Escolar Documentos
Profissional Documentos
Cultura Documentos
TABLE OF CONTENTS
Ninth Grade Digital Citizenship.................................................................................3 Ninth Grade Digital Security.....................................................................................9 Ninth Grade Digital Communication........................................................................13 Ninth Grade Digital Media.......................................................................................14 Tenth Grade Digital Citizenship................................................................................16 Tenth Grade Digital Security....................................................................................19 Tenth Grade Digital Communication........................................................................21 Tenth Grade Digital Media.......................................................................................22 Eleventh Grade Digital Citizenship............................................................................30 Eleventh Grade Digital Security................................................................................31 Eleventh Grade Digital Communication....................................................................32 Eleventh Grade Digital Media...................................................................................34 Twelfth Grade Digital Citizenship..............................................................................35 Twelfth Grade Digital Security..................................................................................38 Twelfth Grade Digital Communication.....................................................................41 Twelfth Grade Digital Media.....................................................................................46
Cyberspies in Cyberspace
By SARAH KAVANAGH AND ANDREA BROTHMAN Note: This lesson was originally published on an older version of The Learning Network; the link to the related Times article will take you to a page on the old site.
Overview of Lesson Plan: In this lesson, students will explore their parents and/or guardians concerns about safety in cyberspace and draft individually prepared parent/guardian-teen contracts about Internet usage.
Author(s): Sarah Kavanagh, The New York Times Learning Network Andrea Brothman, Bank Street College of Education in New York Suggested Time Allowance: 1 hour Objectives: Students will: 1. Complete a survey about the rights of parents and guardians to monitor teens conversations and discuss the survey results as a class. 2. Examine the arguments for parents listening in on their teenagers online conversations by reading and discussing The Undercover Parent. 3. Explore the dangers that teens face online by reading and discussing reports on teen Internet activity. 4. Draft contracts with the help of parents or guardians detailing how concerns of online safety and privacy will be addressed in practice. Resources / Materials: -pens/pencils -paper -student journals -classroom board -Internet access (optional) -copies of surveys listed under Activities/Procedures -copies of the article The Undercover Parent, found online at http://www.nytimes.com/learning/teachers/featured_articles/20080317monday.html (one per student) 3
NINTH GRADE - DIGITAL SECURITY - Making Sure Your Online Image Sends the Right Message
Safety and Security Online: Grades 9-12
Students explore the consequences of unintended audiences viewing their social network profiles. They consider four key characteristics of social network sites and how they might affect teens as they try out new identities. Then students collaborate to write a letter to parents demonstrating their understanding of issues related to unintended online audiences.
Objectives
Analyze situations in which teens' social networking profiles are viewed by authority figures. Describe four characteristics of social networking sites that cause them to be very public spaces. Use creative thinking to find ways to deal with unintended online audiences.
ISTE National Educational Technology Standards for Students 2007 Source: International Society for Technology in Education 1. Creativity and Innovation c. use models and simulations to explore complex systems and issues. 4. Critical Thinking, Problem-Solving & Decision-Making d. use multiple processes and diverse perspectives to explore alternative solutions. 5. Digital Citizenship a. advocate and practice safe, legal, and responsible use of information and technology. d. exhibit leadership for digital citizenship. 6. Technology Operations and Concepts a. understand and use technology systems. Home Connection
NINTH GRADE - DIGITAL SECURITY - Making Sure Your Online Image Sends the Right Message
Materials
Student Sheets 1 and 2 (one of each for the class) Student Sheet 3 (one per student) Drawing paper
Introduce
Have each student think of three face-to-face places they can be found during a week: at school, hanging out with friends, in a house of worship, or at a family gathering. Then have them draw three large intersecting circles and write the name of each place in a circle. Using pencil, because they will want to make adjustments, have students write words that describe the image of themselves that they present in each place. Suggest that they list the kinds of clothes they might wear, their language style, the topics they talk about, and so on. Demonstrate how to write a trait common to two audiences in the areas where the circles intersect. Discuss how each circle represents a different identity.
Use Web 2.0 tools that will enable students to create three-circle Venn diagrams online.
Cut apart the scenario cards on Student Sheet 1 and give one card to each group of three or four students. Have each group read and discuss their scenario and questions.
Next, cut apart and distribute the matching cards on Student Sheet 2. Have each group read and discuss the information and questions under Think About It. Then have each group create a presentation that will inform the other groups about the problem they explored. They may wish to present in the form of a skit, improvisation, debate, news article, or a concept map. Distribute and discuss Student Sheet 3. Make sure students understand the concept of their audience: the group of people who view them at school, at a house of worship, at a park, or online. Explain to students that there are several ways in which information on the Internet is preserved after it is deleted by the creator. Many social networking site companies keep a copy of a profile to make it easy for you to rejoin the network in the future. Search engines archive, or keep copies of, old Web pages as well as current ones. A nonprofit organization called Internet Archive is dedicated to preserving historic Internet records in an electronic library and has its own search tool, called the Wayback Machine, that allows users to find and view old versions of Web pages, software, videos, and audio files.
10
NINTH GRADE - DIGITAL SECURITY - Making Sure Your Online Image Sends the Right Message
Teach 3: Find Solutions Ask: How does it make you feel to know that parents, employers, school administrators, and even younger sisters and brothers, may be looking at what you say online? Students may express anger. Explain that it is
natural for teens to want to share and communicate with their peers unwatched by adults. Students may agree that the situation is somewhat unfair, especially when they have little unsupervised time away from teachers, coaches, and parents. Ask: What are some solutions to the problem of dealing with unintended audiences online? Some students may say that teens should find some other means to socialize online. Others may say that the solution is for employers and school administrators and parents to leave teens alone and give them their space.
Have students write a letter to their parents explaining their understanding of unintended audiences online and their feelings about how it affects their use of social networking sites. Whatever else they say in their letter, guide students to reassure their parents that they get what it means to manage the identity they present to others online.
Use Web 2.0 tools such as a wiki to have students collaborate in writing a class letter to parents. Then publish the letter on a class wiki or a blog, where parents can post comments. Assess
Ask: What audiences other than teens might be interested in viewing teens' social networking profiles? Why? Ask:What characteristics make social networking sites very public spaces? Ask: What are some solutions for dealing with unintended online audiences?
Extend
Students will benefit by revisiting this lesson each year. For students who completed this lesson in a previous grade, have them create a comparison chart like the one below and fill it in. Some possible responses are shown in italics. Advantages Disadvantages Weirdos might contact me Comments can be rude or mean Strangers can copy my photos and videos and do whatever with them College admissions people and potential employers can see what I do with my friends
I could become famous I can be friendly with celebrities I can practice writing skills I can be creative on my profile
11
12
NINTH GRADE - DIGITAL COMMUNICATION - Safe or Unsafe Communication This Lesson Plan could not be copied and pasted into a document for copyright reasons. Lesson Plan URL:
http://pasdcybersafety.wikispaces.com/file/view/js_lessonplan+-+grade9_chat+safety.pdf
13
that copyright law is designed to promote creativity and the growth of knowledge by considering both the rights of owners and the rights of users how fair use ensures that copyright law does not limit First Amendment rights the ways in which copyright law has expanded to protect owners over a period of time that the flexibility of fair use enables it to be relevant and useful to many different kinds of creative communities
Materials
Song: "What's Copyright?" PDF of Copyright Song Lyric
Readings
PDF Attached Reading (A): Understanding Copyright This reading provides basic concepts about the relationship between copyright, fair use and free speech. Reading (B): Loren, L.P. (2008). The purpose of copyright. Open Spaces Quarterly, 2(1). Available at: http://www.open-spaces.com/article-v2n1-loren.php The core purpose of copyright is to promote creativity and the spread of knowledge. Reading (C): Tushnet, R. (2004, December). Copy this essay: How fair use doctrine harms free speech and how copying serves it. Yale Law Journal, 14(3), 535-589. Available at: http://www.yalelawjournal.org/114/3/535_rebecca_tushnet.html Copying serves valuable First Amendment purposes, both for audiences and for speakers, for whom copying often serves interests in self-expression, persuasion, and participation.
14
15
Connected, 24/7
Download Student Activity Sheet(s) for printout. Read a Letter to Educators about cyberbullying from CyberSmart!
Overview
Students explore how bullying behaviors on social networking sites and cell phones can affect teens around the clock. They identify positive actions that bystanders can take to alleviate a particular scenario. Then they write a letter to the editor discussing the positives and negatives of social networking sites, messaging, and cell phone technologies used by teens.
Objectives
Analyze online behaviors that could be considered cyberbullying. Generate multiple solutions for dealing with a cyberbullying situation. Communicate positives and negatives related to Internet and cell phone technologies by teens.
Home Connection
Download the Grades 9-12 Home Connection page related to this lesson.
Site Preview
Optional online research is suggested under Teach 4. An optional strategy for using Web 2.0 tools with your students is recommended under Teach 4.
16
Introduce
Discuss with students how eager many middle school students are to join social networking sites such as MySpace and Facebook, even going so far as to disregard the age rules to sign up. Ask: What advice would you give to middle school students about using these sites?
Distribute the student sheets. Have students read the scenario about Nicole and the social networking group. Have students write their answers to the questions under What's the Problem? Look for responses that show empathy for Nicole, realizing that she might be angry, upset, frightened, or even depressed by the behavior of her so-called friends. Because the harassment is also taking place at school, students may conclude that the school has a responsibility to help resolve the situation. Allow students to share their own stories. Ask: Have you ever witnessed social networks being used to cyberbully a person or a group? Without names, share the story with your class.
Tell students that researchers have found while some teens say they are not bothered by cyberbullying behavior, others report feelings of anger, sadness, and frustration. Because cyberbullying can take place 24/7, the effects on teens can be very intense.
Have students work in pairs to discuss and answer the questions on their activity sheet. Have students role-play some ways to handle this situation. Take roles of Nicole, the other girls, Nicole's parents, a trusted teacher, and the school principal. Discuss each person's point of view. For example, teens often say the last person they would ask for help is a parent because parents, in an attempt to protect their children, often react by taking away their child's Internet privileges.
Write a Letter to the Editor Have students choose a local or national news story related to teens' questionable use of Internet or cell phone technologies. If they wish to do an Internet search, suggest the keyword cyberbullying. They may also read letters to the editor online to get a feel for the format. For example, many letters begin by referring to the title, author, and date of an article published in that paper.
Have students use Web 2.0 tools, such as a wiki, so that they can brainstorm, post the information they find during research, and collaborate in writing their letters to the editor. 17
Ask: What are some advantages and disadvantages of 24/7 communications technologies? Ask: What are some reasons that schools might need to get involved in resolving technologyrelated incidents? Ask: What should parents, teachers, and other community members know about teen use of Internet and cell phone technologies?
Extend
Students will benefit by revisiting this lesson each year. For students who completed this lesson in a previous grade, have them find news stories related to the ever-changing ways teens use Internet and communications technologies and analyze the positive and negative aspects of each.
18
Grades
6 12
Author
Publisher Tip Topic Tips for Teaching With Technology See all tips in this series
19
Discuss the kind of information people post online. Ask teens to talk about information people post on profiles, status updates, and blogs. Have teens talk about what people who read this information online might say or do. Teens can think about how friends and family, teachers, employers and coworkers might react. Also ask teens to discuss how people they do not know might respond (like the admissions staff at a college or a future employer). Some information to talk about includes: o Name, address, phone numbers, and other contact informatio o Things that happen at school and during after-school activitie o Where the teen works and the things that happen there o Things the teen does with friends and family Ask teens to talk about whether it's safe to post personal information online. Talk about how online predators can use personal information to locate someone at home, school, and work. Talk to the teen about how to choose a safe nickname. Some tips to share include: o Do not use your real name or location. Your real name or location can give an online predator enough information to find your street address o Do not include your age or date of birth. Some online predators target young people, so it's best not to tell people your age o Avoid nicknames related to where you go to school or where you work. This information tells an online predator another place to find you. Use the Online Profile Tips to talk about information teens can usually share safely. Talk about how the tips also apply to blogs, email, and instant messages (IMs). Practice creating a safe profile with the Profile Publisher. Ask the teen to use the Online Profile Tips as you work together. For more help, use material from NetSmartz. The site includes comics, worksheets, and videos that talk about how to be safe online. You can also find useful resources on these sites: o Digizen from Childnet International http://www.digizen.org/ o X-Block, from iSafe http://xblock.isafe.org/ o Wired Safely http://www.wiredsafety.org/ If you like, read a book together that explores online situations. Choose a book from the Text Messages podcast Teen Literature and Technology. Talk about whether the characters make smart choices about what they share online back to top
20
TENTH GRADE - DIGITAL COMMUNICATION - Texting & Distracted Driving Websites for lesson:
http://www.safeteens.com/ http://ht.ly/2gmxb
21
Lesson Plan
Grades 9 12 Lesson Plan Type Unit Estimated Time Ten 50-minute sessions Suzanne Taylor Lesson Author Frostburg, Maryland Publisher SUB TABS Preview Standards Resources & Preparation Instructional Plan Related Resources Comments
Preview OVERVIEW
This lesson takes advantage of students interest in music and audio sharing as part of a persuasive debate unit. Students investigate the controversial topic of downloading music from the Internet. They draw upon their prior knowledge and experience by discussing their own sources of music and Internet practices then conduct Internet research to investigate the history and legal issues of copyright infringement related to sharing audio files. Students use graphic organizers and interactive Web tools to synthesize information as well as to evaluate content and point of view. After students map their information, they take a stand on the controversy and develop persuasive arguments on their position that they present in a class debate on the subject of downloading.
FEATURED RESOURCES
Debating Music Downloads Travelogue: Students can use this online tool to explore Web resources related to music downloads. 22
23
Persuasion Map The Persuasion Map is an interactive graphic organizer that enables students to map out their arguments for a persuasive essay or debate.
PRINTOUTS
WEBSITES
Debating Music Downloads Travelogue Analyzing Opinions on Music Downloads Chart Online Point of View Chart Debate Roles and Rules
PREPARATION
Preview the Debate Over Downloading Music Links to check that the school's firewall will allow the sites to be viewed. Reserve computer lab time to conduct research as well as to work with the Persuasion Map. Make copies of the Debate Rubric. Test the Point of View Chart on the computer, or make copies of the print chart. Test the Persuasion Map on your computers to familiarize yourself with the tools and ensure that you have the Flash plug-in installed. You can download the plug-in from the technical support page. See Debate Central from the University of Vermont for a wide variety of information about debate, including learning materials, videos of debates, instructional videos, debate news, and links to debate organizations.
24
evaluate Websites and online information. extract main ideas and supporting details from online resources. analyze arguments for and against a position, paying particular attention to the role of point of view. take a stance on a controversial issue, based on their research. defend their positions in classroom debate, providing supporting facts and details for their arguments.
SESSION ONE
1. Ask students to respond to the following questions in their journals:
o o o o
What do you know about downloading music on the Internet? Have you ever downloaded music? What Web resources have you used? What do fans, artists, and companies think about this practice? Do you feel it is okay to download music? Why or why not?
o Why would some people call it piracy? 2. After about 1520 minutes, ask students to discuss their responses with the rest of the class.
3. Through the discussion, identify some class experts, students who frequently use downloading technology. 4. Invite the class experts to share what they know about the ways that the technology works and how they use it. 5. Ask students to record their questions about the legalities of downloading in their journals. 6. Explain that during the following sessions, the class will complete Internet research on these questions and related issues.
SESSION TWO
1. Ask students to use the Debating Music Downloads Travelogue to explore four Websites on the subject of downloading music. 25
SESSION THREE
1. Arrange students in small groups or partners for the next stage of research in the computer lab. 2. Ask students to complete Analyzing Opinions on Music Downloads chart with partners or group members in order to explore information on music downloads further. 3. At the end of the session, ask students to share some of the information they discovered.
SESSION FOUR
1. Ask students to respond to the following questions in their journals:
o o
What makes a source reliable? What biases did you encounter during your research?
o How did the audience and purpose for the site relate to the information included? 2. Allow students to share their journal entries, if desired.
3. Based on the information they've gathered, ask groups of students to compile their information, using the online or print point of view chart. 4. Remind students to print the charts, and bring the notes to the next session.
SESSION FIVE
1. Ask students to compile their research, notes, and printouts to prepare for further examination of the related issues. 2. As a full class, in small groups, or in their journals, ask students to share their opinions on the controversy surrounding music downloads, using the following questions to guide discussion:
o o o
Do they agree with record companies, artists, or fans? What are the arguments for downloading? What are the arguments against downloading?
3. Explain the final project to students: Students will join teams of 3 or 4 students. Working together, teams decide whether to take a pro or con stance with regard to music downloading. Using the Persuasion Map, teams will outline their main arguments and supporting facts and details. 26
SESSION SIX
1. Remind students of the assignment, and answer any questions. 2. Demonstrate the Persuasion Map for the class, and answer any questions students have about the final project options. 3. Allow students the remainder of the session to complete the Persuasion Map and work on their debates. 4. Circulate through the room, and assist them as they work on the pros and cons of downloading music. 5. Encourage students to refer all of their collected information as they make points and structure their arguments. 6. Remind students to print out their Persuasion Map by the end of the session.
SESSION SEVEN
1. Remind students of the project criteria, pointing to the Debate Rubric. 2. Answer any questions students have about the project and the criteria. 3. Discuss the importance of structuring debates with the information from Debate Structure or Lincoln/Douglas and Team Debate Format. 4. Allow students the reminder of the session to structure and prepare their debates using index cards (where they can record notes and key points). 5. Provide assistance and feedback as necessary. Encourage students to share questions with peers for feedback and support as well.
SESSION EIGHT
1. Remind students of the project criteria, and answer any questions students have about the project and the criteria. 2. Allow students to work on their arguments and notes for the majority of the session. 27
EXTENSIONS
Instead of debating their positions, have students write persuasive papers summing up their positions on downloading music. The paper should include their main arguments for or against and to support their arguments with facts or details. Students will use the Persuasion Map, outline their main arguments and supporting facts and details. Pass out the example position statement and go over the persuasive writing scoring guide so they understand the criteria for the project. Once students have completed the lesson and their debates, the class can periodically revisit this topic and any updates or changes in the legal status of music downloads. Students can give multimedia presentations on downloading, including some of the programs they use and the music they download. Students can access and view current editorial cartoons regarding downloadingnote that this site does include adverstisements that may be inappropriate. You can print out the cartoons and trim the pages before sharing with students if desired. Students can respond to the cartoons in their journals or in class discussion. Students can go on to create their own cartoons on the subject with the use of Comic Creator. The EconEdLink lesson plan Online Mayhem I: Metallica Versus Napster presents additional information on copyright infringement and music downloads. The information provides a useful supplement to the debate process. 28
29
ELEVENTH GRADE - DIGITAL CITIZENSHIP - Acceptable User Policy Lesson Plan URL: http://www.isafe.org/imgs/pdf/education/AUPs.pdf
30
ELEVENTH GRADE - DIGITAL SECURITY - Be Aware of Online Predators Lesson Plan URL: http://pasdcybersafety.wikispaces.com/file/view/IS_HS_AmysChoice.pdf
31
Part I Introduction
"Sexting" is defined as "the sending or receiving of sexually-suggestive or explicit text or pictures via one's cell phone." Source In this lesson students will define the term sexting and outline the dangers of sharing explicit photos or other images online. Part II Class/Advisory Activities Videos Mom Loses Daughter Over 'Sexting ,' (4:28 minutes) Dangers Of Teen 'Sex-ting' (3:12 minutes) 'Sexting' bullying cited in teen's suicide - Teen sucide due to Sexting (7:25)
Discussion Questions
1. 2. 3. 4.
What is Sexting? Is Sexting illegal? How can you prevent Sexting? Who is affected by Sexting?
Activities
1- What is Sexting? Watch: Sexting PSA video and the Teens sharing nude photos online video. Class Discussion: What is Sexting? Is Sexting illegal? Teacher Tips: After watching the videos, have the students define the term sexting. Discuss the possible consequences of sexting- legal and emotional. Stress the fact that once something is online or sent to someone's phone it can NEVER be retrieved or taken down. Activity Suggestion: writing prompt 1 and 2, journal 1 and Sexting Awareness activity. 2- The Dangers of Sexting Watch: Mom Loses Daughter over Sexting and Dangers of Teen Sexting videos. 32
Journal Writing
To demonstrate the affects of online exploitation and for further classroom discussion, show the videos in the home interaction links: Bulletin Board and Everyone Knows Your Name.
Part V Resources How to Handle Sexting Sexting and Child Porn Charges Mom Loses Daughter over Sexting Dangers of Sexting Sexting Tips Sexting is Illegal Connect Safely http://today.msnbc.msn.com/id/26184891/vp/28793204#28793204 http://www.youtube.com/watch?v=0mEky0KdHPk http://www.youtube.com/watch?v=VLTj3WBmY1k&feature=related http://www.youtube.com/watch?v=cNwm4YH9xYg&feature=fvw http://www.safeteens.com/teen-sexting-tips/ http://www.safeteens.com/2009/03/30/teen-sexting-stupd-illegal/ http://www.connectsafely.org/pdfs/sexting_tips.pdf
33
ELEVENTH GRADE - DIGITAL MEDIA - Peer to Peer File Sharing (P2P) No lesson plan; only resources
34
TWELFTH GRADE - DIGITAL CITIZENSHIP - Unethical Online Behaviors & Identity Theft
Safety and Security Online: Grades 9-12
Overview
Students learn about the methods criminals use to steal identities online. They develop an identity theft prevention tip list and propose ways to communicate their tips to their families.
Objectives
Define online identity theft and describe several ways it can occur. Research online identity theft and create a tip list for preventing it. Communicate good online identity theft prevention practices to family members.
Home Connection
Download the Home Connection sheet related to this lesson.
Site Preview
Several Web sites are recommended for optional student research: 35
TWELFTH GRADE - DIGITAL CITIZENSHIP - Unethical Online Behaviors & Identity Theft
Federal Trade Commission's Identity Theft Site Stay Safe Online Bank of America's Helpful Tips: Identity Theft Your Access to Free Credit Reports Citibank Identity theft commercials ID Theft FaceOff!
An optional strategy for using Web 2.0 tools with your students is recommended under Teach 4.
Materials
Student Sheet 1 (one copy per group) scissors (one per group) Student Sheet 2
Introduce
Have students close their eyes for a moment. Tell them to imagine the following scene: It's the big day! You arrive at your state motor vehicle office, several forms of identification in hand, ready to get your driver's license. The official tells you that a driver's license has already been issued to a person with your name and Social Security number, so you cannot get one. Have students open their eyes and ask: How are you feeling? (upset, depressed, scared, angry, disappointed, confused) Tell students that today you will explore the problem called identity theft.
Divide the class into small groups. Distribute one copy of Student Sheet 1 to each group and have students cut apart the cards on their sheet. Depending on the number of groups in the class, allow each group to choose a different subset of cards from among the 12 cards on the sheet. Make sure that every card is assigned to at least one group. Then have each group record what they know about the term and three essential questions describing what they think they need to know related to identity theft. Allow the groups to present to the rest of the class what they know and need to know and why they need to know it. In a discussion, they may discover disagreements or realize they hold misconceptions.
Distribute Student Sheet 2. Have students read and discuss each section. This sheet provides an overview of identity theft. 36
TWELFTH GRADE - DIGITAL CITIZENSHIP - Unethical Online Behaviors & Identity Theft
Have students refer to the essential questions they wrote in Teach 1 and determine which ones were answered and which ones were not. If groups have unanswered or additional questions, allow them to seek answers by planning and carrying out online research at the Federal Trade Commission's Identity Theft Site, the National Cyber Security Alliance's site called Stay Safe Online, or Bank of America's Helpful Tips: Identity Theft. If any group completes its research before the others, have those students visit the Federal Trade Commission's Your Access to Free Credit Reports page to learn how to order a free credit report. Then have the students in that group present what they learned to the rest of the class.
Review with students the Be CyberSmart! tips. Then have them add more tips to the list based on what they learned in class and their research on their essential questions.
Have students brainstorm ways to communicate messages about online identity theft that they can use to remind themselves and their families when they go online. They may choose to make their own videos, posters, cartoons, or reminders on sticky notes. To inspire their creativity, allow students to view the popular Citibank Identity theft commercials.
Use Web 2.0 tools, such as a wiki, to enable students to post and discuss their ideas regarding ways to communicate identity theft messages. Include in the wiki any cartoons, posters, or videos they create.
Assess
The following items assess student mastery of the lesson objectives.
Ask: What does it mean to have your identity stolen, and how does it happen online? Ask:What are three ways that people can avoid online identity theft? Ask: How can you remind family members about online identity theft prevention?
Extend
Students will benefit by revisiting this lesson each year. For students who completed this lesson in a previous grade, have them play the online game from the U.S. government called ID Theft FaceOff!
37
Part I Introduction
Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals. While social networking has gone on almost as long as societies themselves have existed, the unparalleled potential of the Internet to promote such connections is only now being fully recognized and exploited, through Web-based groups established for that purpose. Based on the six degrees of separation concept (the idea that any two people on the planet could make contact through a chain of no more than five intermediaries), social networking establishes interconnected Internet communities (sometimes known as personal networks) that help people make contacts that would be good for them to know, but that they would be unlikely to have met otherwise. In general, here's how it works: you join one of the sites and invite people you know to join as well. Those people invite their contacts to join, who in turn invite their contacts to join, and the process repeats for each person. In theory, any individual can make contact through anyone they have a connection to, to any of the people that person has a connection to, and so on. Source The Dangers of Social Networking: While the number of ways to interact via the Internet are rapidly increasing, so are the types of online social networking dangers. Long gone are the days of innocently thinking that the individual who you are conversing with online is really who he or she claims to be. Children are especially susceptible to online social networking dangers. There are many kinds of online social networking dangers. Individuals -- both adults and teens -- need to be fully aware of what type of information can be traced back to their person through simple conversations in a chat room. For instance, telling a virtual stranger that you live in a certain town and attend a certain high school can lead that person straight to your classroom. But there are other types of dangers, too. People have been known to have their identity stolen, be stalked by sexual predators, or have their photos taken from their online profiles and used in unauthorized ways. People also need to realize that just because you've chatted with someone online, doesn't mean you really know that person. Source
38
Discussion Questions
1. 2. 3. 4. 5.
What is social networking? What types of items do you post on your MySpace or Facebook accounts? How do you determine who is on your buddy list? Do you know how to remove a buddy from your buddy list? How can your personal networking sites affect your future?
Activities 1- Social Networking Watch : Social Networking in Plain English and Tracking Teresa Class Discussion : What is social networking? What types of items do you post on your MySpace or Facebook account? Teacher Tips : Read or summarize the social networking introduction above. Stress the fact that one buddy can be linked to multiple people. Once you connect one person to your account you are potentially inviting others that you may not want to see your site. Activity Suggestion : Print and complete the Tracking Teresa Activity. Writing prompt 1. 2- Social Networking and the Buddy List Watch : Julie's Journey, Amy's Choice, and/or The Dangers of Online Social Networking. Class Discussion : How do you determine who is on your buddy list? Do you know how to remove a buddy from your buddy list? Teacher Tips : Each activity listed above gives specific instructions on how to complete the assignment. If students are unfamiliar with how to remove a buddy, then consider showing the Cyberbullying PSA video. Activity Suggestion : Writing prompt 2 & journal 1. 3- A New Kind of Resume Class Discussion : How can your personal social networking sites affect your future? 39
Activity Suggestion : Print the A New Kind of Resume Game. In groups of 2-4 players the students should roll the dice to find out if their social networking sites affect their future employment. Journal 2 assignment.
Part III Reflection Writing Prompt(s) Journal Writing 1. My social networking sites includes information and pictures that are: 2. My buddy list includes: One of your friends has requested to be included on your buddy list. You accept them as a buddy. The next day you see comments posted on your friend's page about you from other people. After viewing your friend's buddy list, you realize there are a lot of people on there you do not know, and you want to block them from seeing your site. What do you do? You are going for a job interview. Before you turn in your resume, you check out your social networking sites. What items on your site will need to be checked or removed so that your chances of getting this job are good? Watch: Your Kid's Cyber Secrets, a MSNBC documentary that helps to explain what social networking is and how it is dangerous for teens.
Other
Part IV Extension Activities Class/Advisory School Activities Home Interaction Links Part V Resources Social Networking in Plain English Dangers of Online Social Networks Netsmartz http://www.youtube.com/watch?v=6a_KF7TYKVc http://www.msnbc.msn.com/id/21134540/vp/11066322#11066322 http://www.netsmartz.org/resources/reallife.htm 40 A New Kind of Resume Game- Extension Activity. After the students complete the game, have them visit the Occupational Outlook Handbook and select a job that meets the yearly salary that have earned. Your Kid's Cyber Secrets
41
42
43
7. Which of the following contribute to distracted driving: a. Being alert for potential road hazards b. Speed of the windshield wipers c. Talking on the phone to someone who is driving d. Focusing on the weather conditions
44
3. True or False: 8. True or False: Statistics show that talking on the phone or texting while A driver talking on the phone is four times driving is just as dangerous as driving drunk. more likely to get in an accident. 4. How many people a year are involved in 9. How many cell phone owning teens distracted driving related accidents? ages 16-17 say they have talked on a a. 100,000 cell phone while driving? b. 300,000 a. 32% c. 500,000 d. 700,000 b. 42% c. 52% d. 62% 5. True or False: Using a headset or other hands free device eliminates the effects of distracted driving. 10. True or False: Talking or texting on a phone while driving is a skill that you can learn to do safely.
45
Planned Content/ Lesson Outline Discuss: What is copying? What is borrowing? What is stealing? What is copyright? Do any students have a copyright on anything? Read: Research and Plagiarism article Answer questions: 1. True/False It isnt plagiarism if you have paid for the research paper. 2. True/False Altering some of the wording on a purchased research paper prevents plagiarism. 3. True/False There is a contract between the author and reader that says the work is original. 4. True/False The Internet is the only source for information for research papers. 5. True/False Wikipedia is a current, popular and accurate source for information appropriate for research paper writing. 1.) False 2.) False 3.) True 4.) False 5.) False
Differentiation: Pair students for reading. Mark text for stops for Read/Retell summary to facilitate comprehension. Students can be provided with adapted reading materials for struggling readers. Assessment: There will be an oral review for understanding of vocabulary terms. Also, any reading comprehension questions can be assessed for correct answers according to the text. Extension/homework: Students explore a selection of websites related to plagiarism on the Internet and copyright ethics.
46
47