Cyber Bullying Lesson Plans and Curriculum based on the popular Nickelodeon television show icarly.
|
|
- Frederick Johns
- 7 years ago
- Views:
Transcription
1 Cyber Bullying Lesson Plans and Curriculum based on the popular Nickelodeon television show icarly. developed for Nickelodeon by The Director s Cut 2010 Curriculum for grades 4-8 to be used in conjunction with the director s cut in class media literacy workshops presented by
2 Lesson 1: Investigating The Cyber Bully Grades: 4-8 Topic: i Carly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students via their computer, phone and hand held device, it is vital that they become more educated about the dangers and realities surrounding Cyber Bullying. Required Resources About icarly Ads by Google icarly is the newest and most exciting show on Nickelodeon. It offers a new concept as it marries TV and the Web starring Miranda Cosgrove, famous for her role of Megan on "Drake and Josh". It is the first show appealing to "wired" kids. You can watch the television show, see a webcast embedded in the television show, visit the icarly Web site that overlaps with the webcast on the television show, and then, if you really want to be famous, create your own video to be sent to the Web site, in the hopes that your video will be featured on a future webcast embedded in the television show. The show portrays a positive outlook of tweens / teens and what they are capable of accomplishing through the positive use of technology. Why use I Carly to talk about Cyber bullying? I Carly demonstrates the - According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." (
3 Lesson Overview and Teaching Instructions Materials: Class set of Investigating the Cyber Bully worksheet (BLM) (Double Side) BLM Overview: The characters of the upcoming icarly Nickelodeon movie and television show will share their knowledge of technology and the internet in order to help students identify the characteristics of The Cyber Bully. Introduction: All Grades (4-8): To begin the lesson have the students stay seated at their desk, or have them seated as group on the carpet. Ask the group: 1) What is Cyber Bullying? The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child or teenager using text messaging, , instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4]
4 Cyber-bullying can be as simple as continuing to send to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing s and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Ask the students to close their eyes and raise their hands to answer the following questions and record their answers on a large sheet of paper, or blackboard. Closing their eyes will ensure anonymity and provide less skewing due to peer pressure. a. Raise your hand if you have ever been bullied on the internet or via text message? Get the students to open their eyes to see the other students in the classroom that have also raised their hands. This will hopefully display how common Cyber Bullying occurs. *The next question is a little more personal, but ask them to be honest* b. Raise your hand if you have ever bullied someone online or through texting? (For example, have you made fun of someone online?, Have you ever written something negative about someone online?, or Have you threatened anyone online?) Ask them to open their eyes. Look over the results. Are they surprised by the results? Are you surprised by the results?
5 Step-by-step Instructions: On the worksheets provided (See BLMs), the students will be asked to compare the physical features and personality attributes of a Bully and a Cyber Bully. Through this comparison it should become apparent that a Bully may have a more extroverted demeanour (I.e. They are stronger, may be mean or hurtful, etc). The students should discover that a Cyber Bully`s demeanour is more introverted or not as apparent as the bully because the Cyber Bully`s identity may be anonymous or different than their everyday personality or actions. 1) Hand out a copy of Investigating the Cyber Bully worksheet to each student in class. 2) After the students have completed the worksheet, discuss the student`s findings as a class.
6 Lesson 1 Worksheet: Investigating The Cyber Bully Hey, I`m Sam! I do A LOT of blogging for my web show icarly! I have a lot of great fans, but sometimes people say some really hurtful stuff and make fun of the show! The worst thing is some of them go to my high school and they are so nice to me at school, but then when they are online they Instructions: Help Sam figure out who her REAL fans are by helping her figure out what a Cyber Bully looks and acts like. In the boxes below, draw a picture or what you think a Bully looks like, and what a Cyber Bully looks like. What do you notice? Then below each of your pictures list some characteristics that a Bully has, and a Cyber Bully has. The Bully The Characteristic of a Bully are: (Example: They are strong) The Cyber Bully The Characteristics of a Cyber Bully (Example: They are quiet)
7 "#$%$&'(%)*+&*!,-!$!./001 "#$%$&'(%)*+&*!,-!$!"12(%!./001!! Discuss: What do you notice about the Cyber Bully? How are they different from a Bully? Who is worse
8 Lesson 2: A Day in the Life of a Cyber Bully Grades: 4-8 Topic: icarly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Class set of the Mind Mapping worksheet (BLM) Class set of the A Day in the Life of a Cyber Bully Worksheet (BLM)
9 Lesson Overview and Teaching Instructions BLM Overview: In this lesson the students will be asked to step into the shoes of a Cyber Bully for a day, and imagine that they themselves are a Cyber Bully. They will be asked to write a diary entry from the perspective of a Cyber Bully. The students will then share their entry with the class. Introduction Lesson: 1) Re-read the definition of Cyber Bullying to the students again: Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( 2) Based on this definition as the students to brainstorm, and create a list of the most common places where they think Cyber bullying occurs. Examples: (Note: if the students do not come up with all of these examples, add the ones they have missed to the list). - Facebook (and Facebook Chat) - Myspace - Twitter - MSN
10 - Blogs - You Tube - Texting (cell phone) - Rating Sites (I.e. ratemyteacher.com) - Personal Websites - Video Games (where players can communicate to each other online) 3) Next, ask the students why they think Cyber Bullies choose the internet and other technologies to Bully. What motives do they have to Bully? Instructions: On the worksheet provided (See BLM), the students are asked to write a diary entry from the perspective of a Cyber Bully. The entry will be written about a time when they The Cyber Bully used a social networking site, or device to Bully another person. Before they write their diary entry they should brainstorm using the mind map provided (See BLM), and plan what they are going to say in their entry. Please set parameters that you feel your class will be comfortable with. Do not tell your students this, but after they write as their cyber bully, they will be asked to volunteer to read what they have written in front of the class. The teachable moment in this will be to see how students react when their comments are no longer transparent through cyberspace. Are they willing to read what they have written? Is the impact the same? How do their peers react? Why is it different when you say something hurtful in front of someone... and would you say it?
11 Carly takes great pride in hosting her own webisode. Some kids at school think that the stuff she does on line is not very cool, so they call her names and make fun of her on websites, through text messages and even make fake videos about her. Now it is turn to be a cyber bully. Pretend you are cyber bullying and share it below as you would on line. Lesson 2 Worksheet: A Day in the Life of a Cyber Bully My Name is (The Cyber Bully)
12 Lesson 3: Create Your Own Web Show Episode Grades: 4-8 Topic: icarly Movie Cyber-bullying Subjects: Language Arts Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Storyboarding Worksheet (2 copies for each group) Lesson Overview and Teaching Instructions BLM Overview: This lesson asks students to work in groups (of 4-5 students) in order to create their own web based TV show based on the web based show icarly. Students will have to plan and create one episode of their web based television show that will focus on the issue of Cyber Bullying among adolescents. By completing this storyboard they will be prepared for the Director`s Cut workshop they will be participating in.
13 Introduction: Introduce the idea of a Web TV show to the students. Brainstorm with the students how a web based television show may be different from a television show. For example, there are no commercial breaks; web shows are shorter in length etc. Explain to the students that their culminating task requires them to create one episode of an imaginary web show (similar to icarly). Their episode must be based on the topic of cyber bullying. They should ensure that their episode has a message for their audience. For example, that cyber bullying is hurtful and should be prevented. Instructions: First, photocopy the BLM storyboard for each group (x2 so there are 6 frames in total). Review story writing concepts such as, brainstorming, setting, character development, and plot in order to remind students what their story should incorporate. Storyboarding: Should be completed by all students, for the Comic Relief, Claymation and Documentary workshops. Hand out two storyboards to each group. When explaining the storyboard, encourage the students to draw simple pictures of the scenes they want to recreate (I.e. Stick figures). Each scene counts as 1 picture. Also, encourage the students to develop simple story lines. Lesson 3 Worksheet: Storyboarding Group Members: Web Show Title: Episode Title:
14
15 Lesson 2 Worksheet: Mind Mapping What social networking utility or device am I going to use to Cyber Bully? Who am I going to Bully? Why? What is it easy or difficult to bully someone online? How did you feel after you did it? My Name is (The Cyber Bully) What are you going to say to the person you are Bullying? Where am I going to Cyber Bully from? Example: Home Computer.
16 Lesson 2 Worksheet: A Day in the Life of a Cyber Bully!
17 Lesson 3: Create Your Own Web Show Episode Grades: 4-8 Topic: icarly Movie Cyber-bullying Rationale Due to the increasing amount of social networking websites and utilities (I.e. Facebook, Myspace, Twitter, MSN and texting) that are accessible to students, it is vital that they become more educated about the dangers and realities of Cyber Bullying. According to Bill Belsey that creator or Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." ( Required Resources Materials: Story boarding Worksheet (2 copies for each group)
18 Lesson Overview and Teaching Instructions BLM Overview: This lesson asks students to work in groups (of 4-5 students) in order to create their own web based TV show based on the web based show icarly. (please see a synosis of icarly in lesson 1) Students will have to plan and create one episode of their web based television show that will focus on the issue of Cyber Bullying among adolescents. By completing this storyboard they will be prepared for the Director`s Cut workshop they will be participating in. Introduction: Introduce the idea of a Web TV show to the students. Brainstorm with the students how a web based television show may be different from a television show. For example, there are no commercial breaks; web shows are shorter in length etc. Explain to the students that their culminating task requires them to create one episode of an imaginary web show (similar to icarly). Their episode must be based on the topic of cyber bullying. They should ensure that their episode has a message for their audience. For example, that cyber bullying is hurtful and should be prevented. Instructions: 1) First, photocopy the BLM storyboard for each group (x2 so there are 6 frames in total). 2) Review story writing concepts such as, brainstorming, setting, character development, and plot in order to remind students what their story should incorporate. 3) Story boarding: Should be completed by all students, for the Comic Relief, Claymation and Documentary workshops. Hand out two storyboards to each group. When explaining the storyboard, encourage the students to draw simple pictures of the scenes they want to
19 recreate (I.e. Stick figures). Each scene counts as 1 picture. Also, encourage the students to develop simple story lines. Lesson 3 Worksheet: Storyboarding Group Members: Web Show Title: Episode Title:
20
21
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationLesson Plan for Senior Secondary
Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationExploring Media. Time. Activity Overview. Activity Objectives. Materials Needed. Trainer s Preparation. 30 minutes
Exploring Media Time 30 minutes Activity Overview This module provides an introduction into how the curriculum defines media and its purposes. Activities allow participants to brainstorm the many types
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationINTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT
INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationCyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence
Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationGirl Scout Journey: It's Your World Change It!
Girl Scout Journey: It's Your World Change It! amaze! Four-week Girl Scout Journey Program amaze!: The Twists and Turns of Getting Along Life is a maze of relationships and this journey has Girl Scout
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationHow to stop bullying (and dodge a lawsuit)
How to stop bullying (and dodge a lawsuit) Posted on the CHARACTER COUNTS! Character Educator Blog May 18, 2011 You can be sued personally for money damages if you witness instances of bullying or harassment
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationInternet Safety Kit. A wake-up call for safer surfing online for the young people in your life.
Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for
More informationCREATIVE S SKETCHBOOK
Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationComprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationHow can I improve my interviewing skills? MATERIALS
Mock Interviews 6 Finding a job The BIG Idea How can I improve my interviewing skills? AGENDA Approx. 45 minutes I. Warm Up: Model an Interview (10 minutes) II. Interview Practice (30 minutes) III. Wrap
More informationBy Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
More informationWhy is it important?
Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone
More informationA guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:
A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationThe Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior
The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior Collaborative rule making promotes mutual respect, cooperation, self discipline and personal responsibility while
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationSocial Media Curriculum Overview
Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationWisconsin Anti-Bullying Center
Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationI Wanna Rock Music VIdeo Workshop
I Wanna Rock Music VIdeo Workshop Thank you for choosing The Director s Cut Workshops. We are thrilled to be a part of your classroom this year! We promise to work hard to make this the most engaging and
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationTask 2 Multi-Text Reading: Bullying
At a glance Level: ISE II Task 2 Multi-Text Reading: Bullying Focus: Task 2 Multi-text reading Aims: To develop reading strategies by reading a short article about four famous people and answering three
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More information2010 Middle School Internet Safety Survey Results
When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationEarn Money Sharing YouTube Videos
Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationGlossary: Cybersafety and Technology
Glossary: Cybersafety and Technology 3G and 4G G stands for Generation, as in a generation of mobile technology. 1G was analogue mobile phones, 2G was digital phones. 3G and 4G mobile technologies brought
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationMEAN TEENS. Middle and High School Comics Workbook. Prevention of Social Aggression at School. Worksheet for comics MEAN TEENS
MEAN TEENS Middle and High School Comics Workbook Prevention of Social Aggression at School Stuart W. Twemlow, Ph.D. & Frank C. Sacco, M.D. SOCIAL BULLYING Name: When you arrive at Middle, Junior, or High
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationSchool Bullying Survey
School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationBullying Prevention and Intervention:
Bullying Prevention and Intervention: A Guide for the Individualized Education Program (IEP) Team Dr. Carol R. Johnson Superintendent Boston Public Schools 26 Court St. Boston, MA 02108-2528 www.bostonpublicschools.org
More informationSocial Media Legal Issues: To Friend or Not to Friend
Social Networking Social Media Legal Issues: To Friend or Not to Friend New town square. The law as developed is being applied to a totally new medium. Mark Hagemeier, Associate General Counsel University
More informationDIGITAL CITIZENSHIP MODULE 1
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationAnimals that move slowly, animals that move quickly
Unit Three Time 74 Animals that move slowly, animals that move quickly Unit 3: Time Image courtesy of: Microsoft clipart Focus: Animals that move slowly and quickly linked with time Whole class activity
More informationHector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary
Hector s World Lesson Plan Episode: Cyberbullying You re Not Alone Upper primary BACKGROUND Cyberbullying is an increasing problem for children and schools. This lesson addresses the inappropriateness
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationA Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
More informationWORKSHEET ONE FIRST ACTIVITY. Treating others with respect. List of ideas for treating others with respect
WORKSHEET ONE FIRST ACTIVITY Have the group brainstorm what they think it means to treat other people with. Write the answers on the whiteboard, if it helps use this list on the worksheet as a guide. List
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationSTOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW?
STOP BULLYING take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series Hosted by Erika Harold, Miss America 2003, herself a victim of severe harassment, this solution
More informationKnow the Rules Before You Use the Tools: A Student User s Guide to Project Share
Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationLessons for Teens: Risky Internet and Social Networking
Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations
More informationsafety and the internet
www.kidsintheknow.ca A parent's guide for children ages 8 & 9 safety and the internet This brochure is intended to help you improve your child s safety on the Internet. It includes information about children
More informationHealthy and Safety Awareness for Working Teens Unit 5 Communicating Workplace Problems
Healthy and Safety Awareness for Working Teens Unit 5 Communicating Workplace Problems Unit 5 Communicating Workplace Problems 1 Unit 5 Overview This purpose of this unit is to help students develop the
More informationYOUR FINANCIAL ROAD MAP: WHERE DO YOU WANT TO GO?
YOUR FINANCIAL ROAD MAP: WHERE DO YOU WANT TO GO? DAY: 11 TITLE: YOUR MONEY: Consumer Awareness Consumption TARGET COMPETENCY: Understand the influence of advertising and examine the impact of our own
More informationWhat Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
More information