Upload
pewitt-junior-high
View
218
Download
0
Embed Size (px)
Citation preview
8/7/2019 Internet Safety Design Document-Plan
1/7
ITED 523
Project 2
Design Document
Name: Martha Rice
Date: July 19, 2010
I. Project Topic and ScopeThis project is to serve as an introductory course in safe and smart Internet usage for middle school
students taking technology applications at Pewitt Junior High School in Naples-Omaha, Texas.
Although young middle school aged students are digital natives, they still need adult supervision and
guidance when they are using the Internet. Through the modules in this course, students will learn
about basic Internet safety, cyberbullying, Internet communications etiquette, and deciphering what
is true and what is false on Internet sites. Students will mainly concentrate on computer technology
and Internet sites, but will also examine certain associated topics as they pertain to mobile
technology. The final module of this course should segue into the next course, which will deal
wholly with Internet research and 21st
Century learning skills.
II. Target Audience and Context1. Characteristics of the learners (e.g., age, gender, education, work experience, computer
skills, current knowledge/skill levels, etc.)
These modules are designed for junior high school students, especially those in 7th
and
8th grade, whose average age is 13. Students will be both boys and girls with littleformal computer skills training. Students of this age are especially attuned to
technology in their personal lives, but they may not be aware of the myriad dangers
hiding on the Internet.
2. Description of learning environments (e.g., learning environments, tools required)This instructional unit will be assigned in middle school technology application classes.
Students will have use computers with Internet access. Students will have technology
skills necessary to use online eLearning, including using basic knowledge of opening and
saving different types of documents and researching to find information they need on
the Internet.
III. Instructional Objectives1. Overall goal of instruction2. Objective Matrix
8/7/2019 Internet Safety Design Document-Plan
2/7
ITED 523
Project 2
Module Objective
1
Safety and
security online
The student will demonstrate knowledge of safe Internet interaction with
unknown users including:
1.1.keeping personal information secret;1.2.discriminating interaction with users that they do not know;1.3. reporting suspicious Internet activity to the appropriate sources.
2
Cyberbullying
The student will demonstrate knowledge of
2.1. what bullying means;
2.2. how to avoid being a bully and to help students who are being bullied;
2.3. what specifically constitutes cyberbullying;
2.4. cyberbullying and mobile devices;
2.4. what steps to take if cyberbullying is occurring.
3
Communications
and Internet
manners
The student will learn about cyber manners and appropriate communication
skills with different kinds of audiences in online communications, including:
3.1. email;
3.2. discussion boards and blogs;3.3. social media sites.
4
Safe searching
Truth and fiction
online
The student will learn to discriminate when researching using the Internet,
demonstrating basic knowledge of
4.1. Internet scams and misinformation;
4.2. malware, viruses, and spyware;
4.3. searches using Internet search engines like Google;
4.4. judging websites by domains, ads, and layout;
4.5. benefits of researching with EBSCO and other scholarly sources.
IV. Content and Media Objects1. Course Modules: The course will be presented in the following modules:
y Module 1: Safety and security onliney Module 2: Cyberbullyingy Module 3: Communications and Internet mannersy Module 4: Safe searchingtruth and fiction online
2. Module Description & Media ObjectsModule Description & Media Objects
Module 1:
Safety and
security online
This module introduces basic Internet safety and security online.
1. Introduction2. What kinds of information can I share on the Internet?
8/7/2019 Internet Safety Design Document-Plan
3/7
ITED 523
Project 2
3. Who is this person, and what does he really want?4. How do I tell somebody something is wrong?5. Module challenge: Students will each read an article about
Internet safety and will summarize their articles for their
classmates.
Multimedia Objects
y Introductory animation showing basics of what Internet is andwhy it is important to be safe online. (Section 1)
y Video about how to sign up for an online account, detailingwhat kinds of information should be shared and why.
(Section 2)
y Interactive game simulating online Interactions with unknownpeople. (Section 3)
y Video about reporting Internet safety concerns. (Section 4).y Module Challenge (Section 5)
Module 2:
Cyberbullying
This module introduces addresses the pervasive problem of bullying,
especially as it occurs online.
1. Introduction: What is a bully?2. How can I stop bullying?3. How is cyberbullying different than regular bullying?4. How do cyberbullies use mobile devices?5. How can I stop cyberbullying?6. Module Challenge: Students will write scripts and make PSAs
simulating what they would do in a cyberbullying situation.
Multimedia Objects
y Introductory animation showing the effects of bullying on ayoung teenager. (Section 1)
y Graphic showing how to help stop bullying. (Section 2)y Videos dealing with cyberbulling. (Sections 3 and 4).y Interactive simulations about how to stop cyberbullying
(Section 5)
y Module Challenge (Section 5)Module 3:
Communicationsand Internet
manners
This module introduces (explains, provides, etc.)
1. Introduction2. How do you use email correctly?3. What are discussion boards and blogs?4. What are right ways to use social media sites?5. Module Challenge: Students will participate in class
discussion online following proper Internet etiquette.
8/7/2019 Internet Safety Design Document-Plan
4/7
ITED 523
Project 2
Multimedia Objects
y Introductory animation showing the effects of unacceptableonline communication. (Section 1)
y Interactive diagrams of the parts of an email. (Section 2)y Simulation of using a discussion board ( Section 3)y Video discussion of a blog (Section 3)y Video describing how to be safe on social media sites.
(Section 4)
y Simulationto friend or not to friend? (Section 4)y Module Challenge
Module 4:
Safe searching
truth and fiction
online
This module introduces (explains, provides, etc.)
1. Introduction2. Can I really lose 50 lbs overnight? Internet scams and
misinformation
3. Why is my computer messed up? malware, viruses, andspyware
4. If its on Google, its okay, right? searches using Internetsearch engines like Google
5. Where is the information? All I see is ads! judging websitesby domains, ads, and layout
6. Where can I find really good information then? benefits ofresearching with EBSCO and other scholarly sources
7. Module Challenge: Students will analyze websites and reporttheir findings to the class.
Multimedia Objectsy Introductory scavenger hunt to allow students to find
information any way they want to on the Internet. (Section 1)
y Gamechoose the scam. (Section 2)y Video demonstrating how viruses work ( Section 3)y Graphic comparing types of malware (Section 3)y Animation explaining how to use Boolean search (Section 4)y Gameanalyze the website (Section 5)y Animation demonstrating how to navigate EBSCO (Section 6)y Module Challenge (Section 7)
V. Instructional StrategiesIn this course, students will
8/7/2019 Internet Safety Design Document-Plan
5/7
ITED 523
Project 2
y use prior knowledge to activate new learningy use modalitiesy discuss and simulate problems and solutionsy solve problemsy work in collaborative groupsy use technology to research
VI. Development and Production Plany Weekly plan
If project is acceptable, course will be set up online with appropriate links to quality
resources already existing on quality websites (see references) and written for the
course by course instructor.
Each module should last one-two weeks, with additional time provided if students need
more time to work on module challenges.
Module 1: week of August 23-27.
Module 2: week of August 30-September 3.
Module 3: week of September 7-10.
Module 4: week of September 13-17.
VII. ReferencesCenter for Safe and Responsible Internet Use. (2010).Mobilizing educators, parents, students,
and others to combat online social aggression. Retrieved from http://csriu.org/cyberbully
Children International. (2007).Digizen. Retrieved from http://www.digizen.org
Common sense media programs. (2010). Retrieved from http://www.commonsensemedia.org
Digital literacy. (2009). Retrieved from http://www.ikeepsafe.org/youtube.html
Dowell, E., Burgess, A., & Cavanaugh, D. (2009). Clustering of Internet Risk Behaviors in a
Middle School Student Population. Journal of School Health, 79(11), 547-553.doi:10.1111/j.1746-1561.2009.00447.x. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=pbh&AN=44605250&site=ehost-live
Federal Trade Commission. (n.d.). The children's online privacy protection act. Retrieved fromhttp://www.ftc.gov/privacy/privacyinitiatives/childrens.html
Fraud Watch International. (2010).Internet Fraud. Retrieved from
http://www.fraudwatchinternational.com/ife/ife-home/
8/7/2019 Internet Safety Design Document-Plan
6/7
ITED 523
Project 2
Get Net Wise. (2008). Retrieved from http://getnetwise.org
Goddard, C. (2008). Cyber World Bullying. Education Digest, 73(7), 4-9. Retrieved fromEducation Research Complete database.
http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=31203799&site=ehost
-live
Google.com and YouTube. (2010). Safety center. Retrieved from
http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&hl=en-US
Internet Keep Safe Coalition. (2009).I Keep Safe. Retrieved from http://www.ikeepsafe.org
Internet Policy Committee. (2010). Consumer advice on phishing. Retrieved from
http://www.antiphishing.org
Internet Solutions for Kids, Inc. (2010). Retrieved from http://is4k.com
Internet Solutions for Kids, Inc., . (2010).Internet safety task force report published. Retrieved
from http://is4k.com/press-releases/internet-safety-task-force-report-published
Internet Solutions for Kids, Inc. (2010).Prevent cyberbullying. Retrieved fromhttp://www.cyberbully411.org/
iSafe. (2010). iLearn online. Retrieved from http://ilearn.isafe.org
Love is not abuse. (2010). Retrieved from http://loveisnotabuse.com
Miller, N., Thompson, N., & Franza, D. (2009). Proactive Strategies to Safeguard YoungAdolescents in the Cyberage. Middle School Journal, 41(1), 28-34. Retrieved from
Education Research Complete database.http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=43972246&site=ehost
-live
MTV. (2010).A Thin line. Retrieved from http://www.athinline.org
MTV-Associated Press. (2009, Sepetember 23).Digital abuse survey. Retrieved from
http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Full.pdf
MySpace. (2010).MySpaceSafety. Retrieved from
http://www.myspace.com/index.cfm?fuseaction=cms.viewpage&placement=safety_pagehome
The National Center for Missing and Exploited Children. (2010).NetSmartz workshop. Retrieved
from http://www.netsmartz.org
National Crime Prevention Council, . (2010). Cyberbullying. Retrieved from
http://www.ncpc.org/topics/cyberbullying
National Cyber Security Alliance. (2010). Stay Safe Online. Retrieved fromhttp://www.staysafeonline.org
Net Family News. (2010). Retrieved from http://www.netfamilynews.org
8/7/2019 Internet Safety Design Document-Plan
7/7
ITED 523
Project 2
On guard online. (2010). Retrieved from http://www.onguardonline.gov
PBS Frontline. (2009, February 2).Digital nation: life on the virtual frontier. Retrieved fromhttp://www.pbs.org/wgbh/pages/frontline/digitalnation
Safe Kids. (2010). Retrieved from http://www.safekids.com
Safe Teens. (2010). Retrieved from http://www.safeteens.com
The SANS Institute. (2010). Computer security training, network research and resources.Retrieved from http://www.sans.org
Savvy Cyber Kids. (2010). Retrieved from http://www.savvycyberkids.org
Social networking basics. (n.d.). Retrieved fromhttp://iKeepsafe.org/prc/videotutorials/myspace/index.html
Stop badware. (2010). Retrieved from http://www.stopbadware.org
Tech Partnering Group. (2009). ConnectSafely. Retrieved from http://www.connectsafely.org
U.S. Department of Health and Human Services Health Resources and Services Administration.(2010). Stop bullying now!. Retrieved from http://www.stopbullyingnow.hrsa.gov/kids/
Verizon. (2009). Verizon parental controls center. Retrieved fromhttp://parentalcontrolcenter.com
Wired safety. (n.d.). Retrieved from http://www.wiredsafety.org