Вы находитесь на странице: 1из 4

Lisa Marie Winchell

June 19, 2015


LIS 725
Information Literacy Lesson Plan
Standards:
Standard 1: Access information efficiently and effectively to inquire, think critically, and
gain knowledge.
Standard 5: Understand and practice Internet safety when using any electronic media for
educational, social, or recreational purposes.
Objectives: Students will be able to navigate safely online, whether at school or home.
Standard 1:
Recognize the need for information
Formulate questions based on information needs
Identify a variety of potential sources of information
Develop and use successful strategies for locating information
Seek information from diverse sources
Standard 5:
Practice strategies that promote personal safety and protect online and offline
reputation
Recognize that networked environments are public places governed by codes of
ethical behavior
Practice positive digital citizenship
Distinguish website authority, validity, and purpose
Understand the need for protecting personal privacy when using public access to
digital sources
Protect personal information and electronic devices in an online environment
Grade Level: 8th grade
Population: The 8th grade classes consist of 55 regular, special needs, and gifted
students. 15 are Spanish speaking, 2 are autistic, and 1 is hearing impaired.
Grouping: Students will be working individually on computers.
Time: This is a four-week unit comprised of four 45-minute class sessions.
Environment: Students will be in the librarys computer lab for all sessions.
Materials & Resources:
Computers in the computer lab
Printed directions placed at each computer prior to class
Teacher Guide: https://sos.fbi.gov/fbi-csi-teacher-guide.pdf
Outline of activities & Instructional Roles:

The librarian will introduce FBIs Cyber Surf Islands (https://sos.fbi.gov) and show
students how to navigate it. Students will learn about online safety by visiting 8
interactive islands that teach lessons through videos and games. The introduction will
take 10 minutes at most, as it is extremely intuitive. The librarian and classroom teacher
will roam around the room, assisting as needed. Each computer will have printed
instructions for those who prefer the written word.
Week One (Lessons 1-4)
Lesson 1
A villager stands in front of a windmill holding a wooden lever. When you press the
villager, he pulls the lever and aligns with one of the following issues (blades of the
windmill):
copyright, reputable sites, passwords, privacy, plagiarism, online predators, email, chat
rooms, Instant Messages, cell phones, social networking, gaming, sexting
When the lever is aligned with one of the topics, a situation will be given and students
click if they think a smart choice was made. When a student clicks on their answer, a box
pops up that tells why that was a correct or incorrect decision.
Lesson 2
Students perform a word search that reveals definitions of each word. The following
words are included:
virus protection, reporting, cyber bullying, netiquette, grooming, bystander, citation,
copyright, reputable sites, passwords, privacy, plagiarism, online predators, email, chat
rooms, Instant Messages, cell phones, social networking, gaming, sexting
Hints are available, if the students need extra help.
Lesson 3
Five real life stories are told from the National Center for Missing and Exploited Children
in movie form. The topics include:
Amys Choice- about a girl who ran away and met a man online who is now in jail
Cant Take it Back- once you put something online, you cant take it back
Profile Penalty- how your online profile can damage your reputation
Teens Talk Back: Offline Consequences-how your posts can have negative long-term
effects.
Your Photo Fate-this shows what could happen when you text someone a provocative
photo of yourself.
Lesson 4
In this game students use their keyboard keys to navigate and line up crates to keep
Captain Cyberbully from sending mean emails. They only get 9 tries.
Week Two (Lessons 5-8)
Lesson 5
Click on the tiles to move and arrange the picture. Once the picture is completed, a
valuable lesson will be revealed. There are three different puzzles of varying difficulty.
Lesson 6
Students read messages on a computer screen such as Type in your name and
address to receive a free prize and Take this quick personality test! When they have
scrolled through all of the messages, a message pops up telling students how online

predators like to trick teens and kids into telling secrets. They then may threaten to tell
their family and friends if they do not meet them in person. Never give up your
personal information if a website asks for it! The level is complete after they have
read this warning.
Lesson 7
Juliet is underwater wearing a snorkeling mask. Students help pick the right answer so
Juliet
swims to the top. She sinks to the bottom with the incorrect ones and the game starts
over if too many answers are wrong. A description is given that includes the why- the
reasoning behind the correct or incorrect answers. Some questions include:
*When signing up for an account on a trusted website never give out your (email
address) or (credit/debit card number).
*When a predator is grooming, they might (talk about something inappropriate) or (play
you in an online game).
Lesson 8
Students are asked to create the safest social network profile. They select the options
that are the best choice to build the perfect profile. Some of the areas include: picture,
date of birth, email address, my location, and about me. Each section includes 3 choices
and, as with all of the levels, reasons are given as to why the choices are safe or unsafe
ideas.
The lesson will conclude with the online exam that is built into the game. The results are
electronically saved for the teacher to view. Once all students have completed the
assessment, teachers click on the Grade Exam button. The results will be posted to the
Leader Board, only accessible to the teacher.
Weeks Three and Four
The last two lessons will cover techniques for gathering information from library and
Internet resources while following Internet safety practices. The librarian will
demonstrate examples of how to research key topics in the Civil Rights movement.
Possible examples include: Martin Luther King Jr.s I Have a Dream speech and Letter
from Birmingham Jail, Rosa Parks, the Jim Crow laws, and the Civil Rights Act of 1964.
Modifications/Differentiation:
All the information on FBIs Cyber Surf Islands website is available in Spanish.
Students can work at their own pace as it is not timed, but a general timeline has been
provided.
Step-by-step directions will be printed and placed at each computer to help any student
who needs them.
The hearing impaired student will be able to complete the assignment independently as
all the directions and interaction with the website is non-auditory, apart from the videos
for which transcripts will be provided.
Assessment:
Students are given a specific access key to access their final assessment after the 8
levels have been completed. Their results will automatically be saved electronically once

they are submitted. This piece will be used to gauge what students have understood and
what may need to be reviewed at the next session.
Extension:
The lessons regarding Internet safety are vitally important for students awareness
throughout their lives, as theyre involved in multiple forms of social media and online
interaction.
The tools for library and Internet research will benefit students not only for the project
theyre working on for Civil Rights Movement, but for all research projects they
undertake going forward. This equips them for gathering the information to build and
present knowledge.

Вам также может понравиться