Internet Safety Design Document-Plan

Embed Size (px)

Citation preview

  • 8/7/2019 Internet Safety Design Document-Plan

    1/7

    ITED 523

    Project 2

    Design Document

    Name: Martha Rice

    Date: July 19, 2010

    I. Project Topic and ScopeThis project is to serve as an introductory course in safe and smart Internet usage for middle school

    students taking technology applications at Pewitt Junior High School in Naples-Omaha, Texas.

    Although young middle school aged students are digital natives, they still need adult supervision and

    guidance when they are using the Internet. Through the modules in this course, students will learn

    about basic Internet safety, cyberbullying, Internet communications etiquette, and deciphering what

    is true and what is false on Internet sites. Students will mainly concentrate on computer technology

    and Internet sites, but will also examine certain associated topics as they pertain to mobile

    technology. The final module of this course should segue into the next course, which will deal

    wholly with Internet research and 21st

    Century learning skills.

    II. Target Audience and Context1. Characteristics of the learners (e.g., age, gender, education, work experience, computer

    skills, current knowledge/skill levels, etc.)

    These modules are designed for junior high school students, especially those in 7th

    and

    8th grade, whose average age is 13. Students will be both boys and girls with littleformal computer skills training. Students of this age are especially attuned to

    technology in their personal lives, but they may not be aware of the myriad dangers

    hiding on the Internet.

    2. Description of learning environments (e.g., learning environments, tools required)This instructional unit will be assigned in middle school technology application classes.

    Students will have use computers with Internet access. Students will have technology

    skills necessary to use online eLearning, including using basic knowledge of opening and

    saving different types of documents and researching to find information they need on

    the Internet.

    III. Instructional Objectives1. Overall goal of instruction2. Objective Matrix

  • 8/7/2019 Internet Safety Design Document-Plan

    2/7

    ITED 523

    Project 2

    Module Objective

    1

    Safety and

    security online

    The student will demonstrate knowledge of safe Internet interaction with

    unknown users including:

    1.1.keeping personal information secret;1.2.discriminating interaction with users that they do not know;1.3. reporting suspicious Internet activity to the appropriate sources.

    2

    Cyberbullying

    The student will demonstrate knowledge of

    2.1. what bullying means;

    2.2. how to avoid being a bully and to help students who are being bullied;

    2.3. what specifically constitutes cyberbullying;

    2.4. cyberbullying and mobile devices;

    2.4. what steps to take if cyberbullying is occurring.

    3

    Communications

    and Internet

    manners

    The student will learn about cyber manners and appropriate communication

    skills with different kinds of audiences in online communications, including:

    3.1. email;

    3.2. discussion boards and blogs;3.3. social media sites.

    4

    Safe searching

    Truth and fiction

    online

    The student will learn to discriminate when researching using the Internet,

    demonstrating basic knowledge of

    4.1. Internet scams and misinformation;

    4.2. malware, viruses, and spyware;

    4.3. searches using Internet search engines like Google;

    4.4. judging websites by domains, ads, and layout;

    4.5. benefits of researching with EBSCO and other scholarly sources.

    IV. Content and Media Objects1. Course Modules: The course will be presented in the following modules:

    y Module 1: Safety and security onliney Module 2: Cyberbullyingy Module 3: Communications and Internet mannersy Module 4: Safe searchingtruth and fiction online

    2. Module Description & Media ObjectsModule Description & Media Objects

    Module 1:

    Safety and

    security online

    This module introduces basic Internet safety and security online.

    1. Introduction2. What kinds of information can I share on the Internet?

  • 8/7/2019 Internet Safety Design Document-Plan

    3/7

    ITED 523

    Project 2

    3. Who is this person, and what does he really want?4. How do I tell somebody something is wrong?5. Module challenge: Students will each read an article about

    Internet safety and will summarize their articles for their

    classmates.

    Multimedia Objects

    y Introductory animation showing basics of what Internet is andwhy it is important to be safe online. (Section 1)

    y Video about how to sign up for an online account, detailingwhat kinds of information should be shared and why.

    (Section 2)

    y Interactive game simulating online Interactions with unknownpeople. (Section 3)

    y Video about reporting Internet safety concerns. (Section 4).y Module Challenge (Section 5)

    Module 2:

    Cyberbullying

    This module introduces addresses the pervasive problem of bullying,

    especially as it occurs online.

    1. Introduction: What is a bully?2. How can I stop bullying?3. How is cyberbullying different than regular bullying?4. How do cyberbullies use mobile devices?5. How can I stop cyberbullying?6. Module Challenge: Students will write scripts and make PSAs

    simulating what they would do in a cyberbullying situation.

    Multimedia Objects

    y Introductory animation showing the effects of bullying on ayoung teenager. (Section 1)

    y Graphic showing how to help stop bullying. (Section 2)y Videos dealing with cyberbulling. (Sections 3 and 4).y Interactive simulations about how to stop cyberbullying

    (Section 5)

    y Module Challenge (Section 5)Module 3:

    Communicationsand Internet

    manners

    This module introduces (explains, provides, etc.)

    1. Introduction2. How do you use email correctly?3. What are discussion boards and blogs?4. What are right ways to use social media sites?5. Module Challenge: Students will participate in class

    discussion online following proper Internet etiquette.

  • 8/7/2019 Internet Safety Design Document-Plan

    4/7

    ITED 523

    Project 2

    Multimedia Objects

    y Introductory animation showing the effects of unacceptableonline communication. (Section 1)

    y Interactive diagrams of the parts of an email. (Section 2)y Simulation of using a discussion board ( Section 3)y Video discussion of a blog (Section 3)y Video describing how to be safe on social media sites.

    (Section 4)

    y Simulationto friend or not to friend? (Section 4)y Module Challenge

    Module 4:

    Safe searching

    truth and fiction

    online

    This module introduces (explains, provides, etc.)

    1. Introduction2. Can I really lose 50 lbs overnight? Internet scams and

    misinformation

    3. Why is my computer messed up? malware, viruses, andspyware

    4. If its on Google, its okay, right? searches using Internetsearch engines like Google

    5. Where is the information? All I see is ads! judging websitesby domains, ads, and layout

    6. Where can I find really good information then? benefits ofresearching with EBSCO and other scholarly sources

    7. Module Challenge: Students will analyze websites and reporttheir findings to the class.

    Multimedia Objectsy Introductory scavenger hunt to allow students to find

    information any way they want to on the Internet. (Section 1)

    y Gamechoose the scam. (Section 2)y Video demonstrating how viruses work ( Section 3)y Graphic comparing types of malware (Section 3)y Animation explaining how to use Boolean search (Section 4)y Gameanalyze the website (Section 5)y Animation demonstrating how to navigate EBSCO (Section 6)y Module Challenge (Section 7)

    V. Instructional StrategiesIn this course, students will

  • 8/7/2019 Internet Safety Design Document-Plan

    5/7

    ITED 523

    Project 2

    y use prior knowledge to activate new learningy use modalitiesy discuss and simulate problems and solutionsy solve problemsy work in collaborative groupsy use technology to research

    VI. Development and Production Plany Weekly plan

    If project is acceptable, course will be set up online with appropriate links to quality

    resources already existing on quality websites (see references) and written for the

    course by course instructor.

    Each module should last one-two weeks, with additional time provided if students need

    more time to work on module challenges.

    Module 1: week of August 23-27.

    Module 2: week of August 30-September 3.

    Module 3: week of September 7-10.

    Module 4: week of September 13-17.

    VII. ReferencesCenter for Safe and Responsible Internet Use. (2010).Mobilizing educators, parents, students,

    and others to combat online social aggression. Retrieved from http://csriu.org/cyberbully

    Children International. (2007).Digizen. Retrieved from http://www.digizen.org

    Common sense media programs. (2010). Retrieved from http://www.commonsensemedia.org

    Digital literacy. (2009). Retrieved from http://www.ikeepsafe.org/youtube.html

    Dowell, E., Burgess, A., & Cavanaugh, D. (2009). Clustering of Internet Risk Behaviors in a

    Middle School Student Population. Journal of School Health, 79(11), 547-553.doi:10.1111/j.1746-1561.2009.00447.x. Retrieved from

    http://search.ebscohost.com/login.aspx?direct=true&db=pbh&AN=44605250&site=ehost-live

    Federal Trade Commission. (n.d.). The children's online privacy protection act. Retrieved fromhttp://www.ftc.gov/privacy/privacyinitiatives/childrens.html

    Fraud Watch International. (2010).Internet Fraud. Retrieved from

    http://www.fraudwatchinternational.com/ife/ife-home/

  • 8/7/2019 Internet Safety Design Document-Plan

    6/7

    ITED 523

    Project 2

    Get Net Wise. (2008). Retrieved from http://getnetwise.org

    Goddard, C. (2008). Cyber World Bullying. Education Digest, 73(7), 4-9. Retrieved fromEducation Research Complete database.

    http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=31203799&site=ehost

    -live

    Google.com and YouTube. (2010). Safety center. Retrieved from

    http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&hl=en-US

    Internet Keep Safe Coalition. (2009).I Keep Safe. Retrieved from http://www.ikeepsafe.org

    Internet Policy Committee. (2010). Consumer advice on phishing. Retrieved from

    http://www.antiphishing.org

    Internet Solutions for Kids, Inc. (2010). Retrieved from http://is4k.com

    Internet Solutions for Kids, Inc., . (2010).Internet safety task force report published. Retrieved

    from http://is4k.com/press-releases/internet-safety-task-force-report-published

    Internet Solutions for Kids, Inc. (2010).Prevent cyberbullying. Retrieved fromhttp://www.cyberbully411.org/

    iSafe. (2010). iLearn online. Retrieved from http://ilearn.isafe.org

    Love is not abuse. (2010). Retrieved from http://loveisnotabuse.com

    Miller, N., Thompson, N., & Franza, D. (2009). Proactive Strategies to Safeguard YoungAdolescents in the Cyberage. Middle School Journal, 41(1), 28-34. Retrieved from

    Education Research Complete database.http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=43972246&site=ehost

    -live

    MTV. (2010).A Thin line. Retrieved from http://www.athinline.org

    MTV-Associated Press. (2009, Sepetember 23).Digital abuse survey. Retrieved from

    http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Full.pdf

    MySpace. (2010).MySpaceSafety. Retrieved from

    http://www.myspace.com/index.cfm?fuseaction=cms.viewpage&placement=safety_pagehome

    The National Center for Missing and Exploited Children. (2010).NetSmartz workshop. Retrieved

    from http://www.netsmartz.org

    National Crime Prevention Council, . (2010). Cyberbullying. Retrieved from

    http://www.ncpc.org/topics/cyberbullying

    National Cyber Security Alliance. (2010). Stay Safe Online. Retrieved fromhttp://www.staysafeonline.org

    Net Family News. (2010). Retrieved from http://www.netfamilynews.org

  • 8/7/2019 Internet Safety Design Document-Plan

    7/7

    ITED 523

    Project 2

    On guard online. (2010). Retrieved from http://www.onguardonline.gov

    PBS Frontline. (2009, February 2).Digital nation: life on the virtual frontier. Retrieved fromhttp://www.pbs.org/wgbh/pages/frontline/digitalnation

    Safe Kids. (2010). Retrieved from http://www.safekids.com

    Safe Teens. (2010). Retrieved from http://www.safeteens.com

    The SANS Institute. (2010). Computer security training, network research and resources.Retrieved from http://www.sans.org

    Savvy Cyber Kids. (2010). Retrieved from http://www.savvycyberkids.org

    Social networking basics. (n.d.). Retrieved fromhttp://iKeepsafe.org/prc/videotutorials/myspace/index.html

    Stop badware. (2010). Retrieved from http://www.stopbadware.org

    Tech Partnering Group. (2009). ConnectSafely. Retrieved from http://www.connectsafely.org

    U.S. Department of Health and Human Services Health Resources and Services Administration.(2010). Stop bullying now!. Retrieved from http://www.stopbullyingnow.hrsa.gov/kids/

    Verizon. (2009). Verizon parental controls center. Retrieved fromhttp://parentalcontrolcenter.com

    Wired safety. (n.d.). Retrieved from http://www.wiredsafety.org