Unit 3.2. Protect: Safety/ Security

What is Digital Safety/Security?

Digital Security (self-protection):   electronic precautions to guarantee safety.

"In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm."

Lesson Topics

Each numbered section in the right column begins a 20-minute lesson with the following topics:

3.2.a. Online Safety

3.2.b. Passwords

3.2.c. Profiles

3.2.d. Predators

3.2.e. Sharing Information

Lesson Format

1. Video: View the video or Web page

2. Essential question: The student facilitator poses the question or issue you are to consider

3. Think / Ink: Individually think about your personal reaction to the video and write your response to the essential question on your Journal page. 5 minutes.

4. Discuss: Participate in a class discussion comparing your response to that of other students. 5-10 minutes.

5. Conclusion: The facilitator can summarize and present a possible consensus to the question, or decide to disagree. 2 minutes. Collect student Journals.

Lessons

3.2.a. Online Safety

.

Video: Watch this YouTube video, "Playing and Staying Safe Online."

Essential questions:  Do you think any of these rules are dumb and don't apply to you? If you wouldn't step off a curb in front of a car, then why would you deliberately take risks online? Do you think you'll be safe online, no matter what?

Think/Ink and Discuss

3.2.a. Online Safety

.

Video: View this OnGuardOnline.gov video, "The Protection Connection," on how to keep things private.

Essential questions: Do you get what the video is saying? Do you know someone who is careless? Are you afraid you won't be "cool" if you tell them?

Think/Ink and Discuss

3.2.a. Internet Safety

.

Web game/review: Take time on your own for few games of "Internet Safety Hangman."

3.2.b. Passwords

.

Video: View this YouTube video, "4 Tips for Making Online Security Passwords..."

Activity:

1) In your Journal or on a piece of paper, write an example of each of the four criteria needed for a good password: upper case letter, lower case letter, number, symbol.

2) Begin with a simple word, such as: students.

3) As you come to each letter, change it to one of the four criteria. For example: students = $tud3nT$.

4) Now choose your own word and create a "good" password. Remember, NEVER use your name, even when encrypted.

3.2.c. Profile

.

Video: View this (You Tube link) NSTeens video (click link), "Profile Penalty."

Essential question: What kind of information is in a personal profile? What are the dangers of sharing profile information? For example, would you send out a tweet with your Social Security number?

Think/Ink and Discuss

3.2.c. Profile and Privacy

.

Video: View this short YouTube video, "Online Safety- Little Red Riding Mood Chap.2."

Essential question: How are you acting like Little Red Riding Hood? Are wolves waiting to grab guys as well as girls, people young or old? What can you do differently to be keep your profile information safe?

Think/Ink and Discuss

3.2.d. Predators

.

Video: Watch this NSTeens video, "Julie's Journey." (Or try the YouTube link).

Essential question: At what point did Julie cross the line between being uncomfortable and being in a dangerous situation? Have you ever felt uncomfortable online? Did you ignore the warning? 

Think/Ink and Discuss

3.2.d. Predators

.

Video: View this YouTube video, "Child Internet Safety PSA--Online Predators" to see the points-of-view of the victim and the predator.

Essential questions: Have any friends ever told you any of the excuses for online friendships seen in this video? Did you join in or did your red flags go up? Discuss what you would have said to the girl. 

Think/Ink and Discuss

3.2.e. Sharing Information

.

"Say it, forget it. Write it, regret it." (Mares, Sierra MS) Watch this YouTube video, "Exposing Private Information Online," and think about how it relates to that quote. Share thoughts about how information about you may already be out of your control. Is that scary? What can you do?

3.2.e. Sharing... too much!

.

Video: View this brief YouTube video, "Share With Care." Then look at this article, "Teens, Social Media, and Privacy," about the types of information teens are sharing.

Essential questions: When is sharing NOT caring? Do kids not care about who sees the nasty stuff they post? What don't they get?

Think/Ink and Discuss

3.2.e. Sharing Information

.

Video: View "Sharing Information: A Day in Your Life."

Essential questions: Is sharing out of control? It certainly seems to be out of YOUR control! Or is it? What can you do?

Think/Ink and Discuss

3.2.e. Sharing Information

.

Video: View this YouTube video, "Protecting Kids on Social Networks."

Essential questions: Are you billboarding yourself? Are you then your own worst enemy and fooling yourself that sitting alone and sharing on your computer means you are not really sharing...with the whole world?

Think/Ink and Discuss

3.2.e. Sharing Consequences

.

Video: View this NetSmartz Workshop YouTube video, "Teens Talk Back Offline Consequences."

Essential questions: If you think, "It won't happen to me," think again. Is it cool to tempt fate? What are the consequences of online risks compared to being safe?

Think/Ink and Discuss

 

3.2.e. Sharing Consequences

.

Video: View this YouTube video, "Once Posted, You Lose It."

Essential questions: Have you ever said, "I'm sorry. I take it back." Have you ever wished you could reset time to an instant before an accident? What is the best way to avoid the situation in this video?

Think/Ink and Discuss