Reading Detectives Have A Clue … … About Internet Safety Mrs. Bentheim, 6 th  Grade Reading
Objective <ul><li>The student will explore meaningful information about Internet Safety and create an action plan to prote...
Let’s See What You Know … <ul><li>True or False? </li></ul><ul><li>When you set your MySpace profile to private, only you ...
How Did You Do? <ul><li>When you set your  MySpace  profile to private, only you can see what’s on it. </li></ul><ul><ul><...
Let’s Break it Down …  <ul><li>The reality is that a private setting is not private. Anyone with simple decryption softwar...
Let’s Break it Down … <ul><li>Your computer has something called an IP address. This IP is paired up with a physical locat...
Let’s Break it Down … <ul><li>Look at these images. These are MySpace murder victims that thought they knew the person the...
 
Let’s Break it Down … <ul><li>Words hurt. It’s simple. Poor choices of words can come back to get you when you look for a ...
Think. Pair. Share.  <ul><li>Think:  Write down as many things you do that place you in harm’s way on the Internet. </li><...
One Final Thought …
Take Action! <ul><li>Look at the list you created a few minutes ago. Use that information to create a one-page action plan...
 
Upcoming SlideShare
Loading in...5
×

Internet Safety For Kids

739

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
739
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet Safety For Kids

  1. 1. Reading Detectives Have A Clue … … About Internet Safety Mrs. Bentheim, 6 th Grade Reading
  2. 2. Objective <ul><li>The student will explore meaningful information about Internet Safety and create an action plan to protect himself or herself. </li></ul>
  3. 3. Let’s See What You Know … <ul><li>True or False? </li></ul><ul><li>When you set your MySpace profile to private, only you can see what’s on it. </li></ul><ul><li>It’s impossible to track your computer’s location over the Internet. </li></ul><ul><li>People are not kidnapped or murdered by someone they met on the Internet very often. </li></ul><ul><li>You can’t be hurt by using the Internet—it’s just words. </li></ul>
  4. 4. How Did You Do? <ul><li>When you set your MySpace profile to private, only you can see what’s on it. </li></ul><ul><ul><li>FALSE </li></ul></ul><ul><li>It’s impossible to track your computer’s location over the Internet. </li></ul><ul><ul><li>FALSE </li></ul></ul><ul><li>People are not kidnapped or murdered by someone they met on the Internet very often. </li></ul><ul><ul><li>FALSE </li></ul></ul><ul><li>You can’t be hurt by using the Internet—it’s just words. </li></ul><ul><ul><li>FALSE </li></ul></ul>
  5. 5. Let’s Break it Down … <ul><li>The reality is that a private setting is not private. Anyone with simple decryption software can see anything you post. </li></ul><ul><li>So what can you infer? </li></ul><ul><ul><li>It’s simple. DO NOT POST IDENTIFYING INFORMATION ABOUT YOURSELF: class schedule, photo of house, name of school, suggestive photos of yourself, etc. </li></ul></ul>
  6. 6. Let’s Break it Down … <ul><li>Your computer has something called an IP address. This IP is paired up with a physical location that can be tracked by police—or by predators. You may think you’re talking to a cute boy from English class, but it might really be a 40-year-old ex-convict who wants to hurt you. </li></ul><ul><li>So what can you infer? </li></ul><ul><ul><li>Only talk to people you KNOW well. If you’ve never met them in person, don’t bother. Even if you THINK you know who they are. Be smart. Be safe. </li></ul></ul>
  7. 7. Let’s Break it Down … <ul><li>Look at these images. These are MySpace murder victims that thought they knew the person they were talking to: </li></ul>
  8. 9. Let’s Break it Down … <ul><li>Words hurt. It’s simple. Poor choices of words can come back to get you when you look for a job. Poor choices of words can come back to get you when you cyberbully a student from school. </li></ul><ul><ul><ul><li>Kids commit suicide. </li></ul></ul></ul><ul><ul><ul><li>Kids and adults commit murder. </li></ul></ul></ul><ul><li>So what can you infer? </li></ul><ul><ul><li>These are people’s lives ripped apart by irresponsible choices. </li></ul></ul>
  9. 10. Think. Pair. Share. <ul><li>Think: Write down as many things you do that place you in harm’s way on the Internet. </li></ul><ul><li>Pair: When directed, pair up with the person next to you and discuss the similarities and differences in your lists. If time, create a venn diagram. </li></ul><ul><li>Share: Be prepared to share your findings with the class. </li></ul>
  10. 11. One Final Thought …
  11. 12. Take Action! <ul><li>Look at the list you created a few minutes ago. Use that information to create a one-page action plan to help protect yourself from online predators. </li></ul><ul><ul><li>If you already think you’re safe and don’t need to change anything about the way you behave online, write an action plan for a friend who is in danger. </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×