Online Safety

Not a Learning.com customer? Learn More

Type:Lesson

Estimated Time:15 minutes

Score Type:Auto Score

This lesson automatically provides a score to your gradebook

Available Language: English


Vocabulary: bully, bullying, cell phones, chat room, cyberbully, cyberbullying, digital media, email, instant messaging, online communication, online games, posting, privacy settings, reputation, social networking, social networks, texting


Primary Objectives:

  • Students learn how to handle any offensive or insulting material they receive.
  • Students know they should show cruel messages to a teacher or parent.
  • Students learn to not be a bystander or a victim of cyberbullying.
  • Students learn to not forward personal information or embarrassing pictures.
  • Students recognize the need to treat everyone in a respectful manner, in person and online.
  • Students understand that cyberbullying can happen during any type of electronic communication.

Secondary Objectives:

  • Students learn to communicate effectively using all forms of technology.
  • Students make responsible choices and decisions with social media.
  • Students understand their responsibilities within a digital environment.

Subjects:

Bullying and Harassment

Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Information Technology > Internet > Bullying and Harassment 

Development of Safe Interactive Environments 

Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Information Technology > Internet > Internet Attacks and Abuse 

Negative Impact

Information Technology > Internet > Negative Impact

Negative Impact 

Information Technology > Internet > Negative Impact 

Network Security 

Information Technology > Networking > Network Security 

Risks and Benefits of Use 

Information Technology > Mobile Applications > Risks and Benefits of Use 

Safety

Information Technology > Internet > Safety

Safety 

Information Technology > Internet > Safety 

Security Options 

Information Technology > Internet > Security Options 

Security and Privacy 

Information Technology > Internet > Security and Privacy 

Social Networking 

Information Technology > Internet > Social Networking 
Show More

Teacher Notes:

  • Discuss the school’s Acceptable Use Policy with students and how it models the responsible use of technology. Online resources can enhance your knowledge of the ethical use of technology and support student learning. Search for information on websites such as Stopbullying.gov. or StopCyberbullying.org.

Extension Ideas:

  • Students develop and add anti-cyberbullying rules to the school’s Acceptable Use Policy. Have students write school newspaper editorials in response to a cyberbullying situation.

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3A-NI-08 Explain tradeoffs when selecting and implementing cybersecurity recommendations. (P7.2)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback