Anda di halaman 1dari 9

Why is it important to be Cyber Smart?

Lesson Plan
Unit/Topic:
Year Level:
Lesson Duration:

Road trip to being Cyber Smart


Year 7
100 minutes

Domain(s) & Dimension(s) covered: Interdisciplinary Learning, ICT for


communicating. This lesson plan module supports a number of learning areas in
the Australian Curriculum, including Health and Physical Education and
Technologies.
Progression Points covered: Progression Point 6.5 8.0
Learning Intention:
At the end of this lesson:
Students will self-evaluate their internet dependence, technology addiction and
media habits by:

Understanding the value of taking responsibility for themselves and their


actions
Recognising the necessity of treating others with respect online
Identifying positive use of the internet and technology
Understanding that online activities can have associated risks
Acknowledging the impact that online activities can have on their health
and wellbeing
Recognising that personal information can be used to identify or locate
them
Understanding that personal information must only be shared with trusted

ENGAGE:
Watch Episodes 1 to 5 titled #Game On from
https://www.esafety.gov.au/education-resources/classroom-resources/gameon

EXPLORE:
The scenarios on the five episodes and how closely related we are to the
characters in those videos. Students need to look very closely at themselves and
analyse on:

the digital devices that each member of the class owns and/or uses
what they use the device for (e.g. email, playing games, taking photos)
what social networking sites they use
what type of information they share on their social networking sites
The amount of time they spend online.

EXPLAIN:
To teach students how to be regional and global citizens capable of actively and
ethically communicating and collaborating. It is important that students can
apply protocols and practices that support safe, ethical and respectful
communications and collaboration with known and unknown audiences. They
need to discuss how they can protect the privacy of personal data and
information.

Elaborated Lesson Structure:


Durati
on

Teaching Strategies/Approaches

Watch Episode 1 : Stealing Grace


On

10
min

10
min

https://www.esafety.gov.au/education
-resources/classroomresources/gameon

Major Content:
Brainstorming with the students
on the key questions and noting
down key aspects like:
Gaming Addiction
Sharing Passwords
Putting defaming pictures of
friends on the internet as a joke.

Why is it called Stealing Grace?


What can we understand from the
video?
Who are the characters and what
can we learn from them
Brainstorming with the students

Watch Episode 2 : Ringing Ryan


On

https://www.esafety.gov.au/education
-resources/classroomresources/gameon

on the key questions and noting


down key aspects like:
Downloading free games,
free ringtones from the internet
are not really free.
Sending selfies to online friends.
Do you like it when your older
sister or brother tells you to be
careful while online? Why arent
you allowed to play the same
games as your older siblings?

Why is it called Ringing Ryan?


What can we understand from the
video?
Who are the characters and what
can we learn from them
Brainstorming with the students

10
min

Watch Episode 3 : Texting Ollie


On

https://www.esafety.gov.au/education
-resources/classroomresources/gameon

Why is it called Texting Ollie?


What can we understand from the
video?
Who are the characters and what
can we learn from them

10
min

Watch Episode 4 : Telling Dean


On

https://www.esafety.gov.au/education
-resources/classroomresources/gameon

Why is it called Telling Dean?


What can we understand from the

on the key questions and noting


down key aspects like:
How do the other friends feel
when you dont hang out with
them anymore?
What actions do you think the
parents and teachers need to
take if the kids dont listen to
them?
At the end of the video, why do
you think Sarah had that look on
her face??

Brainstorming with the students


on the key questions and noting
down key aspects like:
Relationship of Dean with his
friends and sister suffers. They
think he is always grumpy.
Relationship of Ollie with his
mother and sister suffers. He
finds out the hard way on sharing
photographs online can be

dangerous.
video?
Who are the characters and what Think carefully about sharing
passwords with friends.
can we learn from them

10
min

20
min

Watch Episode 5 : Asking Claudia


On

https://www.esafety.gov.au/education
-resources/classroomresources/gameon

Brainstorming with the students


on the key questions and noting
down key aspects like:
How did the movie end?
Could it have gone worse had it
continued?

Why is it called Asking Claudia?


What can we understand from the
video?
Who are the characters and what Student teams will work on
can we learn from them
topics for their comic strip
creation.
Topics on:
Brainstorming on what topics the
students would like to elaborate Cyberbullying
on or reflect on in their Claudia: I only meant it as a joke.
presentation or comic strip story. Biancas my friend. I didnt know
Students will work collaboratively this was cyberbullying.
in pairs and chose a topic and
spend time in class to work out a Gaming Addiction
story board for the comic strip Harry: He was totally obsessed
creation
or
a
PowerPoint with Star Warriors. It was like he
presentation.
cared more about that game than
he

did

about

his

friends

or

http://www.makebeliefscomix.com/Comix/ anything.
Selfies and Posting
photographs

Ollie knows that he has to be


more careful online. Posting
selfies has consequences, if you
allow the public to view and
share these images and chatting
to strangers

Passwords and privacy


What is personal
information?
What personal information
have you shared online?
Why?

Online friendships

30
min

Free Downloads

There is no such thing as free

Students will then move to the In the IT lab students will work on
computer lab and start working on their presentations and save it on
the Student Home drives.
their PowerPoint presentation.

Lesson Pre-requisites

Students need to have a sound understanding of cyber safety while using the
internet. The pre-requisites for this lesson is that students need to gain an
understanding of Internet protocols and strategies for exchanging information,
which enables them to share and challenge their own and other peoples ideas
and solutions with a global audience. ICT supports knowledge-building among
teams and enables team members to collaborate, enquire, interact and integrate
prior knowledge with new understanding. Protocols for receiving, transferring and
Evaluate

The students will be assessed on their understanding of being Cyber


smart and safe while using the internet and technology. They will be
assessed on their understanding of the adverse effects of internet
addiction, gaming addiction, cyber bullying, sharing passwords,
downloading freebies from the internet and chatting with online friends.
Resources

For the successful completion of this lesson, the teacher needs a few
resources that include:
A Projector
6 Tips for a Balanced Media Diet
Worksheet on Cyber Bullying Multiple Choice
https://www.esafety.gov.au/education-resources/classroom-resources/gameon

http://www.makebeliefscomix.com/Comix/
Microsoft Power Point for creating student presentations on Cyber Smart Topics
Mentor Evaluation

6 Tips for a Balanced Media Diet


The things we observe in the media has a huge influence on usit's kind of like a megapeer group. Whether its television, online or in the news, children absorb information
and develop a sense of what is normal, desirable or in. Its important to ensure a
healthy balance between their exposure to media and interacting with family and friends
to aid in their physical, emotional and social development.

KEEP MEAL TIMES MEDIA FREE


To build a healthy connected family, set a rule that there is no media on during family
meals. Turn off the TV and dont allow Smartphone or iPads at the table (this includes
parents!). When you allow media during meals there is immediately a disconnection, a
distraction. You are not giving each other or your meal your full attention. Encourage
conversation.

BE INVOLVED
Join in! Play, watch and listen with your children. Discuss issues with them and
encourage critical thinking. Look at what they are looking at and get them talking rather
than consuming media passively. Plan activities and then do the one activity such as play
one game or watch a show and then turn it off.

QUESTION
Make sure your children understand that what they may read online may not be the
truth but just opinion. Discuss issues with them and encourage them to question and
analyse the messages in the media.

VALUES
The messages your child is absorbing from media sources may not be in line with your
own family values. Observe and if necessary moderate so that you can help them to
make better choices. Help them to learn responsible behaviour by modelling great media
behaviour yourself.

SET AGE APPROPRIATE TIME LIMITS


Consider the time your child is in front of a screen whether computer, tablet device or
television and set time limits. One or two hours a day is ample for a primary aged child.
Ensure rules you set are manageable.

KEEP A LOG

It can be pretty confronting but by keeping a log you will be able see just how balanced
your childs media diet really is. List all screen time, outside play, sport, time spent with
friends and family (without media), indoor play and reading then help your child to make
wise choices with their allocated screen time.

WORKSHEET: CYBERBULLYING MULTIPLE CHOICE


Name: ____________________________________________________

Cyberbullying is:
a. Using online technology to deliberately and repeatedly bully someone.
b. Using online technology to make someone feel insecure and miserable.
c.

Using online technology to make someone feel isolated and friendless.

d. All of the above.

1. The types of people who are cyberbullied are:


a

Trouble makers.

a. Popular and outgoing.


b. Shy and sensitive.
c.

Anyone can be cyberbullied.

2. Cyberbullying is considered to be:


b

Not that serious everyone gets bullied at school.

d. Very serious it makes people feel unsafe at home as well as at school.


e. Fairly serious but only because there is always evidence.
f.

Who wants to be serious? I only go online for fun.

3. If I am being bullied on a social networking site I can:


c

Ask my friends to help me retaliate.

g. Try to forget its happening.


h. Use that sites report function.
i.

Never go online again.

4. A cyber bully is usually:


a. Big, mean, and obviously a bully.
b. Sneaky, anonymous, and will never be found out.
c.

A particular kind of extremely bad person.

d. Anyone, including my friends or I, if we arent careful about how we treat others online.

5. Ways to prevent cyberbullying include:


a. Not replying to hurtful messages or posts.
b. Using the block, report and privacy settings on the sites where cyberbullying behaviour is
occurring.

c.

Collecting evidence of cyberbullying behaviour, such as nasty texts and reporting it to a


trusted adult, like a parent or teacher.

d. All of the above.

6. Talking to a trusted adult about cyberbullying is:


a. A good idea. Theres no reason to suffer alone.
b. Not worth it because it will make the person who is doing the bullying angrier.
c.

Never a good idea, it can only make things worse.

d. A waste of time because they dont understand.

7. In a cyberbullying situation, a positive bystander is a person who:


a. Does not ignore what they see happening to someone else.
b. Asks the person who is the target of the bullying behaviour if they are OK.
c.

Reports the behaviour to someone who can help, like a trusted adult.

d. All of the above.

Anda mungkin juga menyukai