320px-Computer-aj_aj_ashton_01_svg.png

High School CyberSafety Curriculum (Grades 9-12) home.png


PASD High School CyberSafety
Curriculum Lesson Topics
cybersafety.jpg



Unit
Grade 9
Grade 10
Grade11
Grade 12
Digital Citizenship
Teens' Online Rights
Cyberbullying
Acceptable User Policy
Unethical Online Behaviors &
Identity Theft
Digital Security
Making Sure Your Online
Image Sends the Right Message
Creating a Safe Online Profile
Be Aware of Online Predators
Online Social Networking
Digital Communication
Safe or Unsafe Communication
Texting & Distracted Driving
Sexting
Cellphone Use & Distracted Driving
Digital Media
Copyright & Fair Use
Copyright & Music Downloads
Peer to Peer File Sharing (P2P)
Research & Plagiarism

PASD CyberSafety High School Lesson Plans E-Book



To document your CyberSafety teaching, click here for the online form.

Contact Melanie Wiscount, Cyber Safety Curriculum Committee Member at melanie_wiscount@pasd.us for questions or comments

CyberNetrix - Internet Safety for Secondary Schools Complete with Six Interactive Learning Activities

Student creates an avatar & bedroom simulation, which is creates a virtual environment

for the student to learn about how to be safe and secure on the Internet.

CyberNetrix Interactive Learning Activities -

Chat room, mobile phone, Play Three Quizzes, Create Personal Action Plan
CyberNetrix Learning Interactive

Teacher Resources

Teacher Resources Link

Teacher Guide


Lesson Plans:

Banner Activity
Lesson Objectives:
Students will be able to:
  • understand key safety hints related to using internet or mobile technologies
  • understand the strategies used to communicate effectively using internet media

Cyber Guru Activity
Lesson Objectives:
Students will be able to:
  • understand the issues and risks confronting young people and their use of the internet and mobile technologies
  • understand the process of drafting and storyboarding concepts prior to animating them

Profiling Activity
Lesson Objectives:
Students will be able to:
  • understand that people they meet online are not always who they say they are
  • determine strategies they can use to respond to people they meet online who make them feel uncomfortable or threatened
  • prepare a brief creative writing piece based on a character profile
  • design and ask open and closed questions in a simple interview

Publishing IT Activity
Lesson Objectives:
Students will be able to:
  • understand the conventions of developing an online newspaper
  • understand safety issues affecting young people and their use of internet and mobile technologies

RUL-WU? Activity
Lesson Objectives:
Students will be able to:
  • identify the technologies their peers are using regularly and how they are using them
  • determine safe online behaviors and apply strategies for dealing with unsafe situations
  • make informed decisions about their behaviors and the risks they take when using the internet and mobile technologies
  • understand the structure and function of surveys and the process of data collation, analysis, and reporting

TXTA3 Activity
Lesson Objectives:
Students will be able to:
  • understand and use the common conventions in contemporary text language
  • convey key messages & information relating to safe and ethical use
    of the internet & mobile technologies

Case Studies:
Jeremy's Friend - Grooming & Luring
Lesson Objectives:
Students will be able to:
  • recognize some of the techniques used by online predators to groom and lure others
  • identify the dangers of meeting online friends and recognize the need to meet them with a supervising adult present
  • apply strategies to protect themselves from online predators

Lauren's Ordeal - Cyberbullying

Lesson Objectives:
Students will be able to:
  • identify some of the potential impacts of cyberbullying
  • list their rights and responsibilities in relation to cyberbullying
  • apply strategies to protect themselves from cyberbullying

Stalking Sarah - Cyberstalking
Lesson Objectives:
Students will be able to:
  • identify some of the potential impacts of cyberstalking
  • evaluate how much personal information they have online
  • apply strategies to protect themselves online

What's the ? - Online Scams & Identity Theft
Lesson Objectives:
Students will be able to:
  • identify potential issues related to online scams and identity theft and the likely consequences
  • complete a personal online safety audit and then develop an online security action plan
  • apply a range of strategies for avoiding online scams and identity theft


High School CyberSafety Curriculum Grade 9




Unit

Topic

Lesson

Resources

Digital Citizenship- understanding, practicing, and respecting
- rights & responsibilities, while making
- ethical & accountable decisions when online
Teen's Online Rights
Lesson Outline:
Lesson Objectives -
  • Complete a survey about the rights of parents and guardians to monitor teens’ conversations and discuss the survey results as a class.
  • Examine the arguments for parents “listening in” on their teenager’s online conversations by reading and discussing “The Undercover Parent.”
  • Explore the dangers that teens face online by reading and discussing reports on teen Internet activity.
  • Draft contracts with the help of parents or guardians detailing how concerns of online safety and privacy will be addressed in practice.
Introduction -
  • Students take Teens' Online Rights Survey
  • Analyze the students' answers by asking the post-survey questions in the lesson.
Instruction -
  • As a class, read "The Undercover Parent" and discuss asking the questions in the lesson.
  • Divide the class into six groups. Give each group a different report from the Pew Internet and American Life Report (see Readings for links). Have the groups each read their report and answer the questions in the lesson.
Assess -
  • Have students work with a parent or guardian to draft a contract about issues of Internet safety and privacy. Their contract should use the following format: “I _, understand that my parent or guardian’s concerns about my Internet safety and privacy are as follows… and I _, understand that my child’s concerns about Internet safety and privacy are as follows… The following are solutions that we have agreed to in order to address both of our concerns about Internet safety and privacy…” To accompany this contract, have students write an introduction that explains the process of creating the contract with their parent or guardian and what they believe the value of the contract is. Make sure they address what will make this contract binding. In an upcoming class, students can share the terms of the contracts they drafted.
Extensions -
  • Have students visit the computer lab activities.
  • Create a “How-It-Works” poster that explains spyware. What are the different uses for spyware? What are the moral and ethical questions raised by spyware?
  • Create a contract between students about Internet etiquette, safety and privacy. Since so many means of personal identification and communication (photos, videos, chatroom or instant message conversations) can be posted online without the knowledge of the subject, students should agree about what is acceptable to post online and what is not. This contract can be presented at an all-school assembly and signed by all students.
  • Create a fact sheet that provides information about the recent issues about governmental “spying” and terrorism. What ethical and constitutional issues have arisen around this issue?
  • Write a short story that addresses the tensions between freedom/ independence and safety/protection in the parent-teen relationship. Make sure to approach the issue from both points of view
  • Show the presentation, "Protecting Teens on the Internet: Gaps & Agreements in Perceptions Between Parents and Teens" by Pew Internet & American Life Project
Interdisciplinary Connections
  • See lesson plan for connections to the following disciplines.
    • American History
    • Journalism
    • Mathematics
    • Business Education
Link to Lesson:
http://learning.blogs.nytimes.com/2008/03/17/cyberspies-in-cyberspace/

Handouts:
Teens' Online Rights Survey

Videos:


Readings:
"The Undercover Parent" by Harlen Coben, March 17, 2008 - NY Times
http://www.nytimes.com/learning/teachers/featured_articles/20080317monday.html

Group Readings by the Pew Internet & American Life Project
http://www.pewinternet.org
Group One:
Trust & Privacy Online
http://www.pewinternet.org/Reports/2000/Trust-and-Privacy-Online.aspx


Group Two: Social Networking Sites and Teens:
http://www.pewinternet.org/Reports/2007/Social-Networking-Websites-and-Teens.aspx



Group Three: Teens, Privacy. Online Social Networks: http://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks.aspx


Group Four: Cyberbullying and Online Teens: http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx


Group Five: Teens and Social Media: http://www.pewinternet.org/Reports/2007/Teens-and-Social-Media.aspx


Group Six: Teens and Online Stranger Contact: http://www.pewinternet.org/Reports/2007/Teens-and-Online-Stranger-Contact.aspx


Presentations:
http://www.pewinternet.org/Presentations/2005/Protecting-Teens-on-the-Internet.aspx

Computer Lab Activities:


Back to Top
Digital Security
- exercising precaution & protection while
- making safe & secure decisions when online
Making Sure Your Online
Image Sends the Right Message

Lesson Two:
Promoting Ethical Behavior Online: Our Values & Ethics
Lesson Outline:
Lesson Objectives -
  • Analyze situations in which teens' social networking profiles are viewed by authority figures.
  • Describe four characteristics of social networking sites that cause them to be very public spaces.
  • Use creative thinking to find ways to deal with unintended online audiences.

Introduction -
1. Show students Think Before You Post video
2. Have students think of 3 places they have been this week. Ask them to draw three circles and label each circle with one of the places.
3. Have students write a description of their image in each circle depending on the place they are in at the time.
Instruction -
1. Analyze the Problem - cut apart scenario cards on Student Sheet 1. Give one card to a student group of 3/4. Have students in each group read & discuss their scenario & question.
2. Think About It - Cut apart the matching cards on Student Sheet 2. Have groups think about it & discuss. Have student groups create a quick presentation of the Problem & Thinking of their scenario cards to the class.
- Distribute Student Sheet 3 & talk about what "audience" means online. Make students aware that what may be deleted in a profile is usually archived by one or more parties. After information is put online, that information can never be reclaimed due to its digital nature.
3. Find Solutions - Ask students questions in lesson under Find Solutions.
4. Take Action - Have students write five tips to print in a brochure about safeguarding one's image online. The audience for the brochure will be high school students.
Assess -

  • Ask: What audiences other than teens might be interested in viewing teens' social networking profiles? Why?
  • Ask:What characteristics make social networking sites very public spaces?
  • Ask: What are some solutions for dealing with unintended online audiences?
Extensions -
See lesson for various extensions to this lesson.
  • Have students create an avatar to safely represent themselves online in discussion forums, social network sites, or profile picture on Moodle.
  • Show students Think Before You Post 2 video.
  • Read & Discuss "Reputation Management and Social Media" report by Pew Internet Report
  • Have students visit the computer lab activities.
Link to Lesson One: http://cybersmartcurriculum.org/safetysecurity/lessons/9-12/your_online_image/
Link to Lesson Two:http://www.media-awareness.ca/english/resources/educational/lessons/secondary/cyberbullying/cyberbullying_behaviour.cfm Student Sheets 1-3:


Create Your Own Avatar Websites:
http://www.voki.com/
http://www.befunky.com/
http://www.mms.com/us/becomeanmm/create/
http://www.reasonablyclever.com/?page_id=34

Videos:
Go to the wiki's Video Page for videos in player
Think Before You Post.mov
Think Before You Post 2.mov

Readings:
Reputation Management and Social Media" by the Pew Internet Report
http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx



Computer Lab Activities:
Have students read - "Putting Stuff Up Online That You Wish You Hadn't..." at http://www.thinkuknow.co.uk/11_16/control/


Back to Top
Digital Communication- communicating with others
- through the use of technology while
- practicing etiquette & civility and making
- conscientious & honorable decisions when online
Safe or Unsafe Online Communication - Jenny's Story
Lesson Outline:
Lesson Objectives -
  • To raise students' awareness of potential risks, especially online grooming, when using interactive internet applications.
  • To help students reflect on own behavior.
  • To inform students of strategies they can employ to prevent difficulties online.
Introduction -
  • Start with a general discussion about chatrooms, instant messaging, and emails.
  • Students complete pre-film questionnaire

Instruction -
  • View Jenny's Story
  • Revisit pre-film questionnaire
  • Discuss how to get out of difficult situations online - see questions in lesson plan
Assess -
Extensions -
  • Students can complete any of the computer lab activities on the right.
  • Have students visit the computer lab activities.
Lesson Plan:

Lesson Booklet:

Online Quiz:
Instant Messenger Safety - http://www.chatdanger.com/messenger/

Chatroom Safety -
http://www.chatdanger.com/chat/

Safe or Unsafe Email Quiz - http://www.thinkuknow.co.uk/11_16/everythingelse/games/emailquiz/

Websites:
Teen Chatroom Acronyms
http://www.safesurfingkids.com/chat_room_internet_acronyms.htm

Internet Emoticons
http://www.safesurfingkids.com/chat_room_emoticons.htm

Internet Slang & Symbols
http://www.safesurfingkids.com/interpreting_internet_slang.htm

Interpreting Online Slang, Numbers, Words & Symbols
http://www.safesurfingkids.com/online_slang_number_symbols.htm

Computer Lab Activities:
Email Safety on ChatDanger.com - http://www.chatdanger.com/email/

Chatroom Game - Your Call -
http://www.childnet-int.org/yourcall/

Instant Messenger Game - Who's Ya Buddy?
http://www.thinkuknow.co.uk/11_16/everythingelse/games/buddy/

Spam Swatter Online Game - Can you Spy Spam Email? - http://www.thinkuknow.co.uk/11_16/everythingelse/games/spam/

Hard Copy Resources (Note: Do not have to distribute KidSmart Cards or leaflets; ordering information for families) :
Keep Smart Cards and Parent Leaflets
http://www.childnet-int.org/downloads/js_lessonplan.pdf

Back to Top
Digital Media- using others' created works while
- making legal & proper decisions when online
Lesson One: Understanding Copyright - A Lesson on Copyright & Fair Use


Lesson Two: Copyright Web Quest (Parts I-III)
Lesson Outline:
Lesson Objectives -Students will understand: * that copyright law is designed to promote creativity and the growth of knowledge by considering both the rights of owners and the rights of users
  • how fair use ensures that copyright law does not limit First Amendment rights
  • the ways in which copyright law has expanded to protect owners over a period of time
  • that the flexibility of fair use enables it to be relevant and useful to many different kinds of creative communities
Introduction -
Find out what students know about copyright.
Instruction -
  • Listen to Copyright Song. With lyrics sheet, do a pair~share about how their understanding of copyright might have changed.
  • Combine two pairs of students for group of four. Have half of the student pairs read first reading and the other half of students read second reading in pair groups.
  • Students discuss readings in their four-person group and then one person from each group (reporter) gives one statement found in reading that his group found interesting. Group reporters can not repeat other group reporters statements.
  • View Users Rights, Section 107 video on Fair Use
  • Distribute to students the Fair Use Chart for using media in school projects
  • Encourage critical thinking by asking students why they believe copyright concerns have increased in the past five years. Ask students what can be done to encourage students to abide by copyright and fair use legislation.
Assess -
  • Ask students to create a presentation or cartoon about spreading the message of copyright importance and the reasons why copyright and fair use should be followed when using others' created works in student projects and assignments.
Extensions -
  • Distribute the Document the Fair Use Reasoning Process handout. Students should consider these questions when deciding to use others' created works.
  • Have students visit the computer lab activities.
  • Carry on a debate with students who are for and students who are against downloading music illegally. Use the debating websites on the left for supplemental materials.
Link to First Lesson:
http://mediaeducationlab.com/section-1-understanding-copyright

Link to Second Lesson: Parts I-III
https://mail.nvnet.org/~cooper_j/Plagiarism/

Link to Music Videos: Copyright, What's Copyright - http://mediaeducationlab.com/section-1-understanding-copyright

Fair Use, Users Rights, Section 107 - http://mediaeducationlab.com/music-video-users-rights-section-107

Song Lyrics:

Readings:
"Understanding Copyright"

"Copyright Readings"

"The Purpose of Copyrights" by Lydia Pallas Loren on Open Spaces Quarterly -
http://www.open-spaces.com/article-v2n1-loren.php

"Computer Basics" by US Government Copyright office - A good comprehensive resource connecting copyright, fair use, and computers - http://www.copyright.gov/circs/circ1.pdf

"From Artist to Audience" booklet by WIPO - World Intellectual Property Organization
http://www.wipo.int/freepublications/en/copyright/922/wipo_pub_922.pdf


Handout:

Public Domain Media Sites:
http://www.readwritethink.org/files/resources/lesson_images/lesson1085/PDSources.html

Websites:
Student Guidelines for Multimedia and Web Communication - http://www.sdst.org/shs/library/guidelines.html

Copyright Friendly Media - http://www.sdst.org/shs/library/cfimages.html

Public Domain Media - http://www.readwritethink.org/files/resources/lesson_images/lesson1085/PDSources.html

Debating Music Piracy Links
http://www.readwritethink.org/files/resources/lesson_images/lesson855/Download-Sites.html
Computer Lab Activities:
Copyright Web Quest -
Parts I-III
https://mail.nvnet.org/~cooper_j/Plagiarism/

Back to Top

High School CyberSafety Curriculum Grade 10



Unit

Topic

Lesson

Resources

Digital Citizenship-understanding, practicing, and respecting
- rights & responsibilities, while making
- ethical & accountable decisions when online
Cyberbullying

First Lesson:
Connected, 24/7


Second Lesson:
Let's Fight Together

Third Lesson:
Cyberbullying
Lesson Outline:
Lesson Objectives -
  • Analyze online behaviors that could be considered cyberbullying.
  • Generate multiple solutions for dealing with a cyberbullying situation.
  • Communicate positives and negatives related to Internet and cell phone technologies by teens.
Introduction -
  • Show students the video, Bullied to Death: They Committed Suicide Because of Bullying

  • Discuss with high school students how eager middle school students are to join social networks. Ask students what advice would they offer middle school students about joining social networks?
Instruction -
  • What's the Problem - distribute handout and have students read about Nicole and social networking; have students answer questions, and then share answers and stories about their own experiences, if they feel comfortable doing so.
  • Have students read Megan's story - http://www.meganmeierfoundation.org/story/
  • Have students read Ryan's story - http://www.ryanpatrickhalligan.org/
  • Think About It - Look at some of the statistics about cyberbullying and ask students how cyberbullying affects teens.
  • Find Solutions - Have students complete the rest of the handout with a partner brainstorming how to handle, prevent, and control cyberbullying in your circle of friends. Have partners share their solutions with the class by doing role-play scenarios.
  • Take Action - Have students write letters to their guidance counselor, principal, nurse, homeroom teacher, or one of the teachers they have or had in school about cyberbullying amongst the student body without naming names. Have students provide concerns, questions, and solutions to prevent and decrease cyberbullying in the student body.
Assess -

  • Ask: What are some advantages and disadvantages of 24/7 communications technologies?
  • Ask: What are some reasons that schools might need to get involved in resolving technology-related incidents?
  • Ask: What should parents, teachers, and other community members know about teen use of Internet and cell phone technologies?
Extensions -
Link to First Lesson:
http://cybersmartcurriculum.org/cyberbullying/lessons/9-12/connected_247/

Link to Second Lesson:
Cyberbullying by digizen.org.uk
http://www.digizen.org.uk/downloads/cyberbullying_lesson.pdf

Teacher's Guide for second lesson from digizen.org.uk
http://www.digizen.org.uk/cyberbullying/film.aspx

Link to Third Lesson:
Cyberbullying by Digital Citizen
http://www.nisd.net/digitalcitizen/sec_digcit/cyberbully_9_12.htm

Links to Three Mini Cyberbullying Lessons
Parts I, II, & III - High School Version - http://www.netsmartz.org/resources/reallife.htm

Handouts:
http://cybersmartcurriculum.org/assets/files/activitysheets/9-12/Connected_247.pdf


Videos:
Bullied to Death: They Committed Suicide Because of Bullying
http://www.youtube.com/watch?v=gE5yINOn4N4&feature=related

Cyberbullying Films - digizen.org.uk
http://www.digizen.org.uk/cyberbullying/film.aspx

Let's Fight It Together - http://www.digizen.org.uk/cyberbullying/fullfilm.aspx

Readings:
Megan's Story - http://www.meganmeierfoundation.org/story/
Ryan's Story - http://www.ryanpatrickhalligan.org/

Cyberbullying the Virtual Menace, by Dr. Sheri Bauman
http://www.ncab.org.au/Assets/Files/Bauman,%20S.%20Cyberbullying%20the%20virtual%20menance.pdf


Teens & Cyberbullying - A Report from the National Crime Prevention Council
http://www.ncpc.org/resources/files/pdf/bullying/Teens%20and%20Cyberbullying%20Research%20Study.pdf


PowerPoint Presentation:
Cyberbullying 2010: What the Research is Telling Us by Pew Internet & American Life Project
http://www.pewinternet.org/Presentations/2010/May/Cyberbullying-2010.aspx


Websites:
Make a Difference for Kids - Statistics, stories, real stories, and all the information you wanted to know about cyberbullying.
http://www.makeadifferenceforkids.org/cyberbullying.html

CyberSmart Cyberbullying Prevention Activities for Schools, Families, & Communities - http://cybersmartcurriculum.org/cyberbullying/prevention/

Computer Lab Actitivites:
Cyberbullying Interactive
http://www.cyberbullying.info/

Are You a Responsible Digital Citizen? Interactive
http://www.digizen.org.uk/cyberbullying/interactive/default.aspx

budd:e Interactive
https://budd-e.staysmartonline.gov.au/secondary/main.php


Back to Top
Digital Security- exercising precaution & protection while
-making safe & secure decisions when online
First Lesson:
Creating a Safe Online Profile


Second Lesson:
Naming in a Digital World: Creating a Safe Persona on the Internet
Lesson Outline:
Lesson Objectives -
  • Students learn how to carry on conversations online in a safe and responsible manner.

  • Students learn how to be cautious and private about information about themselves that may put them in harm's way.

Introduction -
  • Discuss the kind of information people post online. Ask teens to talk about information people post on profiles, status updates, and blogs. Have teens talk about what people who read this information online might say or do.

Instruction -
  • Ask teens to talk about whether it's safe to post personal information online. Talk about how online predators can use personal information to locate someone at home, school, and work.
  • Talk to the teen about how to choose a safe nickname.
  • Use the Online Profile Tips to talk about information teens can usually share safely. Talk about how the tips also apply to blogs, email, and instant messages (IMs). Document also available in resources.
Assess -
  • Practice creating a safe profile with the Profile Publisher. URL available in resources.
  • Have students assess each others' profiles and give advice for keeping a safe profile.
Extensions -
  • Profile Penalty Video & Activities - video on wiki page and lesson in resources
  • CyberNetrix game - Internet Safety for Secondary Schools
  • Read & Discuss the "Digital Footprints" report from the Pew Internet Report
Link to First Lesson:
How to be Safe Online, by Read_Write_Think -
http://www.readwritethink.org/parent-afterschool-resources/tips-howtos/safe-online-30119.html

Link to Second Lesson:
Naming in a Digital World: Creating a Safe Persona on the Internet
http://www.readwritethink.org/classroom-resources/lesson-plans/naming-digital-world-creating-843.html?tab=4#tabs

Handouts:
Online Profile Tips


Profile Penalty by NS Teens - http://www.nsteens.org/en/TeachingMaterials

Readings:
"Digital Footprints" from Pew Internet Report
http://www.pewinternet.org/Reports/2007/Digital-Footprints.aspx


"Your Resume May Be Overshadowed by Your Online Personal" by - http://www.privacyrights.org/ar/OnlinePersona.htm
Computer Lab Activities:

Profile Publisher
http://www.readwritethink.org/files/resources/interactives/profile/

Profile Publisher Instructions -http://www.readwritethink.org/parent-afterschool-resources/games-tools/profile-publisher-a-30243.html

Cyber Netrix - Creating a Safe Online Profile & Image
http://www.cybersmart.gov.au/cybernetrix/index.html

Link to Extension Profile Penalty Lesson
http://www.nsteens.org/en/TeachingMaterials


Back to Top
Digital Communication-communicating with others
- through the use of technology while
- practicing etiquette & civility and making
- conscientious & honorable decisions when online
First Lesson:
Texting - Few Words but Lots of Meaning

Second Lesson: Texting & Distracted Driving - Safe Driving
Lesson Outline:
Lesson Objectives -
  • Students will understand texting etiquette and know what is unethical in the use of a cellphone
Introduction -
  • Ask how many students prefer text messaging over other types of communication. Ask students why or why not?
  • Show students statistics about text messaging.
Instruction -
  • Read Text Rage and see what emotions are escalating with teens and cellphone use
  • Read Text Rage Quick Tips to prevent emotions from getting the best of students and adults
Assess -
asdf
Extensions -
  • Have students text an essay after given a prompt. Ask for volunteers to read their essays to the class. Ask students if they liked or disliked this way of composing an essay, and why?
  • Show students the Texting Championship website, or hold your own Texting Championship while students compose a writing for your curriculum. Make sure you set rules as to what they are allowed to use in text language.
  • Have students visit the computer lab activities.
Link to First Lesson:
http://www.safeteens.com/

Link to Second Lesson:
See website

TextEd Website:
http://ht.ly/2gmxb
http://www.wiredsafety.org/safety/chat_safety/phone_safety/sms7.html

Readings:

Websites:
Text Etiquette, Text Rage, and Text Rage Quick Tips - http://ht.ly/2gmxb

Text Messaging Statistics -
number over the past 15 years - http://www.ctia.org/advocacy/research/index.cfm/AID/10323

DTXTR - Detect Text - Translate text messages to see what they say - http://ht.ly/2gmxb

Text Championship - http://ht.ly/2gmxb

Back to Top
Digital Media- using others' created works while
making legal & proper decisions when online
Copyright & Music Downloads
Lesson Outline:
Lesson Objectives -
Students will
  • understand why downloading music illegally is:
    • against the law with consequences
    • limits music quantity and quality in the future
  • understand the role RIAA plays in protecting the created works of musicians
  • learn to effectively debate by:
    • evaluating Websites and online information.
    • extracting main ideas and supporting details from online resources.
    • analyzing arguments for and against a position, paying particular attention to the role of point of view.
    • taking a stance on a controversial issue, based on their research.
    • defending their positions in classroom debate, providing supporting facts and details for their arguments.
Introduction -
Take an anonymous survey to see how many students have downloaded music illegally in the past; what sites they have gone to do this; why they do it?
Instruction -
There are ten different lessons in this unit. Each has its own instruction and assessment. All the resources are listed in the Resources of this lesson.
Assess -
There are ten different lessons in this unit. Each has its own instruction and assessment. All the resources are listed in the Resources of this lesson.
Extensions -
Link to Lesson:
UNIT of ten lessons:
http://www.readwritethink.org/classroom-resources/lesson-plans/copyright-infringement-debate-over-855.html

Printable Version of lesson unit - http://www.readwritethink.org/resources/resource-print.html?id=855

Handout/Booklet:
Young People, Music, and the Internet by RIAA


Debate Rubric
http://www.readwritethink.org/files/resources/lesson_images/lesson819/rubric2.pdf


Point of View Chart
http://www.readwritethink.org/files/resources/lesson_images/lesson855/Pointofviewchart.pdf

Online Interactives about Music Piracy:
Analyzing Opinions on Music Downloads
http://interactives.mped.org/view_interactive.aspx?id=679&title=

Debating Music Downloads
http://interactives.mped.org/view_interactive.aspx?id=678&title=

Different Perspectives of People Involved with Music Downloads and Intellectual Property
http://interactives.mped.org/view_interactive.aspx?id=682&title=

Persuasion Map
http://www.readwritethink.org/files/resources/interactives/persuasion_map/
Note: Test the Persuasion Map on your computers to familiarize yourself with the tools and ensure that you have the Flash plug-in installed. You can download the plug-in from the technical support page.

Point of View Chart
http://interactives.mped.org/view_interactive.aspx?id=682&title=

Debate Roles & Rules
http://web.archive.org/web/20060503194518/http:w3.tvi.edu/~cgulick/roles.htm


Websites:
New to Debating?
This site has everything you need to hold a strong debate - http://debate.uvm.edu/

Debate Over Music Downloading Music Links
http://www.readwritethink.org/files/resources/lesson_images/lesson855/Download-Sites.html

RIAA (Recording Industry Association of America) - http://www.riaa.com/

RIAA and its Purpose - http://www.riaa.com/faq.php

RIAA Legal Music Download Sites - http://www.riaa.com/toolsforparents.php?content_selector=legal_music_sites

RIAA Tools for Parents & Educators
http://www.riaa.com/toolsforparents.php

Music Download Warning List
http://www.cdt.org/copyright/warninglist

RIAA Music Consumer Profile Report
http://www.riaa.com/keystatistics.php?content_selector=MusicConsumerProfile

Computer Lab Activities:
Free Music Downloads - Jamendo.com
http://www.jamendo.com/en/

Back to Top

High School Cybersafety Curriculum Grade 11




Unit

Topic

Lesson

Resources

Digital Citizenship- understanding, practicing, and respecting
- rights & responsibilities, while making
- ethical & accountable decisions when online
Acceptable User Policy - Know Your Responsibilities
Lesson Outline:
Lesson Objectives -
  • Students will learn what an AUP is, why a district creates, follows, and enforces and AUP, and how it benefits all users to the network.

Introduction -
  • Project for students the PASD AUP (Acceptable User Policy)
  • Read over three parts you believe would be of interest to the students
  • Remind students that they and their parents signed the AUP in the beginning of the school year.
  • Ask how many truly read the PASD AUP before signing?
Instruction -
  • Distribute AUPs handout and read with class. Discuss what an AUP, why a school creates and puts into practice an AUP, and what is an AUP expected to do.
  • Project for students the website which outlines the structure of a school AUP
  • Go to the Sample AUPs website. Click on five different AUPs and ask students what they like and what they do not like and why.
Assess -
  • Students will go through the PASD AUP (in Student Handbook) and choose five rules and responsibilities that they believe are most important. Have students give a specific reason why each one is important.
Extensions -
  • Have students look over PASD AUP and see where they would make changes or additions to the AUP. Ask they to justify their requests.
  • Have students visit the computer lab activities.
Link to Lesson:
See handout

Handouts:
AUPs - http://www.isafe.org/imgs/pdf/education/AUPs.pdf

Videos:

Readings:
Getting Started on the INternet: Developing an AUP -
http://www.educationworld.com/a_curr/curr093.shtml

PASD Student Handbooks - http://www.pasd.us/publications_handbooks.shtml
Websites:
Structure for School AUPs - http://landmark-project.com/aup20/pmwiki.php?n=Main.StructurePage

Sample AUPs - http://landmark-project.com/aup20/pmwiki.php?n=Main.SampleAUPs


Computer Lab Activities:
Self-Assessment Online Quiz - http://www.staysafeonline.org/content/self-assessment-quiz

Back to Top
Digital Security
- exercising precaution & protection while
- making safe & secure decisions when online
Be Aware of Online Predators
Lesson Outline:
Lesson Objectives -
  • Students realize how important it is to increase communication between adults and teenagers about online safety.
Introduction -
  • Watch Alicia Kozakiewicz's Plea to US Government to Stop Online Predators from Victimizing America's Youth
  • Discuss students' reactions to video
Instruction -
  • Watch Amy's choice and complete mini lesson
  • Show the presentation, Teens, Online Stranger Contact, & Harrassent. Ask teens to pick out one piece of information to discuss after presentation.
  • Project to class, How to Recognize an Online Predator website. Ask students if any of them ever experienced someone making them feel uncomfortable online.
Assess -
  • Have students collectively create a tip sheet for keeping safe from online predators
Extensions -

  • Have students visit the computer lab activities.
Link to Lesson:
See handout

Handouts:
Amy's Choice Handouts
http://www.nsteens.org/TeachingMaterials?tab=RealLifeStories


Videos:
Amy's Choice -
in grade 11 folder
http://www.netsmartz.org/stories/amy.htm
http://www.netsmartz.org/resources/reallife.htm
Link to Mini Lesson on Amy's Choice with handout
http://www.netsmartz.org/pdf/hsamy1.pdf

Emotional Testimony From Online Predator Victim:
Alicia Kozakiewicz Was a Victim of an Internet Sex Crime
http://abcnews.go.com/Politics/story?id=3742297&page=1

Presentations:
Teens, Online Stranger Contact & Harrassment
http://www.pewinternet.org/Presentations/2008/Teens-Online-Stranger-Contact--Harassment.aspx

Readings:
http://www.wiredsafety.org/internet_predators/index.html

Websites:
How to Recognize an Online Predator
http://www.safesurfingkids.com/predators.htm

Simple K12 Internet Safety LiveBinder: Links about Online Predators - http://livebinders.com/play/play?id=8777

HOW DO ONLINE PREDATORS WORK? HOW CAN PARENTS MINIMIZE RISKS? WHAT TO DO IF TARGETED.
http://www.bewebaware.ca/english/OnlinePredators.aspx
ANATOMY OF A REAL CASE
http://www.katiesplace.org/predators/paul_brown.html
ONLINE PREDATORS: HELP MINIMIZE THE RISK
http://www.microsoft.com/protect/family/guidelines/predators.mspx
ONLINE PREDATOR GROOMING PROCESS
http://www.uwex.edu/ces/cty/buffalo/4h/documents/TheInternetPredatorGroo...
FACTS ABOUT ONLINE PREDATORS
http://www.familysafecomputers.org/predators.htm
INTERNET PREDATOR NEWSWATCH
http://predatornews.blogspot.com/
PROFILE OF A PREDATOR
http://kids.yahoo.com/parents/online-safety/1706/7--Profile+of+an+Online...
PROFILE OF A POTENTIAL VICTIM
http://kids.yahoo.com/parents/online-safety/1706/6--Profile+of+a+Potenti...
HOW TO RECOGNIZE GROOMING
http://kids.yahoo.com/parents/online-safety/1706/3--How+to+Recognize+Gro...
METHODS OF PREDATORS
http://kids.yahoo.com/parents/online-safety/1706/4--Methods+of+Predators
GROOMING TACTICS, SIGNS TO WATCH FOR, HOW TO PROTECT CHILDREN
http://www.inksell.com/onlinepredators.html

2Smart4U - a cybersafety site for GIRLS
http://www.2smrt4u.com/TakeActionKit

Computer Lab Actitivites:
asdf

Back to Top
Digital Communication
- communicating with others
- through the use of technology while
- practicing etiquette & civility and making
- conscientious & honorable decisions when online
First Lesson:
Sexting


Second Lesson: Sexting - Make Good Decisions
Lesson Outline:
Lesson Objective -
  • Students will define the term sexting and outline the dangers and consequences of sharing
    explicit photos or other images online.
Introduction -
Instruction -
  • Watch Dangers of Sex-ting video. Ask questions outlined in the lesson.
  • Have students respond to writing prompt 1 or 2 (student choice)
  • Have students complete Sexting Awareness Activity.
  • Watch Mom Loses Daughter Over Sexting &Sexting Bullying Cited in Teen Suicide videos. Ask questions outlined in the lesson.
  • Distribute Tips to Prevent Sexting handouts and discuss.
  • Students respond to writing prompt 3.
  • Post and discuss Sexting Fact Cards.
Assess -
  • Have students write about an experience that you may have heard
    about or experienced with posting or texting information that was then sent out or shared. Have them include their opinions of the episode.
Extensions -

  • Distribute pages 4-6 for the Associated Press-MTV Digital Abuse Report. Have students get into pairs and read the information and statistics about sexting amongst teens.
  • Show the video, How to Handle Sexting broadcasted on the NBC Today Show
  • Have students visit the computer lab activities.
Link to First Lesson:
http://www.nisd.net/digitalcitizen/sec_digcit/sexting_9_12.htm

Link to Second Lesson:
Make Good Decisions
http://cybersmartcurriculum.org/safetysecurity/lessons/9-12/making_good_decisions/

Handouts:
Sexting Prevention Tips by Connect Safely

Videos:
How to Handle Sexting broadcasted on the NBC Today Show
http://today.msnbc.msn.com/id/26184891/vp/28793204#28793204

Dangers of Sex-ting on YouTube at http://www.youtube.com/watch?v=cNwm4YH9xYg&feature=fvw

Mom Loses Daughter Over Sexting on YouTube at http://www.youtube.com/watch?v=VLTj3WBmY1k

Dangers of Teen Sexting on YouTube at http://today.msnbc.msn.com/id/34236377 OR http://www.cbsnews.com/video/watch/?id=4723169n on cbsnews.com

Readings:
MTV Study - A Thin Line:2009 Associated Press-MTV Digital Abuse Report - http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Executive_Summary.pd

Pew Internet Report: Teens & Sexting
http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx

Sexting informational brochure

ACMA Inappropriate Content - http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/~/media/Files/Cybersafety%20Issues/ACMA_cybersaftey_inappropriatecontent.ashx


The Download on Sexting by Dr. Charles Sophy - http://ht.ly/2gmxb
Tips to Prevent Sexting by
http://www.connectsafely.com/Safety-Tips/tips-to-prevent-sexting.html

Websites:
Inappropriate Content
http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/Inappropriate%20content.aspx


Computer Lab Actitivites:
More Tips on Preventing Sexting
http://www.safeteens.com/teen-sexting-tips/

Sexting is Stupid & Illegal
http://www.safeteens.com/2009/03/30/teen-sexting-stupd-illegal/

Back to Top
Digital Media
- using others' created works while
- making legal & proper decisions when online
First Lesson:
Peer to-Peer File Sharing (P2P)
Lesson Outline:
Lesson Objectives -
  • Students will understand what peer-to-peer (P2P) file sharing is and what are the threats of using illegal sources for files.

Introduction -
  • Ask students if anyone knows what P2P or peer-to-peer file sharing is?
Instruction -
  • Read & discuss the following readings:
    • The Facts about File Sharing
    • What is P2P File Sharing?
  • Split the class into 6 or 7 groups and distribute a different reading to each group. Have two people in the group take turns reading the article aloud to the other group members, have someone else paraphrase the article, and have another student predict what will happen in regards to this article's content in the future.
  • Have the paraphraser and predictor report to the class about their reading. Have students write their answers of risks using P2P on the board.
  • Now, have the same groups take the Tips on P2P File Sharing and report one tip, taking turns, as another list of tips are generated.
  • Now go over with students the economic impact of what illegal P2P file sharing does to our economy.

Assess -
  • Have students create a mindmap of what P2P is, what are the risks, and the tips to counteract the risks.
    • Use MS Excel or MS Word to make a mind map
Extensions -
  • Students can check out how the different P2P sites work at the links listed to the right of this lesson.
  • Have students visit the computer lab activities.
Link to Lesson:
See websites for readings & resources

Handouts:


Videos:


Readings:
The Facts About File Sharing
http://www.familysafecomputers.org/filesharing.htm

What is P2P File Sharing?
http://www.wisegeek.com/what-is-p2p.htm

The Risks of P2P File Sharing:
Economic Impact from P2P - http://www.surfnetkids.com/safety/economic_impact_of_p2p_file_sharing-29158.htm

Websites:
P2P Quick Tips - http://www.onguardonline.gov/topics/p2p-security.aspx

Tips to Avoid P2P File Sharing Risks - http://www.surfnetkids.com/safety/tips_to_avoid_file_sharing_risks_on_p2p_networks-21613.htm

How BitTorrent Works
http://computer.howstuffworks.com/bittorrent.htm

How Limewire Works
http://communication.howstuffworks.com/limewire.htm
How Gnutella Works
http://computer.howstuffworks.com/file-sharing.htm

Other Resources
http://tcs.cybertipline.com/knowthedangers5.htm

Other Resources on P2P:
http://ethics.csc.ncsu.edu/intellectual/peer/

Computer Lab Actitivites:
P2P Threeplay Interactive Game - P2P Game
http://www.onguardonline.gov/games/p2p-threeplay.aspx

How to Make a Mind Map: Six Steps
http://www.mapyourmind.com/howto.htm

Use MS Excel to Make a Mind Map
http://www.internet4classrooms.com/excel_concept_map.htm


Back to Top

High School Cybersafety Curriculum Grade 12




Unit

Topic

Lesson

Resources

Digital Citizenship-understanding, practicing, and respecting
- rights & responsibilities, while making
- ethical & accountable decisions when online
Unethical Online Behaviors & Identity Theft - Information is Power
Lesson Outline:
Lesson Objectives -
  • Define online identity theft and describe several ways it can occur.
  • Research online identity theft and create a tip list for preventing it.
  • Communicate good online identity theft prevention practices to family members.
Introduction -
  • Have students close their eyes for a moment. Tell them to imagine the following scene: It's the big day! You arrive at your state motor vehicle office, several forms of identification in hand, ready to get your driver's license. The official tells you that a driver's license has already been issued to a person with your name and Social Security number, so you cannot get one.
  • Have students open their eyes and ask: How are you feeling? (upset, depressed, scared, angry, disappointed, confused)
Instruction -
  • Analyze the Problem - Divide class into small groups. Distribute student handout 1; have students cut out squares; assign each group a subset of cards; each group needs to share what they know, what they need to know, why they need to know it.
  • Think About It - Distribute student handout 2; have students present to the other students in class;
  • Find Solutions - Have the class construct more tips to guard against unethical behaviors online and to fight for your rights.
  • Take Action -
Assess -
Extensions -
  • Ticket Out the Door. Ask: * Ask: What does it mean to have your identity stolen, and how does it happen online?
    • Ask:What are three ways that people can avoid online identity theft?
    • Ask: How can you remind family members about online identity theft prevention?
  • Have students play any of the Identity Theft online games
  • Have students reading and discuss the readings listed in Resources
  • Have students visit the computer lab activities.
Link to Lesson:
http://cybersmartcurriculum.org/safetysecurity/lessons/9-12/online_identity_theft_information_is_power/

Handouts:


Videos:
Phishing Videos - http://www.onguardonline.gov/videos/overview.aspx

Citibank Identity Theft Commercials -
http://www.fightidentitytheft.com/citibank-idtheft-commercials.html

Readings:
Facebook Does An About Face with Your Privacy - http://www.fightidentitytheft.com/blog/facebook-privacy

Recovering from Identity Theft - http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html

Websites:
Learn the Terms - http://www.onguardonline.gov/tools/learn-terms.aspx

Seven Rules to Be Defense Against Online Offenders
http://www.onguardonline.gov/topics/computer-security.aspx

Identity Theft - http://www.onguardonline.gov/topics/identity-theft.aspx

Computer Lab Actitivites:


Back to Top
Digital Security
- exercising precaution & protection while
- making safe & secure decisions when online
First Lesson:
Online Social Networking

Second Lesson:
What's In a Name in Social Networking Sites?

Third Lesson:
Acceptable Social Networking
Lesson Outline:
Lesson Objectives -
  • Students will learn the ability to recognize dangers on the Internet.
  • Students will understand how important it is to be discreet in social networking sites due to online predators

Introduction -
  • Show students the video, Social Bookmarking in Plain English, by Common Craft.
  • Ask students what social networking sites are, why people want to join social networking sites, what could students propose are the advantages and disadvantages of joining social networking sites.
Instruction -
  • Watch: Dangers of Online Social Networks, a MSNBC documentary that helps to explain what social networking is and how it is dangerous for teens.
  • Watch: Tracking Theresa, and have students fill out handout. Ask questions and give Teacher's Tips in lesson plan.
  • Watch: Your Kid's Cyber Secrets, a MSNBC documentary that helps to explain what social networking is and how it is dangerous for teens.

Assess -
  • Students will write using writing prompt 1 or 2 (student choice)
  • You (students) are going for a job interview. Before you turn in your resume, you check out your social networking sites. What items on your site will need to be checked or removed so that your chances of getting this job are good?

Extensions -
Link to First Lesson:
http://www.nisd.net/digitalcitizen/sec_digcit/social_networking_9_12.htm

Link to Second Lesson:
http://www.bedford.k12.va.us/internet_safety/english/Grade9/InternetSafetyLPG9P.pdf


Link to Third Lesson:
Acceptable Social Networking
http://cybersmartcurriculum.org/cyberbullying/lessons/9-12/acceptable_social_networking/


Handouts:
Social Networking Tips by Parry Aftab
http://www.wiredsafety.org/resources/pdf/socialnetworktips.pdf


Videos:
Social Bookmarking in Plain English by Common Craft
- on PASD High School Video Wiki page

Dangers of Online Social Networks, NBC Today Show
http://www.msnbc.msn.com/id/21134540/vp/11066322#11066322

Your Kid's Cyber Secrets, NBC Today Show
http://www.msnbc.msn.com/id/21134540/vp/11066322#11066322

Tracking Theresa by NetSmartz
http://www.netsmartz.org/stories/teresa.htm
Theresa's Mini Lesson with handout to go with Video -
http://www.netsmartz.org/pdf/hsteresa1.pdf

Readings:
Social Networking - Many Links - Facebook, MySpace, Plus More - http://ethics.csc.ncsu.edu/speech/myspace/

"Facebook Connect and a Failure to Understand Online Identity Management" - Pew Internet Report
http://www.pewinternet.org/Commentary/2008/December/Facebook-Connect-and-a-failure-to-understand-online-identity-management.aspx

"Should Middle School Students Be Banned From Social Networking?
http://www.findingdulcinea.com/news/education/2010/april/Should-Middle-School-Students-Be-Banned-From-Social-Networking-.html


Websites:
MySpace Guide
http://www.wiredsafety.org/internet101/myspaceguide.html

Blog Guide:
http://www.wiredsafety.org/internet101/blogs.html

A LOT of information & links about Social Networking:
http://www.michellehenry.fr/social_network.htm

Computer Lab Actitivites:
Make Your Social Networking More Private
Facebook - http://kids.getnetwise.org/safetyguide/technology/facebook/facebook-private-audio
MySpace - http://kids.getnetwise.org/safetyguide/technology/myspace/myspace-private-audio
Xanga - http://kids.getnetwise.org/safetyguide/technology/xanga/xanga-private-audio

Social Networking Interactives:

Back to Top
Digital Communication
-communicating with others
- through the use of technology while
- practicing etiquette & civility and making
- conscientious & honorable decisions when online
First Lesson: Distracted Driving: No Phone Zone

Second Lesson:
Teens & Cellphone Use
Lesson Outline:
Lesson Objectives -
  • Upon completion of this lesson, students will have a better understanding of the risks associated with distracted driving.
  • Teen drivers will gain a perspective in recognizing unsafe driving situations and selecting the correct response or reaction.
  • Teaching teen drivers to be aware is also teaching them to be responsible for themselves and to use their best judgments.
Introduction -
  • Learn about the dangers of distracted driving - see lesson
    • Watch videos; break into groups; identify key risk behaviors
    • Group share findings with class; teacher facilitates discussion
    • Students take the Distracted Driver Safety Quiz
    • Read to the class the March 2010 statistics on Teens and Distracted Driving
Instruction -
  • Reflection on Distracted Driving
    • Students write a short essay or blog posting on what they learned about distracted driving
    • In the above activtity, students will outline steps to educate the people in their lives about distracted driving
    • Explain why they have or have not signed the "No Phone Pledge".
Assess -
  • No Phone Zone Quiz - quiz & key are in lesson plan
  • Reflection Writing
Extensions -
  • Create a public service announcement poster or flyer detailing the dangers of distracted driving. Display posters or distribute flyers around school.
  • Create a public service announcement video or podcast detailing the dangers of distracted driving. Broadcast video on school announcements or online.
  • Have students play, Gauge Your Distraction interactive game
  • Read the Pew Internet & American Life Project report on Teens & Distracted Driving. Discuss the findings.
  • Read any of the other Pew Internet & American Life Project reports:
    • Teens & Mobile Phones
    • Teen & Mobile Phones - Over the Past Five Years
  • Have students visit the computer lab activities.
Link to First Lesson:
No Phone Zone - Say No to Distracted Driving
http://www.scribd.com/doc/27913353/No-Phone-Zone-Lesson-Plan

Link to Second Lesson:
Texting & Driving: Your Right or a New Way to Crash -
http://www.aaasouth.com/documents/ElemJrSrHighLessonPlan.pdf
Pages 4-6

Handouts:
Distracted Driver Quiz is in lesson plan file above.

Oprah's No Phone Zone Pledge
http://static.oprah.com/images/tows/nophone/no-phone-zone-pledge.pdf

Videos:
Oprah Winfrey: America’s New Deadly Obsession
http://www.oprah.com/oprahshow/Americas-New-Deadly-Obsession-Partial-Episode-Video

University of Utah | Applied Cognition Lab http://www.psych.utah.edu/AppliedCognitionLab/

http://www.ctia.org/advocacy/research/index.cfm/AID/11483

Readings:
Pew Internet Report: Teens and Distracted Driving
http://www.pewinternet.org/Reports/2009/Teens-and-Distracted-Driving.aspx


Teens and Mobile Phones
http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx


Teens & Mobile Phones - Over the Past Five Years
http://www.pewinternet.org/Reports/2009/14--Teens-and-Mobile-Phones-Data-Memo.aspx

Online Quiz:
Take the Car Talk's Driver Distraction Center's Quiz - http://cartalk.com/ddc/interact/quiz/quiz.php

Driven to Distraction, NY Times, August 2, 2010 - Links, real stories, video, game, statistics plus more!
http://topics.nytimes.com/top/news/technology/series/driven_to_distraction/index.html#

Websites:
Teens and Distracted Driving Statistics, March 2010 - http://www.debaird.net/blendededunet/2010/03/lesson-plan-no-phone-zone-teaching-teens-the-dangers-of-texting-driving.html

Gauge Your Distraction interactive game - http://www.nytimes.com/interactive/2009/07/19/technology/20090719-driving-game.html

Distracted Driver Statistics - http://www.vtti.vt.edu/PDF/7-22-09-VTTI-Press_Release_Cell_phones_and_Driver_Distraction.pdf

Car Talk's Driver Distraction Center - http://cartalk.com/ddc/

NPR and Car Talk -
http://www.cartalk.com/content/features/Distraction/

Using Mobile Phones Safely -
http://ilookbothways.com/learn-safety/using-mobile-phones-safely/

The National Safety Council: http://www.nsc.org/safety_road/Distracted_Driving/Pages/KeyResearch.aspx#cognitive

Infographic:
Use of cell phone for pictures and video popular across age groups
http://www.pewinternet.org/Infographics/2010/Use-of-cell-phone-for-picture-and-video-by-age.aspx

Computer Lab Activities:
Take the Car Talk's Driver Distraction Center's Quiz - http://cartalk.com/ddc/interact/quiz/quiz.php

Cellphone Safety Q & A
https://www.kyfb.com/insurance/safety-center/cell-phone-safety/

Back to Top
Digital Media
- using others' created works while
- making legal & proper decisions when online
Lesson One:
Research & Plagiarism


Lesson Two:
Plagiarism Web Quest (Parts IV-VI)
Lesson Outline:
Lesson Objectives -The Student will be able to:
  • identify the ethical issues of documentation in research writings
  • collect and synthesize information, using a variety of print and electronic sources
  • cite sources of information, using MLA or APA style
  • avoid committing plagiarism.
Introduction -
  • Discuss: What is copying? What is borrowing? What is stealing? What is copyright? Do any students have a copyright on anything?
Instruction -
  • Read: Research and Plagiarism article - article in lesson plan
  • Ask questions outlined in lesson
  • Visit the website, plagiarism.org and review Q & A with students as a class - http://www.plagiarism.org/
  • Have students look at and experiment with plagiarism online checkers
Assess -
  • Have students write a short essay on why it is not ethically right to copy someone else's work and call it one's own.
Extensions -
  • Have students visit the computer lab activities.
Link to Lesson:
Research & Plagiarism


Link to Second Lesson: Parts IV-VI
https://mail.nvnet.org/~cooper_j/Plagiarism/
Handouts:
asdf
Videos:
asdf

Websites:
http://www.plagiarism.org/

Campus Downloading Music - KNOW before you GO to College!
http://www.campusdownloading.com/


Readings:
Research & Plagiarism// - included in lesson plan

Online Plagiarism Checkers:
Plagiarism.com's checker - http://www.crossrefme.com/

Plagiarism Checker - http://www.dustball.com/cs/plagiarism.checker/

Plagium - http://www.plagium.com/

Plagiarism Checker - http://www.plagiarismchecker.com/

Paper Rater - http://www.paperrater.com/free_paper_grader

Search for copies of your page on the web - http://copyscape.com/

Websites to Help Students Cite Works:
CitationCenter
Citation Maker
EasyBib
KnightCite
NoodleBib Express
Zotero
Computer Lab Activities:
Plagiarism: Parts IV-VI
https://mail.nvnet.org/~cooper_j/Plagiarism/

Back to Top