Cyber Bullying Lesson Plans and Curriculum based on the popular Nickelodeon television show icarly.

Size: px
Start display at page:

Download "Cyber Bullying Lesson Plans and Curriculum based on the popular Nickelodeon television show icarly."

Transcription

1 Cyber Bullying Lesson Plans and Curriculum based on the popular Nickelodeon television show icarly. developed for Nickelodeon by The Director s Cut 2010 Curriculum for grades 4-8 to be used in conjunction with the director s cut in class media literacy workshops presented by

2 Lesson 1: Investigating The Cyber Bully Grades: 4-8 Topic: i Carly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students via their computer, phone and hand held device, it is vital that they become more educated about the dangers and realities surrounding Cyber Bullying. Required Resources About icarly Ads by Google icarly is the newest and most exciting show on Nickelodeon. It offers a new concept as it marries TV and the Web starring Miranda Cosgrove, famous for her role of Megan on "Drake and Josh". It is the first show appealing to "wired" kids. You can watch the television show, see a webcast embedded in the television show, visit the icarly Web site that overlaps with the webcast on the television show, and then, if you really want to be famous, create your own video to be sent to the Web site, in the hopes that your video will be featured on a future webcast embedded in the television show. The show portrays a positive outlook of tweens / teens and what they are capable of accomplishing through the positive use of technology. Why use I Carly to talk about Cyber bullying? I Carly demonstrates the - According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." (

3 Lesson Overview and Teaching Instructions Materials: Class set of Investigating the Cyber Bully worksheet (BLM) (Double Side) BLM Overview: The characters of the upcoming icarly Nickelodeon movie and television show will share their knowledge of technology and the internet in order to help students identify the characteristics of The Cyber Bully. Introduction: All Grades (4-8): To begin the lesson have the students stay seated at their desk, or have them seated as group on the carpet. Ask the group: 1) What is Cyber Bullying? The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child or teenager using text messaging, , instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4]

4 Cyber-bullying can be as simple as continuing to send to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing s and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Ask the students to close their eyes and raise their hands to answer the following questions and record their answers on a large sheet of paper, or blackboard. Closing their eyes will ensure anonymity and provide less skewing due to peer pressure. a. Raise your hand if you have ever been bullied on the internet or via text message? Get the students to open their eyes to see the other students in the classroom that have also raised their hands. This will hopefully display how common Cyber Bullying occurs. *The next question is a little more personal, but ask them to be honest* b. Raise your hand if you have ever bullied someone online or through texting? (For example, have you made fun of someone online?, Have you ever written something negative about someone online?, or Have you threatened anyone online?) Ask them to open their eyes. Look over the results. Are they surprised by the results? Are you surprised by the results?

5 Step-by-step Instructions: On the worksheets provided (See BLMs), the students will be asked to compare the physical features and personality attributes of a Bully and a Cyber Bully. Through this comparison it should become apparent that a Bully may have a more extroverted demeanour (I.e. They are stronger, may be mean or hurtful, etc). The students should discover that a Cyber Bully`s demeanour is more introverted or not as apparent as the bully because the Cyber Bully`s identity may be anonymous or different than their everyday personality or actions. 1) Hand out a copy of Investigating the Cyber Bully worksheet to each student in class. 2) After the students have completed the worksheet, discuss the student`s findings as a class.

6 Lesson 1 Worksheet: Investigating The Cyber Bully Hey, I`m Sam! I do A LOT of blogging for my web show icarly! I have a lot of great fans, but sometimes people say some really hurtful stuff and make fun of the show! The worst thing is some of them go to my high school and they are so nice to me at school, but then when they are online they Instructions: Help Sam figure out who her REAL fans are by helping her figure out what a Cyber Bully looks and acts like. In the boxes below, draw a picture or what you think a Bully looks like, and what a Cyber Bully looks like. What do you notice? Then below each of your pictures list some characteristics that a Bully has, and a Cyber Bully has. The Bully The Characteristic of a Bully are: (Example: They are strong) The Cyber Bully The Characteristics of a Cyber Bully (Example: They are quiet)

7 "#$%$&'(%)*+&*!,-!$!./001 "#$%$&'(%)*+&*!,-!$!"12(%!./001!! Discuss: What do you notice about the Cyber Bully? How are they different from a Bully? Who is worse

8 Lesson 2: A Day in the Life of a Cyber Bully Grades: 4-8 Topic: icarly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Class set of the Mind Mapping worksheet (BLM) Class set of the A Day in the Life of a Cyber Bully Worksheet (BLM)

9 Lesson Overview and Teaching Instructions BLM Overview: In this lesson the students will be asked to step into the shoes of a Cyber Bully for a day, and imagine that they themselves are a Cyber Bully. They will be asked to write a diary entry from the perspective of a Cyber Bully. The students will then share their entry with the class. Introduction Lesson: 1) Re-read the definition of Cyber Bullying to the students again: Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( 2) Based on this definition as the students to brainstorm, and create a list of the most common places where they think Cyber bullying occurs. Examples: (Note: if the students do not come up with all of these examples, add the ones they have missed to the list). - Facebook (and Facebook Chat) - Myspace - Twitter - MSN

10 - Blogs - You Tube - Texting (cell phone) - Rating Sites (I.e. ratemyteacher.com) - Personal Websites - Video Games (where players can communicate to each other online) 3) Next, ask the students why they think Cyber Bullies choose the internet and other technologies to Bully. What motives do they have to Bully? Instructions: On the worksheet provided (See BLM), the students are asked to write a diary entry from the perspective of a Cyber Bully. The entry will be written about a time when they The Cyber Bully used a social networking site, or device to Bully another person. Before they write their diary entry they should brainstorm using the mind map provided (See BLM), and plan what they are going to say in their entry. Please set parameters that you feel your class will be comfortable with. Do not tell your students this, but after they write as their cyber bully, they will be asked to volunteer to read what they have written in front of the class. The teachable moment in this will be to see how students react when their comments are no longer transparent through cyberspace. Are they willing to read what they have written? Is the impact the same? How do their peers react? Why is it different when you say something hurtful in front of someone... and would you say it?

11 Carly takes great pride in hosting her own webisode. Some kids at school think that the stuff she does on line is not very cool, so they call her names and make fun of her on websites, through text messages and even make fake videos about her. Now it is turn to be a cyber bully. Pretend you are cyber bullying and share it below as you would on line. Lesson 2 Worksheet: A Day in the Life of a Cyber Bully My Name is (The Cyber Bully)

12 Lesson 3: Create Your Own Web Show Episode Grades: 4-8 Topic: icarly Movie Cyber-bullying Subjects: Language Arts Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Storyboarding Worksheet (2 copies for each group) Lesson Overview and Teaching Instructions BLM Overview: This lesson asks students to work in groups (of 4-5 students) in order to create their own web based TV show based on the web based show icarly. Students will have to plan and create one episode of their web based television show that will focus on the issue of Cyber Bullying among adolescents. By completing this storyboard they will be prepared for the Director`s Cut workshop they will be participating in.

13 Introduction: Introduce the idea of a Web TV show to the students. Brainstorm with the students how a web based television show may be different from a television show. For example, there are no commercial breaks; web shows are shorter in length etc. Explain to the students that their culminating task requires them to create one episode of an imaginary web show (similar to icarly). Their episode must be based on the topic of cyber bullying. They should ensure that their episode has a message for their audience. For example, that cyber bullying is hurtful and should be prevented. Instructions: First, photocopy the BLM storyboard for each group (x2 so there are 6 frames in total). Review story writing concepts such as, brainstorming, setting, character development, and plot in order to remind students what their story should incorporate. Storyboarding: Should be completed by all students, for the Comic Relief, Claymation and Documentary workshops. Hand out two storyboards to each group. When explaining the storyboard, encourage the students to draw simple pictures of the scenes they want to recreate (I.e. Stick figures). Each scene counts as 1 picture. Also, encourage the students to develop simple story lines. Lesson 3 Worksheet: Storyboarding Group Members: Web Show Title: Episode Title:

14

15 Lesson 2 Worksheet: Mind Mapping What social networking utility or device am I going to use to Cyber Bully? Who am I going to Bully? Why? What is it easy or difficult to bully someone online? How did you feel after you did it? My Name is (The Cyber Bully) What are you going to say to the person you are Bullying? Where am I going to Cyber Bully from? Example: Home Computer.

16 Lesson 2 Worksheet: A Day in the Life of a Cyber Bully!

17 Lesson 3: Create Your Own Web Show Episode Grades: 4-8 Topic: icarly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Story boarding Worksheet (2 copies for each group)

18 Lesson Overview and Teaching Instructions BLM Overview: This lesson asks students to work in groups (of 4-5 students) in order to create their own web based TV show based on the web based show icarly. (please see a synosis of icarly in lesson 1) Students will have to plan and create one episode of their web based television show that will focus on the issue of Cyber Bullying among adolescents. By completing this storyboard they will be prepared for the Director`s Cut workshop they will be participating in. Introduction: Introduce the idea of a Web TV show to the students. Brainstorm with the students how a web based television show may be different from a television show. For example, there are no commercial breaks; web shows are shorter in length etc. Explain to the students that their culminating task requires them to create one episode of an imaginary web show (similar to icarly). Their episode must be based on the topic of cyber bullying. They should ensure that their episode has a message for their audience. For example, that cyber bullying is hurtful and should be prevented. Instructions: 1) First, photocopy the BLM storyboard for each group (x2 so there are 6 frames in total). 2) Review story writing concepts such as, brainstorming, setting, character development, and plot in order to remind students what their story should incorporate. 3) Story boarding: Should be completed by all students, for the Comic Relief, Claymation and Documentary workshops. Hand out two storyboards to each group. When explaining the storyboard, encourage the students to draw simple pictures of the scenes they want to

19 recreate (I.e. Stick figures). Each scene counts as 1 picture. Also, encourage the students to develop simple story lines. Lesson 3 Worksheet: Storyboarding Group Members: Web Show Title: Episode Title:

20

21

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Lesson Plan for Senior Secondary

Lesson Plan for Senior Secondary Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12 Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which

More information

Exploring Media. Time. Activity Overview. Activity Objectives. Materials Needed. Trainer s Preparation. 30 minutes

Exploring Media. Time. Activity Overview. Activity Objectives. Materials Needed. Trainer s Preparation. 30 minutes Exploring Media Time 30 minutes Activity Overview This module provides an introduction into how the curriculum defines media and its purposes. Activities allow participants to brainstorm the many types

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Girl Scout Journey: It's Your World Change It!

Girl Scout Journey: It's Your World Change It! Girl Scout Journey: It's Your World Change It! amaze! Four-week Girl Scout Journey Program amaze!: The Twists and Turns of Getting Along Life is a maze of relationships and this journey has Girl Scout

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

How to stop bullying (and dodge a lawsuit)

How to stop bullying (and dodge a lawsuit) How to stop bullying (and dodge a lawsuit) Posted on the CHARACTER COUNTS! Character Educator Blog May 18, 2011 You can be sued personally for money damages if you witness instances of bullying or harassment

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

CREATIVE S SKETCHBOOK

CREATIVE S SKETCHBOOK Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

How can I improve my interviewing skills? MATERIALS

How can I improve my interviewing skills? MATERIALS Mock Interviews 6 Finding a job The BIG Idea How can I improve my interviewing skills? AGENDA Approx. 45 minutes I. Warm Up: Model an Interview (10 minutes) II. Interview Practice (30 minutes) III. Wrap

More information

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions

More information

Why is it important?

Why is it important? Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone

More information

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by: A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior

The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior Collaborative rule making promotes mutual respect, cooperation, self discipline and personal responsibility while

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Social Media Curriculum Overview

Social Media Curriculum Overview Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

I Wanna Rock Music VIdeo Workshop

I Wanna Rock Music VIdeo Workshop I Wanna Rock Music VIdeo Workshop Thank you for choosing The Director s Cut Workshops. We are thrilled to be a part of your classroom this year! We promise to work hard to make this the most engaging and

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Task 2 Multi-Text Reading: Bullying

Task 2 Multi-Text Reading: Bullying At a glance Level: ISE II Task 2 Multi-Text Reading: Bullying Focus: Task 2 Multi-text reading Aims: To develop reading strategies by reading a short article about four famous people and answering three

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

2010 Middle School Internet Safety Survey Results

2010 Middle School Internet Safety Survey Results When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Earn Money Sharing YouTube Videos

Earn Money Sharing YouTube Videos Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Glossary: Cybersafety and Technology

Glossary: Cybersafety and Technology Glossary: Cybersafety and Technology 3G and 4G G stands for Generation, as in a generation of mobile technology. 1G was analogue mobile phones, 2G was digital phones. 3G and 4G mobile technologies brought

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

MEAN TEENS. Middle and High School Comics Workbook. Prevention of Social Aggression at School. Worksheet for comics MEAN TEENS

MEAN TEENS. Middle and High School Comics Workbook. Prevention of Social Aggression at School. Worksheet for comics MEAN TEENS MEAN TEENS Middle and High School Comics Workbook Prevention of Social Aggression at School Stuart W. Twemlow, Ph.D. & Frank C. Sacco, M.D. SOCIAL BULLYING Name: When you arrive at Middle, Junior, or High

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

School Bullying Survey

School Bullying Survey School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Bullying Prevention and Intervention:

Bullying Prevention and Intervention: Bullying Prevention and Intervention: A Guide for the Individualized Education Program (IEP) Team Dr. Carol R. Johnson Superintendent Boston Public Schools 26 Court St. Boston, MA 02108-2528 www.bostonpublicschools.org

More information

Social Media Legal Issues: To Friend or Not to Friend

Social Media Legal Issues: To Friend or Not to Friend Social Networking Social Media Legal Issues: To Friend or Not to Friend New town square. The law as developed is being applied to a totally new medium. Mark Hagemeier, Associate General Counsel University

More information

DIGITAL CITIZENSHIP MODULE 1

DIGITAL CITIZENSHIP MODULE 1 Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily

More information

Grand Canyon Council - Social Media Policy

Grand Canyon Council - Social Media Policy INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Animals that move slowly, animals that move quickly

Animals that move slowly, animals that move quickly Unit Three Time 74 Animals that move slowly, animals that move quickly Unit 3: Time Image courtesy of: Microsoft clipart Focus: Animals that move slowly and quickly linked with time Whole class activity

More information

Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary

Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary BACKGROUND Cyberbullying is an increasing problem for children and schools. This lesson addresses the inappropriateness

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

WORKSHEET ONE FIRST ACTIVITY. Treating others with respect. List of ideas for treating others with respect

WORKSHEET ONE FIRST ACTIVITY. Treating others with respect. List of ideas for treating others with respect WORKSHEET ONE FIRST ACTIVITY Have the group brainstorm what they think it means to treat other people with. Write the answers on the whiteboard, if it helps use this list on the worksheet as a guide. List

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

STOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW?

STOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW? STOP BULLYING take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series Hosted by Erika Harold, Miss America 2003, herself a victim of severe harassment, this solution

More information

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

safety and the internet

safety and the internet www.kidsintheknow.ca A parent's guide for children ages 8 & 9 safety and the internet This brochure is intended to help you improve your child s safety on the Internet. It includes information about children

More information

Healthy and Safety Awareness for Working Teens Unit 5 Communicating Workplace Problems

Healthy and Safety Awareness for Working Teens Unit 5 Communicating Workplace Problems Healthy and Safety Awareness for Working Teens Unit 5 Communicating Workplace Problems Unit 5 Communicating Workplace Problems 1 Unit 5 Overview This purpose of this unit is to help students develop the

More information

YOUR FINANCIAL ROAD MAP: WHERE DO YOU WANT TO GO?

YOUR FINANCIAL ROAD MAP: WHERE DO YOU WANT TO GO? YOUR FINANCIAL ROAD MAP: WHERE DO YOU WANT TO GO? DAY: 11 TITLE: YOUR MONEY: Consumer Awareness Consumption TARGET COMPETENCY: Understand the influence of advertising and examine the impact of our own

More information

What Is the Olweus Bullying Prevention Program?

What Is the Olweus Bullying Prevention Program? Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive

More information