributing to the following syllabus outcomes:

 -SSS3.8: Explains the structures, roles, responsibilities and decision making
  processes of State and Federal governments and explains why Australians value
  fairness and socially just principles.
 -Digital citizenship when using social networking (Twitter)

 National Educational Technology Standards for Students © 2007

   Source: International Society for Technology in Education
   Communication and Collaboration
    ◦ interact, collaborate, and publish with peers, experts or others employing a
      variety of digital environments and media.
    ◦ communicate information and ideas effectively to multiple audiences using a
      variety of media and formats.
   Digital Citizenship
    ◦ advocate and practice safe, legal, and responsible use of information and
      technology.
    ◦ exhibit leadership for digital citizenship. http://www.iste.org/standards.aspx
   Where is this lesson paced in the learning unit/sequence:
   This lesson will introduce a new element to the unit of work- Australian Government. There is a
    verbal introduction procedure to familiarise the students with the topic, examples and
    demonstrations. The students will be working together as a whole group and also with partners.
   Preparation: Statement of intent: Specific learning outcomes for this lesson:
   The students will:
   Observe, listen and participate.
   Interpret and answer questions individually.
   Support conclusions by explaining or demonstrating how answers were
    obtained.
   Use social networking appropriately and in a positive manner.
   Openly discuss and comment relating to the topic of work and ask any
    questions in regards to the unit of work.
   Develop related vocabulary and online aspects.
   Advocate digital citizenship
   Key teaching approaches for this lesson:
   The teacher will:
   State the purpose and meaning of the lesson.
   Demonstrate the meaning of the lesson by going through the questions
    outlining brief statements about each.
   Allow for expression of thoughts and comments.
   Demonstrate examples of digital citizenship and appropriate online behaviour.
   Acknowledgement of prior learning prerequisite to this lesson:
   The students have however encountered similar activities that are set out for
    them and are familiar with the style of learning that is presented.
   Students are also familiar with verbalising and presenting information to the
    rest of the class, as well as individual work.
   Resources required:                                           Checklist:
    Stimulus/pictures (intro)                                     Computers
    Internet                                                      White board and markers
   Key classroom management considerations:
   Students will be seated at their desks while an explanation of the topic is demonstrated through
    the use of questioning and answering. The teacher will manage and monitor the classroom
    situation and engagement during set activities.
   Presentation:
   Introduction:                                                 Estimated time: 20 minutes
   This lesson consists of COGS and internet safety. After the year 6 camp to Canberra, students are
    asked to use Twitter to comment/blog about the experience, the structures, roles, responsibilities
    and decision making processes of State and Federal governments and why Australians value
    fairness. This is carried out over a series of lessons. However, before the content of the unit of
    work is explored, digital citizenship elements must transpire. By teaching about social networking,
    cyber-safety and digital citizenship will ensure the outcomes of these lessons are successfully
    achieved.
   Development and consolidation sequence:                      Estimated time: 20 minutes
   The teacher provides scenarios of cyber-bullying, negative social networking and the accessibility
    to personal online information. The positive and negatives to the scenarios will be explored.
    Suitable alternatives to these situations will be addressed.
   Culmination:                                                   Estimated time: 5 minutes
   Are students applying digital citizenships to their social networking?
   Are students appropriately addressing the seriousness of cyber-bullying?
   Can the students work well with their partner?
   Are the students familiar with the vocabulary used?
   Was the task enjoyable and appropriate?
   Has learning occurred?
Students will outline the positives and negatives to the following online scenarios:
Scenario 1:
   Ben tells his friend his password for MSN. A week later they have an argument and the ex-friend goes on MSN
    using Ben‟s account. He pretends to be Ben and posts rude and inappropriate comments to Ben‟s family and
    friends. The next day Ben‟s friends don‟t talk to him because they believe it was him on MSN the previous
    night. Ben‟s family are very disappointed and band him from using the computer or internet. What should Ben
    do?
1) How often do you change your password? How often should you change your password?


2) Should you have the same password for every account you have online?


3) What else could happen if you share your passwords with friends?


4) How can you create strong passwords that would be difficult for people to guess?
Scenario 2:
Sally tells her friend Maria personal information about herself through Facebook. The next day at school everyone
    was talking about Sally‟s personal comments she had shared with Maria. Sally confronted Maria and Maria told
    her she accidently copied and pasted their whole conversation to all of their class members. What should Sally
    do?
1) How could this scenario have been avoided?


2) How can Sally resolve this issue?


3) Is Maria a good friend, why?
Students will watch the video below, which is about changing your internet
  password.
http://www.youtube.com/watch?v=aOqkGmZ4p-s

   Lesson 2: Digital citizenship.
   KLA/Topic: English- (talking & listening) and digital citizenship.
   Specific learning outcomes: Students will discuss and identify why
    creating a strong password is important. Students also recognise why
    changing their online password is significant.
   Key teaching approaches: After watching a video clip outlining the
    importance of online passwords, the class will discuss and brainstorm
    advantages and disadvantages of changing passwords on a worksheet
    (slide 10). Class is also going to develop a „wall chart‟ diagram outlining
    the importance of digital citizenship concerning passwords.
   Resources:
   http://www.youtube.com/watch?v=aOqkGmZ4p-s
   large paper for wall chart, textures/pencils (for wall chart) and
                            advantages and disadvantages worksheet.
   Teaching/learning/assessment sequence (include time estimates
    for each step):
   After watching this video the teacher will facilitate a discussion on
    the importance of creating a strong password and changing online
    passwords regularly.
   The students are expected to outline the advantages and
    disadvantages of changing passwords on a worksheet (See next
    slide). The teacher will emphasise how the advantages outweigh the
    disadvantages.
   After completing the worksheet individually, the students will each
    contribute to a wall chart outlining the pros and cons of this topic.
    This will be displayed in the classroom and continually referred to
    at a later point when using social networking.

   Evaluation/follow up:
   This lessons content will be followed up on numerous occasions
    when using social networking sites and computers in general within
    the classroom.
Advantages:   Disadvantages:
    Class: 6 E Date: May 2, 2011 KLA: Human Society and its Environment (HSIE) & digital citizenship Time: 11:30 – 12:30pm
    This lesson is contributing to the following syllabus outcomes:
    - CUS2.4: Describes different viewpoints, ways of living, languages and belief systems in a variety of communities.
    . Gathers information about significant multicultural celebrations in the local community or in other communities
    -Digital citizenship when using Googlesites.
    Where is this lesson paced in the learning unit/sequence:
     This lesson will be used at the end of the unit of work- Australian Identity and Values. It is designed as a consolidation project and
     focuses on a student centered approach, where the teacher’s acts as a facilitator in the learning process. The students will be working
     in groups of four.
    Preparation:
Statement of intent: Specific learning outcomes for this lesson:
The students will:
    Observe, listen and participate.
    Work collaboratively within their group.
    Share the workload equally.
    Use Googlesites appropriately and in a positive manner.
    Openly discuss and comment relating to the topic of work and ask any questions in regards to the unit of work.
    Develop related vocabulary and online aspects.
    Advocate digital citizenship
Key teaching approaches for this lesson:
The teacher will:
    State the purpose and meaning of the lesson.
    Explain what the students are required to do for the project.
    Allow for expression of thoughts and comments.
    Demonstrate examples of digital citizenship and appropriate online behaviour.
Acknowledgement of prior learning prerequisite to this lesson:
    Prior to this lesson, students have been provided with a mini lesson about how to use Googlesites.
    Students have all created a Gmail account.
    As this is the final consolidation, the students are already familiar with most of the multicultural celebrations.
Resources   required:
Computers, Internet, White board and markers
Key   classroom management considerations:
Students will be seated at their desks while an explanation of the topic is demonstrated through the use of
questioning and answering. The teacher will manage and monitor the classroom situation and engagement during
set activities.
Presentation:

Introduction:                                                          Estimated time: 20 minutes
Each student is required sit next to a computer and log into their Gmail accounts. However, before the content of
the lesson is explored, digital citizenship elements must transpire. The teacher presents a previously made
Googlesites they have created. The teacher then illustrates to the students how easy it can be to find their
Googlesites by typing the title of their Googlesites into the Google search engine. Teacher emphasises to students
how they always need be careful with of what they upload; as this will always be accessible as demonstrated (refer
to Appendix 1). By teaching about cyber-safety and digital citizenship this will ensure the outcomes of these
lessons are successfully achieved.
Development     and consolidation sequence:                            Estimated time: 15minutes
The teacher brainstorms ideas about what kinds of things are and are not appropriate to upload online. Teachers
should discuss issues such as displaying personal photos (from their community) and personal information
(community members). Teachers also remind students that they must acknowledge any online information they
use in their project, including images.
Culmination:                                                           Estimated time: 25 minutes
Students
        form into groups of four. Once the students formed their groups they need to add each of their group
members onto Googlesites. Students can then begin working on their project.
The last part of the lesson recognises the following:
Are   students applying digital citizenships when using Googlesites?
Are   students aware about how accessible their work can be?
Can   the students work well with their group members?
Are   the students familiar with the vocabulary used?
Was   the task enjoyable and appropriate?
Has   learning occurred?
http://www.cybersmart.gov.au/kids.aspx
As a continuation of strategy 1. Never share personal information online, there will be a
   mini lesson on ways to avoid joining online hate groups and inappropriate websites.
   This mini lesson will consist of guidelines and warning signs of inappropriate content.
Guidelines:
1. Remove people on your social networking site that join online hate groups.
2. Never join a group that you have not read into and researched about.
3. Do not click on a link or open a webpage which does not have an official website or
   web address.
4. Always ensure your computer has anti-virus software downloaded by an adult. This
   will also indicate whether a website is appropriate or inappropriate.




                                               http://exodians.wordpress.com/2009/08/01/rant-norton-anti-virus-what-is-wrong-with-you/



5. Avoid downloading any programs, music or videos that are not on official
   downloading websites. This can be reviewed by looking at the URL.
   If the website contains a org, edu, gov, are all official sites. Websites that need to be
   dealt with caution end in .com, .net and now .biz, and any personal home pages (such
   as those now ending in .name).
Warning signs of an inappropriate or dangerous
                     website:
                         1.Flashing icons or notices.
                            2.Unwanted pop ups.
                         3.Unknown friend requests.
                          4.Automatic downloading.
                          5.Unknown ending to URL.
                         6.Red cross next to the link.

The teacher will facilitate a discussion about the above guidelines and show examples
of warning signs through images and verbal comments. This content is most useful
for the students when they are using social networking and when they are surfing the
internet at home. The students are more likely to be exposed to inappropriate content
at home than at school. In saying this, the teacher needs to include and educate
parents about online safety as well. This can be achieved by conducting parent
information evenings on cyber-safety.
The teacher will share the scenario below with the class and formulate a discussion
  afterwards.

        Sam regularly uses her grandparents computer. She downloads file sharing
          software and is using her grandparents next door neighbour‟s wireless
         connection to download her favourite tracks. The next time she visits her
    grandparents house, they are very upset, as the neighbours have received a letter
    from their internet company accusing them of illegally downloading music. Sam‟s
       grandparents checked their computer and found over 100 illegal downloads.

   1) What are the risks of using peer to peer, file sharing sites?

   2) Who could be held responsible for this online illegal activity?

    3) What advice would you give people who want to download music from the
    internet?

           Childnet International. (2011). Roleplay scenarios. Retrieved November 11, 2011,
           from http://www.digizen.org/digicentral/roleplayscenarios.aspx
Students watch the video below, outlining the necessity to only
                 befriend people you know in person.

       http://www.netsmartz.org/NSTeens/PostToBePrivate

   Lesson 5: Digital citizenship.
   KLA/Topic: English- (Talking & Listening) and Digital citizenship.

   Specific learning outcomes: Students will discuss the necessity to
    only befriend people you know in person.

   Key teaching approaches: Students will discuss and brainstorm
    the important messages behind the video. The teacher will also
    refer back to previous lessons about changing passwords and
    sharing personal information online.
   Resources: Computer, video and writing equipment.

   Teaching/learning/assessment sequence (include time
    estimates for each step):
    After watching the video, the students form groups of 4
    and discuss the key points outlined. Students are
    expected to outline how this situation can be prevented,
    strategies to handle this scenario and people that the
    victim can turn to. Student highlight the importance of
    telling an adult when they feel unsure or uncomfortable.

   After presenting the answers to these questions the
    students will write their own scenario and questions for
    their peers to answer. After each group finishes their
    scenario, they will swap it with another group.
   Lesson 6: Digital citizenship “Who are people you trust?”

   KLA/Topic: English- (Talking & Listening), PD/H/PE- positive
    relationships & digital citizenship.

 Specific learning outcomes:
  Students will discuss and brainstorm what trust means to them and
  identify who they classify as trustworthy people.
- PD/H/PE outcome: IRS3.11Describes roles and responsibilities in
  developing and maintaining positive relationships.

    Key teaching approaches:
    If students feel unsafe or uncomfortable on the internet, they need to be
    able to turn to a parent, adult or someone older than themselves.
    By connecting this mini lesson on trust with PD/H/PE, it will enable
    students to identify and acknowledge the people around them.
   Resources: Writing material and poster paper.

  Teaching/learning/assessment sequence (include time estimates
   for each step):
After the discussion and brainstorm on trust and trustworthy
   people, students will identify who they trust. These questions will
   be asked:
1. Have I known this person for an extended period of time?

2. Are they related to me?

3. Do my parents know this person?

4. Will this person take the appropriate action if I expressed being
   uncomfortable on the internet?
5. Has this person proven to be trustworthy in the past?



Students will design their own poster on the people they trust and
  outline why they trust these people.
http://cybersmartcurriculum.org/cyberbullying/lessons/68/cyberbullying_crossing_the_line/
   www.decs.sa.gov.au- Cyber safety: Keeping
    children safe in a connected world.
   www.cybersmartcurriculum.org- Cyber
    bullying: Crossing the line (Lesson plans)
   www.slideshare.com- Online professional
    development.
   http://www.cybersmart.gov.au/Schools/Cybers
    afety%20policies%20and%20procedures.aspx-
    Cybersafety policies and procedures by
    Commonwealth of Australia.
   http://www.cybersmart.gov.au/report.aspx
   Australian Communications and Media Authority (ACMA). (2011). Cyberbullying.
    Retrieved November 3, 2011, from
    http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/Cyberbull
    ying.aspx
   Board of Studies. (2006). Syllabus: HSIE. K-6. Retrieved November 8, 2011, from
    http://k6.boardofstudies.nsw.edu.au/files/hsie/k6_hsie_syl.pdf
   Board of Studies. (2006). Syllabus: PD/H/PE. K-6. Retrieved November 8, 2011, from
    http://k6.boardofstudies.nsw.edu.au/files/pdhpe/k6_pdhpe_syl.pdf
   Childnet International. (2011). Role-play scenarios. Retrieved November 11, 2011,
    from http://www.digizen.org/digicentral/roleplay-scenarios.aspx
   Cybersmart. (2011). Cyberbullying. Retrieved 31 October, 2011, from
    http://cybersmartcurriculum.org/cyberbullying/lessons/68/cyberbullying_crossing_t
    he_line/
   Cybersmart. (2011). Kids. Retrieved November 5, 2011, from
    http://www.cybersmart.gov.au/kids.aspx
   Dictionary.com. (2011). Social networking. Retrieved November 3, 2011, from
    http://dictionary.reference.com/browse/social+networking
   Googleprivacy. (2008). Practicing password safely (video). Retrieved November 2,
    2002, from http://www.youtube.com/watch?v=aOqkGmZ4p-s
   NetSmartz. (2010). Posts to be private.. Retrieved November 10, 2011, from
    http://www.netsmartz.org/NSTeens/PostToBePrivate
Thank you for your time. We hope you have enjoyed this
  seminar on Cyber-safety.

 If you have any further questions, queries or would like extra
     information please comment in the provided space below.


             Students have the world at their
             finger tips, we as teachers need to
             educate the students on how to use
             these tools effectively.


                            By Dalal Annous 10714044 &
                            Tiffany Kennedy 10715050

Más contenido relacionado

La actualidad más candente

Admshs emp tech_q1_m1_l2_software application and platforms
Admshs emp tech_q1_m1_l2_software application and platformsAdmshs emp tech_q1_m1_l2_software application and platforms
Admshs emp tech_q1_m1_l2_software application and platformsDexter Dizon
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfLadyCheyenneMontefal
 
Web 2.0 t & l
Web 2.0 t & lWeb 2.0 t & l
Web 2.0 t & lDrJoolz
 
Lessons Learned When Using Virtual Reality with Middle School Students
Lessons Learned When Using Virtual Reality with Middle School StudentsLessons Learned When Using Virtual Reality with Middle School Students
Lessons Learned When Using Virtual Reality with Middle School StudentsEileen O'Connor
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroomguestb1be291
 
The use of ict
The use of ictThe use of ict
The use of ictuzma aslam
 
E learning: concepts, usage and tools
E learning: concepts, usage and toolsE learning: concepts, usage and tools
E learning: concepts, usage and toolsntlinh
 
Article summaries
Article summariesArticle summaries
Article summariesMrsTchr
 
Staff develpment douglas dawson.doc
Staff develpment douglas dawson.docStaff develpment douglas dawson.doc
Staff develpment douglas dawson.docJuanita Chung
 
Inst 523 Final Reflections 12 10-11
Inst 523 Final Reflections 12 10-11Inst 523 Final Reflections 12 10-11
Inst 523 Final Reflections 12 10-11GNBCEC
 
MSSAA web 2.0 presentation
MSSAA web 2.0 presentationMSSAA web 2.0 presentation
MSSAA web 2.0 presentationMaureen Cohen
 
Educ 5103 responses
Educ 5103 responsesEduc 5103 responses
Educ 5103 responsesJade Gillis
 

La actualidad más candente (17)

Final paper
Final paperFinal paper
Final paper
 
Admshs emp tech_q1_m1_l2_software application and platforms
Admshs emp tech_q1_m1_l2_software application and platformsAdmshs emp tech_q1_m1_l2_software application and platforms
Admshs emp tech_q1_m1_l2_software application and platforms
 
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdfSLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
SLM_Emp_Tech_Quarter-3_Week-_1-to-8.pdf
 
Trends-Networks-Module-1- PDF.pdf
Trends-Networks-Module-1- PDF.pdfTrends-Networks-Module-1- PDF.pdf
Trends-Networks-Module-1- PDF.pdf
 
Web 2.0 t & l
Web 2.0 t & lWeb 2.0 t & l
Web 2.0 t & l
 
Lessons Learned When Using Virtual Reality with Middle School Students
Lessons Learned When Using Virtual Reality with Middle School StudentsLessons Learned When Using Virtual Reality with Middle School Students
Lessons Learned When Using Virtual Reality with Middle School Students
 
Web Enhanced Learning
Web Enhanced LearningWeb Enhanced Learning
Web Enhanced Learning
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroom
 
The use of ict
The use of ictThe use of ict
The use of ict
 
E learning: concepts, usage and tools
E learning: concepts, usage and toolsE learning: concepts, usage and tools
E learning: concepts, usage and tools
 
Article summaries
Article summariesArticle summaries
Article summaries
 
Staff develpment douglas dawson.doc
Staff develpment douglas dawson.docStaff develpment douglas dawson.doc
Staff develpment douglas dawson.doc
 
Inst 523 Final Reflections 12 10-11
Inst 523 Final Reflections 12 10-11Inst 523 Final Reflections 12 10-11
Inst 523 Final Reflections 12 10-11
 
MSSAA web 2.0 presentation
MSSAA web 2.0 presentationMSSAA web 2.0 presentation
MSSAA web 2.0 presentation
 
97 2003
97 200397 2003
97 2003
 
Educ 5103 responses
Educ 5103 responsesEduc 5103 responses
Educ 5103 responses
 
E resources
E resourcesE resources
E resources
 

Similar a Cyberbullying & Social Networking Safety

New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentationNausheen Anwar
 
Te lance course-syllabus_digicitz
Te lance course-syllabus_digicitzTe lance course-syllabus_digicitz
Te lance course-syllabus_digicitzterilance
 
Te lance course-syllabus_digicitz
Te lance course-syllabus_digicitzTe lance course-syllabus_digicitz
Te lance course-syllabus_digicitzterilance
 
Astonishing cooperative writing with technology project
Astonishing cooperative writing with technology projectAstonishing cooperative writing with technology project
Astonishing cooperative writing with technology projectmschlechter
 
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docxIanBanaglorioso
 
Digital citizenship Project
Digital citizenship ProjectDigital citizenship Project
Digital citizenship Projectl yingling
 
Telecommunications Course Outline for Media Literacy
Telecommunications Course Outline for Media LiteracyTelecommunications Course Outline for Media Literacy
Telecommunications Course Outline for Media LiteracyJennifer McBrayer
 
BYOD: Rigor and Relevance 2
BYOD: Rigor and Relevance 2BYOD: Rigor and Relevance 2
BYOD: Rigor and Relevance 2ccaviness
 
Tips for the virtual shift of f2f math classes New Version
Tips for the virtual shift of f2f math classes New VersionTips for the virtual shift of f2f math classes New Version
Tips for the virtual shift of f2f math classes New VersionFred Feldon
 
Recreating Classroom Communities Online
Recreating Classroom Communities OnlineRecreating Classroom Communities Online
Recreating Classroom Communities OnlinePeter Windle
 
Promising practices blastoff_-8-21-12_final
Promising practices blastoff_-8-21-12_finalPromising practices blastoff_-8-21-12_final
Promising practices blastoff_-8-21-12_finalLamar University
 
Educ 6063 module 2 hancock
Educ 6063 module 2 hancockEduc 6063 module 2 hancock
Educ 6063 module 2 hancockjuliahancock4
 
Syllabus presentation
Syllabus presentationSyllabus presentation
Syllabus presentationterilance
 
Animate This: Using What's Free to Motivate
Animate This: Using What's Free to MotivateAnimate This: Using What's Free to Motivate
Animate This: Using What's Free to MotivateSean McMinn
 
Dynamic media & digitial storytelling presentation
Dynamic media & digitial storytelling presentationDynamic media & digitial storytelling presentation
Dynamic media & digitial storytelling presentationDigLitTeach
 
Gifted Kids Network For Nmag
Gifted Kids Network For NmagGifted Kids Network For Nmag
Gifted Kids Network For NmagMichelle Eckstein
 
20110924 educaiton25me pywong_v3 (copied from py)
20110924 educaiton25me pywong_v3 (copied from py)20110924 educaiton25me pywong_v3 (copied from py)
20110924 educaiton25me pywong_v3 (copied from py)Kenneth Chen
 
Online Teaching Standards
Online  Teaching  StandardsOnline  Teaching  Standards
Online Teaching StandardsLisa Dawley
 
Teaching With Technology
Teaching With TechnologyTeaching With Technology
Teaching With Technologycostaleo
 

Similar a Cyberbullying & Social Networking Safety (20)

New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentation
 
Te lance course-syllabus_digicitz
Te lance course-syllabus_digicitzTe lance course-syllabus_digicitz
Te lance course-syllabus_digicitz
 
Te lance course-syllabus_digicitz
Te lance course-syllabus_digicitzTe lance course-syllabus_digicitz
Te lance course-syllabus_digicitz
 
Astonishing cooperative writing with technology project
Astonishing cooperative writing with technology projectAstonishing cooperative writing with technology project
Astonishing cooperative writing with technology project
 
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
 
Digital citizenship Project
Digital citizenship ProjectDigital citizenship Project
Digital citizenship Project
 
Telecommunications Course Outline for Media Literacy
Telecommunications Course Outline for Media LiteracyTelecommunications Course Outline for Media Literacy
Telecommunications Course Outline for Media Literacy
 
BYOD: Rigor and Relevance 2
BYOD: Rigor and Relevance 2BYOD: Rigor and Relevance 2
BYOD: Rigor and Relevance 2
 
Tips for the virtual shift of f2f math classes New Version
Tips for the virtual shift of f2f math classes New VersionTips for the virtual shift of f2f math classes New Version
Tips for the virtual shift of f2f math classes New Version
 
Recreating Classroom Communities Online
Recreating Classroom Communities OnlineRecreating Classroom Communities Online
Recreating Classroom Communities Online
 
Promising practices blastoff_-8-21-12_final
Promising practices blastoff_-8-21-12_finalPromising practices blastoff_-8-21-12_final
Promising practices blastoff_-8-21-12_final
 
Moving Education Online _ OpenEdInfluencers _ 2020
Moving Education Online _ OpenEdInfluencers _ 2020Moving Education Online _ OpenEdInfluencers _ 2020
Moving Education Online _ OpenEdInfluencers _ 2020
 
Educ 6063 module 2 hancock
Educ 6063 module 2 hancockEduc 6063 module 2 hancock
Educ 6063 module 2 hancock
 
Syllabus presentation
Syllabus presentationSyllabus presentation
Syllabus presentation
 
Animate This: Using What's Free to Motivate
Animate This: Using What's Free to MotivateAnimate This: Using What's Free to Motivate
Animate This: Using What's Free to Motivate
 
Dynamic media & digitial storytelling presentation
Dynamic media & digitial storytelling presentationDynamic media & digitial storytelling presentation
Dynamic media & digitial storytelling presentation
 
Gifted Kids Network For Nmag
Gifted Kids Network For NmagGifted Kids Network For Nmag
Gifted Kids Network For Nmag
 
20110924 educaiton25me pywong_v3 (copied from py)
20110924 educaiton25me pywong_v3 (copied from py)20110924 educaiton25me pywong_v3 (copied from py)
20110924 educaiton25me pywong_v3 (copied from py)
 
Online Teaching Standards
Online  Teaching  StandardsOnline  Teaching  Standards
Online Teaching Standards
 
Teaching With Technology
Teaching With TechnologyTeaching With Technology
Teaching With Technology
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Cyberbullying & Social Networking Safety

  • 1. Cyberbullying & Social-networking By Dalal Annous 10714044 & Tiffany Kennedy 10715050
  • 2. What is cyberbullying? “Cyberbullying is commonly defined as the use of information and communication technologies to support repeated and deliberate hostile behaviour intended to harm others. It is sometimes used as an extension to other forms of bullying, and can result in the target of bullying experiencing social, psychological and academic difficulties ” (Australian Communications and Media Authority ACMA, 2011, para.2).  What is social networking? “The use of Web sites or other online technologies to communicate with people and share information, resources, etc” (Dictionary.com, 2011, para.2).
  • 3. 1. Never share personal information online. 2. Create strong passwords and change them regularly. 3. Be careful of what you upload, these will always be accessible. 4. Avoid joining any online hate groups, inappropriate websites or participate in any illegal activities. 5. Don‟t befriend anyone you don‟t know in the real world. 6. If you are uncomfortable or find something disturbing, always tell an adult immediately.
  • 4. Class: 6 E Date: May 2, 2011 KLA: COGS- Australian Government & digital citizenship Time: 11:30 – 12:30pm  This lesson is contributing to the following syllabus outcomes:  -SSS3.8: Explains the structures, roles, responsibilities and decision making processes of State and Federal governments and explains why Australians value fairness and socially just principles.  -Digital citizenship when using social networking (Twitter)  National Educational Technology Standards for Students © 2007  Source: International Society for Technology in Education  Communication and Collaboration ◦ interact, collaborate, and publish with peers, experts or others employing a variety of digital environments and media. ◦ communicate information and ideas effectively to multiple audiences using a variety of media and formats.  Digital Citizenship ◦ advocate and practice safe, legal, and responsible use of information and technology. ◦ exhibit leadership for digital citizenship. http://www.iste.org/standards.aspx  Where is this lesson paced in the learning unit/sequence:  This lesson will introduce a new element to the unit of work- Australian Government. There is a verbal introduction procedure to familiarise the students with the topic, examples and demonstrations. The students will be working together as a whole group and also with partners.
  • 5. Preparation: Statement of intent: Specific learning outcomes for this lesson:  The students will:  Observe, listen and participate.  Interpret and answer questions individually.  Support conclusions by explaining or demonstrating how answers were obtained.  Use social networking appropriately and in a positive manner.  Openly discuss and comment relating to the topic of work and ask any questions in regards to the unit of work.  Develop related vocabulary and online aspects.  Advocate digital citizenship  Key teaching approaches for this lesson:  The teacher will:  State the purpose and meaning of the lesson.  Demonstrate the meaning of the lesson by going through the questions outlining brief statements about each.  Allow for expression of thoughts and comments.  Demonstrate examples of digital citizenship and appropriate online behaviour.  Acknowledgement of prior learning prerequisite to this lesson:  The students have however encountered similar activities that are set out for them and are familiar with the style of learning that is presented.  Students are also familiar with verbalising and presenting information to the rest of the class, as well as individual work.
  • 6. Resources required: Checklist: Stimulus/pictures (intro) Computers Internet White board and markers  Key classroom management considerations:  Students will be seated at their desks while an explanation of the topic is demonstrated through the use of questioning and answering. The teacher will manage and monitor the classroom situation and engagement during set activities.  Presentation:  Introduction: Estimated time: 20 minutes  This lesson consists of COGS and internet safety. After the year 6 camp to Canberra, students are asked to use Twitter to comment/blog about the experience, the structures, roles, responsibilities and decision making processes of State and Federal governments and why Australians value fairness. This is carried out over a series of lessons. However, before the content of the unit of work is explored, digital citizenship elements must transpire. By teaching about social networking, cyber-safety and digital citizenship will ensure the outcomes of these lessons are successfully achieved.  Development and consolidation sequence: Estimated time: 20 minutes  The teacher provides scenarios of cyber-bullying, negative social networking and the accessibility to personal online information. The positive and negatives to the scenarios will be explored. Suitable alternatives to these situations will be addressed.  Culmination: Estimated time: 5 minutes  Are students applying digital citizenships to their social networking?  Are students appropriately addressing the seriousness of cyber-bullying?  Can the students work well with their partner?  Are the students familiar with the vocabulary used?  Was the task enjoyable and appropriate?  Has learning occurred?
  • 7. Students will outline the positives and negatives to the following online scenarios: Scenario 1:  Ben tells his friend his password for MSN. A week later they have an argument and the ex-friend goes on MSN using Ben‟s account. He pretends to be Ben and posts rude and inappropriate comments to Ben‟s family and friends. The next day Ben‟s friends don‟t talk to him because they believe it was him on MSN the previous night. Ben‟s family are very disappointed and band him from using the computer or internet. What should Ben do? 1) How often do you change your password? How often should you change your password? 2) Should you have the same password for every account you have online? 3) What else could happen if you share your passwords with friends? 4) How can you create strong passwords that would be difficult for people to guess? Scenario 2: Sally tells her friend Maria personal information about herself through Facebook. The next day at school everyone was talking about Sally‟s personal comments she had shared with Maria. Sally confronted Maria and Maria told her she accidently copied and pasted their whole conversation to all of their class members. What should Sally do? 1) How could this scenario have been avoided? 2) How can Sally resolve this issue? 3) Is Maria a good friend, why?
  • 8. Students will watch the video below, which is about changing your internet password. http://www.youtube.com/watch?v=aOqkGmZ4p-s  Lesson 2: Digital citizenship.  KLA/Topic: English- (talking & listening) and digital citizenship.  Specific learning outcomes: Students will discuss and identify why creating a strong password is important. Students also recognise why changing their online password is significant.  Key teaching approaches: After watching a video clip outlining the importance of online passwords, the class will discuss and brainstorm advantages and disadvantages of changing passwords on a worksheet (slide 10). Class is also going to develop a „wall chart‟ diagram outlining the importance of digital citizenship concerning passwords.  Resources:  http://www.youtube.com/watch?v=aOqkGmZ4p-s  large paper for wall chart, textures/pencils (for wall chart) and advantages and disadvantages worksheet.
  • 9. Teaching/learning/assessment sequence (include time estimates for each step):  After watching this video the teacher will facilitate a discussion on the importance of creating a strong password and changing online passwords regularly.  The students are expected to outline the advantages and disadvantages of changing passwords on a worksheet (See next slide). The teacher will emphasise how the advantages outweigh the disadvantages.  After completing the worksheet individually, the students will each contribute to a wall chart outlining the pros and cons of this topic. This will be displayed in the classroom and continually referred to at a later point when using social networking.  Evaluation/follow up:  This lessons content will be followed up on numerous occasions when using social networking sites and computers in general within the classroom.
  • 10. Advantages: Disadvantages:
  • 11. Class: 6 E Date: May 2, 2011 KLA: Human Society and its Environment (HSIE) & digital citizenship Time: 11:30 – 12:30pm This lesson is contributing to the following syllabus outcomes: - CUS2.4: Describes different viewpoints, ways of living, languages and belief systems in a variety of communities. . Gathers information about significant multicultural celebrations in the local community or in other communities -Digital citizenship when using Googlesites.  Where is this lesson paced in the learning unit/sequence: This lesson will be used at the end of the unit of work- Australian Identity and Values. It is designed as a consolidation project and focuses on a student centered approach, where the teacher’s acts as a facilitator in the learning process. The students will be working in groups of four.  Preparation: Statement of intent: Specific learning outcomes for this lesson: The students will:  Observe, listen and participate.  Work collaboratively within their group.  Share the workload equally.  Use Googlesites appropriately and in a positive manner.  Openly discuss and comment relating to the topic of work and ask any questions in regards to the unit of work.  Develop related vocabulary and online aspects.  Advocate digital citizenship Key teaching approaches for this lesson: The teacher will:  State the purpose and meaning of the lesson.  Explain what the students are required to do for the project.  Allow for expression of thoughts and comments.  Demonstrate examples of digital citizenship and appropriate online behaviour. Acknowledgement of prior learning prerequisite to this lesson:  Prior to this lesson, students have been provided with a mini lesson about how to use Googlesites.  Students have all created a Gmail account.  As this is the final consolidation, the students are already familiar with most of the multicultural celebrations.
  • 12. Resources required: Computers, Internet, White board and markers Key classroom management considerations: Students will be seated at their desks while an explanation of the topic is demonstrated through the use of questioning and answering. The teacher will manage and monitor the classroom situation and engagement during set activities. Presentation: Introduction: Estimated time: 20 minutes Each student is required sit next to a computer and log into their Gmail accounts. However, before the content of the lesson is explored, digital citizenship elements must transpire. The teacher presents a previously made Googlesites they have created. The teacher then illustrates to the students how easy it can be to find their Googlesites by typing the title of their Googlesites into the Google search engine. Teacher emphasises to students how they always need be careful with of what they upload; as this will always be accessible as demonstrated (refer to Appendix 1). By teaching about cyber-safety and digital citizenship this will ensure the outcomes of these lessons are successfully achieved. Development and consolidation sequence: Estimated time: 15minutes The teacher brainstorms ideas about what kinds of things are and are not appropriate to upload online. Teachers should discuss issues such as displaying personal photos (from their community) and personal information (community members). Teachers also remind students that they must acknowledge any online information they use in their project, including images. Culmination: Estimated time: 25 minutes Students form into groups of four. Once the students formed their groups they need to add each of their group members onto Googlesites. Students can then begin working on their project. The last part of the lesson recognises the following: Are students applying digital citizenships when using Googlesites? Are students aware about how accessible their work can be? Can the students work well with their group members? Are the students familiar with the vocabulary used? Was the task enjoyable and appropriate? Has learning occurred?
  • 14. As a continuation of strategy 1. Never share personal information online, there will be a mini lesson on ways to avoid joining online hate groups and inappropriate websites. This mini lesson will consist of guidelines and warning signs of inappropriate content. Guidelines: 1. Remove people on your social networking site that join online hate groups. 2. Never join a group that you have not read into and researched about. 3. Do not click on a link or open a webpage which does not have an official website or web address. 4. Always ensure your computer has anti-virus software downloaded by an adult. This will also indicate whether a website is appropriate or inappropriate. http://exodians.wordpress.com/2009/08/01/rant-norton-anti-virus-what-is-wrong-with-you/ 5. Avoid downloading any programs, music or videos that are not on official downloading websites. This can be reviewed by looking at the URL. If the website contains a org, edu, gov, are all official sites. Websites that need to be dealt with caution end in .com, .net and now .biz, and any personal home pages (such as those now ending in .name).
  • 15. Warning signs of an inappropriate or dangerous website: 1.Flashing icons or notices. 2.Unwanted pop ups. 3.Unknown friend requests. 4.Automatic downloading. 5.Unknown ending to URL. 6.Red cross next to the link. The teacher will facilitate a discussion about the above guidelines and show examples of warning signs through images and verbal comments. This content is most useful for the students when they are using social networking and when they are surfing the internet at home. The students are more likely to be exposed to inappropriate content at home than at school. In saying this, the teacher needs to include and educate parents about online safety as well. This can be achieved by conducting parent information evenings on cyber-safety.
  • 16. The teacher will share the scenario below with the class and formulate a discussion afterwards. Sam regularly uses her grandparents computer. She downloads file sharing software and is using her grandparents next door neighbour‟s wireless connection to download her favourite tracks. The next time she visits her grandparents house, they are very upset, as the neighbours have received a letter from their internet company accusing them of illegally downloading music. Sam‟s grandparents checked their computer and found over 100 illegal downloads.  1) What are the risks of using peer to peer, file sharing sites?  2) Who could be held responsible for this online illegal activity?  3) What advice would you give people who want to download music from the internet? Childnet International. (2011). Roleplay scenarios. Retrieved November 11, 2011, from http://www.digizen.org/digicentral/roleplayscenarios.aspx
  • 17. Students watch the video below, outlining the necessity to only befriend people you know in person. http://www.netsmartz.org/NSTeens/PostToBePrivate  Lesson 5: Digital citizenship.  KLA/Topic: English- (Talking & Listening) and Digital citizenship.  Specific learning outcomes: Students will discuss the necessity to only befriend people you know in person.  Key teaching approaches: Students will discuss and brainstorm the important messages behind the video. The teacher will also refer back to previous lessons about changing passwords and sharing personal information online.
  • 18. Resources: Computer, video and writing equipment.  Teaching/learning/assessment sequence (include time estimates for each step): After watching the video, the students form groups of 4 and discuss the key points outlined. Students are expected to outline how this situation can be prevented, strategies to handle this scenario and people that the victim can turn to. Student highlight the importance of telling an adult when they feel unsure or uncomfortable.  After presenting the answers to these questions the students will write their own scenario and questions for their peers to answer. After each group finishes their scenario, they will swap it with another group.
  • 19. Lesson 6: Digital citizenship “Who are people you trust?”  KLA/Topic: English- (Talking & Listening), PD/H/PE- positive relationships & digital citizenship.  Specific learning outcomes: Students will discuss and brainstorm what trust means to them and identify who they classify as trustworthy people. - PD/H/PE outcome: IRS3.11Describes roles and responsibilities in developing and maintaining positive relationships. Key teaching approaches: If students feel unsafe or uncomfortable on the internet, they need to be able to turn to a parent, adult or someone older than themselves. By connecting this mini lesson on trust with PD/H/PE, it will enable students to identify and acknowledge the people around them.
  • 20. Resources: Writing material and poster paper.  Teaching/learning/assessment sequence (include time estimates for each step): After the discussion and brainstorm on trust and trustworthy people, students will identify who they trust. These questions will be asked: 1. Have I known this person for an extended period of time? 2. Are they related to me? 3. Do my parents know this person? 4. Will this person take the appropriate action if I expressed being uncomfortable on the internet? 5. Has this person proven to be trustworthy in the past? Students will design their own poster on the people they trust and outline why they trust these people.
  • 22. www.decs.sa.gov.au- Cyber safety: Keeping children safe in a connected world.  www.cybersmartcurriculum.org- Cyber bullying: Crossing the line (Lesson plans)  www.slideshare.com- Online professional development.  http://www.cybersmart.gov.au/Schools/Cybers afety%20policies%20and%20procedures.aspx- Cybersafety policies and procedures by Commonwealth of Australia.  http://www.cybersmart.gov.au/report.aspx
  • 23. Australian Communications and Media Authority (ACMA). (2011). Cyberbullying. Retrieved November 3, 2011, from http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/Cyberbull ying.aspx  Board of Studies. (2006). Syllabus: HSIE. K-6. Retrieved November 8, 2011, from http://k6.boardofstudies.nsw.edu.au/files/hsie/k6_hsie_syl.pdf  Board of Studies. (2006). Syllabus: PD/H/PE. K-6. Retrieved November 8, 2011, from http://k6.boardofstudies.nsw.edu.au/files/pdhpe/k6_pdhpe_syl.pdf  Childnet International. (2011). Role-play scenarios. Retrieved November 11, 2011, from http://www.digizen.org/digicentral/roleplay-scenarios.aspx  Cybersmart. (2011). Cyberbullying. Retrieved 31 October, 2011, from http://cybersmartcurriculum.org/cyberbullying/lessons/68/cyberbullying_crossing_t he_line/  Cybersmart. (2011). Kids. Retrieved November 5, 2011, from http://www.cybersmart.gov.au/kids.aspx  Dictionary.com. (2011). Social networking. Retrieved November 3, 2011, from http://dictionary.reference.com/browse/social+networking  Googleprivacy. (2008). Practicing password safely (video). Retrieved November 2, 2002, from http://www.youtube.com/watch?v=aOqkGmZ4p-s  NetSmartz. (2010). Posts to be private.. Retrieved November 10, 2011, from http://www.netsmartz.org/NSTeens/PostToBePrivate
  • 24. Thank you for your time. We hope you have enjoyed this seminar on Cyber-safety. If you have any further questions, queries or would like extra information please comment in the provided space below. Students have the world at their finger tips, we as teachers need to educate the students on how to use these tools effectively. By Dalal Annous 10714044 & Tiffany Kennedy 10715050