Defined as TAKING ELECTRONIC PRECAUTIONS TO PROTECT ONE'S SELF AND/OR COMMUNITY. | Defined as THE STANDARDS OF CONDUCT OR PROCEDURES ONLINE. | Defined as THE BENEFITS AND BOUNDARIES EXTENDED TO THOSE IN A DIGITAL WORLD. |
Guiding Question: What precautions should one take to protect themselves (Internet Safety) AND the software, hardware or network (Malware Prevention) when using a computer? |
Guiding Question: What is appropriate when communicating online? |
Guiding Question: What are the opportunities and boundaries associated with using technology/the internet? |
Some Key Vocabulary: caching out, cyber attack, malware, phishing, viruses, worms | Some Key Vocabulary: asynchronous vs. synchronous communications, cyberbullying, netiquette | Some Key Vocabulary: digital citizenship, acceptable or responsible use policy |
VIDEOS Primary: Faux Paw's Adventures in the Internet Primary: Wild About Safety with Timon and Pumbaa Middle: The Digital Footprint Middle/Secondary: Child Internet Safety - Online Predators Middle/Secondary: Social, Smart, Secure Secondary: Internet Danger - Everyone Knows Sarah |
VIDEOS Primary: Make Cyberspace a Better Place Primary: Bad Netiquette Stinks Middle: Cyberbully PSA - Talent Show Middle: How to Follow Proper Netiquette Rules Secondary: Harmless Joke or Cyberbullying? Secondary: Netiquette for High School Students For Teachers: Netiquette Overview |
VIDEOS Primary: Freedom of Expression Online Middle: Digital Safety, Responsibility and Awareness Secondary: Ellen's Monologue |
Suggested Activities: INTERNET SAFETY ALL GRADES: commonsensemedia scope-and-sequence Take a picture and share with students how this image can be altered - Photoshop distortions, enhancements ... FOR TEACHERS: GCF learnfree.org staying safe from online predators |
Suggested Activities: CYBERBULLYING ALL GRADES: Cyberbullying-toolkit |
Suggested Activities: PRIMARY: Students could respond to the teacher prompt - what kind of positive message would you like to share on the internet, knowing it could be shared with the world. MIDDLE: Students could complete a T-Chart, or even a Venn Diagram to identify the ways our devices are used as a POWERFUL TOOL OF COMMUNICATION or as a WEAPON OF SELF DESTRUCTION. SECONDARY: Students could debate the benefits and boundaries of putting technology into the hands of kindergarten children. |