Online Safety

Not a Learning.com customer? Learn More

Type:Lesson

Estimated Time:15 minutes

Score Type:Auto Score

This lesson automatically provides a score to your gradebook

Available Languages: English, Spanish


Vocabulary: blog, chat room, cyber bully, cyber bullying, dealing with cyber bullying, email, extort, flaming, harass, impersonate, instant message, intimidate, isolate, password, phone, rumor, social network, stalk, text message


Objectives:

  • Student learns what cyber bullying is and becomes familiar with different forms it can take.
  • Student learns that a cyber bully is someone that repeatedly uses technology to hurt another person, individually or as part of a group.
  • Student learns that some ways that cyber bullies may hurt another person is by harassing them, impersonating them, intimidating them, isolating them, stalking, creating or helping to spread false rumors, extortion, name calling and flaming, tricking or terrorizing them.
  • Student learns that some types of technology that are used by cyber bullies are social networking sites, text messages, camera phones, instant messages, email, malicious Websites, chat rooms, blogs, and phones.
  • Student learns that cyber bullying is taken very seriously by law enforcement and schools.
  • Student learns what they should do to make it harder for someone to cyber bully them.
  • Student learns to create strong passwords with letters and numbers and change them often.
  • Student learns to only share passwords with a responsible adult.
  • Student learns to keep their page, personal information and blog private.
  • Student learns to block cyber bullies.
  • Student learns that treating others well online will make them less of a target for cyber bullies.
  • Student learns what they should and should not do when cyber bullied.
  • Student learns that they should tell their parent or guardian and their school that they are being cyber bullied.
  • Student learns that they must never reply to a cyber bully attack, replying could make the attacks much worse, could make it difficult to prove who started the attacks, and that cyber bullies feed off of the reactions of their victims.
  • Student learns that they should always save and print all evidence of being cyber bullied and print it, and never delete the evidence before saving it or printing it and showing it to an adult.
  • Student learns that if it an attack is posted in a comment they should print it, tell their parent or guardian, and flag it to make sure the site provider knows what the poster is doing.
  • Student learns to report imposter profiles to a social networking site or gaming site.
  • Student learns why it is important to act when they know someone else is being cyber bullied and what they have a responsibility to do.
  • Student learns to tell the school if they know of another student being cyber bullied.
  • Student learns to never participate in cyber bullying.
  • Student learns to tell friends to stop cyber bullying if safe to do so, if they don’t feel safe they should let an adult know, is better to do so privately instead of in front of a group.
  • Student learns ways to support targeted students, send private positive messages to befriend a student that is being targeted.
  • Student learns about the harmful effects that cyber bullying can cause.

Subjects:

Acceptable Use Policy / ICT Policy 

Information Technology > Internet > Acceptable Use Policy / ICT Policy 

Acceptable Use Policy/ICT Policy

Information Technology > Internet > Acceptable Use Policy/ICT Policy

Application of Safe Use of Tools and Equipment 

Information Technology > Student Use > Application of Safe Use of Tools and Equipment 

Appropriate Use of Information 

Information Technology > Internet > Appropriate Use of Information 

Bullying and Harassment

Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Information Technology > Internet > Bullying and Harassment 

Development of Safe Interactive Environments 

Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Information Technology > Internet > Internet Attacks and Abuse 

Negative Impact

Information Technology > Internet > Negative Impact

Negative Impact 

Information Technology > Internet > Negative Impact 

On-line Etiquette 

Information Technology > Basic Operations and Concepts > On-line Etiquette 

Risks and Benefits of Use 

Information Technology > Mobile Applications > Risks and Benefits of Use 

Safety

Information Technology > Internet > Safety

Safety 

Information Technology > Internet > Safety 

Social Networking 

Information Technology > Internet > Social Networking 
Show More

Teacher Notes:

  • Lead discussion with class on “Reporting versus Snitching.” Tattling or snitching is trying to get someone in trouble, reporting is trying to help someone or try to prevent someone from being hurt. No one deserves to be treated badly, if someone is treated badly and it isn't reported, things will just keep getting worse and people will be hurt more (Case example of Bystander Effect or Genovese Syndrome, http://www.youtube.com/watch?v=JozmWS6xYEw, and http://en.wikipedia.org/wiki/Kitty_Genovese). Very Important: Have students engage in class discussion about how they can support and befriend people that are being cyberbullied. Research shows the incredible value to victims that this has, and that because of embarrassment some victims prefer private support over public.

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
1A-IC-17 Work respectfully and responsibly with others online. (P2.1)
1A-IC-18 Keep login information private, and log off of devices appropriately. (P7.3)
1B-NI-05 Discuss real-world cybersecurity problems and how personal information can be protected. (P3.1)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback