Today you will be learning about personal safety when online. This unit consists of four mini...
-
Upload
matthew-webb -
Category
Documents
-
view
213 -
download
0
Transcript of Today you will be learning about personal safety when online. This unit consists of four mini...
Today you will be learning about personal safety when online.
This unit consists of four mini lessons. The slide show covers all lessons in the unit:
The Plan
• Safeguarding your Identity While Online• Protecting Personal Information• Online Predators and the Grooming
Process• Online Personal Safety Review and
Action
Cyberspace
What is Cyberspace, and how do we get there?
What are some of the ways we communicate in Cyberspace?
Teacher’s choice:
Otherwise – let’s continue on…
For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups.
When the activity is completed – Go to the Group Activity slide (slide 13)
Start with the Screen Name Activity
Follow along on your resource and activity pages.
Read through the information and complete the activities as we go along.
Online ID – What can you tell?
Directions: Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative.
1. Jessica4dance2. Smithstealshome3. Bayareababe4. dancinfun5. Fred14
Discussion
Think about your own screen name. What does it say about you?
When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information.
Why do you think you shouldn’t include personal information?
What are some of the dangers?
Screen Names
Screen names should never contain or refer to:– first and/or last name– address– phone number– date of birth (complete or partial) or age– Social Security number– e-mail address– combinations of personal information such as listed
above – combinations of personal information (above) plus
descriptions of such information as, but not limited to gender, school name, favorite sport, favorite celebrity, family member names
codysm
om
marcy14inSanFr
an
tiger1234
Password Protection Directions: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one.
1.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football.
2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake.
3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.
Discussion
Think about your own password. - Is it something obvious? - Could someone easily guess it? - Does anyone else know it?
When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you.
What types of dangers are involved when others know or can guess your password?
Passwords
Follow these rules for creating safe passwords:• be lengthy – at least 8 characters • contain a combination of letters, numbers,
and symbols• changed when its secrecy is in doubt
– should not contain personal information – should not be shared– should not be easily guessed– should not be provided in an e-mail, even if
requested
Group Activity
In small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information.
Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.
Remember
• It is important to select safe and secure screen names and passwords.
• Think about it: What should you NEVER reveal in either?
• Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?
Internet Safety Tips
1. Think carefully before giving out personal information such as your name, home address, school name, or telephone number in a chat room or on social networking sites (IMs and blogs too!).
2. Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are.
Internet Safety Tips
3. Do not meet someone or have them visit you without the permission of your parents.
4. Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.
5. Remember that people online may not be who they say they are.
Brainstorm
Why do students feel safe on the Internet?
What are some dangers on the Internet?
What are some good things on the Internet?
How can you stay away from the dangerous things?
One way to stay safe, is to avoid revealing any
information about oneself online Never tell anyone:
• Your name• Address• Phone number• Age• Gender• Family names• School• Never give a stranger your picture
These are all considered to be identifying or personal information.
I hope you learned something – I know I did!
OK – let’s get into groups. Your teacher will divide you up for the next activity.
Everyone in Groups?Good! Each group should have received a cause and effect sheet. Here’s how to get started
Brainstorm how each effect could have been avoided.
Brainstorm other possible effects of the person’s actions.
Present your information to the class.
So Get Started!
Do your best on these cause and effect charts!
Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.
Let’s Review!
Remember: It is important that any time you are asked to post personal information online you need to ask permission from a parent or supervising adult.
This includes entering Web sites, filling out profiles, forms, etc.
Learning Goals
YOU WILL:• Understand the need for being safe in the cyber
community - just like your physical community.
• Be able to list safety rules/advice of behavior towards strangers in the physical community that also apply to behavior towards strangers in Cyberspace.
• Understand the importance of refusing inappropriate online relationships.
• Know how to interact online appropriately and safely.
Do You Go Online?
Discuss:Do you go online alone?
What do you do online?
How do you know how old someone is that you meet online?
Discuss:What rules do you follow in the physical world for meeting or communicating with strangers?
Do these rules also apply to the cyber community?
REMEMBER: Anyone you meet and know only online is a stranger to you, no matter how well you think you know them.
Rules for Communication
Online Socializing
To socialize online means to interact with others using Internet technologies.
• Name some ways people socialize online.
• Name your favorite ways to socialize online.
• List some good rules to help us (even adults) stay safe
when socializing online.
Online Realities
Sometimes people lie about who they are when socializing online.
•This could be because they want to bully or steal identities.
•It also could be that they are just exploring and experimenting.
• Most online relationships are safe, but sometimes adults lie online in order to meet and form friendships with youth. They are called predators.
The Grooming Process
• Have you heard of the grooming process?
• This term is used to mean the methods a predator uses to befriend youth online.
Online Relationships
• Most online relationships are safe and do not involve a predator!
• How can you identify someone who might be an online predator?
Online Grooming
Studies have shown that an online predator will:
• encourage sexually explicit talk
• do or say anything to show they care
• want to meet
Online Relationships
• Remember: Most online relationships are safe.
• However, the way one interacts online can increase the chances of meeting a predator.
• And no one can predict the harm that a predator could cause.
Minimizing DangerThere are things you can do to minimize the danger and the chances of becoming the victim of an online predator, including the following:
• Choose a safe screen name.• Use caution when choosing whom to communicate
with.• Avoid revealing too much personal information.
No matter what, it is important to tell an adult if:• You feel uncomfortable online for any reason.• You are approached by someone who discusses
inappropriate things. • You are approached by someone who wants to meet
you offline.
Minimizing Danger
Think about what UR Talking About.• A predator looks for youth who willingly talk about
sex online.
• It’s not appropriate! And it’s NOT SAFE!
Review
Think Safety First• Use an appropriate screen name.
• Don’t engage in talk about sex online.
• Don’t agree to meet an online stranger.
• Avoid secret online friendships.
• Find an offline friend if you’re feeling down.
Review
It is important to stop the communication and tell an adult if:
• You feel uncomfortable online for any reason.• You are approached by someone who discusses
inappropriate things. • You are approached by someone who wants to meet
you offline.
Who can U Tell?• Tell your parent, guardian, or another trusted
adult.
• Tell a teacher or another adult at school.
• Bottom line - Tell someone!
Create a Presentation
Procedure: As a class, run through the 5 slide presentation (which begins after the directions).
The 5 slide presentation will be shown TWICE.
Use the first time to become familiar with the slides and the information.
Directions
• These slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet safety.
• What information do your parents need to know to protect both themselves and their children?
• Use what you have learned to tell others how to stay safe online.
Personal Safety Online
There are many dangers youth face while online, such as:
• Predators – strangers who may cause harm
• Cyber bullies
• Inappropriate Web sites and material
And some that parents also face, such as:• Identity theft
• Monetary theft
Predators
Those who use Cyberspace to hunt for victims to take advantage of them.
The Facts:•There are predators online.
•They use tools like social media, instant messaging, etc. to get close to kids.
•Sometimes a victim is a willing participant and chooses to talk to a stranger.
Cyber Bullying
Sending or posting harmful or cruel text or images using the Internet or other digital media source.
The Facts:•The Internet is a tool used to bully.•People feel removed from what they say online. They feel anonymous.•Unexpected participants: Anyone can join in.•1 in 5 youth will be faced with a hurtful or mean message while online.
Identity Theft
The Facts:• Posting personal information online makes it
available for others to steal.
• With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.
• Personal information can also be stolen from you if you respond to e-mails from strangers.
A Little Prevention…
Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs
RECOGNIZE REFUSE RESPOND REPORT
A Second Take…
• Now you are going to look at the slides again and write a “script” to coordinate with them.
• Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script.
• Practice the presentation so it flows smoothly for parent/adult presentation.
Personal Safety Online
There are many dangers youth face while online, such as:
• Predators – strangers who may cause harm
• Cyber bullies
• Inappropriate Web sites and material
And some that parents also face, such as:• Identity theft
• Monetary theft
Predators
Those who use Cyberspace to hunt for victims to take advantage of them.
The Facts:•There are predators online
•They use tools like social media, Instant messaging, etc. to get close to kids.
•Sometimes a victim is a willing participant and chooses to talk to a stranger.
Cyber Bullying
Sending or posting harmful or cruel text or images using the Internet or other digital media source.
The Facts:•The Internet is a tool used to bully.•People feel removed from what they say online. They feel anonymous.•Unexpected participants: Anyone can join in.•1 in 5 youth will be faced with a hurtful or mean message while online.
Identity Theft
The Facts:• Posting personal information online makes it
available for others to steal.
• With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.
• Personal information can also be stolen from you if you respond to e-mails from strangers.
A Little Prevention…
Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs
RECOGNIZE REFUSE RESPOND REPORT
Now Use It!
• Keeping others informed on Internet safety is important.
• Now use the presentation you just helped create to reach others in your school, faculty, family, and in your community.