DIGITAL CITIZENSHIP MODULE 1



Similar documents
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

i-safe K 12 CURRICULUM SCOPE 06-07

E-Safety Issues and Online Safety. Parents Evening

i-safe CURRICULUM SCOPE Elementary Grades K - 5

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Teaching Digital Citizenship

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Eanes Independent School District Responsible Use Guidelines for Technology

Staying Safe Online. A Practical Guide for Parents and Children.

HOW TO STAY SAFE. Smartphones

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Middle secondary unit. Ethical use of technology.

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign Families Presentation

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

2 nd - Watch My Online Neighborhood Video: online- neighborhood

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

Lesson Goals/Objectives: To decide where cell conversations are appropriate.

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

Today s teens use technology more than ever. Most have

e-rate toolkit Cyberbullying: Crossing the Line

Administrative Procedures Memorandum A1300


STOP. THINK. CONNECT. Online Safety Quiz

Digital Citizenship Lesson Plan

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Social Media Guidelines Resource

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Related KidsHealth Links

Students Acceptable Use Policy for Electronic Resources Rules Summary

Safety Tips for Social Networking

Colonial Heights Public Schools Internet Safety Curriculum

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

HEADS up. stop think connect

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Computer Technology Standards of Learning for Virginia s Public Schools

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

Class 3: Identify Tricks and Scams Online

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Social Media Curriculum Overview

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Technology Acceptable Use Policy

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Activity 1A: Perceptions of Crime and Justice

School Policy Regarding Computer Use, Technology and Internet Access

JGSC Laptop Agreement

Cyberbullying: What Parents Can Do to Protect Their Children

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

Guideline on Windows 7 Parental Controls

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Internet Safety/CIPA Lesson Plan

EADS up. stop think connect

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

BC s Digital Literacy Framework (DRAFT)

SOCIAL NETWORKING SITES

Class 2: Manage Your Digital Footprint. Student Handbook

Cyber Security Awareness. Internet Safety Intro.

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

A Publication of the GCPS Information Management Division

September A Anti Bullying (Cyber Bullying) version 9

Activities for Protecting Your Identity and Computer for Middle and High School Students

Cyber safety Parent Easy Guide 63

Teen Online & Wireless Safety Survey

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Baldwin County Public Schools. Acceptable Use Policy

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

DIGITAL WELLNESS ONLINE CHALLENGE

National Health Education Standards and Performance Indicators. Interpersonal Communication [4.12.1; ; ] Self Management [7.12.2; 7.12.

Online Safety for Middle and High School

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Transcription:

Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily living in the digitial era, understand the norms of use, and explain the purpose of digital use norms 1. Watch: https://prezi.com/secure/77f19c716224cd17e1893580268531f282a96468/ 2. While going through the prezi, take time to answer the questions and have a 2-3 minute open discussion with the class. 3. Ask students to generate a one line solgan to remind others to always be a good digital citizen. 4. Have the class vote on the best slogan and create a classroom banner on butcher paper to display. ELEMENT Digital Communication MODULE 2 Email, Texting, Cell Phone Usage, Wikis, Blogs, Social Networks, YouTube, Web Hosting, SKYPE, etc. Outline the major forms of digital communication, understand that the way in which we communcation evolves and technology impacts that process Day One: 1. Watch: http://www.youtube.com/watch?v=mpioclx1jpe&nr=1&feature=fvwp 2. Assign students to groups of 3-4 to identify as many different forms of social media and digital communication used in 2011: (Email, texting, celluar phones, wikis, social networks, YouTube, WWW, blogs, Skype, etc.) 3. In their groups, students will discuss the following: Are schools investing in and using these modes of digital communication to facilitate learning? How can schools use these forms of communication to impact teaching and learning? 4. Have students work in groups to create a poster collage illustrating the benefits of using technology in the classroom. Day Two: 1. Ask students to think about how the ways in which people communicate will change in the next 20 years. 2. Assign students to groups and have them work to create a poster illustrating how they would spread the word about a new product if they were alive in: 1100 B.C., 1434, 1672, 1796, 1850, 1960, 1978, 1989, 1996, 2000, 2010, 2025, 3000. 3.Watch: http://www.youtube.com/watch?v=b2ormforov4

Digital Access MODULE 3 Understand your level of access and know that there is a digital divide between individuals in the world. 1. Have students watch: http://www.youtube.com/watch?v=xvrbgkdeii0 2. Poll the class to assess the number of hours your students are engaged in the digital world. 3. Ask students how they use digital resources on a daily basis and how their lives would be different if they did not have access to these resources. 4. Lead students in a google search on "The Digital Divide". Briefly discuss what this idea is and then: 5. Ask students to respond (in a whole group discussion) to the following questions: Is there a "digital divide"? If so, what are the ramifications for American society? Show http://www.youtube.com/watch?v=icbost0evqe and ask students to think about this question: Do all students have the opportunity to be involved in a digital society? 5. Ask students to brainstorm ways to bridge the Digital Divide.

Digital Security Phising, Secure Passwords, Secure Websites MODULE 4 Objectives: 1. Identify some sources of and kinds of security threats to home and public computers. 2. Share cyber security information with their families and prepare a family cyber security plan. Common Sense Media Inc. 2011. All rights reserved.curriculum About http://cybersmartcurriculum.org/safetysecurity/lessons/9-12/safeguarding_your_stuff_my_stuff_our_stuff/ 1.Watch: http://www.youtube.com/watch?v=x7gweghexca&feature=related 2.Have students read page 1of handout and "Think About It" on page 2 of handout. 3.Ask: What is it about using computers that you cannot live without? Allow students to establish that using computers is often central to their ability to do school assignments, socialize, and have fun. 4.Acknowledge: that security issues are probably not uppermost in their minds as they do these things and then challenge them to consider how they might feel if their computer or data was attacked and they were prevented from doing these activities. 5.Showing commoncraft videos Phising 2:54 min Secure Passwords 3:26 min Secure Websites 3:08 min http://www.commoncraft.com/phishing http://www.commoncraft.com/secure-passwords-video http://www.commoncraft.com/secure-websites-video 6.Have students review page 3 of handout. 7. Watch:http://www.youtube.com/watch?v=5PlofmoUu8s

Digital Rights and Responsibilities Cyberbullying, Sexting, Social Networking MODULE 5 Students are to understand that although they are allotted digital rights, there are responsibilities that accompany these rights. There are also laws to enforce and protect the rights of each digital citizen amongst our social networking arena. Day One: 1. Present Prezi entitled Bullying: Face to Face & in Cyberspace (approx. time 10 minutes) 2. Students: Get in small groups. 3. In each group, students will generate a list of ways to prevent cyberbullying, which include sexting and the abuse of social networking. (approx. time 10 minutes) 4. Each group will share their top preventative method with the class (no idea should repeat). (no more than 5 minutes) 5. Teachers will share with students the importance of not allowing our perceptions of people to control our actions towards them, before we truly get to know them (approx. 5 minutes) Day Two: 1. Students are to form the same small group from yesterday. 2. They are to think about the activity from yesterday and then generate a list of 10 reasons people bully others. 3. The groups will share out with the class. One spokesperson will use the simple script: I am a bully because, (then read the reasons the other group provided)... 4. Each group is to trade lists with another group and write ways in which we can prevent "reasons to bully" 5. Ask each group to share two ways they can't prevent bullying

MODULE 6 - Part 1 Digital Law Copyright and Fair Use, Intellectual Property Develop an understanding of the necessity of respecting other's work, your own work,and copyright and fair use policies. Lesson 1 (day 1) : Personal Creativity and Copyright Watch video: http://animoto.com/play/i1wdkotdr6eja7jlq2uvow?autostart=true 1. What is copyright? What steps do you take to copyright your own unique, creative materials? 2. When is something considered copyrighted material? 3. Why should you care about copyrighting your work? In groups, discuss ways that students should protect their own works. Come up with a class document that outlines the most important rules to remember. Lesson 2 (day 2): Copyright /Plagiarism Other People s Work Focus on respecting the rights of others who have created works posted online. Watch video: http://www.xtranormal.com/watch/7355957/ Discussion: Talk about the necessity of documenting information when you use someone else s work in your own productions (essays, videos, presentations, etc). 1. What is plagiarism and how do you avoid it? 2. What are some of the tools available to you to help you document work that you borrow from other people for your own creations? Create a class list of useful tools. Lesson 2 continued (day 3) : Plagiarism Consequences. Watch Prezi: http://prezi.com/pivfwzq8hpuf/the-law-digital-citizenship/ Discussion: Focus on why plagiarism is such a problem and has such dire consequences. 1. Why is it wrong to download music from websites like Limewire that offer free but illegal copies of songs and videos? 2. What steps should you take to ensure that the websites that you get your music and movies from are legitimate? 3. What is fair use? How does it complicate the copyright issue? 4. What steps should you take to ensure that you are being a responsible digital citizen when you access various types of information on the internet? Create a list of ideas.

MODULE 6 - Identity Theft Digital Literacy Protecting yourself from identity theft Understand the dangers of identity theft and how to avoid becoming a victim. Watch: http://www.youtube.com/watch?v=mcomevovrho 1. What is identity theft and what makes it easy for people to steal your identity? 2. How can you protect yourself from identity theft? 3. As a class or in groups, students generate a list of ways that they can protect themselves from identity theft. 4. Watch Prezi: http://prezi.com/yabh1dxpcfxo/digital-citizens-identity-theft/

MODULE 7 Digital Literacy Acceptable Use Policies, Reliable Resources, Urban Legends Understand the rules and consequences of the Plano ISD AUP, learn how to conduct research on the WWW and how to determine reliability of the source, and learn to identify internet hoaxes Day One: 1. Show the Plano ISD AUP: Photo Story 2. Students think about what they want to do after high school and decide whether or not they need to be digitally literate. 3. Pick 3-5 to share out. 4. Ask students to think about the following question: Will technology eliminate jobs that are important today? (Teachers, doctors, nurses, postman, cashier, bank tellers, telephone operators, etc.) 5. Call on a couple of students to share their thoughts. Day Two: 1. Ask students to think about the information they receive from different sources: Where do you find information about the weather, crimes, important events/dates, local news, national news, world events? 2. How do you know that these sources of information are reliable and valid? 3. Watch: http://www.ikeepsafe.org/youtube.html 4. Using the handout, ikeepsafe: Detecting Lies, as a class, evaluate some popular information sites to determine reliability.

MODULE 8 ELEMENT Digital Health and Wellness Balancing Recreational Activities, Interpersonal Relationships, and Digital Activities Define internet addiction and potential harmful effects, discuss proper computer ergonomics and the importance of active living, indentify potential harmful effects of over use, inappropriate use, and abuse. Day One: 1. Race to define: ergonomics (students may use whatever access to the WWW available) (Students work individually and raise their hands to call the teacher over to check their definition) (STOP AFTER FIRST FIVE CORRECT or 3 min) 2. Send these 5 out into the hallway and have them create a sketch that shows the meaning of the word (2-3 min) 3. Talk about how this word relates to technology use in their lives (5-7 minutes) 4. Ask your students to brainstorm ways in which technology use, abuse, and misuse can impact their health, safety, and even kill them. 5. Watch: http://www.youtube.com/watch?v=debhwd6ljzs Day Two: 1. Assign students to groups. Ask them to think about the video from yesterday. 2. Assign each group one of the following tasks: 1) Create a timeline illustrating the evolution of recreational activities for teens from 1910 to 2010. 2) Create a PSA for teens to encourage the safe use of techonology. 3) Create a short skit to demonstrate appropriate uses of technology. 4) Survey your classmates and create a graphic that shows the variety of recreational activities your peers like to do. 5) Using the WWW, create a list of helpful websites that teens can use to learn about Digital Health and Wellness. ELEMENT Digital Commerce MODULE 9 Internet Scams, Shopping Online and E-Commerce, Craigslist, E-bay, etc. Identify ways to safely shop online successfully through secure websites. 1. View the power point called, "Digital Commerce." 2. Use the power point as a guide to have a class discussion regarding E-Commerce. 3. Pair the students up to research the various questions asked in the power point, or research the information as a class. 4. As a class, play one or all of the games linked in the power point regarding ways to safely shop online.