170 likes | 339 Views
Title. Stranger Danger Webquest. Introduction Digital Communication Digital Security Important Definitions . Designed By: Shana DeBerte Traci Stair Maria Withrow. Task. Process Video One Video Two What Would You Do? Statistics. Evaluation. Conclusion.
E N D
Title Stranger DangerWebquest • Introduction • Digital Communication • Digital Security • Important Definitions • Designed By: • Shana DeBerte • Traci Stair • Maria Withrow Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion http://blog.protectmyid.com/2012/01/06/top-10-resolutions-for-a-safe-new-year/ Credits http://kidshealth.org/parent/positive/family/net_safety.html
Title Introduction • Introduction • Digital Communication • Digital Security • Important Definitions • The Internet can be a fun and exciting place, but one has to use caution before a serious or life threatening situation occurs. • Facebook, Twitter, MySpace, games, chat rooms, instant messaging • It is important to know the difference between personal information and information that can be shared online • Number of youth posting personal information in public online places: • 45% of youth posted their birth date or age • 34% posted their real names, phone numbers, addresses, or schools • http://www.child-safety-for-parents.com/internet-safety-facts.html Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Digital Citizenship • Introduction • Digital Communication • Digital Security • Important Definitions • 3. Digital Communication: electronic exchange of information. • Person’s ability to communicate with others • Before, communication was limited • Now there are many choices (e-mail, cell phones, instant messaging) • People are able to keep in constant communication at any time • Not everyone has been taught how to make good decisions when faced with different digital options • What technology do you use to communicate? Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Digital Citizenship • Introduction • Digital Communication • Digital Security • Important Definitions • 9. Digital Security (self-protection):electronic precautions to guarantee safety. • Just as people do bad things in society, it is the same when using technology • You can’t trust others with your safety. • Just as you protect your home, you need to protect your electronic devices. • It’s important to use virus protection and extra copies of important documents on your computer. • You need to protect your computer from outside forces that might cause harm. • What is something someone can do to cause harm to your computer or your information? Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Important Definitions • Introduction • Digital Communication • Digital Security • Important Definitions • Technology has open new doors to for “strangers” to harass children. • http://us.norton.com/kids-safe/article • Cybercrime “Many kids are savvy enough to realize when they've downloaded a virus, but few are comfortable admitting their mistake to their parents.” • Cyberbullying “The second category is the harm that can befall your child from people they know. Typically, this means cyberbullying, the single most common online harm our children will experience” • Online reputation – The third category of online risk is the harm we cause ourselves. This can take many forms, including sexting (sending sexual content by photo, video, or text message); posting information or images of a private, embarrassing, or controversial nature; and even neglecting to set privacy settings. Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title The Task • Introduction • Digital Communication • Digital Security • Important Definitions • Participate in class discussion based on internet safety and stranger danger. Every student must provideanswers, feedback, and opinions to questions and examples. • Be able to identify safe or inappropriate situations by use of videos, pictures, and given scenarios. Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title The Process • Introduction • Digital Communication • Digital Security • Important Definitions • As a class discuss issues you or someone you know has been faced with on the internet • How did you or someone you know solve their problem? • Should it have been handled differently? • Have you ever posted personal information online, if so where and what? • Discuss whether the situations in the scenarios and videos are safe, why or why not? • What are your opinions? • What would you do? Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title • Introduction • Digital Communication • Digital Security • Important Definitions Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits http://www.youtube.com/watch?v=_o8auwnJtqE
Title • Introduction • Digital Communication • Digital Security • Important Definitions Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits http://www.youtube.com/watch?v=CE2Ru-jqyrY&feature=related
Title The Process- What Would You Do? • Introduction • Digital Communication • Digital Security • Important Definitions One million children were harassed, threatend or subjected to other forms of cyberbullying on Facebook during the past year. (Consumer Reports, 2011) http://www.internetsafety101.org/cyberbullyingstatistics.htm 15 year-old girl from the United Kingdom: One of my friends started hassling me on msn messenger; she was sending me nasty messages and text messages and this carried on at school. I told my parents, my friends, and a teacher. she was spoken to a few times but it still carries on a bit now but not as bad because i have blocked her online. This really affected me at home and at school; I couldn't concentrate on school work and I was always upset and down. 10 Year Old Boy from Ohio I have a friend who is in my class at school and we also go to the same after school program together. He always calls me mean names and says things about my mom which make me feel really uncomfortable. I’ve told my mom and our teacher at school has separated us but he still sends me emails and instant messages. http://www.cyberbullying.us/shareyourstory.php Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title The Process- What Would You Do? • Introduction • Digital Communication • Digital Security • Important Definitions Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion http://www.covenanteyes.com/2008/08/07/stranger-danger-how-many-teens-are-talking-to-strangers-online/ Credits
Title Evaluation • Introduction • Digital Communication • Digital Security • Important Definitions Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Conclusion • Introduction • Digital Communication • Digital Security • Important Definitions • Be able to identify unsafe situations online, know to have a parent assist/supervise you when entering personal information, know that once info is posted it is online and in the system forever. • Keep in mind: What sites are safe? What is safe for you to post? Do you trust the website and people online? Task http://www.porchester.notts.sch.uk/website/2008/04/stranger-danger.html • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Credits & References • Introduction • Digital Communication • Digital Security • Important Definitions "Covenant Eyes Header." Honest Discussions about Internet Temptations. Covenant Eyes: Internet Accountability and Filtering, n.d. Web. 03 Oct. 2012. "Cyberbullying Statistics." InternetSafety101.org: Statistics. Enough Is Enough, n.d. Web. 04 Oct. 2012. "Internet Safety Facts & Statistics: Dangers To Kids Online." Internet Safety Facts & Statistics: Dangers To Kids Online. N.p., n.d. Web. 01 Oct. 2012. http://www.child-safety-for-parents.com/internet-safety-facts.html. Jigsaw: Assembly for 8-10 Year Olds. YouTube. The Child Exploitation and Online Centre, 19 Nov. 2009. Web. 2 Oct. 2012. Merrit, Terrian. "Norton from Symantec." Antivirus Software, Spyware and Firewall Protection. Symantec Corporation, n.d. Web. 02 Oct. 2012. <http://us.norton.com/kids-safe/article>. Once Posted You Lose It. YouTube. Cybertipline.com, 16 Apr. 2008. Web. 2 Oct. 2012. Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Credits & References • Introduction • Digital Communication • Digital Security • Important Definitions "Porchester Junior School Website:Stranger Danger." Porchester Junior School Website:Stranger Danger. N.p., n.d. Web. 03 Oct. 2012. Ribble, Mike. "Nine Themes in Digital Citizenship." Reading. Digital Citizenship: Using Technology Appropriately. Dream Design. Web. 02 Oct. 2012. <http://springboard.uakron.edu/d2l/lms/content/viewer/main_frame.d2l?ou=3832042&tId=1851159>. "RubiStar Home." RubiStar Home. Altec at University of Kansas, 2000. Web. 02 Oct. 2012. <http://rubistar.4teachers.org/>. Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits
Title Teacher Slide: Additional Resources • Introduction • Digital Communication • Digital Security • Important Definitions http://en.community.dell.com/dell-blogs/education-blog/b/education/archive/2012/07/10/beyond-stranger-danger-parental-control-and-privacy-strategies-to-protect-your-digital-child.aspx http://www.internetsafety101.org/onlinegaming.htm Safe games children can play http://www.life360.com/blog/10-things-to-teach-your-kids-about-strangers/ Tips for parents http://www.netsmartz.org/Resources Good website for anyone, teachers, parents or students to find important information Task • Process • Video One • Video Two • What Would You Do? • Statistics Evaluation Conclusion Credits