Вы находитесь на странице: 1из 11

Name: Grade Level: 11th Grade Subject: Cyber Safety Title of Lesson: Cyber Safety 101

Establishing the Lesson Framework


NETS-S: 5. Digital Citizenship. Students understand human, cultural, societal issues relating to technology and practice legal and ethical behavior. TEKS: 113.41. United States History Studies Since 1877 (One Credit), Beginning with School Year 2011-2012.: The Student applies critical-thinking skills to organize and use information acquired from a variety of valid sources, including electronic technology. 126.32. Fundamentals of Computer Science (One-Half to One Credit), Beginning with School Year 2012-2013: 5) Digital citizenship. The Student explores and understands safety, legal, cultural, and societal issues relating to the use of technology and information.

Applicable Student Expectations & Objectives: TEK 126.32.5B- The Student is expected to demonstrate proper digital etiquette and knowledge of acceptable use policies when using networks, especially resources on the Internet and on intranets. TEK 126.32.5D- The Student is expected to understand the safety risks associated with the use of social networking sites. TEK 113.41.29D- The Student is expected to use the process of historical inquiry to research, interpret, and use multiple types of sources of evidence TEK 113.41.30A- The Student is expected to create written, oral, and visual presentations of social studies information TEK 113.41.30C- The Student is expected to use different forms of media to convey information, including written to visual and statistical to written or visual, using available computer software as appropriate. NETS 5.a-The Student is expected to advocate and practice safe, legal, and responsible use of information and technology.

NETS 5.b-The Student is expected to exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity. Rationale: The Student will comprehend and practice safe skills while using a computer and the internet. Knowledge of safety skills will prevent the student from violating copyright laws, plagiarism, and other computer crimes listed in the Texas Penal Code. The Student will also learn how to identify cyber dangers or concerns to navigate online away from personal safety threats. This lesson will help the students become safer on the internet from learning about cyber safety. Also, students will learn how to do historical research and create presentations (PowerPoint and video) from the information that they collected.

Designing Supportive Learning Environments


Materials: Teacher Use Resources Handouts: Instructions on Cyber Safety and History Project; Rubric for History Project Lesson Plan Presentation saved to USB Videos for lesson plan Paper/Pen/Pencil http://www.netsmartz.org/Resources http://bullying.rfkcenter.org/schools/additionalresources/ http://www.commonsensemedia.org/educators/scopeand-sequence#grades-9-12 http://www.teachingcybersafety101.weebly.com Online Impersonation. Tex. Penal Code 33.07. (2011). Identity Theft. Tex. Business and Commerce Code 521.051. (2009). Htt p://youtu.be/YoTIaRyGzac http://youtu.be/BdCHgzU9beA Student Use Handouts: Instructions on Cyber Safety and History Project; Rubric for History Project Pencil/Pen Paper for notes

Technology

Projector Desktop Computer complete with keyboard, mouse, internet access, webcam, and speakers.

Desktop Computers in the schools computer lab complete with keyboard, mouse, internet access, webcam, and speakers. Laptops for Modifications (headphones, hand held microphones, modified keyboards, and a larger screen/monitor size for visually impaired students).

Setting: The setting will be 5 students who are in the 11th grade. Students will be having class in the schools computer lab with a large room with desktop computers complete with internet access and webcams, keyboards, and a mouse. The room will also have a long table with laptop computers for students who need a more private area, more space, or one on one time (modifications or behavior (IED)). Students will be assigned to computers with one student on each side of the walls of the computer lab to ensure individual work. Students with needs will be placed at the laptop on the table in the room or at a computer near the instructors position in the classroom. Students will only need paper and pencil/pen at their workstations. All other handouts will be given to them throughout the lesson. If the computer lab is in need by another instructor, with the amount of instructors in this class, all students may be placed along one wall of the computer lab and supervised with the 4 instructors to ensure individual work. This will allow another class or group of students to work on their assignments without interrupting instruction for this group of students.

Student Needs/Adaptations: If there is prior knowledge that a student is deaf, then anything that is discussed during the lesson that is not included on the handout will be transcribed from a tape recorder. Another modification to this lesson would be to have a translator present if available.

If there is prior knowledge that a student is blind, then if necessary, a computer to text laptop will be available for the student as well as a modified keyboard. Also a printed copy of the presentation will be provided for students who are hearing-impaired.

**Any and all accommodations will be added to the lesson to that are in accordance with any students IEP. ***All students were tested to find their reading levels within the first week of school. Students will be expected to research within their reading levels or higher, only to a level of success. Students will not be deducted points on any assignments for their research abilities. Students with less than average ability will be required to display proper digital citizenship, however, may have less sources required for their post assessments.

Instructional Strategies:
Introduction/Focus (5-7 min): We will welcome the students after they have all settled down in their seats. We will tell them to put their things away underneath their desks in order for todays lesson to go as smooth as possible. They will need a writing utensil. After the students take their seat, play the video from youtube.com (http://youtu.be/YoTIaRyGzac) (Kid calls 911 for help with math) and then play the Kid gives motivational speech video (http://youtu.be/BdCHgzU9beA) With a positive attitude and asking for help from the right peoplewe can get anything done. Are you ready to get it done? As the students enter in the classroom, tell them to take one copy of the Pre- Assessment from the chair in front of the room as that will be their warm up for the day.

Yesterday, you were told you would have a project that is a major grade. You are going to create a video based on your favorite person in history and why they are your favorite person. You will include the following elements in your project: full name of person, biography of the person and what they are known for in history, and why you selected them as your favorite person. The second part of this task is make the video convince me that this person really is your favorite person in history. You will have to put all of your class time into research and being creative. You only have the rest of this week to complete in class. If you need more time, you will be able to work on it at home.

You will use ANIMOTO to create the video. It is slideshow video creator. Your video must be at least 5 minutes long and have music that is appropriate for your project. You will also be

expected to use a computer webcam in the project. Perhaps you could use it to video yourself saying something or videotaping something for your video.

To complete this project, you will need to be in the computer lab for the rest of the week. However, you may be able to work on this project at home because of the ANIMOTO website. Before we get started on your project and you have access to the internet, lets review cyber safety. While we review cyber safety, you will learn how to demonstrate proper digital etiquette and knowledge of acceptable use policies when using networks, and practice safe, legal, and responsible use of information and technology. You are also expected to exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity.

As we are telling them this, one or two of the instructors will be turning on the projector, opening the website www.teachingcybersafety101.weebly.com, and pulling up the Prezi presentation to begin the lesson.

Instructional Procedure (30-40 min): When the students complete the Pre-Assessment, they will turn in their papers. Then instructors continue the discussions.

Lets talk about being safe online. Was there something on the pre-test that you didnt know? Someone tell me one way to be safe online.

Open for class discussion. When students run out of ways to be safe (not participating in chat rooms, knowing each and every person in real life that they send files and photos to, not telling people online where they are-location, etc) and we would move onto the list of concerns with cyber safety.

On the white board in front of you, you will see a list of topics in regards to being safe online.

White board list: Copyrights/Plagiarism, Identity Theft, Cyber Bullying, Revealing too much information, Online Impersonation (its a crime), Social Media Use, Webcam Use, Spyware, Spams, and Scams, Social Networking, Sexual Predators, Inappropriate Content, File Sharing, and Digital Literacy. Then open up webpage to www.teachingcybersafety101.weebly.com

Think to yourself why it is so important to be safe online when you arent physically around other peopleTheres a lot to be concerned about when you work online or use a computer. Lets review this cyber safety webpage. The home page plainly states that safety begins at home. It says Parents should be fully aware of what their children are doing online. Why do you think your parents need to know what you are doing online? (Hold for answers then click on READ MOREexamples could be to monitor friends activity/associations, etc.) Here is a list of ideas for parents to get involved and to find out what their child is actually doing online. All of you are old enough now to review this page as young adults since you are in the 11th grade. (Go over each item and then ask if the students have any questions, comments or stories to share. Then click on each of the guides shown at the bottom and show the students the guides but do not read. Tell them they go over them at home or when they have free time in class. Click on the MISSION tab of the website) The mission of this website is clearly stated to provide parents, educators, and children of all ages the necessary information to help make the internet a safer place to explore. Did everyone see this second paragraph? Internet crimes and concerns are not often in the media. Try and think of a time when you heard on the news that someones identity was stolen and a person was charged with a crime. When was the last time you heard someone was arrested for claiming to be someone he wasnt and posted bad things about the person? Its hardly ever in the news. Students, it is still a crime to do those things. Lets look at MORE tab. It has a section for LAW ENFORCEMENT. Here is a copy of the Penal Code, which is law written out for Texas, and its the section on computer crimes. Lets review this. The section in red is what I want you to pay attention to. You will need to understand that your behavior online can now be criminal. This is a new concept because technology has just recently evolved to a level where it now needs to be protected. You can break the law also by taking someones work online and using it as your own without giving someone credit. This is going to an important aspect in your research online for your history project. Documentation can help you and will prevent you from doing this.

When you are researching on the internet, there are many sources online that are FALSE. As a researcher, you must be prepared to confirm your source or use validated sources. When you use sources you must also remember to cite them in your project. This will avoid plagiarism.

Play video Respecting Creative Work by CommonSense.org.

If you have questions on how to appropriately cite a source, use the MLA or Chicago manual at the front of the classroom and ask your instructor. These formats for citing sources is what is commonly used with social science studies.

Step 1 is to make sure you do not plagiarize and that you follow the copyright laws. Step 2 is to avoid inappropriate content on social media sites, websites, and to refrain from revealing too much information while interacting with social media sites and websites. How do you think you can do that?

Open for discussion (Comments could be telling where you really live, giving your full name, telling others where you are location-wise at the exact time you are there, etc)

How can you avoid it?

Open for discussion. (Comments could be simply to refrain from posting it online.)

Play video Connected Culture by CommonSense.org.

This video showed you that todays youth is affected deeply by online activity. Todays youth likes to communicate over technology and how youth bully online other youth. Have any of you ever bullied another person online? Has anyone ever posted something mean or inappropriate about you? Think about your answers while you watch this next video.

Play videos DC_Brittany & EvasStory by CommonSense.org.

Step 3 is to discuss criminal acts. We touched on this briefly at the beginningbut lets get specific. Online impersonation and identity theft happens every day. Some people have their identity stolen more than once and it takes them years to fix what happens to them. When your identity is stolen, they are not only telling people they are you, but they are telling people they are you so they can get what you would have received: a credit card, a home, or a car.sometimes people will steal your identity and steal your education records and claim your college degree. They claim to be you and they will take the money out of your bank account. People may also claim to be you to lie about you. They will create an online page on a social media site and say Im an idiot or I hate my boss. They may even say that you are a prostitute. It can be something very hurtful! When people do these things, they are breaking the law and can go to jail for it. Another criminal act that you need to be aware of is to observe sexual predators online. People who are in jail have access to the internet. Have you ever thought about the people who you dont know watching your social sites as those who are in jail?

Step 4 is to monitor your digital literacy. Did you use your computer responsibly? Did you share files to people you dont know? Do you have permission to share those files? Remember we talked about copyright laws? Have you thought about your webcam use? What did you decide to use your webcam for in your project? You have to monitor what happens on your computer. You have to observe the spyware and spam sent to your computer. Can you handle that responsibility?

Closure (10-15 min): First, are there any questions? To recap todays lesson, there were 4 main points to remember while practicing good digital citizenship. 1. Always document your sources and the information you want to use with your thoughts and concepts. Do this to avoid plagiarism and follow copyright laws. 2. Avoid posting inappropriate content online. Dont tell people where you are. Be careful when you use webcams or other recording devices. If you find an online organization that you must join to obtain your research information, use caution telling them your personal information. 3. Avoid criminal behavior. Who can tell me 3 crimes you can commit online? (online impersonation, identity theft, and violating copyright laws) And 4. Monitoring your digital literacy and using your computer and internet appropriately. Any questions? To complete your project, you must learn and demonstrate cyber safety. You will be demonstrating next. Instructor will answer any and all questions that the students have pertaining to the cyber safety lesson. If the questions go over the allotted time, then the explanation of the project will have to be pushed back until the next class period. If it is determined by the teacher that there still is enough time left, then the teacher will introduce the project to the class.

This project will determine if you have effectively learned about cyber safety. If you need any help or have any questions regarding proper cyber rules, please do not hesitate to ask.

Instructors will pass out the assignment handout and the rubric for the project.

Lets look at your handout. We just went over all of these cyber safety rules. Do you remember the videos you just watched? Lets talk about your project and what will be expected of you. You will do your research here in class in the computer lab. You are expected to follow the cyber safety rules and tips you were given today in class for the rest of the week. You will use ANIMOTO.com to build your slideshow video. The video will be 5 minutes in length and will have music or audio the entire length of the video. You will need to find at least 5 different sources for information and another 5 sources for pictures. The more information, the better

your video will be. You must include the full name of your favorite person from history, their birthday and location of birth, a biography of the person, and why they are important to history. Then, you will add to the video specifically why you like them as your favorite person in history. Why do they stand out to you? You must be creative. You can earn extra points for supreme work. Any questions?

Evaluation Strategies:

Pre- Assessment: Pre-Test will handed out and graded. Pre-test will have questions that students may not have considered before using computers and the internet. Pre-assessment is meant to be fill in the blank to make the students think about the correct answers. It meant to drive the students and motivate them to learn about cyber safety.

Formative: With using various videos and online tools, the students should be able to understand the concept of cyber safety. However if during the lesson, if there seems to be any disconnect between the students learning and the material, it will be addressed promptly. The students must be able to comprehend these concepts in order to successfully complete their project.

Summative: The student will complete a history project on their favorite historical person. The student will use an ANIMOTO video in lieu of writing a paper or power point to do their presentations. The students will need to obtain 5 photos and 5 sources of information are cited appropriately, accurate information on historical persons biography, and detailed information on why they are known in history. The video needs to be creative with adding audio in the background during its entirety. Students will be graded on appropriate cyber safety used for the project for each day in the computer lab. Students are expected to respect copyright laws and not plagiarize. Students are expected to not reveal a lot of personal information in this project. Students are expected to use appropriate content in their project. Students are expected to use webcams appropriately in this project.

Students are expected to participate in educational organizations, if need be, to obtain additional information from a valid source of information. Students refrained from participation in chat rooms unless educational chat rooms that were approved by instructors. Students are expected to understand appropriate file sharing and only share files with the instructors and no one online or in the class. Students are expected to follow the schools Code of Conduct.

Adaptations Based on the Individual Needs of Students- Post Assessment: If a student is blind, then there will be a verbal or written post assessment instead. Students who are blind may use computers that are speech to text in order to perform the written assessment if that is the assessment that they choose. If a student is deaf and a translator is available, then they will have the choice of doing the ANIMOTO assignment. However, certain aspects of the project like having the music in the background will not be deducted off if there is not any. If there is not a translator available or the student is not comfortable with doing the ANIMOTO, then they will be allowed to do a written assessment as well. Any and all accommodations will be added to the project that are in accordance with any students IEP.

Rubric: 25 Question Pre-Assessment (Pre-test). 4 points each.

A = 90-100 B = 80-89 C = 75-79 D = 70-74 F = 0-69

Post-Assessment History Video Project. Grade EvaluationA = 586-650 points B = 520-586 points 90-100 80-89

C = 455-520 points F = 0-455 points

70-79 0-69

***See attached Excel document. Total project is worth 650 points.

Вам также может понравиться