Lesson Plan
Unit/Topic:
Year Level:
Lesson Duration:
ENGAGE:
Watch the You Tube video titled "Let's fight it together" from Anti-Bullying week
Cyber Bullying Video.
EXPLORE:
The possibilities after the video. What do you think will happen next? What do
you think should happen next? Brainstorming ideas on what happened in the
video? Opinions of student groups. How do you think the video will end? How do
you think it should end if it happened at your school?
EXPLAIN:
Identify ways to manage and prevent cyberbullying behaviour.
What is Cyber Bullying? Is it the same as Bullying? Is it a crime? Why or why not?
"I Think I have been CyberBullied.... What do I do now??" Create a plan or
strategies in place for victims of bullying on the internet. Also look at Brodies
Law and what it states.
Durati
on
10
min
5 min
Teaching
Strategies/Approaches
will
understand
that
Students will be asked to watch the Students
video titled "Let's fight it together" cyberbullying can be as a form of a
until
4:51
min
on hurtful message text, abusive emails,
https://www.youtube.com/watch?
v=S03Br1dwJR8
15min
excluding
individuals
from
online
conversations,
imitating
someone
online, posting inappropriate images and
trolling are some of the ways people can
cyber bully each other.
Cyberbullying varies from defaming and
hurtful comments and pictures posted
intended to embarrass another person. It
is also described as internet aggression
through computers, smart phones and
other electronic devices.
Students
will
understand
that
Cyberbullying is a crime and serious
penalties have to be paid. There is a
procedure in place for prosecution.
Students need to be aware of the
procedure on reporting cyberbullying.
5 min
Major Content
a
complaint
about
cyber
bullying material?
What is the "Cybersafety Help
Button"?
15
min
Students need to have a sound understanding of cyber safety while using the
internet. The pre-requisites for this lesson is that students need to gain an
understanding of Internet protocols and strategies for exchanging information,
which enables them to share and challenge their own and other peoples ideas
and solutions with a global audience. ICT supports knowledge-building among
teams and enables team members to collaborate, enquire, interact and integrate
prior knowledge with new understanding. Protocols for receiving, transferring and
Evaluate
Cyberbullying is:
a. Using online technology to deliberately and repeatedly bully someone.
b. Using online technology to make someone feel insecure and miserable.
c.
d. Anyone, including my friends or I, if we arent careful about how we treat others online.
c.
Reports the behaviour to someone who can help, like a trusted adult.