View
221
Download
0
Category
Preview:
DESCRIPTION
Why We Use the Internet Information -We are able to access more information quickly via the Internet than by any other means of gathering information Communication -People of all ages are able to have connections to family, friends, and others nationally and internationally through , IM, blogs, social networking, etc… Entertainment/Enjoyment NextBack TOC
Citation preview
Internet Safety for Elementary Students
By Joanne ButlerITC 525 801
Next
Table of Contents
• Why We Use the InternetSlide 3• Ideas for Using the Internet Slides 4-6• Why We Need to be Safe Slides 7-10• Rules for Keeping You Safe
on the Internet Slides 11-14• Games Slide 15• What Do You Know? Slides 16-19• Standards Slide 20• Resources Slide 21
Next
Why We Use the Internet
• Information-We are able to access more information quickly via the Internet than by any other means of gathering information
• Communication-People of all ages are able to have connections to family, friends, and others nationally and internationally through email, IM, blogs, social networking, etc…
• Entertainment/Enjoyment NextBack
TOC
Ideas for Using the Internet
1. Research• Research on specific topics by using
databases like Power Library or Erichttp://www.powerlibrary.org/
NextBack
TOC
Ideas for Using the Internet
2. Communication-connect with others by using:
• Email• Facebook http://www.facebook.com/ • MySpace http://www.myspace.com/
NextBack
TOC
Ideas for Using the Internet3. Viewing Movie Clips
• Visually seeing something and hearing first-hand valuable information or for entertainmentClick on screen below to view a short film about the parts of a plant.
Next
Back
TOC
Why We Need to Be Safe
• Cyber bullying
• Meeting harmful people
• Viewing inappropriate materials
NextBack
TOC
Cyber Bullying• “Verbal harassment that occurs during online
activities.”• “58% of kids admit someone has been mean or said
hurtful things to them. 42% of kids have been bullied online.” (i-SAFE Research Team)
What It Looks Like1. Emails that are threatening in nature2. IM sessions that are nasty3. Being sent repetitive messages by cell phone4. Forwarding to others of private messages, photos, or videos
NextBack
TOC
Meeting Harmful People
• Predators are people who may have intentions of hurting you mentally and/or physically.
• They pretend to be your friend online so that they can earn your trust.
NextBack
TOC
Viewing Inappropriate Material
• This would be material that is considered “harmful to minors”.-It may include hate messages.-It may include offensive language.-It may include nudity.
NextBack
TOC
Rules for Keeping You Safe on the Internet
• Don’t give out any personal information-Name-Passwords-Address-Phone number-Names of friends or family members-Photos
NextBack
TOC
Rules for Keeping You Safe on the Internet
• Computers should be kept in a central location, especially at home-If someone is close by, you will have a better chance getting help sooner.-Schedule once-in-awhile Internet chat sessions with an adult sitting at the computer with you so that you can show them a little about what you’re viewing and discuss what’s online.
NextBack
TOC
Rules for Keeping You Safe on the Internet
Never agree to meet with someone in person that you’ve met online without permission. Tell an adult if someone has contacted you and wants to meet.
Always meet in a public place with your mom or dad.
NextBack
TOC
Rules for Keeping You Safe on the Internet
• Tell an adult right away: -If you receive messages that make you feel uncomfortable -If you view content that makes you feel uncomfortable
• Do not respond to any messages that make you feel uncomfortable.
NextBack
TOC
GamesAT&T Internet Safety
http://www.att.com/Common/images/safety/game.html
McGruff http://www.mcgruff.org/Games/
Gamequarium Internet Safety Games http://www.kidscomjr.com/games/safety/safety.html
NextBack
TOC
What Do You Know?
Question #1: Cyber bullying is which of the following?
A. Persistent and repetitive messagesB. Threatening emailsC. When someone who you trusted not
to share forwards a personal email to others
D. All of the above NextBack
TOC
Answer:
D. All of the AboveEach one of those are examples of
what to look for if you think you are being cyber bullied.
NextBack
TOC
What Do You Know?Question #2: What should you do if someone you’ve met online wants to
really meet in person?
A. Run out and meet the person by yourselfB. Tell an adult and let them decide how to set
up a meeting place with them supervisingC. Go with your friend to meet at a private spotD. Tell the person that he/she is out of their mind
NextBack
TOC
Answer:
B. Tell an adult and let them decide how to set up a meeting place
with them supervisingAlways have an adult accompany you
if they feel a meeting is appropriate. The location to meet
should be in a public place.
NextBack
TOC
StandardsPennslyvania Standards
1.9. K. Information, Communication, and Technology LiteracyA. Gain information using media and technology resources with adult assistance.
B. Identify different types of media
ISTE NETSDigital Citizenship
Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students:
a.advocate and practice safe, legal, and responsible use of information and technology.
b.exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity.
c.demonstrate personal responsibility for lifelong learning.d.exhibit leadership for digital citizenship.
Technology Operations and Concepts Students demonstrate a sound understanding of technology concepts, systems, and
operations. Students: a.understand and use technology systems.
b.select and use applications effectively and productively.c.troubleshoot systems and applications.
d.transfer current knowledge to learning of new technologies.NextBack
TOC
Resourcesi-SAFE. Beware of the Cyber Bully. i-SAFE Dig Deeper.
http://www.isafe.org/imgs/pdf/education/CyberBullying.pdf
Cromwell, Sharon. (1998).The Internet Safety Debate. Education World.
https://kud2l.kutztown.edu/d2l/lms/content/viewer/view.d2l?tId=2407020&ou=142519
http://www.discoveryeducation.com/
Thornburgh,Dick & Herbert Lin. (2004). Youth, Pornography, and the Internet. Issues in Science and Technology.
https://kud2l.kutztown.edu/d2l/lms/content/viewer/main_frame.d2l?ou=142519&tId=2407023
HomeTOC
Recommended