In Class Learning Activity

  • 745 views
Uploaded on

 

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
745
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
15
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Internet Safety Unit • Unit Title : Safe “Surfing” on the Internet • Grade Level(s): 6th & 7th • Subject/Topic Area(s): Computers/Safety • Key Words: personal information, private identity, cyberspace, cyber pals, ethiical • Designed By: Original unit by John Dolan • Time Frame: 3 weeks • School: St. Luke’s School, New Canaan, Connecticut. Understanding By Design Unit on Internet John Dolan 1 Safety
  • 2. Purpose • This in class learning activity is part of a larger unit, on internet safety. I developed this unit two years ago. After attending a UbD workshop. When I took over as the middle school computer teacher, there was little or no emphasis on internet safety. The previous teacher taught the students Microsoft Word, Excel & PowerPoint . There was little or no emphasis on internet safety, ethical use of the internet and internet research skills. I knew there was a need to teach the students about internet safety. I happened to attend a UbD workshop, and thought it would be a great opportunity to create an internet safety unit scratch, using the UbD model.
  • 3. 1. The Connecticut Framework K-12 Curricular Standards • Technological Impacts-Students will understand the impact that technology has on the social, cultural and environmental aspects of their lives. • Educational experiences in Grades 5-8 will assure that students: • Indicator 1: explain how technology and technological has expected and unex-pected effects; citizenship.
  • 4. 2. American Association of School & Library Standards Standard 8: The student who contributes positively to the learning community and to society is information literate and practices ethical behavior in regard to information and information technology.] Indicator 3. Uses information technology responsibly
  • 5. 3. The ISTE Standards (NETS•S)and Performance Indicators for Students • Standard 5: Digital Citizenship-Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: • Indicator a. advocate and practice safe, legal, and responsible use of information and technology.
  • 6. 3. The ISTE Standards (NETS•S)and Performance Indicators for Students • Indicator b. exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity. • Indicator c. demonstrate personal responsibility for lifelong learning. • Indicator d. exhibit leadership for digital citizenship
  • 7. Desired Results • In this lesson students will… • Distinguish between private identity information and personal information • Recall that private identity information should not be communicated in cyberspace without permission of a teacher or parent • Learn how the Internet can be used to communicate with others in cyberspace • Relate reasons for protecting private identity information in cyberspace Understanding By Design Unit on Internet John Dolan 7 Safety
  • 8. Desired Results • Determine whether a site is required to post a children's privacy policy • Analyze privacy notices for compliance with FTC rules
  • 9. Learning Plan 1 Introduction • Some web sites ask for information before allowing you to participate in an online activity. • What do you think private identity information is? • What do you think personal information? • In your group create questions that you would ask yourself before providing private or personal information. • If you were to share private information online. Write a paragraph explaining what impact (if any) this might this have on your life. • Refer to A Great Place to Share Ideas Understanding By Design Unit on Internet John Dolan 9 Safety
  • 10. Learning Plan 1 • What is the difference between private and personal information? • What kind of personal information can be used to indentify you? • What kind of personal information can you share that won’t identify you? • Why might someone want your private identity information? What good is it to them? • Why might someone want your personal information? What good is it to them? • Refer to A Great Place to Share Ideas Understanding By Design Unit on Internet John Dolan 10 Safety
  • 11. Learning Plan 2 • Introduce (offline)Ask students for examples of Web sites that request private identity information. Allow volunteers to describe the content of the site, what information was requested, and how they handled the request. • Explain that the United States government passed the Children's Online Privacy Protection Act (COPPA) in October, 1998. This law requires site owners to help protect the privacy of kids 13 and younger; they are also required to post and explain the elements of the privacy policy they’re returning
  • 12. Learning Plan 2 • Teach 1 (online)Distribute one copy of the activity sheets.Take students to www.becybersmart.org or www.cybersmartcurriculum.org, click on Student Links, and then click on the diamond. Find the title of this lesson, and open its links. Choose a site to explore with the class. • Have students complete the checklist through Question 3. A “yes” response to the first three questions indicates that the site is required to comply with COPPA. If this is the case, have students complete the rest of the checklist, recording how the site complies in the “Details” column.
  • 13. Learning Plan 2 • In addition to the BBB and TRUSTe seals, some Web sites may display the CARU (The Children's Advertising Review Unit) seal from the Council of Better Business Bureaus or the ESRB kids privacy seal from the Entertainment Software Rating Board. Point out to students that since anyone can create an official-looking “seal,” it's important to investigate the reliability of the organizations that issue unfamiliar seals.NOTE: What CyberSmart! calls “private identity information,” others may call “personal information.” CyberSmart! defines private identity information as any information that can be used to discover one's identity. Personal information is defined as any information about the person that cannot be used to discover his or her identity. By reading carefully, students should be able to tell when a privacy policy is referring to information that can be used to identify an individual.
  • 14. Learning Plan 2 • Have students look over their completed checklists. Explain that if the answers to Questions 4-17 are “yes,” the site is in compliance with the rules. Additionally, if the answers to Questions 18 and 19 are “yes,” the site is monitored and approved by watchdog organizations. • Point out that, in order to protect their private identity information, students should make a habit of checking the privacy policy at the sites they visit.Discuss strategies for dealing with a site that asks for more information than students feel comfortable sharing or that does not post a clear policy. Remind students they can leave the site or ask a parent or teacher to contact the site for more information. NOTE: The FTC also provides an online Consumer Complaint Form for adults at www.ftc.gov.
  • 15. Learning Plan 2 • Teach 3 (online) Distribute a second copy of the activity sheets. Assign individuals or groups to the remaining sites, have them complete the checklist, and share their results with the class. • Close (offline)Ask: What types of sites are required to post a children's privacy policy? (Sites that are intended for kids 13 and under and that request private identity information.)Ask: How do you use the CyberSmart! checklist to decide whether a site is following the law? (Answer the first three questions to decide if it must follow the law. If so, check to see if each of the rest of the questions can be answered “yes.”)
  • 16. Learning Plan 3 Writing Activity • Write a biography about yourself. You can include personal information, but leave out private identity information. Once you are finished, you will present it to the class. The class will evaluate whether you have provided information in your biography that could threaten your safety, identify your exact location or can be used for other purposes i.e. identity theft.
  • 17. Learning Plan 3 Post the Essential Questions • Who should you not talk with on the internet? • What does anonymity mean on the internet? • Where should you not share private identity • information? • When is online chatting and messaging harmful to you or others? • When is online chatting and messaging beneficial? Understanding By Design Unit on Internet John Dolan 17 Safety
  • 18. Learning Plan 3 Create Groups • Form a group of three safe “surfer” dudes • In your group try to predict what lesson this online game will teach you. • Surf to the Privacy Playground • Create an online name that will identify your group • One person in the group will “surf” through the game Understanding By Design Unit on Internet John Dolan 18 Safety
  • 19. Learning Plan 3 Assign Roles • One person will be the “spotter”, spotting the errors each character makes • One person will be the “recorder”, recording the errors each character makes • Play the game and look for ways that Mo, Lil and Les (the characters in the game) are not being cybersmart. • Why do you think they are not being cybersmart? Understanding By Design Unit on Internet John Dolan 19 Safety
  • 20. Learning Plan 3 Activity • Play the game a second time • Record on chart paper Mo, Lil and Les' errors under each character's name. What did each of them do wrong regarding sharing information online? • In real life, if you were to make the same mistakes as Mo, Lil and Les. What do you think might happen? How might your online mistakes affect your life or the lives of those close to you? How might you rectify your errors? Understanding By Design Unit on Internet John Dolan 20 Safety
  • 21. Learning Plan 3 Discussion • Did they select a play or pay site? • What does 'play or pay site' mean? • What is the virtualpigsty.com trying to sell? • Why do you think they are trying to sell it? Understanding By Design Unit on Internet John Dolan 21 Safety
  • 22. Learning Plan 3 Search for similar sites • Switch roles i.e. different person being the surfer, spotter and recorder • Search for two sites that are similar to virtualpigsty.com Understanding By Design Unit on Internet John Dolan 22 Safety
  • 23. Learning Plan 3 Record • Once you have found three sites that are similar to virtualpigsty.com • Write down the web addresses • Write down what they’re trying to sell • Do they ask you to identify your real name, age or address? • If they do why do you think they ask you for your name, age or address. Write down five reasons why they might ask you for these? Understanding By Design Unit on Internet John Dolan 23 Safety
  • 24. Wrap up • In your group write down 20 questions you have about internet safety in general. • You will share your questions • Then as a group you will then pick your top three questions • We will use the top three questions from each group to further explore the topic of internet safety.