Request More Info

Coding

Not a Learning.com customer? Learn More

Teacher-Facing Resources

Type:Lesson

Estimated Time:15 minutes

Grades:6-12

Score Type:Automatically Graded

Work completed by a student will be automatically graded and the grade will be sent to the Learning Management System (LMS) gradebook

Available Language: English


Vocabulary: bully, bullying, cell phones, chat room, cyberbully, cyberbullying, digital media, email, instant messaging, online communication, online games, posting, privacy settings, reputation, social networking, social networks, texting


Primary Objectives:

  • Students learn how to handle any offensive or insulting material they receive.
  • Students know they should show cruel messages to a teacher or parent.
  • Students learn to not be a bystander or a victim of cyberbullying.
  • Students learn to not forward personal information or embarrassing pictures.
  • Students recognize the need to treat everyone in a respectful manner, in person and online.
  • Students understand that cyberbullying can happen during any type of electronic communication.

Secondary Objectives:

  • Students learn to communicate effectively using all forms of technology.
  • Students make responsible choices and decisions with social media.
  • Students understand their responsibilities within a digital environment.

Subjects:

Adjusts Accordingly / Identify

Language Arts > Communication Spanish > Speaking Strategies / Presentations > Audience > Adjusts Accordingly / Identify

Bullying and Harassment

Library Media > Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Technology Education > Information Technology > Internet > Bullying and Harassment 

Development of Safe Interactive Environments 

Technology Education > Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Library Media > Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Technology Education > Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Technology Education > Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Library Media > Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Technology Education > Information Technology > Internet > Internet Attacks and Abuse 

Negative Impact

Library Media > Information Technology > Internet > Negative Impact

Negative Impact 

Technology Education > Information Technology > Internet > Negative Impact 

Network Security 

Technology Education > Information Technology > Networking > Network Security 

Personal Safety / Use / Online

Science > History / Technology / Social Perspectives > Computer Science > Personal Safety / Use / Online

Privacy 

Technology Education > Media and Culture > Law and Legal Issues > Privacy 

Respond

Language Arts > Communication > Listening Strategies / Context > Respond

Risks and Benefits of Use 

Technology Education > Information Technology > Mobile Applications > Risks and Benefits of Use 

Safety

Library Media > Information Technology > Internet > Safety

Safety 

Technology Education > Information Technology > Internet > Safety 

Security Options 

Technology Education > Information Technology > Internet > Security Options 

Security and Privacy 

Technology Education > Information Technology > Internet > Security and Privacy 

Social Networking 

Technology Education > Information Technology > Internet > Social Networking 
Show More
  • Discuss the school’s Acceptable Use Policy with students and how it models the responsible use of technology. Online resources can enhance your knowledge of the ethical use of technology and support student learning. Search for information on websites such as Stopbullying.gov. or StopCyberbullying.org.

  • Students develop and add anti-cyberbullying rules to the school’s Acceptable Use Policy. Have students write school newspaper editorials in response to a cyberbullying situation.
S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3A-NI-08 Explain tradeoffs when selecting and implementing cybersecurity recommendations. (P7.2)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ELA-Literacy.SL.11-12.1d Respond thoughtfully to diverse perspectives; synthesize comments, claims, and evidence made on all sides of an issue; resolve contradictions when possible; and determine what additional information or research is required to deepen the investigation or complete the task.