Professional Documents
Culture Documents
Air Dogs
An Interactive Internet Safety Program
GRADE 8
TEACHER RESOURCE PACKAGE
Healthy Living
Personal Safety and Injury Prevention
ACKNOWLEDGEMENTS
Ophea would like to acknowledge the following for their contributions to this resource:
Development team:
Michael Brophy, Ontario Principals Council
Jeff Bumstead, Ophea
Debra Courville, Ophea Curriculum Advisory Council
Nazreen Motiar, Toronto District School Board
Russ Minnis, Conseil scolaire de district des coles catholiques du Sud-Ouest
Kelly Pace, Conference of Independent Schools
Mel Trojanovic, Halton District School Board
Reviewers:
Michael Brophy, Toronto District School Board
Colin Harris, Educational Computing Organization of Ontario
Sharron McKeever, Institute for Catholic Education
Kelly Pace, Conference of Independent Schools
Lisa Soroko, Toronto Catholic District School Board
All field test participant schools.
LiveWires Design Ltd.
Ministry of Education
Ontario Provincial Police, Electronic Crimes Section
ISBN 0-921868-53-7
Copyright 2006 Ophea.
All rights reserved. Program materials may be reproduced, with credit, for educational purposes.
This Internet Safety Initiative was made possible by a grant from the Ministry of Education in partnership
with the Ministry of the Attorney Generals Victim Justice Fund.
Healthy Living
Personal Safety and Injury Prevention
TABLE OF CONTENTS
Section 1 Upfront
Introduction..... 1
The Principal....2
The Teacher.4
The Student..6
The Parent.......7
Connections to the Grade 8 Curriculum......8
Using CyberCops .......9
Background........10
Definitions ..11
Section 3 Supports
Copy Masters....32
Appendices
A Literacy Whole-class Discussions Four Corners ..54
B Literacy Writing Modified Word Wall59
C Reporting....63
D Additional Supports.. 66
E Glossary. 68
References 74
Healthy Living
Personal Safety and Injury Prevention
SECTION 1
Upfront
Healthy Living
Personal Safety and Injury Prevention
INTRODUCTION
The Ontario Curriculum for elementary schools recognizes the importance of and strongly encourages
the use of technology to support learning in all curriculum areas. Elementary schools are more equipped
with higher levels of technology to support and extend classroom learning. With this increased ability to
explore the cyberworld and all the benefits that come with it, there is also a new set of concerns for the
personal safety of the children and youth using this technology. As a result, new levels of safety are
required to ensure all students are able to learn in a safe and supportive environment with the tools
needed to achieve success.
A wealth of information is available through CD ROMs, the Internet, and many other simulation
activities. As a result, our students are spending more time on computers, both at home and at school,
accessing previously unavailable information. With increased access, however, comes an increased risk
for those who explore cyberspace. In the information age, schools can and should take a role in teaching
students how to be multimedia and technology literate in a world that is increasingly digital. Principals
must be aware of Internet safety and the dangers that exist for students; classroom teachers must also
be aware of and teach students about strategies to stay safe on-line (Jilks-Racine, 2005).
Healthy Living
Personal Safety and Injury Prevention
THE PRINCIPAL
Role of the Principal
School Administrators have a DUTY OF CARE to:
Ensure that all reasonable safety procedures are carried out to protect the well
being of: students, staff, volunteers, visitors and others.
CODE OF CONDUCT
Principals, under the direction of
their school board, take a leadership
role in the daily operation of a school.
They provide this leadership by:
demonstrating care and
commitment to academic
excellence and a safe teaching
and learning environment;
holding everyone, under their
authority, accountable for their
behaviour and actions;
communicating regularly and
meaningfully with all members of
their school community.
Healthy Living
Personal Safety and Injury Prevention
Healthy Living
Personal Safety and Injury Prevention
THE TEACHER
Role of the Teacher
Education Act - Duties of the teacher: (Reg. 298, S.20)
g) Ensure that all reasonable safety procedures are carried out in courses and activities for
which the teacher is responsible.
CODE OF CONDUCT
Teachers and School staff, under the
leadership of their principals, maintain
order in the school and are expected to
hold everyone to the highest standard
of respectful and responsible
behaviour. As role models, staff uphold
these high standards when they:
help students work to their full
potential and develop their selfworth;
communicate regularly and
meaningfully with parents;
maintain consistent standards of
behaviour for all students;
demonstrate respect for all
students, staff and parents;
prepare students for the full
responsibilities of citizenship.
Healthy Living
Personal Safety and Injury Prevention
3. Communicate to Students
Listen to students concerns and fears and help them seek appropriate help. If it is related to school use,
follow appropriate board policies for reporting inappropriate internet use and disclosure of student
information.
Post in the computer lab or by computers safety tips for using the computer. You may want to have a
learning bulletin board that outlines safe Internet practices and what students should do if inappropriate
situations arise.
Teach students how to use technology respectfully and how to be a responsible cybercitizen.
This includes information on appropriate participation in chat rooms, how to appropriately deal with
potentially dangerous situations and how to access support.
It is important to teach the students how to look after and protect themselves. They must learn to
question all people they meet, whether in person or on the Internet. There are warning signs when
students are out in the real world, there are few in cyberspace.
4. Communicate with Parents
Ensure all parents are informed and understand that students will be using the Internet, the type of
technology that will be used and the Acceptable Use Policy of the school prior to students using the
Internet. Parents must understand the seriousness of inappropriate Internet use and the potential threats
associated with it.
Provide ongoing communication about the use of technology in the classroom and tips for safe Internet
use. This information can be published in class newsletters.
5. Work in Partnership
Contact the local police department or Ontario Provincial Police to access an officer with expertise and
experiences in the areas of cybersafety to come in to support the teaching of Internet safety in the
classroom.
Healthy Living
Personal Safety and Injury Prevention
THE STUDENT
How Students can Help
The increase in information and communication access for youth through the Internet and chat rooms
provides new freedom and access to the world, and with this comes new responsibilities. Students are
responsible for understanding and following the Acceptable Use Policies of the Internet while at school
and at home. Students should also ensure that they know what to do if a potentially dangerous situation
arises.
1. Acceptable Use Policy
Read carefully the Acceptable Use Policy and share with your parents. Remember that nothing you
write on the web is completely private including email, so be careful and think about what you type
and who you tell. Never use language in chat rooms that you would not use in public.
2. Organization and Supervision
Never arrange a face-to-face meeting without telling your parent/guardian. If your parent/guardian
agrees to the meeting make sure you meet in a public place with a parent/guardian present. It is
potentially dangerous to meet unsupervised.
Be wary of those who want desperately to be your friend, especially if they try to turn you against your
parents or real friends.
Respect the feelings and privacy of others online.
Choose a password that is easy to remember and hard to guess.
Only chat over a webcam with people that you already know and trust in the real world, under adult
supervision wherever possible.
Be sure that you are dealing with someone that you and your parent/guardian know and trust before
giving out any personal information about yourself via email such as name, home address, school
name, or telephone number in a public message, such as a chat room or on bulletin boards.
Never send a person a picture of yourself without first checking with a parent/guardian.
Never open emails, files, links, images or games from people you do not know or trust.
3. Communicate to Parents
Remind your parents to keep the family computer properly protected by installing up to date security
patches, current anti-virus software and a firewall.
Let your parents know the moment something worries you
CODE OF CONDUCT
online and report it to the chat service provider. Save any
Students are to be treated with respect
conversations that you think could prove someone has
and dignity. In return, they must
been bullying or harassing you. Some chat rooms have
demonstrate respect for themselves, for
instructions on how to do this.
others and for the responsibilities of
Be careful when someone offers you something for
citizenship
through
acceptable
nothing, such as gifts and money. Be very careful about
behaviour.
Respect
and
responsibility
any offers that involve you coming to a meeting or having
are demonstrated when a student:
someone visit your house.
comes to school prepared, on time
4. Communicate with School
and ready to learn;
Understand the school/board Acceptable Use Policy and
shows respect for themselves, for
ensure that you are using the computers for school related
others and for those in authority;
work. Report potentially dangerous situations immediately.
refrains from bringing anything to
Know who to talk to at the school and the steps to take if a
school that may compromise the
potentially dangerous situation arises.
safety of others;
5. Work in Partnership
takes responsibility for his or her own
If a dangerous situation arises communicate the situation
action.
to parents, teachers, peers, police officers, etc.,
immediately in order to support yourself in addressing and
resolving the situation and preventing the situation from getting worse.
Healthy Living
Personal Safety and Injury Prevention
THE PARENT
How Parents can Help
Parents must stay well informed about the dangers that their children could encounter as they explore
the Internet. By understanding these dangers and discussing them with their children, parents can help
realize the positive potential of the Internet while minimizing its inherent risks.
1. Acceptable Use Policy
Establish a set of rules for your child(ren) to follow when using the Internet that include amount of use,
how to interact appropriately online, and what to do if they feel uncomfortable or in danger.
Be familiar with the school/board Acceptable Use Policy. When this document comes home to be
signed, discuss the components with your child and outline the benefits of using technology and the
safety procedures that need to be taken when using it.
2. Organization and Supervision
Keep Internet-connected computers in an open area and out
of the bedrooms. Check out your childs Instant Messaging
(IM) names and profiles to ensure personal information is
not being shared or accessed over the Internet.
Supervise childrens computer usage. Do not rely on filtering
software to do the work.
3. Communicate with Your Child(ren)
Talk to your children about Internet safety and ethical
behaviour on the Internet. Participate with them online. If
they know more than you, let them teach you.
Ensure that, if your children are thinking of meeting an online
friend, they check with you. It is potentially dangerous for
this meeting to take place unsupervised.
Teach your child(ren) never to give out personal information
without your permission when using email, chat rooms, or
instant messaging, filling out registration forms and personal
profiles, and entering online contests.
Encourage your child(ren) to come to you if they receive a
message that makes them feel uncomfortable or threatened.
The Internet should not be used to spread gossip, bully or
threaten others.
CODE OF CONDUCT
Parents play an important role in the
education of their children and have a
responsibility to support the efforts of
school staff in maintaining a safe and
respectful learning environment for all
students.
Parents
fulfill
this
responsibility when they:
show an active interest in their child's
school work and progress;
communicate regularly with the
school;
help their child be neat, appropriately
dressed and prepared for school;
ensure that their child attends school
regularly and on time;
promptly report to the school their
childs absence or late arrival;
become familiar with the Code of
Conduct and school rules;
encourage and assist their child in
following the rules of behaviour;
assist school staff in dealing with
disciplinary issues.
5. Work in Partnership
Be aware of the supports available in the community to support safe Internet practices and how to
access them if needed.
Be aware of the safety features that the Internet Provider has available.
If a situation becomes potentially dangerous contact and report the situation immediately to the local
police, school administrator, or other support agencies.
Healthy Living
Personal Safety and Injury Prevention
Healthy Living
Personal Safety and Injury Prevention
USING CYBERCOPS
The CyberCops: Air Dogs disc included in this resource includes the following: A Guide for Parents and
Teachers, the Air Dogs game, the Consequences and the Confession modules and Internet Safety Plan
pages.
1. Download the Guide for Parents and Teachers which includes the Detectives Notebook and
the Internet Safety Plan poster template. The guide is a PDF that can be downloaded to paper. It
gives useful background information and suggestions for using the game in the classroom and
introduces the four components of the Air Dogs program.
The Guide for Parents and Teacher includes a description of the Air Dogs game, including the
Detectives Notebook which includes the puzzles and their answers.
The next pages of the Guide illustrate Consequences, a class discussion that helps students
assess the serious penalties resulting from cybertheft.
The third part of the Guide demonstrates Confession, a class discussion focusing on the lifelong legal and social consequences of cybertheft on the individuals involved as well as their
families.
Finally, this Guide includes an Internet Safety Poster Template. Using this template, students
can design a poster with their own Internet safety guidelines. Teachers should also download
these pages.
2. View the slide show for background and suggestions on how the game can be played in the
classroom.
There are two ways of playing Air Dogs in the classroom:
Theatre Style: The game can be played on a single computer, hooked up to a projector at the front of
the classroom. The teacher assigns one student to use the keyboard, while the rest of the class is asked
to call out their answers to the puzzles. Played this way, the class will finish the game in approximately
40 minutes.
Small Groups: The game can also be loaded onto multiple computers, with students playing in pairs.
One student is in charge of the keyboard, while the other writes down the clues. Played this way, it will
take approximately 60 minutes to play the game.
Note: the game must be played in sequence as it can not be stopped and restarted at the point stopped.
3. Download the game from the disc. The Air Dogs story is told through two simultaneous streams of
video. In order to achieve a smooth playback of both video streams, use a computer with a minimum of
384MB of RAM (512 for optimal playback). The computer should be loaded with Quicktime 6.02.
External speakers are recommended.
4. View Consequences. Consequences is a class discussion program in which the students are asked
to play the role of a cyberpolice officer examining the evidence amassed during the game and deciding
what charges can be laid against the perpetrators. This program also includes a website,
www.cybercops.net which offers a description of the Consequences activity to see one way this class
discussion can be conducted.
5. View Confession. Confession is the real story used in the creation of Air Dogs. Students read
Confession and then discuss the life-long social and legal consequences of cybertheft on both the
individuals involved and their families.
Healthy Living
Personal Safety and Injury Prevention
BACKGROUND
The Ontario Government has funded the CyberCops game series Mirror Image (Grade 7) and Air
Dogs (Grade 8) as part of its commitment to ensuring that youth in Ontario schools learn through
concrete applications, the critical thinking skills required to make judicious decisions associated with
Internet use.
The Personal Safety and Injury Prevention component of the Health and Physical Education Curriculum
document is the primary subject area in the curriculum where students can learn about Internet safety.
This component of the Health and Physical Education curriculum focuses on effective decision making
skills, conflict resolution, resistance and refusal techniques at all age levels to respond to various
situations effectively. Students in grades 7 and 8 would have prior knowledge related to these living
skills and thus a solid foundation on which to apply the knowledge acquired through the CyberCops
programs, Mirror Image and Air Dogs.
Healthy Living
Personal Safety and Injury Prevention
10
DEFINITIONS
The following definitions can help teachers and other users, such as community police officers to identify
and understand the following elements within the game: cyberbullying and how it can play a role in
escalating further violent acts, cybercrime and software piracy.
Cyberbullying
"Cyberbullying involves the use of information and communication technologies such as e-mail, cell
phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory
online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual
or group, which is intended to harm others." -Bill Belsey, President, Bullying.org Canada
Please note the terms cyberbullying and cyberharrasment are interchangeable in this resource.
How Cyberbullying Takes Place
Cyberbullying, like other forms of bullying, is about human relationships, power and control. Those who
bully others are trying to establish power and control over others that they perceive to be weaker than
them. Those who bully want to make victims feel that there is something wrong with them. It is the
bullies who have the real problems.
How it Starts
In most cases, cyberbullies know their victims, but their victims may not know the cyberbully. The
aggressor may or may not be bullying their victims through physical, verbal, or other means that are
more commonly identified. With the increase in mobile communications (i.e., cell phones, text
messaging, wireless Internet access), cyberbullying can happen at any time and place and for many
children, home is no longer a refuge from negative peer interaction and pressures such as bullying.
Cyberbullying and the Law
Some forms of cyberbullying are considered criminal acts. Under the Criminal Code of Canada, it is a
crime to communicate repeatedly to someone if your communication causes them to fear for their own
safety or the safety of others. It is also a crime to publish a defamatory libel writing something that is
designed to insult a person or likely hurt a persons reputation by exposing him/her to hatred, contempt
or ridicule.
A cyberbully may also be violating the Canadian Human Rights Act if he/she
spreads hate or discrimination based on race, national or ethnic origin, colour,
religion, age, gender, sexual orientation, marital status, family status or
disability.
Cybercrime
Many young people believe that software piracy and computer hacking are
clever or cool. Air Dogs illustrates that these are serious crimes that may
carry heavy legal penalties.
Cybercrime consists of specific crimes dealing with computers and networks
(such as hacking) and the facilitation of traditional crime through the use of
computers (child pornography, hate crimes, telemarketing /Internet fraud). In
addition to cybercrime, there is also computer-supported crime which covers
the use of computers by criminals for communication and document or data
storage. While these activities might not be illegal in and of themselves, they
are often invaluable in the investigation of actual crimes. (www.dfaitmaeci.gc.ca/internationalcrime/cybercrime-en.asp).
Health and Physical Education
Grade 8
Healthy Living
Personal Safety and Injury Prevention
11
Software Piracy
Software piracy is defined as the unauthorized distribution or reproduction of software for business or
personal use. The purchaser of software is the licensed user (not the owner of the software) and has
the right to use the software on a single computer, but not to put copies on other computers or to pass
that software on to friends. Whether software piracy is deliberate or not, it is illegal and punishable by
law.
Healthy Living
Personal Safety and Injury Prevention
12
SECTION 2
The Unit
Healthy Living
Personal Safety and Injury Prevention
Healthy Living
Personal Safety and Injury Prevention
13
Healthy Living
Personal Safety and Injury Prevention
14
2. Waybill Number. When a package is shipped by courier, the sender fills out a
waybill, a sheet of paper that states the contents of the package. The courier company then gives the
shipment a waybill number, a digitized representation of the code on the package, which helps to trace
the package.
When a package crosses an international border, officials want to be sure that the package contains
exactly what the shipper stated on the waybill. They can detect misinformation by checking the
addresses of the send and receiver, and by weighing any suspicious packages. They may also check
the financial history of the credit card that was used for the shipment.
3. PixPass. Most of us protect our computer files with a password, a series of letters
and numbers that only we know. But programmers are also experimenting with graphic passwords.
These are composed of a series of icons that have special meaning to the person who owns the
computer. In the Air Dogs game, we have used the fictitious name PixPass for this technology.
When police officers get a warrant to search a computer, they have to guess which icons the perpetrator
has used for the graphic password. In the future, police may be able to run a program that tests all the
possible combinations of icons, so the police can solve graphic icons more quickly.
4. Tixel. A digital photograph is made up of four layers of information. The first three
layers are red, green and blue. A combination of these layers gives the photograph its colour.
The fourth, called the Alpha layer, is usually empty. However, criminals have learned that it may be
used to carry secret information. For example, people may use it to send messages or images. In the
Air Dogs game, this technology (called steganography) has been given the fictitious name, Tixel.
Healthy Living
Personal Safety and Injury Prevention
15
5. Triangulation. When our cell phones are turned on, they constantly emit a signal to
tell surrounding cell phone towers where the cell phone is located. Cyberpolice officers can use this
signal to track the location of a criminal.
To do so, the police officer measures the strength of the signal that is received at three nearby cell
phone towers. They may also determine the length of time it takes for the signal to travel from the tower
to the cell phone. By comparing information from three nearby cell phone towers, police can determine
the geographic location of the criminal.
6. Thermal Imaging. When it is difficult to see a suspect with the naked eye, police
departments use sophisticated camera equipment that picks up an image of the heat of a suspects
body.
In the Air Dogs game, the police officers track Terry with ground-based infrared imaging. In these video
images, a person appears in red or yellow, while the surrounding forest appears blue or violet. The
game also demonstrates a second kind of infrared image, which appear in black-and-white. Inanimate
objects are dark grey or black, while living creatures stand out in white.
Healthy Living
Personal Safety and Injury Prevention
16
Stephens counterpart in Vermont is Marisol, a by-the-book agent who has been sent in from New York
City to step up law enforcement along the US/Canadian border. Marisol is frustrated that she has been
assigned to a small border station, when she could be handling more challenging cases.
Stephen calls his son and he discovers that Luke is unrepentant about missing school. He is training
intensively with his coach, Terry, hoping he can master some new moves for the Air Dogs tournament in
Vermont. Nothing his father says can persuade him to return home.
Suddenly, a courier knocks on the door of Lukes dorm room and brings in a package. Snowboarding
gear, Luke tells his father as he stows the package quickly under his desk.
But Stephen is suspicious and takes an electronic photo of his son that captures the waybill number of
the package. Although Marisol feels that the photograph is a violation of his sons privacy, Stephen
sends the image off to be analysed.
Challenge: The photograph reveals that the label has been partially ripped from Lukes package. Only
the first few digits of the waybill number are legible. Players must decipher the bar code to get the
waybill number and then find out what the package contains.
Solution: Each vertical pattern represents a discrete number. Students must decode the final four
numbers by comparing them to a chart. When they complete the sequence, they check the records from
the courier company and find that the package contains two new laptop computers.
Healthy Living
Personal Safety and Injury Prevention
17
Stephen is furious. He knows that his son cannot afford to buy two laptop computers so Luke must have
obtained them illegally. Stephen calls his son, but before he can question him, two older teens enter
Lukes dorm room.
Taylor and James noticed the courier as he was leaving Lukes room, and have learned that Luke has
received a package with two laptops. The older boys demand that Luke hand over his laptops. If not,
they threaten to post embarrassing photos of Luke and his girlfriend on the Internet. Luke gives in.
Stephen and Marisol disagree on how the problem should be addressed. As a father, Stephen wants to
sort out the problem with the bullies privately; Marisol believes that the police should be involved. Theft.
Extortion. These are crimes, whether you are sixteen or sixty.
Stephen orders a search of the dorm rooms of Taylor, James and his son, Luke, requesting that their
laptops and phones be confiscated. Then he resigns from the case.
Challenge: Students must open Lukes computer by guessing the three icons that Luke has used for his
graphic password. If they click on the snowboard, the goggles and the snowboarder, the files will open.
Solution: By opening the emails, students can read Lukes email from Terry, his coach, praising his
snowboard skills. They can also read Lukes bank statement, which shows he has almost $10,000 in
the bank. Finally, there is a link to a bullying website with embarrassing photos of Luke and his girlfriend
Jeannette. The logo that runs along the bottom of the final page of the website is the same as on the
pirated software: TJ.
Marisol is determined to find out who is behind the ring of youth who are stealing laptops. Stephen
agrees to answer questions from the two American agents, but Luke is mute.
Marisol reveals what her investigation has uncovered. More than $100,000 worth of stolen laptops have
passed through Lukes hands. She has also found Lukes bank account, with only a small portion of that
money in it. She reasons that Luke has been forwarding the bulk of the money to someone else. Marisol
demands to know the name of his partner.
Stephen is stunned at the magnitude of the theft, but he resents the strong-armed tactics that Marisol is
using to get answers from Luke. Angrily, he cuts off the interview.
Challenge: The challenge is to prove there is a financial link between Luke and his partner in the scam.
Students are given a photo that the snowboarding coach, Terry, has sent to Luke.
Solution: The photograph shows Terry at the top of a mountain. A 3-D rendering of the photo reveals it
is made up of four layers, including bands of red, green and blue pixels. By stripping off the layers one
by one, students reveal a message in the Alpha band: Terry has sent Luke an account number from a
bank in Boston along with a cryptic message.
Terry has been using stolen credit card information to buy laptops, which he ships to Luke. Although
Luke thinks he has a job selling laptops, he is actually fencing stolen property.
Marisol insists that Luke reveal everything he knows about the cybertheft operation, but Luke is
adamant: he will not betray his friend and coach for fear of losing his one shot at the Olympic Games.
He is shocked to learn that Terrys promise to put him on the national team was a lie, used to manipulate
him into selling the laptops.
Reluctantly, Luke gives his father the cell phone number that Terry has told him to use in the event of an
emergency. Stephen only hands the information to Marisol when she promises to go easy on the youth
who have been caught up in Terrys network.
Health and Physical Education
Grade 8
Healthy Living
Personal Safety and Injury Prevention
18
Challenge: Terry is snowshoeing along the shore of Lake Memphramagog, hoping to cross the border
into Vermont unnoticed. The police will only be able to trace him by tracking the signal emitted by his
cell phone.
Solution: Students determine Terrys location by measuring the time it takes for a signal to go from his
cell phone to three cell phone towers. The 3-D model uses coloured discs to illustrate the distance.
When the distance to each of the three towers has been measured correctly, the map of the terrain
rotates, so the intersection of the three discs can be located. This is the spot where Terry will be found.
While Marisol and fellow agent Charlie pour over their map of the Vermont border, Luke lets slip that
Terry will try to escape by crossing into the United States on snowshoes, along the shores of a lake that
straddles the two countries.
The Department of Homeland Security tracks Terry using two infrared cameras. One camera is carried
by Marisol and Charlie who are combing the forest on foot. Marisol is frantic. She can hear Terry but
she cannot see him unless the camera reveals the bright-coloured image of a figure snowshoeing
through the woods.
A second camera is mounted in a helicopter, which is surveying the terrain along the lake. It sends back
black-and-white video. From time to time figures cross the screen: turkeys, a wolf and the police
officers hunting on the ground.
Finally, students spot Terry as he makes his way through the forest. When Marisol moves in for the
arrest, Terry threatens his Canadian accomplice: Luke, buddy, remember. If I go down, you go down.
Challenge: Students must pinpoint Terrys location. He has crossed the border by snowshoeing along
the shore of Lake Memphramagog from Quebec to Vermont.
Solution: By cross-checking Charlies ground-based thermal video with images from a helicopter
overhead, students are able to pinpoint Terrys location and click on it.
Healthy Living
Personal Safety and Injury Prevention
19
2. Consequences
The Consequences activity opens with an appeal from Luke. He knows that he made a serious mistake
when he became involved in the credit card fraud, and he is willing to pay the penalty. But all of the
evidence suggests he was the organizer of both the fraud scheme and the software piracy. Luke asks
students to uncover evidence revealing Terry, Taylor and James as the organizers.
Challenge: Students put themselves in Marisols shoes and must decide what charges can be laid
against Terry, the bullies and Luke.
Solution: Students review the seven pieces of evidence that were gathered during the game. Most of
the evidence points at Luke: the pirated discs, the note on his bulletin board, the waybill information from
the courier company and his bank account records all implicate him.
Under careful scrutiny, students may find two clues that can be used to prove that Terry and the bullies
organized the criminal networks. If they compare the writing on the note with the graffiti on Lukes door,
they will see that the letter L is similar. This handwriting evidence shows that Taylor and James gave
Luke instructions for pirating the discs.
If students review the photograph of Terry, they will see not only Terrys bank account number, but also
an encrypted message. By comparing the number/letter encryption with the credit card number on the
bottom of the waybill, they will realize that Terry has provided Luke with the credit card number he has
used to order the laptop computers
The class discussion focuses on the tactics that Terry and the bullies have used to persuade Luke to
become involved in their criminal activities. Terry has used persuasion - free coaching, money, and
snowboarding gear - to draw Luke into a cybertheft ring. The two bullies have used threats and
humiliation to force Luke to take the fall for their software piracy.
3. Confession
After playing the Air Dogs game, students often ask: Did this really happen? When they learn that Air
Dogs is based on a true story, they often want to learn the details. Confession allows students to read
the real story and then discuss how Kyles (the real snow boarding coach) brief, six-month foray into
cybertheft brought a lifetime of consequences.
Healthy Living
Personal Safety and Injury Prevention
20
Description
By the end of this unit the students will analyse situations that are potentially dangerous to their personal
safety. They will also identify support services that assist victims of violence and explain how to access
them.
Sub-Task Title
1. Prior Knowledge Reviewing Cyberharrassment and Internet
Safety
2. Air Dogs Playing the Game
3. Air Dogs Identifying Ways to be Safe
4. Air Dogs Analyse Situations that are Potentially Dangerous to
Personal Safety
Expectation Codes
8p14, 8p15
8p14, 8p15
8p14, 8p15
8p14, 8p15
Healthy Living
Personal Safety and Injury Prevention
21
The teacher sends home CM13 Sample Letter to Parent (s)/ Guardian(s).
The teacher should become familiar with the Air Dogs game (i.e., read the game synopsis and play the
game) before introducing it to the students.
The teacher decides if the game will be played in a theatre style or in small groups and arrange access
to the necessary computers and/or equipment (i.e., data projector) for an adequate amount of time.
Dealing with Disclosure
The teacher is required to be aware of legislation (Child and Family Services Act, Section 72 Duty to
Report) and school board policies regarding reporting of disclosures of abuse (or suspected neglect) to
the Childrens Aid Society. Before commencing any anti-violence lessons, the teacher is required to
know the procedures for the reporting and documenting of abuse and ways to support students. See
Appendix C for a complete listing of the Child and Family Services Act responsibilities.
Cautionary Notes:
During the presentation of the following material, the potential exists for students to disclose
personal experiences of an abusive nature. Encouragement should be given to the student to
take up such matters with the teacher outside the context of the class. It is incumbent upon the
teacher to follow up with the directions specified in their boards Child Abuse Protocol.
Modifications and/or Accommodations
Not all students in a Grade 8 classroom will be able to complete, independently, all of the unit
suggestions or assessments. The teacher should adapt the Teaching/Learning Strategies to
accommodate for the needs of students with exceptionalities and ensure that the accommodations are
consistent with the strategies outlined in their IEP. Students may require scribing, instructions repeated,
paired groupings, etc.
Appendices
Copy Master 1 Information and Communication Technology (ICT) Inventory
Copy Master 2 Be Safe! Know Information and Communication Technology Uses
Copy Master 3 Cyber Graphic Organizer
Copy Master 4 Word Cards
Copy Master 5 Introduction to the Game (The Real Story)
Copy Master 6 Air Dogs Log Book
Copy Master 7 Air Dogs Log Book Answers
Copy Master 8 Profile Recorder
Copy Master 9 Steps in Decision Making Model
Copy Master 10 Steps in Decision Making Model Sample for Luke
Copy Master 11 Decision Making Checkbric Assessment Tool
Copy Master 12 ICT Case Scenarios
Copy Master 13 Sample Letter to Parent(s)/ Guardian(s)
Copy Master 14 Code of Conduct
Copy Master 15 Understanding Internet Safety Protocol
Copy Master 16 Air Dogs Internet Safety Poster Template
Copy Master 17 Air Dogs Internet Safety Poster Template Sample
Appendix A Four Corners (Whole-class Discussions)
Appendix B Modified Word Wall Strategy (Creating a Word Wall))
Appendix C Reporting Child Abuse and Neglect
Appendix D Additional Supports
Appendix E Glossary
Health and Physical Education
Grade 8
Healthy Living
Personal Safety and Injury Prevention
22
Sub Task # 1
Title: Reviewing Cyberharassment and Internet Safety
Materials
CM 1 Information and Communication Technology (ICT) Inventory
CM 2 Be Safe! Know Information and Communication Technology Uses
CM 3 Cyber Graphic Organizer
CM 4 Word Cards
CM 9 Steps in Decision Making Model
CM 11 Decision Making Model Checkbric Assessment Tool
CM 14 Code of Conduct
Appendix A Four Corners
Appendix B Modified Word Wall Strategy
Appendix D Additional Supports
Writing Utensil
Description
Students will review their understanding of cyberharrassment and Internet safety. This will set the
context for the rest of the unit.
Expectation Code
8p14,8p15
8p14,8p15
Learning Expectations
Analyse situations (e.g., sharing personal information through
instant messaging, blogging) that are potentially dangerous to
personal safety
Identify support services (e.g., the school guidance counselor,
trusted teacher/adult, shelters, Kids Help Phone) that assist
victims of violence, and explain how to access them
Healthy Living
Personal Safety and Injury Prevention
23
Teaching/Learning Strategies
Four Corners
Activate students prior knowledge around cyberharassment using the Four Corners strategy. See
Appendix A for description and samples of the strategy.
Have each student think about, and respond to, the following by going to a corner picture that best
represents their thoughts on the statement:
Students will move to their chosen corner and discuss in a small group why they chose that particular
picture. The pictures found on page 63 in Appendix A can be enlarged for posting around the room.
Each group will decide on one idea to share with the whole class.
The teacher will call upon the various groups to share information gathered in the small group
discussions with the whole class.
CM2 Be Safe! Know Information and Communication Technology Uses:
Provide each student with a copy of CM2 Be Safe! Know Information and Communication
Technology Uses. Each student will indicate True or False under the Before column on the guide.
Once complete, have students share their opinions with a partner and then with the class.
The teacher may wish to encourage students to think about any questions they may have around this
anticipation guide and ask students to record the thoughts at the bottom of the page for use as a
question swap later in the unit.
Students will use this guide in Subtask 4 to help fill out their decision making model.
Word Wall
See Appendix B Modified Word Wall Strategy for descriptions and samples of the strategy.
The teacher will give an introduction to the language that students will be exposed to in this unit (some
may have been generated already through the previous activities, in which case there can be a
comparison) and students will complete the modified word wall task using pre-made word cards to
match key terms with definitions that will be useful during the unit. See CM4 Word Cards.
CM1 Information and Communication Technology Inventory:
Distribute CM1 Information and Communication Technology (ICT) Inventory
Student activity: Each student will individually complete CM1 ICT Inventory.
Students will complete:
What does ICT mean?
Types of ICT that are regularly used by the public?
What types of ICT do you use?
What are your family rules around using ICT?
What are the dangers associated with using ICT?
Some inappropriate uses of ICT are
With an elbow partner (a group of 2 or 3 students sitting near each other), students will share the
information that they have recorded on the CM1 ICT Inventory sheet. Students will then highlight any
answers they have given that could put them at risk when they are communicating using these ICTs.
If time permits provide an opportunity for the whole class to share some ideas around the ICT Inventory
using a popcorn style of commenting (e.g., if a student has something to share they stand up and
Health and Physical Education
Grade 8
Healthy Living
Personal Safety and Injury Prevention
24
share and sit right back down again allowing for another student to pop up and share. This continues for
a few minutes until all comments have been shared.)
Have students work with their partner and another pair to brainstorm some familiar terms that are used
with respect to ICT. Have each group share their list with the class while the teacher records the words
on the chalk board or chart paper.
Cyber Graphic Organizer Introduction
Introduce the cyber graphic organizer, CM3 Cyber Graphic Organizer.
The organizer will be used starting in Subtask 2. Students will complete the organizer using information
gathered throughout the unit.
Introduce the CM11 Decision Making Model Checkbric Assessment Tool and the CM9 Steps in
Decision Making Model and explain that they will be analysing a case scenario for use as a final
assessment.
Curricular Extension Code of Conduct with respect to On-line acceptable conduct
Students will read the Code of Conduct provided in CM14 Code of Conduct and will discuss with a
partner or a small group what is missing and what might need to be added to the code to reflect the
many uses of ICT.
Students can also examine their schools Code of Conduct and make recommendations to the principal
for items to be added to ensure students are safe on the Internet and are using the various forms of ICT
in an appropriate manner.
Healthy Living
Personal Safety and Injury Prevention
25
Sub Task #2
Title: Playing the Game
Materials
Air Dogs game (loaded on the computer)
LCD projector if presenting theatre style (see description below)
External speakers are recommended
CM 3 Cyber Graphic Organizer
CM 5 Introduction to the Game (The Real Story)
CM 6 Air Dogs Log Book
CM 7 Air Dogs Log Book Answers
Writing Utensil
Description
In this sub-task students will play the Air Dogs game.
Expectation
Code
8p14,8p15
8p14,8p15
Learning Expectation
Analyse situations(e.g., hitchhiking, gang violence, violence in relationships)
that are potentially dangerous to personal safety
Identify support services (e.g., the school guidance department, shelters,
Kids Help Phone) that assist victims of violence, and explain how to access
them
Healthy Living
Personal Safety and Injury Prevention
26
given before the correct answer is entered or one must wait until the end of that video sequence
so as to avoid disturbing students concentration during the video. There is an opportunity to
advance more quickly through the game; to skip a clue, wait for the dialog box to appear and
type in the work skip.
Theatre Style: The game can be played on a single computer, hooked up to a projector at the front of
the classroom. The teacher assigns one student to use the keyboard, while the rest of the class is
asked to call out their answers to the challenges. Played this way the class will complete the game in
approximately 40 minutes.
Small Groups: The game can also be loaded onto multiple computers, with students playing in pairs.
One student is in charge of the keyboard, while the other writes down the clues. Each group may wish
to have roles for individual students (e.g., time keeper, leader who controls the mouse, recorder). Played
this way the class will complete the game in approximately 60 minutes.
Teaching/Learning Strategies
Introduction
Before going to the computer lab or accessing the Air Dogs game, it is essential that the teacher
provides introductory information about the game.
Explain to students that the Air Dogs game is based on a real life story that happened in the United
States. Read CM5 Introduction to the Game to the class prior to playing the game. The Air
Dogs game has three streams of video: from the RCMP office in Quebec, the Homeland Security
office in Vermont, and from the video telephones of Luke and Marisol. This represents, in a
fictional format, emerging technology in which offices and cell phones can share live video signals.
Inform students that they are taking on the role of a CyberCop to gather information and help solve
challenges throughout the game. It is important for students to understand their overall purpose for
completing the game is to 1) Beware of Internet Fraud; 2) Avoid Counterfeit Software; 3) Report
Bullying.
It is essential that students collect information as they go through the game. There will be five
challenges throughout the game that the students must recognize and input information accurately
in order to move on.
Provide each student with CM6 Air Dogs Log Book to record their responses to the clues and
important information as they play the game. Inform students that if they do not accurately solve
the clue within three attempts, they are to bring the log book to the teacher who will provide the
correct response.
Remind students that there is a limited amount of time to complete the game.
Play the game
After the game
Allow students time to complete CM6 - Air Dogs Log Book.
Address and clarify any questions that may have arisen after playing the game.
Cyber Graphic Organizer
In pairs, students complete the sections on CM3 Cyber Graphic Organizer.
Curricular Extension
After playing the game, what are some of the pieces that students might change or add to their ICT
Inventory?
Healthy Living
Personal Safety and Injury Prevention
27
Sub Task # 3
Title: Identifying Ways to be Safe
Materials:
CM 3 Cyber Graphic Organizer
CM 8 Profile Recorder
CM 15 Understanding Internet Safety Protocol
CM 16 Air Dogs Internet Safety Poster Template
CM 17 Air Dogs Internet Safety Poster Template Sample
Writing Utensil
Markers
Description:
Students will identify similarities and differences between the situations in the game and their own lives,
and identify how to deal with them appropriately and safely. Students will identify the supports available
to them.
Expectation
Code
8p14,8p15
8p14,8p15
Learning Expectation
Analyse situations(e.g., sharing personal information through instant
messaging, blogging) that are potentially dangerous to personal safety
Identify support services (e.g., the school guidance counsellor, trusted
teacher/adult, shelters, Kids Help Phone) that assist victims of violence, and
explain how to access them
Assessment Opportunities:
Students will complete CM8 Profile Recorder. This will enable the teacher to examine if the
students are able to identify how people may be vulnerable to potentially dangerous situations, and how
to access the support services available to them.
Teaching/Learning Strategies:
Use a think pair share activity to generate discussion about what made Luke vulnerable. Ask students to
individually read and reflect on what each wrote in CM3 Cyber Graphic Organizer. Then in pairs
students will share what each wrote in the Cyber Graphic Organizer. Students will discuss some of the
unsafe practices that Luke demonstrated during the game. What was it that made Luke vulnerable?
Lead a class discussion about what students saw in the game about how Luke was vulnerable to
bullying and extortion.
Have the students individually complete the CM8 Profile Recorder in order to identify and record how
Luke was enticed to make the choices that he did. Students will examine the similarities and differences
between Lukes character and themselves to complete the remaining sections.
Exit Pass:
Students will complete the question on the bottom of the CM8 Profile Recorder as an exit pass. An
exit pass refers to an activity that students will need to complete by the time of the end of a period or
class. Students will identify three to five ways to prevent myself from being cyberharassed and what
supports are available to me.
Healthy Living
Personal Safety and Injury Prevention
28
Curricular Extensions
CM15 Understanding Internet Safety Protocol. Have students read through the article and discuss
how they are currently being safe on the Internet and what they could do to be safer using the Internet.
CM16 Air Dogs Internet Safety Poster Template
Have students develop a poster addressing Internet safety using the template (or create your own).
Ensure that students include the three main points addressed in the Air Dogs resource:
1) Beware of Internet Fraud
2) Avoid Counterfeit Software
3) Report Bullying
Teachers may wish to distribute CM17 Air Dogs Internet Safety Poster Template Sample as an
example of an Internet Safety Poster.
Healthy Living
Personal Safety and Injury Prevention
29
Sub Task # 4
Title: Analyse Situations That Are Potentially Dangerous to Personal
Safety
Materials:
CM 2 Be Safe! Know Information and Communication Technology Uses
CM 9 Steps in Decision Making Model
CM 10 Decision Making Model Sample for Luke
CM 11 Decision Making Checkbric Assessment Tool
CM 12 ICT Case Scenarios
Writing Utensil
Description:
Students will analyse situations that are potentially dangerous to their personal safety. Students will also
identify support services and explain how to access them.
Expectation
Code
8p14,8p15
8p14,8p15
Learning Expectation
Analyse situations(e.g., hitchhiking, gang violence, violence in relationships)
that are potentially dangerous to personal safety
Identify support services (e.g., the school guidance department, shelters, Kids
Help Phone) that assist victims of violence, and explain how to access them
Assessment Opportunities:
Assessment - Using CM11 Decision Making Checkbric Assessment Tool teacher assesses the
students ability to analyse situations that are potentially dangerous to personal safety and identify
support services and how to access them.
Teaching/Learning Strategies:
Model a decision making process by working through a problem that Luke encountered. Using CM 10
Decision Making Model Sample for Luke, lead a class discussion.
Case Scenarios
Students will individually analyse a case scenario (see CM12 ICT Case Scenarios) by using CM9
Steps in Decision Making Model.
Distribute or post CM11 Decision Making Checkbric Assessment Tool and discuss the assessment
tool.
Students identify the problem, explore the options or alternatives, evaluate the possibilities, consider the
consequences, make a decision, and reflect on that decision.
Students may refer back to CM2 Be Safe! Know Information and Communication Technology
Uses to help them in the decision making process.
Curricular Extension
Teachers may use this piece as an evaluation of the unit being studied.
Students will create a Public Service Announcement (PSA). Students choose one piece of Internet
safety (instant messaging, blogging, etc.) and make their audience aware of how to stay safe, students
Healthy Living
Personal Safety and Injury Prevention
30
choose: a target audience and a medium for the PSA. The PSA can be delivered through a poster,
video, rap/song, story, or PowerPoint presentation. Students need to address the following areas:
1. Safety concern
2. Strategies on how to be safe
3. Available supports that assist victims of violence
Healthy Living
Personal Safety and Injury Prevention
31
SECTION 3
Supports
Healthy Living
Personal Safety and Injury Prevention
Copy Master 1
Healthy Living
Personal Safety and Injury Prevention
32
Copy Master 2
After
T
F
Statement
1. Instant Messaging people I do not know is asking for
problems.
2. It is important to always use a good, up-to-date antivirus and spyware blocking program.
3. Bullying can instigate further violent acts such as
assault, robbery and extortion.
4. Posting information that may be used to identify or
find you offline such as full name, address, cell or phone
number, school or sports team, or links to sites that have
that information is not recommended at any time.
5. It is advisable to keep your password a secret even if
an email asks you to log on to a site.
6. It is possible to talk to several people at once without
knowing it.
7. Your computer camera images could easily be shared
anywhere by anyone.
8. Software piracy and computer hacking are cool
activities.
9. People can be bullied using Information and
Communication Technologies.
10. 21% of kids have received mean or threatening
email or other messages.
11. 65% of students between 8-14 have been involved
directly or indirectly in a cyberbullying incident as the
bully, victim or friend.
12. 40 % of students have had their password stolen
and changed by a bully (locking them out of their own
account) or sent communications posing as them.
Question Swap
Healthy Living
Personal Safety and Injury Prevention
33
Copy Master 3
Healthy Living
Personal Safety and Injury Prevention
34
Copy Master 4
Word Cards
Camera
Phone
Information and
Communication
Technologies
(ICT)
Instant
Messaging
Peripherals
Healthy Living
Personal Safety and Injury Prevention
35
Pirating
Software
URL
(Uniform Resource
Locator)
Web Browser
Healthy Living
Personal Safety and Injury Prevention
36
Copy Master 5
Healthy Living
Personal Safety and Injury Prevention
37
Copy Master 6
Healthy Living
Personal Safety and Injury Prevention
38
Copy Master 7
Terry
Please note if a computer malfunctions, teachers may want to go back to the same spot in the game
quickly. To skip a clue, wait for the dialog box to appear and type the work skip.
Healthy Living
Personal Safety and Injury Prevention
39
Copy Master 8
Profile Recorder
Similarities and Differences
How was Luke vulnerable and enticed into the choices he made? (Consider the ICTs he
used, his character, social influences, parental influences, past experiences and interests)
Luke
How am I vulnerable and how could I be enticed into making unsafe choices? (Consider the
ICTs you use, your own character, social influences, parental influences, past experiences
and interests.)
EXIT PASS
Healthy Living
Personal Safety and Injury Prevention
40
Copy Master 9
What are the options and choices? Analyse and weigh the options keeping in mind the
consequences. (Include supports that are available.)
Option 1
Option 2
Option 3
Consequences option 1
Consequences option 2
Consequences option 3
Healthy Living
Personal Safety and Injury Prevention
41
Copy Master 10
Luke is being bullied by Taylor and James, both on the internet and in person.
Bullying can lead to more aggressive forms of violence. Other students may see that
it is easy to bully Luke and may start to join in.
What are the options and choices? Analyse and weigh the options keeping in mind the consequences
(include supports that are available).
Option 3
Option 1
Option 2
Consequences option 1
The bullying continues
or it might even become
more severe.
Consequences option 2
The bullying might
become more intense.
More problems could be
created for fighting
back. The bullying
might become more
physical.
Consequences option 3
Taylor and James could
find themselves in
trouble. Taylor and
James could come back
to deal with me later.
Other things that Luke
has done may come out.
Go to a trusted
adult for help, and
tell them what
Taylor and James
have been doing.
42
Healthy Living
Personal Safety and Injury Prevention
Copy Master 11
LEVEL 1
LEVEL 2
LEVEL 3
Students have
identified the
problem and or
dangers associated
with it with limited
ability.
Students have
identified some of the
problems and or
dangers associated
with it.
Students have
identified the options
and supports available
with limited ability.
Evaluates decision
made with a limited
degree of
effectiveness.
Analyses the
alternative or
consequences of the
scenario with a limited
degree of
effectiveness.
Evaluates decision
made with some
degree of
effectiveness.
Analyses the
alternatives or
consequences of the
scenario with some
degree of
effectiveness.
43
Students have
identified most of the
problems and or
dangers associated
with it.
Students have
identified most of the
options and supports
available.
LEVEL 4
Students have
clearly and
accurately
identified the
problem and
or dangers
associated with
it.
Students have
clearly identified
the options and
supports
available.
Evaluates decision
made with a
considerable degree of
effectiveness.
Evaluates
decision made
with a high
degree of
effectiveness.
Analyses the
alternatives or
consequences of the
scenario with a
considerable degree of
effectiveness.
Analyses the
alternatives or
consequences
of the scenario
with a high
degree of
effectiveness.
Healthy Living
Personal Safety and Injury Prevention
Copy Master 11
LEVEL 1
LEVEL 2
LEVEL 3
Students have
identified the
problem and or
dangers associated
with it with limited
ability.
Students have
identified some of the
problems and or
dangers associated
with it.
Students have
identified the options
and supports available
with limited ability.
Evaluates decision
made with a limited
degree of
effectiveness.
Analyses the
alternative or
consequences of the
scenario with a limited
degree of
effectiveness.
Evaluates decision
made with some
degree of
effectiveness.
Analyses the
alternatives or
consequences of the
scenario with some
degree of
effectiveness.
43
Students have
identified most of the
problems and or
dangers associated
with it.
Students have
identified most of the
options and supports
available.
LEVEL 4
Students have
clearly and
accurately
identified the
problem and
or dangers
associated with
it.
Students have
clearly identified
the options and
supports
available.
Evaluates decision
made with a
considerable degree of
effectiveness.
Evaluates
decision made
with a high
degree of
effectiveness.
Analyses the
alternatives or
consequences of the
scenario with a
considerable degree of
effectiveness.
Analyses the
alternatives or
consequences
of the scenario
with a high
degree of
effectiveness.
Healthy Living
Personal Safety and Injury Prevention
45
Healthy Living
Personal Safety and Injury Prevention
Copy Master 13
Please return to school by: __(Date prior to the start of the Unit) ___________________________
Name of Student:
_________________________________________________________________
Name of Class:
_________________________________________________________________
I have read the letter which introduces the health unit on Internet Safety.
Parent/Guardian Signature: ______________________________________Date: _____________
46
Healthy Living
Personal Safety and Injury Prevention
Copy Master 14
Code of Conduct
What does the Code of Conduct Say:
Standards of Behaviour
Standards of Behaviour
Physical Aggression
All school members must:
not inflict or encourage others to inflict
bodily harm on another person;
seek staff assistance, if necessary, to
resolve conflict peacefully.
Physical Aggression
All school members must:
47
Healthy Living
Personal Safety and Injury Prevention
Copy Master 15
Protect your computer. Another way to protect yourself is to actually protect your computer.
Make sure that you have a current anti-virus software program installed on your computer.
Its also a good idea to make sure that you have installed an anti-spyware software.
Spyware software can take partial control of your computer to do a variety of things without
your consent. Protect yourself by protecting your computer.
48
Healthy Living
Personal Safety and Injury Prevention
Cyberbullying can take many forms today. You may be bullied in an instant message; an online chat
room; an email or text message; or you may even be mentioned on someones website in a negative
way. If you feel you are being bullied online there are several steps to help your situation.
1. Turn to a trusted adult. It might sound clich, but trusting an adult with this information really
does help. This could be your parent, caregiver or a teacher you get along with. Talking
about this with an adult can help the situation before it becomes even worse.
2. Never agree to meet someone you dont know. If you like to Instant Message (IM) then
youre just like most youth your age. More and more we are seeing youth and adults use the
easy Instant Messaging services that are out there (msn, gmail, yahoo, etc). This is a lot of
fun to use, but be weary of who you are chatting with. A friend of a friend who you dont
really know may simply be impersonating someone your age. People you invite to chat with
that you have never met may be dangerous people. Never agree to meet someone in
person who you dont know. If you really want to meet someone that you have met in an
online environment, take an adult with you. If the person is safe they shouldnt object to
meeting you with another person. If someone continually makes you feel uncomfortable by
inviting you to chat privately online, or threatens you in some form, tell an adult or contact
your local police.
3. Have you ever thought about blocking? If someone invites you to chat or wants to be added
to your IM contact list, but you dont recognize the name simply block that person. If they
are indeed one of your friends then they can tell you their online name when you see them
in person. By blocking people you dont know you are essentially blocking possible bullies.
If the bully doesnt get a rise out of you because you do not respond to their negative emails
or have blocked them, they may stop bullying you.
49
Healthy Living
Personal Safety and Injury Prevention
50
Copy Master 16
Healthy Living
Personal Safety and Injury Prevention
51
Healthy Living
Personal Safety and Injury Prevention
Copy Master 17
52
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
Appendix A
53
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
What students do
54
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
What Teachers do
What students do
During
After
55
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
Cyberharrassment is a big
deal/problem
To download the full page symbols to use with this strategy in the classroom please visit:
www.ophea.net/Ophea/Ophea.net/CyberCopsResources.cfm
Health and Physical Education
Grade 8
56
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
I am not really
sure if I know
what is safe?
What happens if
you get caught?
Cyberharrassment is a big
deal/problem
57
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
Appendix B
What students do
Before
Preview the Air Dogs (Grade 8) text
for key vocabulary. See Appendix E
for the list of terms for use.
Prepare strips of card stock
(approximately 4 x 6) for words and
the same for matching definitions
based on CM4.
Each student receives one card.
During
Ask students to read what is on the
card and attempt to find a matching
partner. Encourage discussion
amongst the students if some word
cards seem to fit two definitions
After
58
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Extending Vocabulary (Creating a Modified Word Wall) Health and Physical Education
Grade 8 Personal Safety and Injury Prevention
Samples:
Camera
Phone
Information and
Communication
Technologies
Instant Messaging
Peripherals
Pirating Software
URL
(Uniform
Resource
Locator)
Web Browser
Camera Phone
To download these word cards to use with this strategy in the classroom please visit:
www.ophea.net/Ophea/Ophea.net/CyberCopsResources.cfm
Health and Physical Education
Grade 8
59
Healthy Living
Personal Safety and Injury Prevention
Samples continued:
URL (Uniform Resource
Locator)
Instant Messaging
Communication Software
allows users to exchange
information online in a
synchronous (live)
environment.
Communication (usually
between two people) is
achieved instantaneously,
hence the term Instant
Message.
Pirating Software
Peripherals
Information and
Communication
Technologies (ICT)
Describes a range of
technologies that are used to
convey and or manipulate
information. Examples of
ICT include: desktop
computers; GPS systems;
mobile cell phones; Internet;
television; satellite radios;
DVDs and CD Roms; digital
music players; digital
cameras and USB flash
drives.
60
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
Remind students to keep a hand up when looking for a partner. This makes it easier to
see students who still need a partner.
A location in the room can be designated for students to wait until they find a partner.
Differentiated Instruction:
Monitor to assess and help.
Put answers on the back of cards if needed.
Colour code cards by levels of difficulty students find someone with the same colour
card to quiz.
Use pictures instead of words.
Social Skills:
Asking questions
Greeting
Departing
Coaching
Praising
Tolerance
Seeking help
Vocabulary and definitions (e.g., substance use and abuse, healthy eating, growth
and development)
Sport rules
61
Healthy Living
Personal Safety and Injury Prevention
Appendix C
Reporting Child Abuse and Neglect
Introduction
Ontario's Child and Family Services Act (CFSA) provides for a broad range of services for families
and children, including children who are or may be victims of child abuse or neglect.
The paramount purpose of the Act is to promote the best interests, protection and well being of
children.
The Act recognizes that each of us has a responsibility for the welfare of children. It states clearly
that members of the public, including professionals who work with children, have an obligation to
report promptly to a Children's Aid Society if they suspect that a child is or may be in need of
protection.
The Act defines the term "child in need of protection" and sets out what must be reported to a
Children's Aid Society. This definition (CFSA s.72(1)) is set out in detail on the following pages. It
includes physical, sexual and emotional abuse, neglect and risk of harm.
This information summarizes reporting responsibilities under Ontario's Child and Family Services
Act. It is not meant to give specific legal advice. If you have questions about a given situation, you
should consult a lawyer or the Children's Aid Society.
Responsibility to report a child in need of protection
CFSA s.72(1)
If a person has reasonable grounds to suspect that a child is or may be in need of protection, the
person must promptly report the suspicion and the information upon which it is based to a Children's
Aid Society.
The situations that must be reported are listed in detail below.
Child and Family Services Act CFSA s.72 (1)
Despite the provisions of any other Act, if a person, including a person who performs professional or
official duties with respect to children, has reasonable grounds to suspect one of the following, the
person shall forthwith report the suspicion and the information on which it is based to a society:
1. The child has suffered physical harm, inflicted by the person having charge of the child or
caused by or resulting from that person's,
i.
failure to adequately care for, provide for, supervise or protect the child, or
ii.
pattern of neglect in caring for, providing for, supervising or protecting the child.
2. There is a risk that the child is likely to suffer physical harm inflicted by the person having
charge of the child or caused by or resulting from that person's,
i.
failure to adequately care for, provide for, supervise or protect the child, or
ii.
pattern of neglect in caring for, providing for, supervising or protecting the child.
3. The child has been sexually molested or sexually exploited, by the person having charge of
the child or by another person where the person having charge of the child knows or should
know of the possibility of sexual molestation or sexual exploitation and fails to protect the
child.
4. There is a risk that the child is likely to be sexually molested or sexually exploited as
described in paragraph 3.
5. The child requires medical treatment to cure, prevent or alleviate physical harm or suffering
and the child's parent or the person having charge of the child does not provide, or refuses
or is unavailable or unable to consent to, the treatment.
6. The child has suffered emotional harm, demonstrated by serious,
i.
anxiety,
ii.
depression,
iii.
withdrawal,
iv.
self-destructive or aggressive behaviour, or
v.
delayed development,
Health and Physical Education
Grade 8
62
Healthy Living
Personal Safety and Injury Prevention
and there are reasonable grounds to believe that the emotional harm suffered by the child results
from the actions, failure to act or pattern of neglect on the part of the child's parent or the person
having charge of the child.
7. The child has suffered emotional harm of the kind described in subparagraph i, ii, iii, iv or v of
paragraph 6 and the child's parent or the person having charge of the child does not provide,
or refuses or is unavailable or unable to consent to, services or treatment to remedy or
alleviate the harm.
8. There is a risk that the child is likely to suffer emotional harm of the kind described in
subparagraph i, ii, iii, iv or v of paragraph 6 resulting from the actions, failure to act or pattern
of neglect on the part of the child's parent or the person having charge of the child.
9. There is a risk that the child is likely to suffer emotional harm of the kind described in
subparagraph i, ii, iii, iv or v of paragraph 6 and that the child's parent or the person having
charge of the child does not provide, or refuses or is unavailable or unable to consent to,
services or treatment to prevent the harm.
10. The child suffers from a mental, emotional or developmental condition that, if not remedied,
could seriously impair the child's development and the child's parent or the person having
charge of the child does not provide, or refuses or is unavailable or unable to consent to,
treatment to remedy or alleviate the condition.
11. The child has been abandoned, the child's parent has died or is unavailable to exercise his
or her custodial rights over the child and has not made adequate provision for the child's
care and custody, or the child is in a residential placement and the parent refuses or is
unable or unwilling to resume the child's care and custody.
12. The child is less than 12 years old and has killed or seriously injured another person or
caused serious damage to another person's property, services or treatment are necessary to
prevent a recurrence and the child's parent or the person having charge of the child does not
provide, or refuses or is unavailable or unable to consent to, those services or treatment.
The child is less than 12 years old and has on more than one occasion injured another person or
caused loss or damage to another person's property, with the encouragement of the person having
charge of the child or because of that person's failure or inability to supervise the child adequately.
Ongoing duty to report CFSA s.72(2)
The duty to report is an ongoing obligation. If a person has made a previous report about a child, and
has additional reasonable grounds to suspect that a child is or may be in need of protection, that
person must make a further report to a Children's Aid Society.
Persons must report directly CFSA s.72(3)
The person who has the reasonable grounds to suspect that a child is or may be in need of
protection must make the report directly to a Children's Aid Society. The person must not rely on
anyone else to report on his or her behalf.
What are "reasonable grounds to suspect"?
You do not need to be sure that a child is or may be in need of protection to make a report to a
Children's Aid Society. "Reasonable grounds" are what an average person, given his or her training,
background and experience, exercising normal and honest judgement, would suspect.
Special responsibilities of professionals and officials, and penalty for failure to report CFSA
s.72(4), (6.2)
Professional persons and officials have the same duty as any member of the public to report a
suspicion that a child is in need of protection. The Act recognizes, however, that persons working
closely with children have a special awareness of the signs of child abuse and neglect, and a
particular responsibility to report their suspicions, and so makes it an offence to fail to report.
Any professional or official who fails to report a suspicion that a child is or may be in need of
protection, where the information on which that suspicion is based was obtained in the course of his
or her professional or official duties, is liable on conviction to a fine of up to $1,000.
63
Healthy Living
Personal Safety and Injury Prevention
64
Healthy Living
Personal Safety and Injury Prevention
Appendix D
ADDITIONAL SUPPORTS
Canadian Alliance Against Software Theft
(www.caast.org)
The Canadian Alliance Against Software Theft (CAAST) is an industry alliance of software manufacturers
who share the common goal of reducing software piracy. CAAST provides educational information to
corporations, consumers, academic institutions and resellers about software theft and its implications.
CAAST is affiliated with the Business Software Alliance (BSA), an organization that runs educational,
enforcement and public policy campaigns to combat piracy in 80 countries around the world.
Copyright Board of Canada
(www.cb-cda.gc.ca) The Board is an economic regulatory body empowered to establish, either
mandatorily or at the request of an interested party, the royalties to be paid for the use of copyrighted
works, when the administration of such copyright is entrusted to a collective-administration society. The
Board also has the right to supervise agreements between users and licensing bodies and issues
licenses when the copyright owner cannot be located. This website provides information about copyright.
Cybercops.net
(cybercops.net)
Hosted by Livewires Design Ltd., Cybercops.net provides additional information on Internet Safety as well
as additional classroom activities to accompany the Air Dogs game.
Cyberbullying
(www.cyberbullying.ca)
This website gives examples of cyberbullying, information on what can be done, facts and news, a
section on "Talking the Talk": A Quick Introduction to Knowing What People Are Saying to Each Other in
Cyberspace and a list of related resources.
Media Awareness Network: Be Web Aware
(www.bewebaware.ca)
Be Web Aware is a national, bilingual public education program on Internet safety. The objective of
everyone involved in this project is to ensure young Canadians benefit from the Internet, while being safe
and responsible in their online activities. Be Web Aware grew out of a series of discussions and a
collective concern among Microsoft Canada, Media Awareness Network and Bell Canada about online
safety. A national coalition of Canadian media companies and non-profit organizations has formed to
promote this initiative across the country.
The goal of the Be Web Aware initiative is two-fold: to raise awareness amongst parents that there are
safety issues when their children go online and that they need to get involved and to provide practical
information and tools that will equip parents to effectively manage Internet use in the home and to teach
their kids to be web aware.
National White Collar Crime Centre
www.nw3c.org
The mission of NW3C is to provide a nationwide support system for agencies involved in the prevention,
investigation, and prosecution of economic and high-tech crimes and to support and partner with other
appropriate entities in addressing homeland security initiatives, as they relate to economic and high-tech
crimes.
Ontario Provincial Police
(www.opp.ca)
The Ontario Provincial Police provide support of both an information and protective nature regarding
many aspects of safety including Internet Safety. The E-crime section focuses their work both on the
preventative aspects as well as the investigative aspects of many types of Internet related crimes.
65
Healthy Living
Personal Safety and Injury Prevention
66
Healthy Living
Personal Safety and Injury Prevention
Appendix E
GLOSSARY
ICT Definitions
Camera Phone: A cell phone with a built in camera. Some phones have the ability to transmit video and
video calls and are called Videophones.
Information and Communication Technologies (ICT): describe a range of technologies that are used
to convey and or manipulate information. Examples of ICT include: Desktop Computers; GPS systems;
Mobile Cell Phones; Internet; Televison; Satellite Radios; DVDs and CD Roms; Digital Music Players;
Digital Cameras and USB Flash Drives.
Instant Messaging: Communication Software allows users to exchange information online in a
synchronous (live) environment. Communication (usually between two people) is achieved
instantaneously, hence the term Instant Message.
Peripherals: include internal and external devices that are attached to your computer. Peripheral
examples include: scanners, printers, mice, keyboards, speakers, CD ROM drives and modems.
Pirating Software: the act of replicating software applications for the purpose of illegal distribution.
Software is purchased with a specific licensing agreement. By copying CD ROMs a user is infringing upon
this agreement.
URL (Uniform Resource Locator): The address of a resource or webpage displayed in the address bar
of a web browser.
Web Browser: A software application that allows users to find, access and utilize information on the
Internet. Common browsers include Internet Explorer, Netscape Navigator and Opera.
Internet Vocabulary
Acceptable Use Policy (AUP)
A legally binding document agreed to by online users, which regulates the rules of Internet use at a
school, business, or home. Schools can embed these into agendas or planners, or send home specific
newsletters requiring a signature from parents and students.
Backdoor
A way to bypass authentication and obtain remote access to a computer. A hacker/cracker might install a
backdoor to retrieve files and gain access to confidential information
Bookmark list
A personal list of favorite Web addresses, organized in a single list. All Web browsers allow users to
create bookmarks so users can return to their favourite Websites. Also known as Hotlists. Hackers can
target these lists through software, viruses and Trojan Horses.
67
Healthy Living
Personal Safety and Injury Prevention
Chat Room
Public places on the Internet where Internet users have live, real-time conversations with many people at
the same time. Everyone in the chat room can see what everyone else writes, but they can remain
anonymous if they wish.
Computer Hacking
A hacker is a person who creates and modifies computer software and computer hardware, including
computer programming, administration and security systems.
Cybercops
An informal reference used by police officers who assist one another to solve Internet based crimes.
Most police units are called High-Tech Crimes Units or Electronic Crime Units in Ontario.
Cybercrime
The Internet creates a new way to commit these crimes by providing a new level of opportunity and
anonymity for those that choose this path. Credit card fraud, harassment and extortion are offences
against the Criminal Code of Canada. Software piracy is punishable via the Copyright Act.
Cybertheft
Cyber-Theft is the use of computers and communication systems to steal information in electronic format.
Cyber-theft usually involves the extraction of a copy of the electronic information.
Counterfeit
A counterfeit is an imitation that is made with the intent to deceptively represent its content or origins.
Domain Name
The unique name that identifies an Internet site. Domain Names always have two or more parts,
separated by dots. The part on the left is the most specific, and the part on the right is the most general.
Government sites contain gov and many educational sites will have edu in their domain names.
Extortion
The use of or the express or implicit threat of the use of violence or other criminal means to cause harm
to person, reputation, or property as a means to obtain property from someone else with his consent.
FLIR
Forward Looking Infrared (FLIR) is a night vision enhancement system with many potential applications in
law enforcement agencies.
Fire Wall
A combination of hardware and or software that protects computers connected to the Internet. Monitors
programs that communicate with the Internet.
Grooming
The process by which a pedophile stalks a victim and lulls them into thinking they are chatting with a
friend. They act as if they were the same age, ask seemingly innocuous questions that helps them
identify the location of the victim. There are several stages in this process during which time they become
increasingly more bold and may mention personal subjects such as removing clothing or asking about
sex.
Hacker
Individual who obtains unauthorized access to computer data most commonly via the Internet.
68
Healthy Living
Personal Safety and Injury Prevention
Harrassment
The Ophea H&PE Curriculum Resource Support Document, Grade 7(2005) defines harassment as any
unwanted, uninvited remarks, gestures, sounds or actions of a persistent nature that make you feel
unsafe, degraded or uncomfortable. It includes any overt, subtle, verbal or written comments or any
physical conduct which places pressure on, ridicules, degrades, or expresses hatred based on a persons
sex or sexual orientation, race, ethnicity, cultural background, place of birth, religion, citizenship or
ancestry.
Some examples are:
unwanted, unwelcome physical contact like touching, grabbing or patting;
sexual gossip;
obscene phone calls;
rude jokes or suggestive remarks of a sexual nature;
demeaning nicknames;
catcalls, rating, or embarrassing whistles;
stalking;
graffiti;
threats, abuse, or assault;
sexually insulting remarks about race, culture, ability or class.
It is not:
a hug between friends;
mutual flirtation;
sincere and personal compliments.
These types of harassment can take place in person or over the Internet. Harassment of any kind is
unacceptable both in and out of the school environment.
Hotlist
A personal list of favourite Web addresses, organized in a single list. All web browsers allow users to
create hotlists so users can return to their favorite Websites. Also known as bookmarks.
Infrared
Radiation is electromagnetic radiation of a wavelength longer than that of visible light, but shorter than
that of microwave radiation. The name means "below red" (from the Latin infra, "below"), red being the
color of visible light of longest wavelength. Infrared radiation spans three orders of magnitude and has
wavelengths between approximately 750 nm and 1 mm.
Instant Messaging (IM)
A means by which Internet users communicate in real-time. A form of chat but controlled by user utilizing
the software. Users choose who they communicate with and maintain buddy lists for IM purposes that
could include strangers if proper precautions are not taken. Users can block those they do not wish to
have on their list. Can allow the use of web cameras (web cams).
Internet
The network that connects more than four million computers in 160 countries. The Internet is the virtual
space in which users send and receive email, login to remote computers (telnet), browse databases of
information (gopher, World Wide Web), and send and receive programs (ftp) contained on these
computers.
Internet account
Purchased through an Internet service provider, the account assigns a password and email address to
an individual or group, and access to the Internet at large.
69
Healthy Living
Personal Safety and Injury Prevention
70
Healthy Living
Personal Safety and Injury Prevention
Suspended sentence
A suspended sentence is a legal construct. Unless a minimum punishment is prescribed by law, the court
has the power to suspend the passing of sentence (generally for a period of three years) and place the
offender on probation. It is the passing of the sentence, not the sentence itself that is being suspended.
This means that if the person is convicted of another offense during the period when the passing of
sentence had been suspended, then the person may be sentenced for the original offense.
Thermal Imaging
Use of specialized camera equipment which pick up an image of the heat released from a body. The
person appears in red or yellow, while the surrounding inanimate objects will appear blue or violet.
Triangulate
Triangulate is determining the location of a person using a cell phone by using two kinds of information.
The strength of the signal that it received at a nearby phone tower and the length of time it takes for the
signal to travel from the tower to the cell phone. By comparing information from three nearby cell phone
towers, the geographic location can be determined.
Search Warrant
A search warrant is a written warrant issued by a judge or magistrate which authorizes the police to
conduct a search of a person or location for evidence of a criminal offense, and seize the evidence.
Server
A company providing many different services to clients on the www, such as web page hosting, email
services.
Signature file (SIG)
A return address and information such as name, phone number, and email address that users put at the
bottom of email messages. Usually it is a simple text message, automatically added by your email
program.
Software Piracy
Software piracy is defined as the unauthorized distribution or reproduction of software for business or
personal use. The purchaser of software is the licensed user, not the owner of the software and has the
right to use the software on a single computer but not to put copies on other computers or to pass that
software on to friends. Whether software piracy is deliberate or not it is illegal and punishable by law.
Spam
Unsolicited email. Applies primarily to commercial messages posted across a large number of Internet
Newsgroups, especially when the ad contains nothing of specific interest to the posted Newsgroup. Spam
sent in bulk, slows down bandwidth and causes the users server to work more slowly.
Trojan (Horse)
Trojan Horse is a form of a program that can plant itself on a hard drive. It can be received via a hacker or
as a file masquerading as an innocuous downloadable file within an email or peer to peer network. It
could simply delete files on your system, or it can plant itself and give remote users full access to your
system. Similar to worms and viruses, which replicate themselves. The biggest danger with a worm is its
ability to replicate itself on your system, so rather than your computer sending out a single worm, it could
send out hundreds or thousands of copies of itself, creating a huge devastating effect.
71
Healthy Living
Personal Safety and Injury Prevention
72
Healthy Living
Personal Safety and Injury Prevention
REFERENCES
Criminal Code of Canada R.S. (1985).
Institute for Catholic Education. (1998). Ontario Catholic School Graduate Expectations. Toronto.
Belsey, Bill. Cyberbullying: An Emerging Threat to the Always On Generation. www.cyberullying.ca.
Jilks-Racine, J. (2005) Internet Safety. Ontario Principal's Council Register Spring 2005, Vol. 7 (1).
Toronto.
Ministry of Education. (1998).The Ontario Curriculum, Grades 1-8, Health and Physical Education.
Queens Printer for Ontario.
Ministry of Education. (2001). Code of Conduct, Ontario Schools. Queen's Printer for Ontario.
Ophea, (2000). Health and Physical Education Curriculum Support Documents, Grade 7.
Ontario Child and Family Services Act, R.S.O. (1990).
Ontario Conference of Catholic Bishops. Fully Alive (Grades 1-8). Pearson.
Ontario Provincial Police. Internet Safety Tips for Teens and Internet Safety Tip for Parents.
Statistics Canada.(2005). Family Violence in Canada: A Statistical Profile. Canadian Centre for Justice
Statistics.
www.bewebaware.ca Media Awareness Network
www.cb-cda.gc.ca/new-e.html Whats new at the Copyright Board
www.crin.org/resources/infoDetail.asp?ID=6567&flag=report Violence Against Children in Cyberspace
www.cyberbullying.ca A website dedicated to the issue of cyberbullying.
www.cybercops.net LiveWires Design Ltd.
www.cybertip.ca Canadas National Tipline
www.opp.ca Ontario Provincial Police
www.phonebusters.com The Canadian Anti-Fraud Call Centre
73
Healthy Living
Personal Safety and Injury Prevention