Professional Documents
Culture Documents
Alford
FRIT 7090
July 18, 2013
2013
GEORGIA SOUTHERN
UNIVERSITY-
GOML
Digital Footprint
Technology and Internet Safety
9-12
3 weeks
Understandings
Goals and Objectives: Students will understand that: To have a digital footprint, they must learn how to be safe on the internet. They must understand the dangers of cyber bullying and how to report its existence appropriately and safely. Related Misconceptions: The internet is safe as long as you only use educational websites and sites that are student/kid friendly. Cyber bullying will not occur when you use educational websites. ISTE NETS Content Standards: http://www.iste.org/standards/nets-for-students/netsstudent-standards-2007 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. a. Advocate and practice safe, legal, and responsible use of information and technology b. Exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity c. Demonstrate personal responsibility for lifelong learning d. Exhibit leadership for digital citizenship
Essential Questions
Overarching Questions: 1. How important is it for all internet users to learn what it means to have a digital footprint? 2. When you get out of school is it safer to use the internet? 3. What is cyber bullying, sexting, IM, digital profile, social networks, Child Pornography, Stalker, Background Check, Identity and how does it affect each and every person? Topical Questions: 1. What is a digital footprint? 2. What are social networks and how do they affect me as a student? 3. How can I always know I am safe on any internet site? 4. What do I as a student do if someone on the internet is asking me personal questions or someone is cyber bullying me or a friend?
Skills
Students will be able to: Write a Story (Persuasive/argumentative, Comparison, Descriptive, Evaluation, or Narrative) or a blog explaining their knowledge of what they have learned about cyber bullying and how to use social networking appropriately and safely. Be able to share their interpretation of how important private information must be kept
anonymous and not shared on the internet. To verify this they must complete a google search of each of their family members.
Learner Characteristics
Being a Media Specialist in a Media Center, I only get a class once a week for approximately 45 minutes. So I organized my lessons to fit that schedule. I have all types of students from a few ESOL to many SLD. We are very fortunate to have another Media Specialist as well as a Media Clerk. I teach all grades 9 through 12. I am trying very fervently to reach all students while they are within 9th or 10th grades and teach them internet safety. This is so important when technology is such an integral part of most high school settings. I then try to reinforce and update technology "dangers" again when they reach 11th and 12th. A typical class of learners: 9th grade English: 25 girls 12 boys 17 gifted that are self-motivated 13 auditory/visual learners that need frequent activity 7 ADD students that need extra help with Media Clerk/special needs Prerequisite skills- Most if not all students have attended the Media Center orientation and have received their log in information. They also have been taught basic internet rules.
Be sure to indicate: Goal: List three ways that are commonly used in bullying on the internet or with mobile devices. You must describe the culprit and how it can be used for cyberbullying. Role: You are a designer that works for the State school board system. You need to develop an eye-catching flyer/poster that will warn others about how bullies can use internet and mobile devices to destroy an individual. Audience: You are going to be distributing the flyers/posters to schools throughout your district. Situation: You must develop a visually appealing flyer and it must be acceptable to and desirable for use in the various high schools within the State. Product Performance and Purpose: The flyer should have at least three cyberbullying culprits that are used to cause discomfort to any person. Standards and Criteria for Success: This assignment will meet the standard listed below.
Learner Assessments
Matching Vocabulary quiz listed below. Write a paper explaining what you have learned about cyber bullying. Include an article you have found where these topics have affected a persons life Be able to share their interpretation of how important private information must be kept anonymous and not shared on the internet. For homework, have each student google their name and their parents name. Type each name they googled and have their parents sign it. This will also share with parents the danger of our digital world. Students will see how cyber bullying can affect a life because searching your name shows so much information. Exit Slips- Students will answer quick questions and turn them in as the exit the class to determine if they understood the material covered.
4) ______ Social Networking 5) ______ IM 6) ______ RFID 7) ______ Chat 8) ______ Background Check 9) ______ blog 10) _____ cookie
.
a) search of the history of someones credit or criminal record b) the sending of sexually explicit photos, images, text messages, or e-mails by using a cell phone or other mobile device. c) the development of social and professional contacts; the sharing of information and services among people with a common interest d) fraudulent appropriation and use of someone's identifying pornography using a child or children as the subject. e) a journal kept online that is like a log f) Radio Frequency Identification- scanner used to steal information g) search of the history of someones a message, or segment of data, containing information about a user, sent by a Web server to a browser and sent back to the server each time the browser requests a Web page.credit or criminal record h) instant message i) to participate with others, through the Internet, in a real-time conversation in a chat room or online tech support j) fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card. ANSWERS 1) b Sexting 2) j identity theft 3) d Child Pornography 4) c Social Networking 5) h IM 6) f RFID 7) i Chat
Questions for Lesson Evaluation: 1. What do I like about this lesson plan? 2. What do I dislike about this lesson plan? 3. How can the plan be more creative? 4. Are there any components to the lesson that are missing? 5. Where in the lesson plan did I mostly likely lose the attention of the student's? 6. Are there aspects I am ignoring out of fear (i.e. technology, discussion, group work)? 7. Was this lesson appropriate and keep the attention of the age group it was designed? 8. How does my lesson plan make room for student involvement?
9. Did the games used in the lesson plan keep the interest of the students? 10. Were the games instrumental in teaching the goals set forth by this plan?
Works Cited Cyber bullying interactive Game. (2013, July 15). Retrieved from deal.org: http://deal.org/wpcontent/uploads/2009/11/Cyberbullying_Interactive_Game.swf Cyber Bullying Video. http://www.youtube.com/watch?v=5Du6A-HIzmY Cyber- safety tips. (2013, July 15). Retrieved from Cyber-safety: http://www.cyber-safety.com/safetytips.html Effingham County BOE. (2013, July 15). Retrieved from EffinghamCounty: www.effinghamschools.com McTighe, G. W. (2005). Understanding by Design. Alexandria: ASCD. Web Warriors Game. http://www.webwarriors.org.au/