the original complete unit
DESCRIPTION
TRANSCRIPT
Understanding By Design Unit Understanding By Design Unit on Internet Safetyon Internet Safety 11John DolanJohn Dolan
Be a Safe “Surfer”Be a Safe “Surfer”
Dude! Dude!
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 22
Internet Safety Unit Internet Safety Unit
• Unit Title : Safe “Surfing” on the Internet
• Grade Level(s): 6th & 7th
• Subject/Topic Area(s): Computers/Safety• Key Words: personal information, private identity, cyberspace, cyber pals, ethiical
• Designed By: Original unit by John Dolan• Time Frame: 3 weeks• School: St. Luke’s School, New Canaan, Connecticut.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 33
Stage 1Stage 1
DESIRED RESULTS DESIRED RESULTS
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 44
Content StandardsContent Standards
• ISTE’s-National Educational Technology ISTE’s-National Educational Technology Standards (NETS) Performance Indicators Standards (NETS) Performance Indicators for Grades 6-8for Grades 6-8
• Performance Indicators # 2 and 3 • # 2 Demonstrate knowledge of current # 2 Demonstrate knowledge of current
changes in information technologies and changes in information technologies and the effect those changes have on the the effect those changes have on the workplace and society. workplace and society.
• # 3 Exhibit legal and ethical behaviors # 3 Exhibit legal and ethical behaviors when using information and technology, when using information and technology, and discuss consequences of misuse. and discuss consequences of misuse.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 55
Summary of Unit
•In this unit students will…• Distinguish between private identity information and personal information
• Recall that private identity information should not be communicated in cyberspace without permission of a teacher or parent
• Learn how the Internet can be used to communicate with others in cyberspace
• Relate reasons for protecting private identity information in cyberspace
Summary of UnitSummary of Unit
• Understand the importance of passwords and describe strategies for protecting them Explain how to protect private identity information when designing personal Web sites
• Distinguish between cyberpals and face-to-face friends Explain the rules for being safe when dealing with cyberpals
• Create ways to help teach others how to Create ways to help teach others how to protect their personal and private protect their personal and private identity information when using the identity information when using the Internet. Internet.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 66
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 77
Enduring Understandings Enduring Understandings
•Students will understand…Students will understand…• How to talk and share ideas with How to talk and share ideas with others on the internet. others on the internet.
• How to protect themselves as they How to protect themselves as they visit sites requesting private visit sites requesting private identity information. identity information.
• The concept of anonymity on the The concept of anonymity on the internetinternet
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 88
Essential Questions Essential Questions
• Who should you not talk with on the Who should you not talk with on the internet?internet?
• What does anonymity mean on the What does anonymity mean on the internet? internet?
• Where should you not share private Where should you not share private identity information?identity information?
• When is online chatting and When is online chatting and messaging harmful to you or others?messaging harmful to you or others?
• Why is online chatting and messaging Why is online chatting and messaging beneficial?beneficial?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 99
Desired Results
Students will know…..Students will know…..• How to protect their private How to protect their private identity information identity information
• How to protect your personal How to protect your personal informationinformation
• What anonymity on the internet means What anonymity on the internet means
• How to engage in safe e-mail, chat & How to engage in safe e-mail, chat & messaging practices messaging practices
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1010
Desired Results
Students will be able to…..Students will be able to…..• Think critically in protecting one’s Think critically in protecting one’s identity when visiting web sites identity when visiting web sites
• Evaluate how well web sites protect Evaluate how well web sites protect private identity informationprivate identity information
• Distinguish between private identity Distinguish between private identity information & personal informationinformation & personal information
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1111
Stage TwoStage Two
Assessment EvidenceAssessment Evidence
Assessment Evidence Assessment Evidence
• Each group will create ways to help Each group will create ways to help teach others how to protect their teach others how to protect their personal and private identity personal and private identity information when using the Internet. information when using the Internet.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1212
Assessment Evidence Assessment Evidence
• Ideas for helping others to protect Ideas for helping others to protect their personal and private identity their personal and private identity information information
• Create a "Protect Personal Information Create a "Protect Personal Information & Private Identity” poster to be put in & Private Identity” poster to be put in the school hallway the school hallway Rubric for the Poster
• Create a "Safety News Article" to be Create a "Safety News Article" to be published in the school newsletter. published in the school newsletter.
• News Article Rubric
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1313
Assessment Evidence Assessment Evidence
• Build a "Protect Yourself Online" Build a "Protect Yourself Online" website that can be linked to your website that can be linked to your school's Web page. school's Web page. Web Site Rubric
• "Create a "Guard Your Personal "Create a "Guard Your Personal Information" board game to teach Information" board game to teach other people about what you've other people about what you've learned. learned.
• Board Game Rubric
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1414
Assessment Evidence Assessment Evidence
• Create a “Protect Yourself Online” Create a “Protect Yourself Online” public service video public service video Video Rubric
• Create a “Protect Personal Create a “Protect Personal Information & Private Identity” Information & Private Identity” PowerPoint Presentation PowerPoint Presentation PowerPoint Rubric
• Assign each member of the group a Assign each member of the group a role when working on this project. role when working on this project. Fill in Fill in Group Roles for Project
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1515
Assessment Evidence Assessment Evidence
•Evaluation Evaluation • When you are ready to present your When you are ready to present your project. project.
• Fill out the Fill out the group evaluation rubric and give it and give it to me to me
Participation within the Group Evaluation Rubric Cooperative Learning Project Rubric
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1616
Stage 3Stage 3
Learning Plan Learning Plan
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1717
Learning Plan 1Learning Plan 1
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1818
IntroductionIntroduction • Some web sites ask for information Some web sites ask for information before allowing you to participate before allowing you to participate in an online activity. in an online activity.
• You should stop and consider how You should stop and consider how providing such information may providing such information may affect your private identity & affect your private identity & personal safety. personal safety.
• Go to Go to A Great Place to Share Ideas
Learning Plan 1 Learning Plan 1
• On a sheet of paper write down your On a sheet of paper write down your personal informationpersonal information
• Let’s discuss your examplesLet’s discuss your examples
• Have you included Private Identity Have you included Private Identity Information? Information?
• Make sure you haven’t. Make sure you haven’t.
• Refer to Refer to A Great Place to Share Ideas
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 1919
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2020
Learning Plan 1Learning Plan 1
Post the Essential Questions Post the Essential Questions • Who should you not talk with on the Who should you not talk with on the internet?internet?
• What does anonymity mean on the internet? What does anonymity mean on the internet? • Where should you not share private Where should you not share private identity identity
• information?information?• When is online chatting and messaging When is online chatting and messaging harmful to you or others?harmful to you or others?
• Why is online chatting and messaging Why is online chatting and messaging beneficial?beneficial?
Learning Plan 1Learning Plan 1
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2121
Create GroupsCreate Groups• Form a group of three safe “surfer” dudesForm a group of three safe “surfer” dudes
• Surf to the Privacy PlaygroundSurf to the Privacy Playground
• Create an online name that will identify your Create an online name that will identify your groupgroup
• One person in the group will “surf” through the One person in the group will “surf” through the game game
•
Learning Plan 1Learning Plan 1
Assign Roles Assign Roles • One person will be the “spotter”, One person will be the “spotter”, spotting the errors each character spotting the errors each character makes makes
• One person will be the “recorder”, One person will be the “recorder”, recording the errors each character recording the errors each character makes makes
• Play the game and look for ways that Play the game and look for ways that Mo, Lil and Les (the characters in the Mo, Lil and Les (the characters in the game) are not being cybersmart. game) are not being cybersmart.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2222
Learning Plan 1Learning Plan 1
ActivityActivity• Play the game a second time Play the game a second time
• Record on chart paper Mo, Lil and Record on chart paper Mo, Lil and Les' errors under each character's Les' errors under each character's name.name.
• Find the rule that helps them know Find the rule that helps them know the correct thing to do next time.the correct thing to do next time.
• Was there something new in the site Was there something new in the site that Mo, Lil and Les used?that Mo, Lil and Les used?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2323
Learning Plan 1Learning Plan 1
Discussion Discussion •Did they select a play or pay site?Did they select a play or pay site?
•What does 'play or pay site' mean?What does 'play or pay site' mean?
•What is the virtualpigsty.com What is the virtualpigsty.com trying to sell?trying to sell?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2424
Learning Plan 1Learning Plan 1
Search for similar sites Search for similar sites • Switch roles i.e. different person Switch roles i.e. different person being the surfer, spotter and being the surfer, spotter and recorder recorder
• Search for two sites that are Search for two sites that are similar to virtualpigsty.comsimilar to virtualpigsty.com
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2525
Learning Plan 1Learning Plan 1
Record Record • Once you have found three sites that Once you have found three sites that areare
similar to virtualpigsty.comsimilar to virtualpigsty.com
• Write down the web addresses Write down the web addresses
• Write down what they’re trying to Write down what they’re trying to sell sell
• Do they ask you to identify your real Do they ask you to identify your real name, age or address?name, age or address?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2626
Learning Plan 1Learning Plan 1
ClassifyClassify• Classify the information requested Classify the information requested as private identity or personal as private identity or personal information.information.
• Report your findings and Report your findings and classifications to the class.classifications to the class.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2727
Learning Plan 2Learning Plan 2
IntroductionIntroduction• What are some examples of private What are some examples of private identity information? identity information?
• Why would you not give out private Why would you not give out private identity information?identity information?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2828
Learning Plan 2Learning Plan 2
Activity Activity • Go to Passowrds ActivityGo to Passowrds Activity
• Have each group read the paragraph Have each group read the paragraph titled “Passwords”titled “Passwords”
• Each group should generate questions Each group should generate questions about this information in this about this information in this paragraphparagraph
• Each group should give their Each group should give their questions to another group to answer questions to another group to answer
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 2929
Learning Plan 2Learning Plan 2
ActivityActivity• Go to Passowrds ActivityGo to Passowrds Activity
• Each group should read and discuss Each group should read and discuss the scenarios about Jesse & Sondra. the scenarios about Jesse & Sondra.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3030
Learning Plan 2Learning Plan 2
• Each group will be assigned one of Each group will be assigned one of the following personal web sites the following personal web sites
• Jessy Scott Web Page Jessy Scott Web Page
• Mike Shaum's SiteMike Shaum's Site
• Adam G's SiteAdam G's Site
• Jeremy W's Home PageJeremy W's Home Page
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3131
Learning Plan 2Learning Plan 2
• Each group will be answering Each group will be answering questions based on their web site questions based on their web site
• One person should be navigatingOne person should be navigating
• One person should be finding the One person should be finding the informationinformation
• One person recording the information One person recording the information
• One person will present the group’s One person will present the group’s report to the class. report to the class.
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3232
Learning Plan 2Learning Plan 2
• What private identity information is What private identity information is given about the subject of this given about the subject of this site?site?
• How could the site be changed to How could the site be changed to keep this information private?keep this information private?
• What private identity information is What private identity information is given about other people?given about other people?
• How could the site be changed to How could the site be changed to keep this information private?keep this information private?
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3333
Learning Plan 2Learning Plan 2
• Each group reports their findings Each group reports their findings
• Discussion on private identityDiscussion on private identity
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3434
Learning Plan 3Learning Plan 3
• What does it mean to be anonymous in What does it mean to be anonymous in cyberspace? cyberspace?
• Discuss the positive and negative Discuss the positive and negative effects of anonymity effects of anonymity
• Go to Cyber Smart Activity Sheet and Go to Cyber Smart Activity Sheet and complete it in your group complete it in your group
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3535
Learning Plan 3Learning Plan 3
• Have two members of your group role-Have two members of your group role-play being in a chat room play being in a chat room
• They met online, like one another, They met online, like one another, and enjoy the same things and enjoy the same things
• One person should ask for the other's One person should ask for the other's real name and phone number. real name and phone number.
• As a group suggest and write down As a group suggest and write down responses that will keep the person responses that will keep the person safesafe
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3636
Learning Plan 3Learning Plan 3
• Share your group’s responses Share your group’s responses
• Discussion about the difference Discussion about the difference between online pals and real life between online pals and real life palspals
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3737
BibliographyBibliography
• Title:Title: CyberSmart! : Home CyberSmart! : Home
• Publisher:Publisher: The CyberSmart Education The CyberSmart Education Company. .Site last updateCompany. .Site last update
• Date Published:Date Published: 2000 2000
• Retrieved:Retrieved:
• URL:URL: http://www.cybersmartcurriculum.orhttp://www.cybersmartcurriculum.or
• modify & add data below... modify & add data below...
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3838
BibliographyBibliography
• Title:Title:
• Publisher:Publisher: London District Catholic London District Catholic School Board and its licensorsSchool Board and its licensors
• Date Published:Date Published: 2006 2006
• Retrieved:Retrieved:
• URL:URL: http://www.ldcsb.on.ca/schools/cfehttp://www.ldcsb.on.ca/schools/cfe
• modify & add data below... modify & add data below...
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 3939
BibliographyBibliography
• Title:Title: Privacy Playground Privacy Playground
• Publisher:Publisher: Media Awareness Network Media Awareness Network
• Date Published:Date Published: 2000 2000
• Retrieved:Retrieved:
• URL:URL: http://www.media-awareness.ca/englhttp://www.media-awareness.ca/engl
• modify & add data below... modify & add data below...
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 4040
BibliographyBibliography
• Title:Title: Process Process
• Retrieved:Retrieved:
• URL:URL: http://coe.nevada.edu/slefevre/Prohttp://coe.nevada.edu/slefevre/Pro
• modify & add data below... modify & add data below...
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 4141
BibliographyBibliography
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 4242
• Title:Title: Kathy Schrock's Guide for Kathy Schrock's Guide for Educators - Assessment RubricsEducators - Assessment Rubrics
• Publisher:Publisher: Discovery Education Discovery Education
• Date Published:Date Published: 2006 2006
• Retrieved:Retrieved:
• URL:URL: http://school.discovery.com/schrochttp://school.discovery.com/schroc
• modify & add data below... modify & add data below...
BibliographyBibliography
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 4343
• Title:Title: Bill of Rights Redux UbD Unit Bill of Rights Redux UbD Unit
• Retrieved:Retrieved:
• URL:URL: http://kancrn.kckps.k12.ks.us/wyanhttp://kancrn.kckps.k12.ks.us/wyan
• modify & add data below... modify & add data below...
BibliographyBibliography
• http://cybersmartcurriculum.org/http://cybersmartcurriculum.org/safetysecurity/lessons/6-8/safetysecurity/lessons/6-8/check_the_privacy_policy/check_the_privacy_policy/
John DolanJohn DolanUnderstanding By Design Unit Understanding By Design Unit
on Internet Safetyon Internet Safety 4444