Today you will be learning about personal safety when online. This unit consists of four mini...

56

Transcript of Today you will be learning about personal safety when online. This unit consists of four mini...

Today you will be learning about personal safety when online.

This unit consists of four mini lessons. The slide show covers all lessons in the unit:

The Plan

• Safeguarding your Identity While Online• Protecting Personal Information• Online Predators and the Grooming

Process• Online Personal Safety Review and

Action

Lesson 1Safeguarding your Identity

While Online

Cyberspace

What is Cyberspace, and how do we get there?

What are some of the ways we communicate in Cyberspace?

Teacher’s choice:

Otherwise – let’s continue on…

For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups.

When the activity is completed – Go to the Group Activity slide (slide 13)

Start with the Screen Name Activity

Follow along on your resource and activity pages.

Read through the information and complete the activities as we go along.

Online ID – What can you tell?

Directions: Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative.

1. Jessica4dance2. Smithstealshome3. Bayareababe4. dancinfun5. Fred14

Discussion

Think about your own screen name. What does it say about you?

When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information.

Why do you think you shouldn’t include personal information?

What are some of the dangers?

Screen Names

Screen names should never contain or refer to:– first and/or last name– address– phone number– date of birth (complete or partial) or age– Social Security number– e-mail address– combinations of personal information such as listed

above – combinations of personal information (above) plus

descriptions of such information as, but not limited to gender, school name, favorite sport, favorite celebrity, family member names

codysm

[email protected]

om

marcy14inSanFr

an

tiger1234

Password Protection Directions: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one.  

1.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football.

2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake.

3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.

Discussion

Think about your own password. - Is it something obvious? - Could someone easily guess it? - Does anyone else know it?

When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you.

What types of dangers are involved when others know or can guess your password?

Passwords

Follow these rules for creating safe passwords:• be lengthy – at least 8 characters • contain a combination of letters, numbers,

and symbols• changed when its secrecy is in doubt

– should not contain personal information – should not be shared– should not be easily guessed– should not be provided in an e-mail, even if

requested

Group Activity

In small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information.

Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.

Remember

• It is important to select safe and secure screen names and passwords.

• Think about it: What should you NEVER reveal in either?

• Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?

Lesson 2Protecting Personal

Information

Let’s go over some basic Internet Safety Tips

Internet Safety Tips

1. Think carefully before giving out personal information such as your name, home address, school name, or telephone number in a chat room or on social networking sites (IMs and blogs too!).

2. Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are.

Internet Safety Tips

3. Do not meet someone or have them visit you without the permission of your parents.

4. Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.

5. Remember that people online may not be who they say they are.

Remember that people online may not be who they say they

are.

Brainstorm

        Why do students feel safe on the Internet?

        What are some dangers on the Internet?

        What are some good things on the Internet?

        How can you stay away from the dangerous things?

One way to stay safe, is to avoid revealing any

information about oneself online Never tell anyone:

• Your name• Address• Phone number• Age• Gender• Family names• School• Never give a stranger your picture

These are all considered to be identifying or personal information.

I hope you learned something – I know I did!

OK – let’s get into groups. Your teacher will divide you up for the next activity.

Everyone in Groups?Good! Each group should have received a cause and effect sheet. Here’s how to get started

 Brainstorm how each effect could have been avoided.

  Brainstorm other possible effects of the person’s actions.

  Present your information to the class.

So Get Started!

Do your best on these cause and effect charts!

Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.

Let’s Review!

Remember: It is important that any time you are asked to post personal information online you need to ask permission from a parent or supervising adult.

This includes entering Web sites, filling out profiles, forms, etc.

Lesson 3identifying Online

Predators

Learning Goals

YOU WILL:• Understand the need for being safe in the cyber

community - just like your physical community.

• Be able to list safety rules/advice of behavior towards strangers in the physical community that also apply to behavior towards strangers in Cyberspace.

• Understand the importance of refusing inappropriate online relationships.

• Know how to interact online appropriately and safely.

Do You Go Online?

Discuss:Do you go online alone?

What do you do online?

How do you know how old someone is that you meet online?

Group Activity

Your teacher will provide you with activity instructions.

Discuss:What rules do you follow in the physical world for meeting or communicating with strangers?

Do these rules also apply to the cyber community?

REMEMBER: Anyone you meet and know only online is a stranger to you, no matter how well you think you know them.

Rules for Communication

Online Socializing

To socialize online means to interact with others using Internet technologies.

• Name some ways people socialize online.

• Name your favorite ways to socialize online.

• List some good rules to help us (even adults) stay safe

when socializing online.

Online Realities

Sometimes people lie about who they are when socializing online.

•This could be because they want to bully or steal identities.

•It also could be that they are just exploring and experimenting.

• Most online relationships are safe, but sometimes adults lie online in order to meet and form friendships with youth. They are called predators.

The Grooming Process

• Have you heard of the grooming process?

• This term is used to mean the methods a predator uses to befriend youth online.

Online Relationships

• Most online relationships are safe and do not involve a predator!

• How can you identify someone who might be an online predator?

Online Grooming

Studies have shown that an online predator will:

• encourage sexually explicit talk

• do or say anything to show they care

• want to meet

Online Relationships

• Remember: Most online relationships are safe.

• However, the way one interacts online can increase the chances of meeting a predator.

• And no one can predict the harm that a predator could cause.

Minimizing DangerThere are things you can do to minimize the danger and the chances of becoming the victim of an online predator, including the following:

• Choose a safe screen name.• Use caution when choosing whom to communicate

with.• Avoid revealing too much personal information.

No matter what, it is important to tell an adult if:• You feel uncomfortable online for any reason.• You are approached by someone who discusses

inappropriate things. • You are approached by someone who wants to meet

you offline.

Minimizing Danger

Think about what UR Talking About.• A predator looks for youth who willingly talk about

sex online.

• It’s not appropriate! And it’s NOT SAFE!

Review

Think Safety First• Use an appropriate screen name.

• Don’t engage in talk about sex online.

• Don’t agree to meet an online stranger.

• Avoid secret online friendships.

• Find an offline friend if you’re feeling down.

Review

It is important to stop the communication and tell an adult if:

• You feel uncomfortable online for any reason.• You are approached by someone who discusses

inappropriate things. • You are approached by someone who wants to meet

you offline.

Who can U Tell?• Tell your parent, guardian, or another trusted

adult.

• Tell a teacher or another adult at school.

• Bottom line - Tell someone!

Lesson 4Online Personal Safety

Review and Action

Create a Presentation

Procedure: As a class, run through the 5 slide presentation (which begins after the directions).

The 5 slide presentation will be shown TWICE.

Use the first time to become familiar with the slides and the information.

Directions

• These slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet safety.

• What information do your parents need to know to protect both themselves and their children?

• Use what you have learned to tell others how to stay safe online.

Personal Safety Online

There are many dangers youth face while online, such as:

• Predators – strangers who may cause harm

• Cyber bullies

• Inappropriate Web sites and material

And some that parents also face, such as:• Identity theft

• Monetary theft

Predators

Those who use Cyberspace to hunt for victims to take advantage of them.

The Facts:•There are predators online.

•They use tools like social media, instant messaging, etc. to get close to kids.

•Sometimes a victim is a willing participant and chooses to talk to a stranger.

Cyber Bullying

Sending or posting harmful or cruel text or images using the Internet or other digital media source.

The Facts:•The Internet is a tool used to bully.•People feel removed from what they say online. They feel anonymous.•Unexpected participants: Anyone can join in.•1 in 5 youth will be faced with a hurtful or mean message while online.

Identity Theft

The Facts:• Posting personal information online makes it

available for others to steal.

• With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.

• Personal information can also be stolen from you if you respond to e-mails from strangers.

A Little Prevention…

Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs

RECOGNIZE REFUSE RESPOND REPORT

A Second Take…

• Now you are going to look at the slides again and write a “script” to coordinate with them.

• Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script.

• Practice the presentation so it flows smoothly for parent/adult presentation.

Personal Safety Online

There are many dangers youth face while online, such as:

• Predators – strangers who may cause harm

• Cyber bullies

• Inappropriate Web sites and material

And some that parents also face, such as:• Identity theft

• Monetary theft

Predators

Those who use Cyberspace to hunt for victims to take advantage of them.

The Facts:•There are predators online

•They use tools like social media, Instant messaging, etc. to get close to kids.

•Sometimes a victim is a willing participant and chooses to talk to a stranger.

Cyber Bullying

Sending or posting harmful or cruel text or images using the Internet or other digital media source.

The Facts:•The Internet is a tool used to bully.•People feel removed from what they say online. They feel anonymous.•Unexpected participants: Anyone can join in.•1 in 5 youth will be faced with a hurtful or mean message while online.

Identity Theft

The Facts:• Posting personal information online makes it

available for others to steal.

• With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.

• Personal information can also be stolen from you if you respond to e-mails from strangers.

A Little Prevention…

Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs

RECOGNIZE REFUSE RESPOND REPORT

Now Use It!

• Keeping others informed on Internet safety is important.

• Now use the presentation you just helped create to reach others in your school, faculty, family, and in your community.

That’s a wrap!

You now know the tips and tools that can help keep you safe online! Just remember, when

you’re online you aren’t invincible.