ONLINE RELATIONSHIPS i-safe Lesson Plan
|
|
- Martin Garry Atkins
- 7 years ago
- Views:
Transcription
1 ONLINE RELATIONSHIPS i-safe Lesson Plan Suggested Grade Level High School Learning Objectives Students will: understand the various types of online relationships that can occur from online communication be able to define the terms predator, grooming process, and willing participant understand the implications of the grooming process and willing participation in risky online behavior Enrichment Goal Learners will interact in the classroom environment through group discussion and examination of various types of online relationships. Learners will be provided with materials to engage in an enrichment activity, which includes setting up a school DROP (Dealing Responsibly with Online Problems) Box for dealing with Internet issues and concerns from the school population. Materials/Preparation a copy of reference and activity pages for each student DROP Box direction page online i-mentor registration (each student) to receive supporting i-mentor Toolkit materials Pre-Assessment If beginning the i-safe program with this lesson, administer the pre-assessment online at by clicking on Assessments prior to the lesson. To verify school ID number, log in at go to the My Info page, and select Find Your School ID. Lesson Procedures All students participating in the i-safe curriculum are considered i-mentors. If they haven t done so already, have students enroll online by clicking on Create Account at to take full advantage of the support and incentives offered. This may be done at any time during the lessons, or students may complete this registration at home. If you would like to register your students yourself, simply go to and fill out the information for your students; then to outreach@isafe.org. Your students will then be enrolled, will receive information about sharing Internet safety with other students, and will be registered to participate in contests to win prizes. Discussion Ensure that all students have printouts of the reference activity sheet. Engage learners in a brief discussion in which they define the term online relationship, and identify, explain, and analyze the dangers involved in initiating online relationships. Guide the discussion to cover the following: Online relationships form through regular online communication, such as chatting, text messaging, bulletin posting, etc i-safe Inc. Online Relationships Grades
2 Online relationships can have different goals, such as friendship, love, career networking, support community, etc. Online relationships come with both benefits and disadvantages. Brainstorm as a class the benefits and disadvantages of online relationships. There are dangers involved in forming online relationships. Online communication has become increasingly popular in recent years, offering a way for individuals to meet and talk with others in an environment that seems anonymous and open. However, while it s easy to meet people online, it is also easy to forget that these people may not be who they say they are or be there for the stated reasons/purposes they provide. o What are some of the potential dangers? o How can these dangers be prevented? Have students refer to the Online Relationships reference sheet. Decide as a class how to cover the information provided. Some options include: o Read together as a class and discuss. o Divide class into small groups, and read in small groups and discuss. o Have students read individually, and then meet back as a class or in small groups to discuss. Review as a class the information covered in the reference sheet. Create student groups of three or four to complete the following project. Peer-to-Peer Activity Direct students to engage in the project activity as directed on the activity page. Each group receives an activity page to spur conversation. Students should discuss each question and jot down their thoughts. Inform students that each group will be responsible for presenting its thoughts on its type of online relationship including: o benefits o dangers o proactive prevention tips/guidelines Students develop a corresponding visual aid for their presentation to the class (i.e. a poster of their safety tips). Presentation: Each group stands up and shares its thoughts on the question/issue as related to the type of online relationship it is covering. Concluding Discussion As a class, discuss the following: potential benefits and risks of online relationships when the benefits outweigh the risks when the risks outweigh the benefits proactive ways to handle online relationships. Stress the key concept that no matter what type of online relationship, personal information should be safeguarded to prevent issues/dangers from arising. Ask students if this is information their peer group needs to know and understand in order to operate safer online. Lead into a discussion about the enrichment activity i-safe Inc. Online Relationships Grades
3 Enrichment Activity Youth who participate in activities to share what they have learned about Internet safety are more likely to practice safe habits online. Additional lessons and support for students, teachers, and parents on Internet safety topics are available from i-safe Inc. at Review with students what they have learned about personal safety. Discuss with students ways to help others dealing with online safety. Inform students that they will be helping set up a schoolwide DROP Box so other students can receive help when involved with online issues. Pass out the DROP Box worksheet for students to fill out as you discuss getting started. Share with students the DROP Box information directions for getting started. A DROP Box gives your peers a chance to confidentially ask Internet safety questions and report any online concerns. A successful DROP Box requires some forethought and communication with school administrative staff. 1. Ask an adult teacher or counselor to monitor the DROP Box and report back to you. He or she should be the only person with access to the box to sort the messages by topic. Any immediate or unsafe concerns must be handled by this adult monitor. 2. Submit a proposal to your school administration to have a DROP Box. In your proposal, address the following: Faculty Liaison What faculty member will be responsible for checking the box? Frequency How frequently will the faculty member check the box? Chain of Command Once the faculty member has checked box, how will issues be handled (i.e. what school official will deal with serious or dangerous issues, how will other issues be passed onto students to deal with, and how will answers be relayed to the student or school body)? 3. Find a ballot box and a lock. 4. Find a location for your DROP Box. Get permission to set it up. 5. DROP Boxes relay the safe and non-confidential messages to you and the other i- MENTORs to address while passing along more serious safety concerns to the school official who deals with the issues. 6. Make sure you don t give people the wrong info: Research and verify your answers before you respond! Also, please respect the privacy of others. Questions and answers should be publicized anonymously; don t use real names. 7. Relay information back to student/school body as identified in proposal. Suggestions include: periodic articles in school newspaper (i.e. Dear Abby type column) daily/weekly spot on school announcements, either via PSA or TV spot bulletin board or web page in prominent location for posting of answers Post-Assessment Administer the post-assessment online at by clicking on Assessments if this is your last lesson for i-safe. To verify school ID number, log in at go to the My Info page, and select Find My School ID i-safe Inc. Online Relationships Grades
4 Related Lessons The i-safe lessons: Online Social Networking and Cyber Relationships (Webcast) provide additional related information. Contact us We d like to hear from you! teachers@isafe.org to share any unique ideas and/or experiences you had during implementation of this lesson i-safe Inc. Online Relationships Grades
5 Online Relationships Chances are that if you re online, you ve engaged in communication that helps develop an online relationship, whether that relationship is with someone you already know offline or someone you meet while online. Unfortunately, predators use various types of online relationships to cultivate new victims. They use what is known as the grooming process to take valid, safe online relationships to dangerous levels, and to break down barriers. Predators and the Grooming Process: The traditional role of a child predator changed dramatically with the advent of the Internet. Now there is a forum where predators can groom their victims. A predator is one who stalks or uses lies, secrecy, or stealth to get close to another person in order to easily hurt or harm them. The grooming process of a predator involves the following: SIMILAR INTERESTS: A predator will discuss common, shared interests, likes, and dislikes with you. If you say you like a particular actor, so will the predator. This person will pretend to have the same musical interests or sports interests; have things that you desire (e.g. clothes, swimming pool, or a cool car); or claim to enjoy the same activities (e.g. shopping, hiking, fishing). This leads you to believe that he or she is just like you, and because you like the same things, you can be online buddies. After you come to believe that the two of you have a lot in common, you may exchange or add him to your buddy list. Now the two of you can talk online without other people listening. TRUST: The predator will want to listen to anything you want to talk about. He will be very interested in everything you say because he wants you to believe that he is really interested in you and cares about what you have to say. If you have a bad day at school or at home, he will be sympathetic. He will tell you that he understands. You will begin to believe that this person really cares about you. However, he just wants you to trust him. The longer you talk with this person and the more you share with him, the more you will come to believe that this person is no longer a stranger but is actually a friend. This new friend will usually take your side when you tell him or her about an argument with your friends, parents, or teachers. By doing so, he gives the impression that he is a better friend to you then your other friends or your family. You soon gain such trust in this false friend that you separate yourself from your true friends and family. SECRECY: You and your online acquaintance build a relationship. The predator will usually ask you to keep the friendship secret. He will explain that other people, especially your parents, won t understand how you can be such good friends with someone who you met on the Internet. The reason he doesn t want you to tell your parents or another adult is because you really CAN NOT trust this person, and he knows that an adult would step in and protect you from him i-safe Inc. Reference
6 Willing Participant You ve heard it before, and you know better than to fall for the grooming ritual. That DOESN T mean you aren t susceptible to dangerous online relationships. Studies show that more and more students are entering into online relationships as willing participants they are told that their online friend is older, and rather than being groomed, they are often mislead by their online friend. The anonymity of the Internet means that trust and intimacy can develop quickly. However, as one frightening story after another is revealed, even educated people who enter into online relationships can find disaster stalking, harassment, and more. So no matter what, don t reveal personal information online. Get an adult s help to evaluate the relationship for what it is, and don t meet offline. Online relationships can be great, as long as they stay ONLINE! Safety Tips 1. Treat all people you meet online as strangers, even if a friend introduced you! 2. Take everything that s said online with a grain of salt. It is all too easy to develop a new persona, make things up, etc., when online. 3. There are many ways to deceive online. Be aware that the person on the other end may or may not be there for the same reasons you are. 4. Don't give out personal details, such as your name, phone number, address, or a personal description, to people with whom you chat on the Internet. Even if the person is who they say they are and not a predator, relationships that end badly can degenerate into cyber harassment or stalking. 5. Trust your instincts. If you feel uneasy about someone, there may be a reason. Get out of the relationship. Get help from someone you know offline, if needed i-safe Inc. Reference
7 Online Relationships Types of Online Relationships friendship: basic friendship, discuss daily events, hang out, etc. special interest, clubs, and hobbies support group: friendship based upon central issue (i.e. health problem, new baby, etc.) dating: online dating that may progress to physical meeting business/professional: interaction for the purpose of getting ahead in business, school, etc. Directions: Your teacher will assign you one of the above types of relationships to discuss in your group. Be sure to cover the following questions in relation to your type of relationship: How do such relationships form online? What types of communication can occur is such an online relationship? What are some benefits of this type of online relationship? What are some drawbacks/dangers of this type of online relationship? Compose a list of safety tips/rules specific to this type of relationship? Be prepared to present what you have learned to the class with a visual aid if directed to by your teacher (i.e. poster, flyer, etc.). Use the space below to brainstorm ideas in your group i-safe Inc.
8 DROP Box Directions: A DROP Box gives peers a chance to confidentially ask Internet safety questions and report any online concerns. A successful DROP Box requires some forethought and communication with administrative staff at your school. 1. Decide if the DROP box will be a class project, a committee or team undertaking, or the responsibility of an individual. 2. Ask an adult teacher or counselor to monitor the DROP Box and report back to you. He or she should be the only person with access to the box to sort the messages by topic. Any immediate or unsafe concerns must be handled by this adult monitor. 3. Submit a proposal to administration to have a DROP Box at your school. In your proposal, address the following: Faculty Liaison What faculty member will be responsible for checking box? Frequency How frequently will the faculty member check the box? Chain of Command Once the faculty member has checked the box, how will issues be handled (i.e. what school official will deal with serious or dangerous issues, how will other issues be passed onto students to deal with, how will answers be relayed to student or school body)? 4. Find a ballot box and a lock. 5. Find a location for your DROP Box. Get permission to set it up. 6. DROP Boxes relay the safe and non-confidential messages to you and the other i- MENTORs to address while passing along more serious safety concerns to the school official who deals with the issues. 7. Make sure you don t give people the wrong info: Research and verify your answers before you respond! Also, please respect the privacy of others. Questions and answers should be publicized anonymously; don t use real names. 8. Relay information back to student/school body as identified in the proposal. Suggestions include: periodic articles in school newspaper (i.e. Dear Abby type column) daily/weekly spot on school announcements either via PSA or TV spot bulletin board in prominent location for posting of answers 2006 i-safe Inc.
9 DROP Box Worksheet DROP Box: Dealing Responsibly with Online Problems. This box is designed so students can write letters concerning their Internet safety issues and submit them in the confidential box in order to receive help from the appropriate person (i.e. counselor, administrator, feedback from peers, etc.) Faculty Liaison: the person responsible for checking the box Frequency: how often box will be checked Location: where box will be placed Chain of Command: how answers to questions will be dealt with Sample: Faculty liaison checks box, reads questions, and sorts. School level issues (i.e. safety issues occurring on campus with potential danger) are referred to appropriate administrator or resource officer. Hot topic issues (i.e. safety issues of concern that do not occur on campus with potential danger) are referred to counselor and/or resource officer. Peer issues are referred to DROP Box student board to be answered. Response Retrieval (how students will get their questions answered): Sample: bulletin board with answers (all anonymous) newsletter answers spot on announcements Points to Remember: Box should be all about CONFIDENTIALITY. Faculty liaison should make all final decisions on how concerns are routed and must approve all student responses i-safe Inc.
RISKS OF SPYWARE. Lesson Procedures
i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks
More informationPREDATOR IDENTIFICATION
i-safe Lesson Plan Suggested Grade Level 7 Lesson PowerPoint and activity guide PREDATOR IDENTIFICATION Learning Objectives Students will be able to: identify the characteristics of tactics used by an
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationComprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
More informationWhat Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationFor parents and carers of children with autism
For parents and carers of children with autism The NSPCC helps parents and carers talk to their children about staying safe. It s part of our work to prevent abuse from happening to any child. And it
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationSample Peer Mentoring Handbook
Sample Peer Mentoring Handbook Sample Peer Mentoring Handbook Designing a Scheme Booklet/Scheme Handbook First, consider your audience: Do you need a series of short pamphlets aimed at different groups
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationPromotional Guide 11
Promotional Guide 11 PROMOTE! PROMOTE! PROMOTE! Promotional Guide Promotion plays a vital role in the success of the class! From posters and videos to word of mouth, you must get the word out! Don t forget
More informationInternet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
More informationGrade 8 Lesson Peer Influence
Grade 8 Lesson Peer Influence Summary This lesson is one in a series of Grade 8 lessons. If you aren t able to teach all the lessons, try pairing this lesson with the Substance and Gambling Information,
More informationThinking about College? A Student Preparation Toolkit
Thinking about College? A Student Preparation Toolkit Think Differently About College Seeking Success If you are like the millions of other people who are thinking about entering college you are probably
More informationElicit Me too and Me neither by asking students if they have a sister or brother (or dog, cat ) and then responding appropriately.
All about me. Topic: Personal interests, likes and dislikes Aims: To help students focus on fluency when speaking To develop students communication skills To develop students listening skills Level: Pre-intermediate
More informationMental Health Role Plays
Mental Health Role Plays Goals: To discuss various mental health issues and mental illnesses. To discuss stigma, support and treatment options surrounding mental health issues and mental illnesses. Requirements:
More informationi-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
More informationFrom The Desk of Mrs. Samine Charles Pierre.. INTRODUCING YOUR SCHOOL COUNSELOR
From The Desk of Mrs. Samine Charles Pierre.. INTRODUCING YOUR SCHOOL COUNSELOR What is a school counselor? Your school counselor is a person who is specially trained to help you realize your full potential
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationi-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationCREATIVE S SKETCHBOOK
Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationThe Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior
The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior Collaborative rule making promotes mutual respect, cooperation, self discipline and personal responsibility while
More informationJob Search. How to make your job search successful
Job Search How to make your job search successful Pick a major that relates to a specific job or occupation. Get a great GPA. Participate in leadership activities. Secure internships, summer jobs, part-time
More informationCambridge Friendship Questionnaire
Cambridge Friendship Questionnaire Please complete the following background information about yourself and then turn over to fill out the rest of the questionnaire. Name:..... Sex:... Date of birth:...
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationWelcome to Marketeach! Here is the sample lesson plan that you requested be sent to you. The next page is a summary of the entire set of lesson plans.
Dear Educator, Welcome to! Here is the sample lesson plan that you requested be sent to you. The next page is a summary of the entire set of lesson plans. We at created this program to allow teachers to
More informationShell Mentoring Toolkit
Shell Mentoring Toolkit A reference document for mentors and mentees Human Resources LEARNING 25/07/2007 Copyright: Shell International Ltd 2006 CONTENTS What is Mentoring? 4 The Mentor s Role The Role
More informationTop Ten Mega Marketing Mistakes That Gun Shops Make
Top Ten Mega Marketing Mistakes That Gun Shops Make A Special Report By Gene Kelly, President of The American Gunsmithing Institute I can t emphasize enough how important it is to identify mistakes, because
More informationNewspaper Activities for Students
Newspaper Activities for Students Newspaper Activities for Students Page 2 Higher Learning By the year 2010, millions of the jobs available in the United States will require more than a high school diploma.
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationTINA: But we re getting ahead of ourselves. Let s start at the beginning This is Ivy Tech.
SFX: Commercial Soundtrack STU: There s nothing like it. Walking across that stage knowing you ve graduated and you re ready for the next step. Whether it s a job or continuing on with your education Ivy
More informationTeen Success Agreement
Teen Success Agreement A youth-developed written agreement for older youth, caregivers, and social workers to provide older youth age-appropriate activities and opportunities TABLE OF CONTENTS INTRODUCTION
More informationA-A A-B A-C C-A C-B C-C PS-A PS-B PS-C X X X X X
Lesson Plan 7: Preparing for a Job Interview Core www.collegeincolorado.org Area: Job Search Total Time: Two 50-55 minute class periods Target Grades: Grades 10-12 Suggested Timeline: Any time during school
More informationPEER PRESSURE TEACHER S GUIDE:
TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students
More informationBack to School: Working with Teachers and Schools
Back to School: Working with Teachers and Schools Starting school each fall is a challenge for the student and parents. The following article offers some valuable suggestions as your child starts a new
More informationVIDEO TEACHING GUIDE. for use with Program 8 ASKING FOR HELP. In the Youth Guidance Video Series
VIDEO TEACHING GUIDE for use with Program 8 ASKING FOR HELP In the Youth Guidance Video Series EDUCATIONAL GOALS:! Children learn that it's important to ask for help when they are having difficulties.!
More informationExploring Media. Time. Activity Overview. Activity Objectives. Materials Needed. Trainer s Preparation. 30 minutes
Exploring Media Time 30 minutes Activity Overview This module provides an introduction into how the curriculum defines media and its purposes. Activities allow participants to brainstorm the many types
More informationWORKSHEET ONE FIRST ACTIVITY. Treating others with respect. List of ideas for treating others with respect
WORKSHEET ONE FIRST ACTIVITY Have the group brainstorm what they think it means to treat other people with. Write the answers on the whiteboard, if it helps use this list on the worksheet as a guide. List
More informationAthena Study Abroad. Student Ambassador Internship Handbook 2016 Spring Semester
Athena Study Abroad Student Ambassador Internship Handbook 2016 Spring Semester Athena Student Ambassador Internship Handbook Spring 2016 Congratulations on your acceptance into Athena s Ambassador Internship
More informationYoung people and drugs
Young people and drugs Many parents worry about whether their son or daughter is taking illegal drugs, how they can tell, and what to do about it. While there s a lot of concern about illegal drugs in
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationsolving, adaptability, and communication through clarification and evaluation of
By increasing students' interactivity with each other in task-oriented ways, they construct, rather than acquire, knowledge. Group work improves critical thinking, problem solving, adaptability, and communication
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationHold a Petition Signing Event for The End of Bullying Begins With Me
Hold a Petition Signing Event for The End of Bullying Begins With Me Guidelines for encouraging kids, teens, and adults to sign the petition PACER s National Bullying Prevention Center PACER.org/Bullying
More informationSuccess: An Educational Toolkit for Philadelphia Foster Youth
For the LOVE of Success: An Educational Toolkit for Philadelphia Foster Youth Table of Contents About this Toolkit Page 2 Section 1: Getting to Know You Basic Information Page 3 Interests and Activities
More informationINTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT
INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards
More informationNick s Plan. My case study child is a young boy in the third grade. I will call him Nick. Nick is a
Jamie Oliver Nick s Plan My case study child is a young boy in the third grade. I will call him Nick. Nick is a student who has cerebral palsy. He remains in a wheelchair all day long while in school.
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationNETWORKING: WHY, HOW, WHO, and WHEN
NETWORKING: WHY, HOW, WHO, and WHEN Professional Development Workshop Series Career Development and Internships Office (CDIO) careers@northpark.edu x5575 1 Up to 80% of jobs these days are found through
More informationA bigger family, a better future.
A bigger family, a better future. Child sponsorship is changing for the better Sponsors like you are a vital part of our big, supportive family. Like us, you want the very best for your sponsored child.
More informationKeep your English up to date 4. Teacher s pack Lesson plan and student worksheets with answers. Facebook
Keep your English up to date 4 Teacher s pack Lesson plan and student worksheets with answers British Broadcasting Corporation 2008 Lesson Plan: Teacher's notes CONTENTS 1. Level, topic, language, aims,
More informationTHE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT
THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT NATIONAL CYBER SECURITY AWARENESS MONTH October is National Cyber Security Awareness Month (NCSAM)! NCSAM engages
More informationMoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
More informationThe Doctor-Patient Relationship
The Doctor-Patient Relationship It s important to feel at ease with your doctor. How well you are able to talk with your doctor is a key part of getting the care that s best for you. It s also important
More informationRelated KidsHealth Links
Grades 3 to 5 Health Problems Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
More informationTransitional Kindergarten Parent Engagement Toolkit
Transitional Kindergarten Parent Engagement Toolkit A Parent Outreach and Communications Resource for School Districts and Local Education Agencies Implementing Transitional Kindergarten The Kindergarten
More informationMortgage Secrets. What the banks don t want you to know.
Mortgage Secrets What the banks don t want you to know. Copyright Notice: Copyright 2006 - All Rights Reserved Contents may not be shared or transmitted in any form, so don t even think about it. Trust
More informationSTEP 5: Giving Feedback
STEP 5: Giving Feedback Introduction You are now aware of the responsibilities of workplace mentoring, the six step approach to teaching skills, the importance of identifying the point of the lesson, and
More informationLifeSmarts Safety Smart Ambassador Program PowerPoint Discussion Notes
Slide 1 Safety Smart Ambassador Program LifeSmarts challenges teens to engage in service learning and community service This presentation will help you understand more about the Safety Smart Ambassador
More informationIcebreakers and Name Games
1 Icebreakers and Name Games Be Healthy Stay Safe Enjoy and Achieve Make a Positive Contribution Achieve Economic Wellbeing 2 Ice breaker Act Out Your Name No equipment needed 10-15 minutes 4+ Get the
More informationGuide to Letters of Recommendation, Thank You and First Choice Letters
Guide to Letters of Recommendation, Thank You and First Choice Letters Letters of Recommendation You should only provide a letter of recommendation to a school if you re asked for one. Some schools may
More information101 IELTS Speaking Part Two Topic cards about sports, hobbies and free time A- Z
101 IELTS Speaking Part Two Topic cards about sports, hobbies and free time A- Z As the topics of sports, hobbies and free time are easy ones that tie in with IELTS Speaking Part One and students like
More informationSCOTTISH RESOURCES. First Level/Second Level Autumn 2008. Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite)
B B C Learning Scotland SCOTTISH RESOURCES First Level/Second Level Autumn 2008 Tuesdays 03.45 04.00 16 and 23 September BBC Radio 4 digital (terrestrial, cable, satellite) China Stories Programmes in
More informationTeach your child The Underwear Rule.
1. Teach your child The Underwear Rule. About one in five children falls victim to sexual violence, including sexual abuse. You can help prevent this happening to your child. Teach your child The Underwear
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationLearn How to Revise 1
Learn How to Revise 1 SCHOOL EXAM DATES 2016 END OF YEAR EXAMS FOR YEARS 7-9 BEGIN ON MONDAY 6 TH JUNE THEY WILL TAKE PLACE IN LESSONS DURING THIS WEEK AND IF NECESSARY THE WEEK AFTER. Some subjects are
More informationClass 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
More informationGENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1
Page 1 Contents 1. Introduction 2. How to use the 360 Self Assessment 3. Links to documents and resources 4. Acknowledgements 5. 360 Self Assessment 6. Report Sheet Introduction The development and expansion
More informationTO WRITING AND GIVING A GREAT SPEECH. A Reference Guide for Teachers by Elaine C. Shook Leon County 4-H
EIGHTSTEPS TO WRITING AND GIVING A GREAT SPEECH A Reference Guide for Teachers by Elaine C. Shook Leon County 4-H Introduction Good oral communication skills are important in our day to day activities.
More informationParenting a College Student ARCS. arts.kennesaw.edu/arcs
Parenting a College Student ARCS arts.kennesaw.edu/arcs Parenting a COLLEGE STUDENT First of all, congratulations! You ve done an amazing job raising an exceptional student who s ready to take the next
More informationWriting Topics WRITING TOPICS
Writing Topics Topics in the following list may appear in your actual test. You should become familiar with this list before you take the computer-based TOEFL test. Remember that when you take the test
More informationHector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9
Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9 OBJECTVES: 1. Children understand that strong passwords can help protect computer files and information. 2. Children undrestand
More informationTop 40 Career Change Tips. Copyright 2013 Position Ignition Top 40 Career Change Tips www.positionignition.com www.careerignitionclub.
Top 40 Career Change Tips 1 Hello! Career changes can be overwhelming, challenging, exciting, scary, fun or frustrating-many of us have found them to be all of the above! You could be changing careers
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationCyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence
Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber
More informationStoring Your Medicines Safely
A H E A L T H Y H O U S E Why is it important to store medicines correctly? When you store your medicines correctly they work well when you need them. If you do not store your medicine in the right place
More informationBullying UK Fundraising Pack
Bullying UK Fundraising Pack Get your school or organisation involved in raising money to help stop bullying in the UK Thank you for supporting Bullying UK Thank you for choosing to support Bullying UK
More informationStarting a Booktalk Club: Success in Just 12 Weeks!
Starting a Booktalk Club: Success in Just 12 Weeks! It s wonderful that you re interested in starting a booktalk club at your school! Before you even begin, you may want to familiarize yourself with some
More informationACTIVITY 15 Set Goals and Plan for Action
Title: Focus: Time: Guiding Question: Connections: Rationale/ Background: ACTIVITY 15 Set Goals and Plan for Action Self-assessment: What do I know about myself? 2 lessons @ 50-60 minutes A snapshot view:
More informationINSTRUCTION AT FSU THE FLORIDA STATE UNIVERSITY OFFICE OF DISTANCE LEARNING. A Guide to Teaching and Learning Practices
7th Edition Office of Distance Learning INSTRUCTION AT FSU A Guide to Teaching and Learning Practices Version 12.02.11 ODL/rg THE FLORIDA STATE UNIVERSITY OFFICE OF DISTANCE LEARNING 7th Edition Office
More information60 Daily Social Skills Lessons for the Intermediate Classroom (Grades 3-6)
60 Daily Social Skills Lessons for the Intermediate Classroom (Grades 3-6) Terms of Use: The materials within this manual were created to assist staff in the school-wide implementation of social skills
More informationDisability Hate Crime 04-03-09 9/3/09 12:03 Page 1. Disability Hate Crime. Reporting Book
Disability Hate Crime 04-03-09 9/3/09 12:03 Page 1 Disability Hate Crime Reporting Book Disability Hate Crime 04-03-09 9/3/09 12:06 Page 2 This book is about Disability Hate Crime and how to Report it
More information50 Must-Have Content Ideas for Your Email Newsletter
50 Must-Have Content Ideas for Your Email Newsletter 50 Must-Have Content Ideas for Your Email Newsletter Email newsletters are a win-win. They benefit companies and consumers alike. Why? Email newsletters
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationWELCOME TEAM CAPTAINS!
WELCOME TEAM CAPTAINS! Thank you for joining the online fundraiser for (org name)! This kit is designed to provide you with the tools you will need to make your team s experience fun, successful and rewarding.
More informationRaising Drug-Free Teens
A Parent s Guide to Raising Drug-Free Teens Dear Parent, You are the single most important influence in keeping your children drug free. In fact, research shows that the number one reason teenagers don
More informationFree Psychic Guide How To Get More From Your Psychic Readings
Free Psychic Guide How To Get More From Your Psychic Readings Please Copy and Send This Insightful 20 page e-book To Your Friends and to Anyone Who Is Looking For Sincere and Helpful Guidance in Their
More informationNAME OF ASSESSMENT: Reading Informational Texts and Opinion Writing Performance Assessment
GRADE: Third Grade NAME OF ASSESSMENT: Reading Informational Texts and Opinion Writing Performance Assessment STANDARDS ASSESSED: Students will ask and answer questions to demonstrate understanding of
More informationCommunication Process
Welcome and Introductions Lesson 7 Communication Process Overview: This lesson teaches learners to define the elements of effective communication and its process. It will focus on communication as the
More informationThe 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
More informationPart 1: Complete the following steps using the first half of the Patient Verification worksheet:
Patient Verification Manager s Training Guide You will facilitate a 45 minute training session with your team to review important key procedures for Patient Verification. This guide will help you deliver
More informationBasic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used
U UNPLUGGED Digital Citizenship Lesson time: 30 Minutes to delve deeper when time allows. Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used LESSON OVERVIEW In collaboration
More information