Be a Safe Surfer, Dude!

805 views

Published on

Unit Title : Safe “Surfing” on the Internet
Grade Level(s): 6th & 7th
Subject/Topic Area(s): Computers/Safety
Key Words: personal information, private identity, cyberspace, cyber pals, ethiical
Designed By: Original unit by John Dolan
Time Frame: 3 weeks
School: St. Luke’s School, New Canaan, Connecticut.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
805
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • John Dolan
  • Be a Safe Surfer, Dude!

    1. 1. Be a Safe “Surfer” Dude! Understanding By Design Unit on Internet Safety John Dolan
    2. 2. Internet Safety Unit <ul><li>Unit Title : Safe “Surfing” on the Internet </li></ul><ul><li>Grade Level(s): 6 th & 7 th </li></ul><ul><li>Subject/Topic Area(s): Computers/Safety </li></ul><ul><li>Key Words: personal information, private identity, cyberspace, cyber pals, ethiical </li></ul><ul><li>Designed By: Original unit by John Dolan </li></ul><ul><li>Time Frame: 3 weeks </li></ul><ul><li>School: St. Luke’s School, New Canaan, Connecticut. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    3. 3. Stage 1 <ul><li>DESIRED RESULTS </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    4. 4. Content Standards <ul><li>ISTE’s-National Educational Technology Standards (NETS) Performance Indicators for Grades 6-8 </li></ul><ul><li>Performance Indicators # 2 and 3 </li></ul><ul><li># 2 Demonstrate knowledge of current changes in information technologies and the effect those changes have on the workplace and society. </li></ul><ul><li># 3 Exhibit legal and ethical behaviors when using information and technology, and discuss consequences of misuse. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    5. 5. Summary of Unit <ul><li>In this unit students will… </li></ul><ul><li>Distinguish between private identity information and personal information  </li></ul><ul><li>Recall that private identity information should not be communicated in cyberspace without permission of a teacher or parent  </li></ul><ul><li>Learn how the Internet can be used to communicate with others in cyberspace </li></ul><ul><li>Relate reasons for protecting private identity information in cyberspace  </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    6. 6. Summary of Unit <ul><li>Understand the importance of passwords and describe strategies for protecting them  Explain how to protect private identity information when designing personal Web sites </li></ul><ul><li>Distinguish between cyberpals and face-to-face friends  Explain the rules for being safe when dealing with cyberpals </li></ul><ul><li>Create ways to help teach others how to protect their personal and private identity information when using the Internet. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    7. 7. Enduring Understandings <ul><li>Students will understand… </li></ul><ul><li>How to talk and share ideas with others on the internet. </li></ul><ul><li>How to protect themselves as they visit sites requesting private identity information. </li></ul><ul><li>The concept of anonymity on the internet </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    8. 8. Essential Questions <ul><li>Who should you not talk with on the internet? </li></ul><ul><li>What does anonymity mean on the internet? </li></ul><ul><li>Where should you not share private identity information? </li></ul><ul><li>When is online chatting and messaging harmful to you or others? </li></ul><ul><li>Why is online chatting and messaging beneficial? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    9. 9. Desired Results <ul><li>Students will know….. </li></ul><ul><li>How to protect their private identity information </li></ul><ul><li>How to protect your personal information </li></ul><ul><li>What anonymity on the internet means </li></ul><ul><li>How to engage in safe e-mail, chat & messaging practices </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    10. 10. Desired Results <ul><li>Students will be able to….. </li></ul><ul><li>Think critically in protecting one’s identity when visiting web sites </li></ul><ul><li>Evaluate how well web sites protect private identity information </li></ul><ul><li>Distinguish between private identity information & personal information </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    11. 11. Stage Two <ul><li>Assessment Evidence </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    12. 12. Assessment Evidence <ul><li>Each group will create ways to help teach others how to protect their personal and private identity information when using the Internet. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    13. 13. Assessment Evidence <ul><li>Ideas for helping others to protect their personal and private identity information </li></ul><ul><li>Create a &quot;Protect Personal Information & Private Identity” poster to be put in the school hallway Rubric for the Poster </li></ul><ul><li>Create a &quot;Safety News Article&quot; to be published in the school newsletter. </li></ul><ul><li>News Article Rubric </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    14. 14. Assessment Evidence <ul><li>Build a &quot;Protect Yourself Online&quot; website that can be linked to your school's Web page. Web Site Rubric </li></ul><ul><li>&quot;Create a &quot;Guard Your Personal Information&quot; board game to teach other people about what you've learned. </li></ul><ul><li>Board Game Rubric </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    15. 15. Assessment Evidence <ul><li>Create a “Protect Yourself Online” public service video Video Rubric </li></ul><ul><li>Create a “Protect Personal Information & Private Identity” PowerPoint Presentation PowerPoint Rubric </li></ul><ul><li>Assign each member of the group a role when working on this project. Fill in Group Roles for Project </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    16. 16. Assessment Evidence <ul><li>Evaluation </li></ul><ul><li>When you are ready to present your project. </li></ul><ul><li>Fill out the group evaluation rubric and give it to me </li></ul><ul><li>Participation within the Group Evaluation Rubric </li></ul><ul><li>Cooperative Learning Project Rubric </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    17. 17. Stage 3 <ul><li>Learning Plan </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    18. 18. Learning Plan 1 <ul><li>Introduction </li></ul><ul><li>Some web sites ask for information before allowing you to participate in an online activity. </li></ul><ul><li>You should stop and consider how providing such information may affect your private identity & personal safety.   </li></ul><ul><li>Go to A Great Place to Share Ideas </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    19. 19. Learning Plan 1 <ul><li>On a sheet of paper write down your personal information </li></ul><ul><li>Let’s discuss your examples </li></ul><ul><li>Have you included Private Identity Information? </li></ul><ul><li>Make sure you haven’t. </li></ul><ul><li>Refer to A Great Place to Share Ideas </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    20. 20. Learning Plan 1 <ul><li>Post the Essential Questions </li></ul><ul><li>Who should you not talk with on the internet? </li></ul><ul><li>What does anonymity mean on the internet? </li></ul><ul><li>Where should you not share private identity </li></ul><ul><li>information? </li></ul><ul><li>When is online chatting and messaging harmful to you or others? </li></ul><ul><li>Why is online chatting and messaging beneficial? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    21. 21. Learning Plan 1 <ul><li>Create Groups </li></ul><ul><li>Form a group of three safe “surfer” dudes </li></ul><ul><li>Surf to the Privacy Playground </li></ul><ul><li>Create an online name that will identify your group </li></ul><ul><li>One person in the group will “surf” through the game </li></ul><ul><li>  </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    22. 22. Learning Plan 1 <ul><li>Assign Roles </li></ul><ul><li>One person will be the “spotter”, spotting the errors each character makes </li></ul><ul><li>One person will be the “recorder”, recording the errors each character makes </li></ul><ul><li>Play the game and look for ways that Mo, Lil and Les (the characters in the game) are not being cybersmart. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    23. 23. Learning Plan 1 <ul><li>Activity </li></ul><ul><li>Play the game a second time </li></ul><ul><li>Record on chart paper Mo, Lil and Les' errors under each character's name. </li></ul><ul><li>Find the rule that helps them know the correct thing to do next time. </li></ul><ul><li>Was there something new in the site that Mo, Lil and Les used? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    24. 24. Learning Plan 1 <ul><li>Discussion </li></ul><ul><li>Did they select a play or pay site? </li></ul><ul><li>What does 'play or pay site' mean? </li></ul><ul><li>What is the virtualpigsty.com trying to sell? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    25. 25. Learning Plan 1 <ul><li>Search for similar sites </li></ul><ul><li>Switch roles i.e. different person being the surfer, spotter and recorder </li></ul><ul><li>Search for two sites that are similar to virtualpigsty.com </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    26. 26. Learning Plan 1 <ul><li>Record </li></ul><ul><li>Once you have found three sites that are </li></ul><ul><li>similar to virtualpigsty.com </li></ul><ul><li>Write down the web addresses </li></ul><ul><li>Write down what they’re trying to sell </li></ul><ul><li>Do they ask you to identify your real name, age or address? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    27. 27. Learning Plan 1 <ul><li>Classify </li></ul><ul><li>Classify the information requested as private identity or personal information. </li></ul><ul><li>Report your findings and classifications to the class. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    28. 28. Learning Plan 2 <ul><li>Introduction </li></ul><ul><li>What are some examples of private identity information? </li></ul><ul><li>Why would you not give out private identity information? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    29. 29. Learning Plan 2 <ul><li>Activity </li></ul><ul><li>Go to Passowrds Activity </li></ul><ul><li>Have each group read the paragraph titled “Passwords” </li></ul><ul><li>Each group should generate questions about this information in this paragraph </li></ul><ul><li>Each group should give their questions to another group to answer </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    30. 30. Learning Plan 2 <ul><li>Activity </li></ul><ul><li>Go to Passowrds Activity </li></ul><ul><li>Each group should read and discuss the scenarios about Jesse & Sondra. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    31. 31. Learning Plan 2 <ul><li>Each group will be assigned one of the following personal web sites </li></ul><ul><li>Jessy Scott Web Page </li></ul><ul><li>Mike Shaum's Site </li></ul><ul><li>Adam G's Site </li></ul><ul><li>Jeremy W's Home Page </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    32. 32. Learning Plan 2 <ul><li>Each group will be answering questions based on their web site </li></ul><ul><li>One person should be navigating </li></ul><ul><li>One person should be finding the information </li></ul><ul><li>One person recording the information </li></ul><ul><li>One person will present the group’s report to the class. </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    33. 33. Learning Plan 2 <ul><li>What private identity information is given about the subject of this site? </li></ul><ul><li>How could the site be changed to keep this information private? </li></ul><ul><li>What private identity information is given about other people? </li></ul><ul><li>How could the site be changed to keep this information private? </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    34. 34. Learning Plan 2 <ul><li>Each group reports their findings </li></ul><ul><li>Discussion on private identity </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    35. 35. Learning Plan 3 <ul><li>What does it mean to be anonymous in cyberspace? </li></ul><ul><li>Discuss the positive and negative effects of anonymity </li></ul><ul><li>Go to Cyber Smart Activity Sheet and complete it in your group </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    36. 36. Learning Plan 3 <ul><li>Have two members of your group role-play being in a chat room </li></ul><ul><li>They met online, like one another, and enjoy the same things </li></ul><ul><li>One person should ask for the other's real name and phone number.   </li></ul><ul><li>As a group suggest and write down responses that will keep the person safe </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    37. 37. Learning Plan 3 <ul><li>Share your group’s responses </li></ul><ul><li>Discussion about the difference between online pals and real life pals </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    38. 38. Bibliography <ul><li>Title: CyberSmart! : Home </li></ul><ul><li>Publisher: The CyberSmart Education Company. .Site last update </li></ul><ul><li>Date Published: 2000 </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://www.cybersmartcurriculum.or </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    39. 39. Bibliography <ul><li>Title: </li></ul><ul><li>Publisher: London District Catholic School Board and its licensors </li></ul><ul><li>Date Published: 2006 </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://www.ldcsb.on.ca/schools/cfe </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    40. 40. Bibliography <ul><li>Title: Privacy Playground </li></ul><ul><li>Publisher: Media Awareness Network </li></ul><ul><li>Date Published: 2000 </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://www.media-awareness.ca/engl </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    41. 41. Bibliography <ul><li>Title: Process </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://coe.nevada.edu/slefevre/Pro </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    42. 42. Bibliography <ul><li>Title: Kathy Schrock's Guide for Educators - Assessment Rubrics </li></ul><ul><li>Publisher: Discovery Education </li></ul><ul><li>Date Published: 2006 </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://school.discovery.com/schroc </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    43. 43. Bibliography <ul><li>Title: Bill of Rights Redux UbD Unit </li></ul><ul><li>Retrieved: </li></ul><ul><li>URL: http://kancrn.kckps.k12.ks.us/wyan </li></ul><ul><li>modify & add data below... </li></ul>John Dolan Understanding By Design Unit on Internet Safety
    44. 44. Bibliography <ul><li>http://cybersmartcurriculum.org/safetysecurity/lessons/6-8/check_the_privacy_policy/ </li></ul>John Dolan Understanding By Design Unit on Internet Safety

    ×