Cyber Bullying. Lesson Plan. Ice-Breaker. Learning Outcomes:

Similar documents
Cyberbullying A whole-school community issue

September A Anti Bullying (Cyber Bullying) version 9

Cyberbullying: What Parents Can Do to Protect Their Children

E-Safety Issues and Online Safety

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

Social Networking Policy

E-Safety Issues and Online Safety

Staying Safe Online. A Practical Guide for Parents and Children.

Social Media Guidelines Resource

Online Safety for Middle and High School

Social Networking Sites like Facebook, MSN

Guideline on Windows 7 Parental Controls

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

SOCIAL NETWORKING SITES

E-Safety Issues and Online Safety. Parents Evening

TAVISTOCK COLLEGE POLICIES & PROCEDURES

Girls & Cyber- bullying

Finchley Catholic High School. Anti Bullying Policy

Digital Citizenship Lesson Plan

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Mobiles /3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST Camera Mobile Phones Health and Safety Issues

Networking and Social Media Policy

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EADS up. stop think connect

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

Cranmere Primary School ANTI-BULLYING POLICY

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

FIRBANK GRAMMAR SCHOOL

GET CONNECTED, GET IN THE KNOW

Part 5. Dinosaur School Notes to Teachers. 1. Introduction. 2. Iguanodon Unit: How to be Successful in School

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

e-rate toolkit Cyberbullying: Crossing the Line

Anti Bullying Policy

CyberbullyNOT Student Guide to Cyberbullying

ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.

UK children s media literacy

DIGITAL CITIZENSHIP MODULE 1

HEADS up. stop think connect

HOW TO STAY SAFE. Smartphones

Internet Safety. A guide to staying smart & safe online

Eanes Independent School District Responsible Use Guidelines for Technology

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Internet Safety/CIPA Lesson Plan

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Take a tour of the technology that can help you understand what your children are seeing online.

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

[Name of School] E-safety policy

Acceptable Use of ICT Policy. Learner School Policy

Guidelines for Preventing and Dealing with Bullying Issues

St. Gregory s Catholic Primary School Behaviour Policy

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities

Social Networking Policy

Sonia Livingstone, LSE

1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher

Cybersafety and protocols for conducting online life?

4. The Importance of Internet Use in the Primary Curriculum

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

E-Safety and Acceptable Use Policy

Affirmative Action Presentation

Sibford School Student Computer Acceptable Use Policy

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

School Policy Regarding Computer Use, Technology and Internet Access

Computer Facilities and External Networks Acceptable Use by Students

Students Acceptable Use Policy for Electronic Resources Rules Summary

St Bernadette s Catholic Primary School. E-Safety Policy


UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

Safety Tips for Social Networking

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

King David Primary School Staff Social Networking Policy

Children and parents: media use and attitudes report

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

A Time to Tell Troop Meeting Guide

E-safety: Protecting your child online. Information for parents

Preventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice

FAQs: Bullying in schools

Safer Internet Day Quiz

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017

E Safety Policy. 6 th March Annually. 26 th February 2014

Today s teens use technology more than ever. Most have

Blaenavon Heritage Voluntary Controlled Primary School

FREDERICK BREMER SCHOOL E SAFETY POLICY Date of Issue: June 2015 Ratified: For review:

Village Activity: Beating Bullying

BLACKPOOL COUNCIL Topic Social Media Policy

MARC K-12 Bullying and Cyberbullying Assemblies

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Assertiveness at Work. Delegate Manual SAMPLE PAGES

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015

Why is it important?

Class 2: Manage Your Digital Footprint. Student Handbook

E-Safety Awareness. Parents and Carers

Woodfield School 2015 Anti Bullying & Cyber Bullying Policy

What does compassion look like?

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Cyber Security Awareness. Internet Safety Intro.

Home-School Agreement

Transcription:

Cyber Bullying Lesson Plan Learning Outcomes:. For the YP to define cyberbullying. To suggest ways in which YP can stay safe online.. To look at online dangers.. To identify cyberbullying and it s consequences.. To suggest ways YP can behave positively in cyberspace.. To promote active participation, communication and group discussion. Ice-Breaker. Ice Breaker (mins in total) Activity Both secondary and primary age Teacher to divide class up in to small groups ( YP per group) and give them minutes to come up with as many words or short sentences as possible related to CyberBullying. The words must start with the letters that spell CYBERBULLYING. The YP should be encouraged to be as creative as possible. some examples: C Children can be cyberbullied C Crying Cyberbullying can make you cry Y young people can by cyberbullied Y Y do people do it? B bullies, brave it is brave when people stand up to the cyberbullies, Bebo a site we like going to but not when we get bullied there The YP then give a few of their answers each to the teacher who writes them up on the board and leaves them there for the rest of the lesson. This will encourage the YP to start thinking as creatively as possible about issues surrounding cyberbullying and will help to give them some new language and ideas around it.

Defining What is cyberbullying Primary Age - focus on friendship and positive relationships. Activity Give brief introduction to this section ( mins) See Appendix with information for teacher Talk about friendships and positive relationships. Perhaps talk about bullying and touch on Cyberbullying. (they may find it difficult at a young age but I think starting to introduce the term is important) Coming up with cyberbullying definition (mins) Give the YP mins to individually come up with key words they associate with good relationships, which might include what a good friend *wouldn t* do. Ask or YP to read out their lists, and write it up somewhere for all children to see. Then ask class if there are any more they would like to add to the list to make a complete list. Secondary Age - focus on bullying. Give brief introduction to this section ( mins) See Appendix with information for teacher Some time should be spent by the teacher talking about cyberbullying and what it is Divide into groups of or (mins) Encourage each group to come up with a group definition about cyberbullying, or key phrases of; that explore the act, method and consequences of. Group definition (mins) Ask all groups to read out their definitions and pick out key parts from each group to make one overall definition.

Dangers online Teacher explains and gives one example of an online danger or cyberbullying, and the consequences of this. Examples of starting points might be: Activity You ve started getting nasty text messages. You ve started to recieve inappropriate emails. You ve become a victim of prank calling or silent calling. A number of hate groups have been set up about you. You ve become a victim of sexting(inappropriate photos sent around about you). You ve posted personal details like mobile number or home address on your webpage and someone starts pretending to be you. Someone you ve met for the first time online asks to meet you...and you go along because they re the same age as you. When you turn up, they re not who you thought they were... YP then break in to groups to come up with or things they consider to be online dangers and the consequences of these. Role play. Each group then presents their or online dangers to the rest of the class. How to keep cybersafe This session is about giving top tips on keeping Activity yourself and your peers safe online. Brainstorm with the class use a white board or flip chart to record ideas and plan to display top tips in the school ICT rooms and near all classroom computers. Examples might include: Treat others with respect and expect them to do the same Keep passwords a secret If you don t want the world to know then don t post it! Never post personal information online that can identify you in any way Use a free email address online like hotmail or googlemail that you can get rid of should you need to... mins

Positive behaviour in cyberspace The section consists of a Stamp out cyberbullying! game. Activity Primary School focus on good and bad choices The class teacher puts a CyberMentor widget on the board. Examples of both good and bad choices are on it. Individually, young people will be called up to remove a bad choice, with the aim being to remove all the bad choices and they will be left with a clear image of good behaviour. There may be some ambiguity about the examples on the board and this will be a point for discussion. Secondary School - focus on alternatives of bad online behaviour The class teacher puts a CyberMentor widget on the board. Examples of negative behaviour online are stuck around the outside of the widget and the YP have to suggest alternatives to this behaviour. If they successfully suggest an alternative then they can stick a large laminated footprint over the negative behaviour on the board. The teacher can also write the alternative behaviour on the laminated footprint to reinforce learning. There may be some ambiguity about the examples on the board and this will be a point for discussion. In both schools, the young people can been shown CyberMentors. org.uk, where they can: Receive support from CyberMentors Apply to be a CyberMentor Interact socially in a safe environment, presenting as positive role models Plenary ( minutes) Teacher re-caps on areas covered in the lesson and also points out that the YP can all get help on line from cybermentors.org.uk

Appendix of information: What is CyberBullying? Mobile, Internet and wireless technologies have increased the pace of communication and brought benefits to users worldwide, but their popularity provides increasing opportunities for misuse, one of which is cyberbullying. It is crucial that children and young people, who are particularly skilful at adopting new technologies, are able to use the Internet and mobile phones safely and positively, be aware of the consequences of misuse and how to report any incidence of bullying. The advent of cyberbullying adds new dimensions to traditional forms of bullying. Unlike other forms of bullying, cyberbullying can follow children and young people into their private spaces and outside school hours there is no safe haven for the child being bullied. Cyberbullies can communicate their messages to a wide audience at lightening speed and can often remain unseen and unidentifiable with catastrophic effects. There are many different types of cyberbullying that take place over many mediums: Types of cyberbullying: prank calling; filming; texting; sexting, passing on messages that may upset others; using Bluetooth to send around picture or video clips which may be offensive. Other forms of technology can be used to cyberbully and these might be the use of IM (Instant Messaging) to intimidate others, coercing others into ganging up online and using aggressive and threatening behaviour towards an individual. Social networking sites have become the norm and are used by millions of children and young people daily to communicate. However, social networking (SNS) can also be used to propel images and thoughts out to a massive audience at lightening speed. This may be done by: Posting nasty or threatening comments on someone s profile or making obscene comments Setting up fake profiles and uploading pictures or video with the intention of humiliating the victim Excluding an individual from a forum or thread; setting up hate sites and online ganging up especially within the online video game world threatening new players and using derogatory terms such as noob Sending threatening emails or forwarding private emails with the intent to hurt or embarrass Sending offensive emails and attachments or participation in chain emails with intent to hurt