You are on page 1of 11

Rebecca B.

Alford
FRIT 7090
July 18, 2013

2013

GEORGIA SOUTHERN

UNIVERSITY-

GOML

Title of Unit Curriculum Area

Digital Footprint
Technology and Internet Safety

Grade Level Time Frame

9-12
3 weeks

Understandings
Goals and Objectives: Students will understand that: To have a digital footprint, they must learn how to be safe on the internet. They must understand the dangers of cyber bullying and how to report its existence appropriately and safely. Related Misconceptions: The internet is safe as long as you only use educational websites and sites that are student/kid friendly. Cyber bullying will not occur when you use educational websites. ISTE NETS Content Standards: http://www.iste.org/standards/nets-for-students/netsstudent-standards-2007 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. a. Advocate and practice safe, legal, and responsible use of information and technology b. Exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity c. Demonstrate personal responsibility for lifelong learning d. Exhibit leadership for digital citizenship

Essential Questions
Overarching Questions: 1. How important is it for all internet users to learn what it means to have a digital footprint? 2. When you get out of school is it safer to use the internet? 3. What is cyber bullying, sexting, IM, digital profile, social networks, Child Pornography, Stalker, Background Check, Identity and how does it affect each and every person? Topical Questions: 1. What is a digital footprint? 2. What are social networks and how do they affect me as a student? 3. How can I always know I am safe on any internet site? 4. What do I as a student do if someone on the internet is asking me personal questions or someone is cyber bullying me or a friend?

Knowledge and Skills Knowledge


Students will know: Recognize and verify their understanding of internet terms that include cyber bullying, sexting, social networks, Digital Profile, Blog, Chat, Sexting, Child Pornography, Stalker, and IM. Students will be able to share their knowledge with their parents, peers and siblings to spread the word of the internet predators and their antics.

Skills
Students will be able to: Write a Story (Persuasive/argumentative, Comparison, Descriptive, Evaluation, or Narrative) or a blog explaining their knowledge of what they have learned about cyber bullying and how to use social networking appropriately and safely. Be able to share their interpretation of how important private information must be kept

anonymous and not shared on the internet. To verify this they must complete a google search of each of their family members.

Learner Characteristics
Being a Media Specialist in a Media Center, I only get a class once a week for approximately 45 minutes. So I organized my lessons to fit that schedule. I have all types of students from a few ESOL to many SLD. We are very fortunate to have another Media Specialist as well as a Media Clerk. I teach all grades 9 through 12. I am trying very fervently to reach all students while they are within 9th or 10th grades and teach them internet safety. This is so important when technology is such an integral part of most high school settings. I then try to reinforce and update technology "dangers" again when they reach 11th and 12th. A typical class of learners: 9th grade English: 25 girls 12 boys 17 gifted that are self-motivated 13 auditory/visual learners that need frequent activity 7 ADD students that need extra help with Media Clerk/special needs Prerequisite skills- Most if not all students have attended the Media Center orientation and have received their log in information. They also have been taught basic internet rules.

Content, Instructional Strategies and Performance Task(s)


1. As students enter the Media Center, have a screencast-o-matic playing with cyber-bullying words and statements that someone may hear or say. 2. Review the essential question for this week which is What are the dangers of cyberbullying and sexting? 3. Complete survey about cyberbullying and sexting on the internet that is anonymous. The teacher will print the results. 4. Watch the video on cyberbullying. http://www.youtube.com/watch?v=5Du6A-HIzmY 5. Have each student write a word that can be harmful to another person. Place word on displayed word poster. Discuss this poster and the words. 6. Have each student begin creating a Prezi or slide rocket about cyber bullying. Place in teachers drop box. ELA and SLD help from MS, and MC. 7. Simulation -Cyber bullying game on deal.org -http://deal.org/wpcontent/uploads/2009/11/Cyberbullying_Interactive_Game.swf This game is a simulation of the real world of technology. It informs students of the dangers of the internet and what can happen. It even covers the legal ramifications of passing information through technology. It is interactive. While trying to find a game to meet this standard, I found there were not many available. I have decided I am going to try one of the game development software and create a few games for use with this lesson. 8. Play game of Web Warriors: http://www.webwarriors.org.au/ This is a great game for all age students. It has different levels and students can create their own avatars. I do not think this is good for younger students because it requires an email address. The avatar runs over envelopes that give questions/tips on cyber bullying. Students will be motivated to reach new levels while learning great information.

Be sure to indicate: Goal: List three ways that are commonly used in bullying on the internet or with mobile devices. You must describe the culprit and how it can be used for cyberbullying. Role: You are a designer that works for the State school board system. You need to develop an eye-catching flyer/poster that will warn others about how bullies can use internet and mobile devices to destroy an individual. Audience: You are going to be distributing the flyers/posters to schools throughout your district. Situation: You must develop a visually appealing flyer and it must be acceptable to and desirable for use in the various high schools within the State. Product Performance and Purpose: The flyer should have at least three cyberbullying culprits that are used to cause discomfort to any person. Standards and Criteria for Success: This assignment will meet the standard listed below.

Performance Task(s) Rubric(s)

(e.g. tests, quizzes, work samples, observations)

Learner Assessments

Matching Vocabulary quiz listed below. Write a paper explaining what you have learned about cyber bullying. Include an article you have found where these topics have affected a persons life Be able to share their interpretation of how important private information must be kept anonymous and not shared on the internet. For homework, have each student google their name and their parents name. Type each name they googled and have their parents sign it. This will also share with parents the danger of our digital world. Students will see how cyber bullying can affect a life because searching your name shows so much information. Exit Slips- Students will answer quick questions and turn them in as the exit the class to determine if they understood the material covered.

Matching Quiz of Vocabulary Words


1) ______ Sexting 2) ______ identity theft 3) ______ Child Pornography

4) ______ Social Networking 5) ______ IM 6) ______ RFID 7) ______ Chat 8) ______ Background Check 9) ______ blog 10) _____ cookie
.

a) search of the history of someones credit or criminal record b) the sending of sexually explicit photos, images, text messages, or e-mails by using a cell phone or other mobile device. c) the development of social and professional contacts; the sharing of information and services among people with a common interest d) fraudulent appropriation and use of someone's identifying pornography using a child or children as the subject. e) a journal kept online that is like a log f) Radio Frequency Identification- scanner used to steal information g) search of the history of someones a message, or segment of data, containing information about a user, sent by a Web server to a browser and sent back to the server each time the browser requests a Web page.credit or criminal record h) instant message i) to participate with others, through the Internet, in a real-time conversation in a chat room or online tech support j) fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card. ANSWERS 1) b Sexting 2) j identity theft 3) d Child Pornography 4) c Social Networking 5) h IM 6) f RFID 7) i Chat

8) a Background Check 9) e blog 10) g cookie


.

More Student Self-Assessment and Reflection


Question Box
Place a question box with slips of paper next to it. Students can place their concerns, questions, and/or misconceptions in the box. They can also share what they like about the lesson and what they do not like. (This assessment is helpful for those students who do not like to speak out. This is the same as "exit slips". Use www.everywherepolls.com and have students that have phones or ipods send a text of the answer to the poll and see how many in the class understand the concepts. The students will be able to see how many in the class understood the concept and how many did not but it is anonymous. This can be done on the following day as a "bell ringer" activity because it can lead into another discussion about the subject of cyber bullying.

Questions for Lesson Evaluation: 1. What do I like about this lesson plan? 2. What do I dislike about this lesson plan? 3. How can the plan be more creative? 4. Are there any components to the lesson that are missing? 5. Where in the lesson plan did I mostly likely lose the attention of the student's? 6. Are there aspects I am ignoring out of fear (i.e. technology, discussion, group work)? 7. Was this lesson appropriate and keep the attention of the age group it was designed? 8. How does my lesson plan make room for student involvement?

9. Did the games used in the lesson plan keep the interest of the students? 10. Were the games instrumental in teaching the goals set forth by this plan?

Works Cited Cyber bullying interactive Game. (2013, July 15). Retrieved from deal.org: http://deal.org/wpcontent/uploads/2009/11/Cyberbullying_Interactive_Game.swf Cyber Bullying Video. http://www.youtube.com/watch?v=5Du6A-HIzmY Cyber- safety tips. (2013, July 15). Retrieved from Cyber-safety: http://www.cyber-safety.com/safetytips.html Effingham County BOE. (2013, July 15). Retrieved from EffinghamCounty: www.effinghamschools.com McTighe, G. W. (2005). Understanding by Design. Alexandria: ASCD. Web Warriors Game. http://www.webwarriors.org.au/

You might also like