SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Internet Safety Unit

 • Unit Title : Safe “Surfing” on the Internet
 • Grade Level(s): 6th & 7th
 • Subject/Topic Area(s): Computers/Safety
 • Key Words: personal information, private identity,
   cyberspace, cyber pals, ethiical
 • Designed By: Original unit by John Dolan
 • Time Frame: 3 weeks
 • School: St. Luke’s School, New Canaan, Connecticut.

                  Understanding By Design Unit on Internet
John Dolan                                                   1
                                   Safety
Purpose
• This in class learning activity is part of a larger unit, on
  internet safety. I developed this unit two years ago. After
  attending a UbD workshop. When I took over as the
  middle school computer teacher, there was little or no
  emphasis on internet safety. The previous teacher taught
  the students Microsoft Word, Excel & PowerPoint . There
  was little or no emphasis on internet safety, ethical use
  of the internet and internet research skills. I knew there
  was a need to teach the students about internet safety. I
  happened to attend a UbD workshop, and thought it
  would be a great opportunity to create an internet safety
  unit scratch, using the UbD model.
1. The Connecticut Framework
      K-12 Curricular Standards
• Technological Impacts-Students will
  understand the impact that technology has on
  the social, cultural and environmental aspects
  of their lives.
• Educational experiences in Grades 5-8 will
  assure that students:
• Indicator 1: explain how technology and
  technological has expected and unex-pected
  effects; citizenship.
2. American Association of School
      & Library Standards
Standard 8: The student who contributes
  positively to the learning community and to
  society is information literate and practices
  ethical behavior in regard to information and
  information technology.]
Indicator 3. Uses information technology
  responsibly
3. The ISTE Standards (NETS•S)and
     Performance Indicators for
              Students
• Standard 5: Digital Citizenship-Students
  understand human, cultural, and societal
  issues related to technology and practice legal
  and ethical behavior. Students:
• Indicator a. advocate and practice safe, legal,
  and responsible use of information and
  technology.
3. The ISTE Standards (NETS•S)and
    Performance Indicators for
             Students
• Indicator b. exhibit a positive attitude toward
  using technology that supports collaboration,
  learning, and productivity.
• Indicator c. demonstrate personal
  responsibility for lifelong learning.
• Indicator d. exhibit leadership for digital
  citizenship
Desired Results
• In this lesson students will…
• Distinguish between private identity information and
  personal information
• Recall that private identity information should not be
  communicated in cyberspace without permission of
  a teacher or parent
• Learn how the Internet can be used to communicate
  with others in cyberspace
• Relate reasons for protecting private identity
  information in cyberspace


                  Understanding By Design Unit on Internet
John Dolan                                                   7
                                   Safety
Desired Results
• Determine whether a site is required to post a
  children's privacy policy
• Analyze privacy notices for compliance with
  FTC rules
Learning Plan 1
     Introduction
• Some web sites ask for information before allowing you
  to participate in an online activity.
• What do you think private identity information is?
• What do you think personal information?
• In your group create questions that you would ask
  yourself before providing private or personal
  information.
• If you were to share private information online. Write a
  paragraph explaining what impact (if any) this might this
  have on your life.
• Refer to A Great Place to Share Ideas
                    Understanding By Design Unit on Internet
John Dolan                                                     9
                                     Safety
Learning Plan 1
• What is the difference between private and personal
  information?
• What kind of personal information can be used to
  indentify you?
• What kind of personal information can you share that
  won’t identify you?
• Why might someone want your private identity
  information? What good is it to them?
• Why might someone want your personal information?
  What good is it to them?
• Refer to A Great Place to Share Ideas
                   Understanding By Design Unit on Internet
John Dolan                                                    10
                                    Safety
Learning Plan 2
• Introduce (offline)Ask students for examples of Web sites
  that request private identity information. Allow volunteers to
  describe the content of the site, what information was
  requested, and how they handled the request.
• Explain that the United States government passed the
  Children's Online Privacy Protection Act (COPPA) in October,
  1998. This law requires site owners to help protect the
  privacy of kids 13 and younger; they are also required to post
  and explain the elements of the privacy policy they’re
  returning
Learning Plan 2
• Teach 1 (online)Distribute one copy of the activity
  sheets.Take students to www.becybersmart.org or
  www.cybersmartcurriculum.org, click on Student Links, and
  then click on the diamond. Find the title of this lesson, and
  open its links. Choose a site to explore with the class.
• Have students complete the checklist through Question 3. A
  “yes” response to the first three questions indicates that the
  site is required to comply with COPPA. If this is the case, have
  students complete the rest of the checklist, recording how
  the site complies in the “Details” column.
Learning Plan 2
• In addition to the BBB and TRUSTe seals, some Web sites may
  display the CARU (The Children's Advertising Review Unit) seal from
  the Council of Better Business Bureaus or the ESRB kids privacy seal
  from the Entertainment Software Rating Board. Point out to
  students that since anyone can create an official-looking “seal,” it's
  important to investigate the reliability of the organizations that
  issue unfamiliar seals.NOTE: What CyberSmart! calls “private
  identity information,” others may call “personal information.”
  CyberSmart! defines private identity information as any
  information that can be used to discover one's identity. Personal
  information is defined as any information about the person that
  cannot be used to discover his or her identity. By reading carefully,
  students should be able to tell when a privacy policy is referring to
  information that can be used to identify an individual.
Learning Plan 2
• Have students look over their completed checklists. Explain
  that if the answers to Questions 4-17 are “yes,” the site is in
  compliance with the rules. Additionally, if the answers to
  Questions 18 and 19 are “yes,” the site is monitored and
  approved by watchdog organizations.
• Point out that, in order to protect their private identity
  information, students should make a habit of checking the
  privacy policy at the sites they visit.Discuss strategies for
  dealing with a site that asks for more information than
  students feel comfortable sharing or that does not post a
  clear policy. Remind students they can leave the site or ask a
  parent or teacher to contact the site for more information.
  NOTE: The FTC also provides an online Consumer Complaint
  Form for adults at www.ftc.gov.
Learning Plan 2
• Teach 3 (online) Distribute a second copy of the activity
  sheets. Assign individuals or groups to the remaining sites,
  have them complete the checklist, and share their results
  with the class.
• Close (offline)Ask: What types of sites are required to post a
  children's privacy policy? (Sites that are intended for kids 13
  and under and that request private identity
  information.)Ask: How do you use the CyberSmart! checklist
  to decide whether a site is following the law? (Answer the
  first three questions to decide if it must follow the law. If so,
  check to see if each of the rest of the questions can be
  answered “yes.”)
Learning Plan 3
   Writing Activity
• Write a biography about yourself. You can include
  personal information, but leave out private identity
  information. Once you are finished, you will present it to
  the class. The class will evaluate whether you have
  provided information in your biography that could
  threaten your safety, identify your exact location or can
  be used for other purposes i.e. identity theft.
Learning Plan 3

      Post the Essential Questions
 • Who should you not talk with on the internet?
 • What does anonymity mean on the internet?
 • Where should you not share private identity
 • information?
 • When is online chatting and messaging harmful to you or
   others?
 • When is online chatting and messaging beneficial?


                    Understanding By Design Unit on Internet
John Dolan                                                     17
                                     Safety
Learning Plan 3

             Create Groups
      • Form a group of three safe “surfer” dudes
      • In your group try to predict what lesson this online game
        will teach you.
      • Surf to the Privacy Playground
      • Create an online name that will identify your group
      • One person in the group will “surf” through the game




                       Understanding By Design Unit on Internet
John Dolan                                                        18
                                        Safety
Learning Plan 3
     Assign Roles
• One person will be the “spotter”, spotting the errors
  each character makes
• One person will be the “recorder”, recording the errors
  each character makes
• Play the game and look for ways that Mo, Lil and Les (the
  characters in the game) are not being cybersmart.
• Why do you think they are not being cybersmart?



                    Understanding By Design Unit on Internet
John Dolan                                                     19
                                     Safety
Learning Plan 3
     Activity
• Play the game a second time
• Record on chart paper Mo, Lil and Les' errors under each
  character's name. What did each of them do wrong
  regarding sharing information online?
• In real life, if you were to make the same mistakes as
  Mo, Lil and Les. What do you think might happen? How
  might your online mistakes affect your life or the lives of
  those close to you? How might you rectify your errors?


                    Understanding By Design Unit on Internet
John Dolan                                                     20
                                     Safety
Learning Plan 3
     Discussion
•   Did they select a play or pay site?
•   What does 'play or pay site' mean?
•   What is the virtualpigsty.com trying to sell?
•   Why do you think they are trying to sell it?




                      Understanding By Design Unit on Internet
John Dolan                                                       21
                                       Safety
Learning Plan 3
     Search for similar sites
• Switch roles i.e. different person being the surfer,
  spotter and recorder
• Search for two sites that are similar to virtualpigsty.com




                    Understanding By Design Unit on Internet
John Dolan                                                     22
                                     Safety
Learning Plan 3
     Record
• Once you have found three sites that are
  similar to virtualpigsty.com
• Write down the web addresses
• Write down what they’re trying to sell
• Do they ask you to identify your real name, age or
  address?
• If they do why do you think they ask you for your name,
  age or address. Write down five reasons why they might
  ask you for these?

                   Understanding By Design Unit on Internet
John Dolan                                                    23
                                    Safety
Wrap up
• In your group write down 20 questions you
  have about internet safety in general.
• You will share your questions
• Then as a group you will then pick your top
  three questions
• We will use the top three questions from each
  group to further explore the topic of internet
  safety.

Weitere ähnliche Inhalte

Was ist angesagt?

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
paul
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 

Was ist angesagt? (20)

Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Cape
CapeCape
Cape
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 

Andere mochten auch (7)

Crimson Publishing Autumn Catalogue
Crimson Publishing Autumn CatalogueCrimson Publishing Autumn Catalogue
Crimson Publishing Autumn Catalogue
 
Enlighten Kuan Yin Avalokitesvara
Enlighten Kuan Yin AvalokitesvaraEnlighten Kuan Yin Avalokitesvara
Enlighten Kuan Yin Avalokitesvara
 
Unternehmensbroschüre
UnternehmensbroschüreUnternehmensbroschüre
Unternehmensbroschüre
 
Physical Digital Slideshow
Physical Digital SlideshowPhysical Digital Slideshow
Physical Digital Slideshow
 
P U Hoofdstuk6
P U  Hoofdstuk6P U  Hoofdstuk6
P U Hoofdstuk6
 
Exchange 2010 on_v_mware_-_best_practices_guide[1]
Exchange 2010 on_v_mware_-_best_practices_guide[1]Exchange 2010 on_v_mware_-_best_practices_guide[1]
Exchange 2010 on_v_mware_-_best_practices_guide[1]
 
Sapana Dubai Tour Sponsorship Packages Presentation
Sapana Dubai Tour Sponsorship Packages PresentationSapana Dubai Tour Sponsorship Packages Presentation
Sapana Dubai Tour Sponsorship Packages Presentation
 

Ähnlich wie In Class Learning Activity

Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Sarah Sell
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Markus final project
Markus final projectMarkus final project
Markus final project
erinmarkus
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
emilyensign
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
Self disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networksSelf disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networks
TAFENSW Online
 
Class 1-become-an-online-sleuth
Class 1-become-an-online-sleuthClass 1-become-an-online-sleuth
Class 1-become-an-online-sleuth
Wheeler School
 

Ähnlich wie In Class Learning Activity (20)

Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Be a Safe Surfer, Dude!
Be a Safe Surfer, Dude!Be a Safe Surfer, Dude!
Be a Safe Surfer, Dude!
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Markus final project
Markus final projectMarkus final project
Markus final project
 
Mentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeMentoring Youth in the Digital Age
Mentoring Youth in the Digital Age
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
A student’s right to privacy1
A student’s right to privacy1A student’s right to privacy1
A student’s right to privacy1
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Self disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networksSelf disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networks
 
Class 1-become-an-online-sleuth
Class 1-become-an-online-sleuthClass 1-become-an-online-sleuth
Class 1-become-an-online-sleuth
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

In Class Learning Activity

  • 1. Internet Safety Unit • Unit Title : Safe “Surfing” on the Internet • Grade Level(s): 6th & 7th • Subject/Topic Area(s): Computers/Safety • Key Words: personal information, private identity, cyberspace, cyber pals, ethiical • Designed By: Original unit by John Dolan • Time Frame: 3 weeks • School: St. Luke’s School, New Canaan, Connecticut. Understanding By Design Unit on Internet John Dolan 1 Safety
  • 2. Purpose • This in class learning activity is part of a larger unit, on internet safety. I developed this unit two years ago. After attending a UbD workshop. When I took over as the middle school computer teacher, there was little or no emphasis on internet safety. The previous teacher taught the students Microsoft Word, Excel & PowerPoint . There was little or no emphasis on internet safety, ethical use of the internet and internet research skills. I knew there was a need to teach the students about internet safety. I happened to attend a UbD workshop, and thought it would be a great opportunity to create an internet safety unit scratch, using the UbD model.
  • 3. 1. The Connecticut Framework K-12 Curricular Standards • Technological Impacts-Students will understand the impact that technology has on the social, cultural and environmental aspects of their lives. • Educational experiences in Grades 5-8 will assure that students: • Indicator 1: explain how technology and technological has expected and unex-pected effects; citizenship.
  • 4. 2. American Association of School & Library Standards Standard 8: The student who contributes positively to the learning community and to society is information literate and practices ethical behavior in regard to information and information technology.] Indicator 3. Uses information technology responsibly
  • 5. 3. The ISTE Standards (NETS•S)and Performance Indicators for Students • Standard 5: Digital Citizenship-Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: • Indicator a. advocate and practice safe, legal, and responsible use of information and technology.
  • 6. 3. The ISTE Standards (NETS•S)and Performance Indicators for Students • Indicator b. exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity. • Indicator c. demonstrate personal responsibility for lifelong learning. • Indicator d. exhibit leadership for digital citizenship
  • 7. Desired Results • In this lesson students will… • Distinguish between private identity information and personal information • Recall that private identity information should not be communicated in cyberspace without permission of a teacher or parent • Learn how the Internet can be used to communicate with others in cyberspace • Relate reasons for protecting private identity information in cyberspace Understanding By Design Unit on Internet John Dolan 7 Safety
  • 8. Desired Results • Determine whether a site is required to post a children's privacy policy • Analyze privacy notices for compliance with FTC rules
  • 9. Learning Plan 1 Introduction • Some web sites ask for information before allowing you to participate in an online activity. • What do you think private identity information is? • What do you think personal information? • In your group create questions that you would ask yourself before providing private or personal information. • If you were to share private information online. Write a paragraph explaining what impact (if any) this might this have on your life. • Refer to A Great Place to Share Ideas Understanding By Design Unit on Internet John Dolan 9 Safety
  • 10. Learning Plan 1 • What is the difference between private and personal information? • What kind of personal information can be used to indentify you? • What kind of personal information can you share that won’t identify you? • Why might someone want your private identity information? What good is it to them? • Why might someone want your personal information? What good is it to them? • Refer to A Great Place to Share Ideas Understanding By Design Unit on Internet John Dolan 10 Safety
  • 11. Learning Plan 2 • Introduce (offline)Ask students for examples of Web sites that request private identity information. Allow volunteers to describe the content of the site, what information was requested, and how they handled the request. • Explain that the United States government passed the Children's Online Privacy Protection Act (COPPA) in October, 1998. This law requires site owners to help protect the privacy of kids 13 and younger; they are also required to post and explain the elements of the privacy policy they’re returning
  • 12. Learning Plan 2 • Teach 1 (online)Distribute one copy of the activity sheets.Take students to www.becybersmart.org or www.cybersmartcurriculum.org, click on Student Links, and then click on the diamond. Find the title of this lesson, and open its links. Choose a site to explore with the class. • Have students complete the checklist through Question 3. A “yes” response to the first three questions indicates that the site is required to comply with COPPA. If this is the case, have students complete the rest of the checklist, recording how the site complies in the “Details” column.
  • 13. Learning Plan 2 • In addition to the BBB and TRUSTe seals, some Web sites may display the CARU (The Children's Advertising Review Unit) seal from the Council of Better Business Bureaus or the ESRB kids privacy seal from the Entertainment Software Rating Board. Point out to students that since anyone can create an official-looking “seal,” it's important to investigate the reliability of the organizations that issue unfamiliar seals.NOTE: What CyberSmart! calls “private identity information,” others may call “personal information.” CyberSmart! defines private identity information as any information that can be used to discover one's identity. Personal information is defined as any information about the person that cannot be used to discover his or her identity. By reading carefully, students should be able to tell when a privacy policy is referring to information that can be used to identify an individual.
  • 14. Learning Plan 2 • Have students look over their completed checklists. Explain that if the answers to Questions 4-17 are “yes,” the site is in compliance with the rules. Additionally, if the answers to Questions 18 and 19 are “yes,” the site is monitored and approved by watchdog organizations. • Point out that, in order to protect their private identity information, students should make a habit of checking the privacy policy at the sites they visit.Discuss strategies for dealing with a site that asks for more information than students feel comfortable sharing or that does not post a clear policy. Remind students they can leave the site or ask a parent or teacher to contact the site for more information. NOTE: The FTC also provides an online Consumer Complaint Form for adults at www.ftc.gov.
  • 15. Learning Plan 2 • Teach 3 (online) Distribute a second copy of the activity sheets. Assign individuals or groups to the remaining sites, have them complete the checklist, and share their results with the class. • Close (offline)Ask: What types of sites are required to post a children's privacy policy? (Sites that are intended for kids 13 and under and that request private identity information.)Ask: How do you use the CyberSmart! checklist to decide whether a site is following the law? (Answer the first three questions to decide if it must follow the law. If so, check to see if each of the rest of the questions can be answered “yes.”)
  • 16. Learning Plan 3 Writing Activity • Write a biography about yourself. You can include personal information, but leave out private identity information. Once you are finished, you will present it to the class. The class will evaluate whether you have provided information in your biography that could threaten your safety, identify your exact location or can be used for other purposes i.e. identity theft.
  • 17. Learning Plan 3 Post the Essential Questions • Who should you not talk with on the internet? • What does anonymity mean on the internet? • Where should you not share private identity • information? • When is online chatting and messaging harmful to you or others? • When is online chatting and messaging beneficial? Understanding By Design Unit on Internet John Dolan 17 Safety
  • 18. Learning Plan 3 Create Groups • Form a group of three safe “surfer” dudes • In your group try to predict what lesson this online game will teach you. • Surf to the Privacy Playground • Create an online name that will identify your group • One person in the group will “surf” through the game Understanding By Design Unit on Internet John Dolan 18 Safety
  • 19. Learning Plan 3 Assign Roles • One person will be the “spotter”, spotting the errors each character makes • One person will be the “recorder”, recording the errors each character makes • Play the game and look for ways that Mo, Lil and Les (the characters in the game) are not being cybersmart. • Why do you think they are not being cybersmart? Understanding By Design Unit on Internet John Dolan 19 Safety
  • 20. Learning Plan 3 Activity • Play the game a second time • Record on chart paper Mo, Lil and Les' errors under each character's name. What did each of them do wrong regarding sharing information online? • In real life, if you were to make the same mistakes as Mo, Lil and Les. What do you think might happen? How might your online mistakes affect your life or the lives of those close to you? How might you rectify your errors? Understanding By Design Unit on Internet John Dolan 20 Safety
  • 21. Learning Plan 3 Discussion • Did they select a play or pay site? • What does 'play or pay site' mean? • What is the virtualpigsty.com trying to sell? • Why do you think they are trying to sell it? Understanding By Design Unit on Internet John Dolan 21 Safety
  • 22. Learning Plan 3 Search for similar sites • Switch roles i.e. different person being the surfer, spotter and recorder • Search for two sites that are similar to virtualpigsty.com Understanding By Design Unit on Internet John Dolan 22 Safety
  • 23. Learning Plan 3 Record • Once you have found three sites that are similar to virtualpigsty.com • Write down the web addresses • Write down what they’re trying to sell • Do they ask you to identify your real name, age or address? • If they do why do you think they ask you for your name, age or address. Write down five reasons why they might ask you for these? Understanding By Design Unit on Internet John Dolan 23 Safety
  • 24. Wrap up • In your group write down 20 questions you have about internet safety in general. • You will share your questions • Then as a group you will then pick your top three questions • We will use the top three questions from each group to further explore the topic of internet safety.