Safety

Connectivity, Sign-In and Warm-up    


"With great power comes great responsibility"

                                                     ~ Uncle Ben

YouTube Video


"What Happens when you give a

bad guitar player a bigger amplifier?"
 

                                                                               ~Jason Ohler

YouTube Video

YouTube Video



Essential Questions

What is the context of safety?

How can we be safe?

How should we handle inappropriate online talk?

How can we keep our information secure?


Inventory/Baseline

 "How many of us chat online?" "How many are regular users of Facebook or other social networking sites?"


How Dangerous Is It?

100 Schools

To Catch a Predator

YouTube Video



Safety Threats Overblown
MacArthur Report:  Digital Youth Project   (Summary)
Nancy Willard: Techno-Panic and 21st Century Education
Nancy Willard: A Briefing for Educators: Online Social Networking Communities & Youth Risk

Elza Dunkels:

YouTube Video



Anne Collier:

YouTube Video


Connect Safely 3.0 - Empowering and Protecting Youth


Three Kinds of Online Safety



Common Sense Media Resources



Unit: Safety Download a full unit overview

Students learn that the Internet offers great ways to visit new places, learn new things, and collaborate with others worldwide. They learn to follow rules about safety online, such as not revealing private information without a parent or guardian's permission.

Going Places Safely (K-1)

How do I go places safely on the computer? Students learn that they can go to exciting places online, but they need to follow certain rules to remain safe.

Download lesson plan and handout

Staying Safe Online (2-3)

How do you stay safe when you visit websites? Students understand that they should stay safe online by choosing websites that are good for them to visit, and avoid sites that are not appropriate for them.

Download lesson plan and handout

Talking Safely Online (4-5)

What's the difference between Internet friends and real-life, face-to-face pals? Students learn that while they can develop friendships on the Internet, they should never reveal private information to a person they know only online.

Download lesson plan and handout

Unit: Security Download a full unit overview

Students learn several ways to keep their information secure online. They learn how to: create and keep secure passwords, handle spam or unwanted messages, be cautious about the enticing offers they see on websites, and recognize privacy policies and seals of approval on children's websites.

Keep it Private (2-3)

What kinds of information should I keep to myself when I use the Internet? Students learn that many websites ask for information that is private and discuss how to responsibly handle such requests.

Download lesson plan (this lesson has no handout)

Powerful Passwords (4-5)

How do you create a secure password? Students explore reasons why people use passwords and discover strategies for creating and maintaining strong, secure passwords.

Download lesson plan and handout

You've Won a Prize (4-5)

What is spam, and what can you do about it? After students learn what spam is and the forms it takes, they identify strategies for dealing with it.

Download lesson plan and handout

Privacy Rules! (4-5)

How do you know if a website protects your private information? Students learn to identify secure sites by looking for their privacy policies and privacy seals of approval.

Download lesson plan and handout


Safety (6-8)

Students explore the benefits and risks of online talk. They learn about the rewards of communicating online, but also how to recognize inappropriate contact. Students learn how to apply commonsense tips to online talk, and to stay safe when they connect with others.

Lessons in this unit



Security (6-8)

Students learn strategies for managing their information online to keep it secure. They learn how to guard against identity theft, keep their property safe from hacking and malware, and protect themselves from phishing.

Č
Ċ
Jim Burke,
Jan 31, 2011, 5:08 PM
Ċ
Jim Burke,
Jan 29, 2011, 10:57 AM
Ċ
Jim Burke,
Jan 29, 2011, 10:50 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:11 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:11 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:11 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:12 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:45 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:46 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:12 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:12 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:12 AM
Ċ
Jim Burke,
Feb 1, 2011, 5:12 AM
Ċ
Jim Burke,
Jan 29, 2011, 8:33 AM
Comments