38
Lesson 1 of 4 30 minutes Curriculum expectations: C2.2, C3.2, 1.3, 1.4, 1.5 CyberCops Reviewing Cyber Harassment and Internet Safety Grade 8 Ophea | 2016 | CyberCops Lesson 1 of 4 30 minutes Curriculum expectations: C2.2, C3.2, 1.3, 1.4, 1.5 CyberCops Reviewing Cyber Harassment and Internet Safety Grade 8 Ophea | 2016 | CyberCops Learning Goals By the end of this lesson, students will be able to: apply interpersonal skills and critical and creative thinking skills as they demonstrate an understanding of cyberharassment and Internet safety while assessing potentially harmful situations and analyse the impact of violent behaivours. Facility Classroom, Computer Lab Equipment List Student Resource: Be Safe! Know Information and Communication Technology Uses Student Resource: Code of Conduct Student Resource: Cyber Graphic Organizer Student Resource: Information and Communication Technology (ICT) Inventory Student Resource: Steps in Decision-Making Model Teacher Resource: Decision-Making Model Checkbric Assessment Tool Teacher Resource: Four Corners – Student Sample Teacher Resource: Modified Word Wall – Student Sample Teacher Resource: Word Cards

Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

Learning Goals

By the end of this lesson, students will be able to:

apply interpersonal skills and critical and creative thinking skills as they demonstrate an understanding of●

cyberharassment and Internet safety while assessing potentially harmful situations and analyse the impact ofviolent behaivours.

Facility

Classroom, Computer Lab

Equipment List

Student Resource: Be Safe! Know Information and Communication Technology Uses

Student Resource: Code of Conduct

Student Resource: Cyber Graphic Organizer

Student Resource: Information and Communication Technology (ICT) Inventory

Student Resource: Steps in Decision-Making Model

Teacher Resource: Decision-Making Model Checkbric Assessment Tool

Teacher Resource: Four Corners – Student Sample

Teacher Resource: Modified Word Wall – Student Sample

Teacher Resource: Word Cards

Page 2: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

Minds On

Four CornersActivate students’ prior knowledge about cyberharassment using the Four Corners strategy. See TeacherResource: Four Corners – Student Sample for student samples of the strategy.

Have students brainstorm a definition of cyberharassment. Consider recording student responses forreference throughout the unit. Next have each student think about, and respond to, the following by goingto a corner picture that best represents their thoughts on the statement:

“Cyberharassment is a big deal/problem.”●

Students will move to their chosen corner and discuss in a small group why they chose that particularpicture. The pictures found in Teacher Resource: Four Corners–Student Sample can be enlarged forposting around the room.

Each group will decide on one idea to share with the whole class.

Have the various groups share the information gathered in the small group discussions with the wholeclass.

A&E - Minds On

Teacher observation of students' demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety

Action

Provide each student with a copy of Student Resource: Be Safe! Know Information and CommunicationTechnology Uses. Each student will indicate True or False under the “Before” column on his or her copy.Once complete, have students share their opinions with a partner and then with the class.

Consider encouraging students to think about any questions they may have around this anticipation guide

Page 3: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

and ask students to record the thoughts at the bottom of the page for use as a question swap later in theunit.

Students will use this guide in Lesson 4 to help fill out their decision-making model.

Word WallSee Teacher Resource: Modified Word Wall - Student Sample for student samples of the strategy.

Provide an introduction to the language that students will be exposed to in this unit (some may have beengenerated already through the previous activities, in which case there can be a comparison) and havestudents complete the modified word wall task using pre-made word cards to match key terms withdefinitions that will be useful during the unit. See Teacher Resource: Word Cards.

Distribute Student Resource: Information and Communication Technology (ICT) Inventory. Have eachstudent individually complete Student Resource: Information and Communication Technology (ICT)Inventory.

With an elbow partner (a group of 2 or 3 students sitting near each other), have students share theinformation that they recorded on the Student Resource: Information and Communication Technology (ICT)Inventory sheet. Have students highlight any answers they have given that could put them at risk whenthey are communicating using these ICT’s.

If time permits provide an opportunity for the whole class to share some ideas around the ICT Inventoryusing a “popcorn" style of commenting (e.g., if a student has something to share they stand up and shareand sit right back down again allowing for another student to pop up and share. This continues for a fewminutes until all comments have been shared.)

Have students work with their partner and another pair to brainstorm some familiar terms that are usedwith respect to ICT. Have each group share their list with the class. Record the words on the chalk boardor chart paper.

A&E - Action

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using Student

Page 4: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

Resource: Information and Communication Technology (ICT) Inventory

Consolidation

CyberGraphic Organizer IntroductionIntroduce Student Resource: Cyber Graphic Organizer. The organizer will be used starting in Lesson 2.Students will complete the organizer using information gathered throughout the unit.

Introduce Teacher Resource: Decision-Making Model Checkbric Assessment Tool and Student Resource:Steps in Decision-Making Model and explain that they will be analysing a case scenario for use as a finalassessment.

Students demonstrate their understanding of the assessment tools by giving a thumbs up (if theyunderstand), thumbs middle (if they have questions), thumbs down (if they need more information).

A&E - Consolidation

Teacher observation of students demonstrated understanding of the assessment tools using the ThumbsUp Strategy

Ideas for Extension

Code of Conduct with respect to “Online” acceptable conductHave students read the Code of Conduct provided in Student Resource: Code of Conduct and discuss witha partner or a small group what is missing and what might need to be added to the code to reflect themany uses of ICT.

Students can also examine their school’s Code of Conduct related to technology use and makerecommendations to the principal for items to be added to ensure students are safe on the Internet andare using the various forms of ICT in an appropriate manner.

Page 5: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 1 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Reviewing Cyber Harassment andInternet SafetyGrade 8

Ophea | 2016 | CyberCops

Notes to Teacher

Students will be introduced to new terminology related to Information and Communication Technology(ICT). Students need to recognize that software piracy, fraud, bullying and other inappropriate activitiesoften happen on the Internet and that there are consequences for these behaviours. Discussion of theseterms will occur during the activities within the lessons.

Page 6: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 2 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Playing the GameGrade 8

Ophea | 2016 | CyberCops

Learning Goals

By the end of this lesson, students will be able to:

apply interpersonal skills and critical and creative thinking skills as explore the Air Dog game while assessing●

potentially harmful situations and analyse the impact of violent behaviours.

Facility

Classroom, Computer Lab

Equipment List

Air Dogs game (loaded on a computer or multiple computers)

Student Resource: Air Dogs Log Book

Student Resource: Be Safe! Know Information and Communication Technology Uses

Student Resource: Cyber Graphic Organizer

Student Resource: Information and Communication Technology (ICT) Inventory

Teacher Resource: Air Dogs Log Book Answers

Teacher Resource: Introduction to the Game (The Real Story)

Minds On

Page 7: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 2 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Playing the GameGrade 8

Ophea | 2016 | CyberCops

Before going to the computer lab or accessing the Air Dogs game, it is essential that the followingintroductory information about the game is shared with the students.

The Game - Explain that the Air Dogs game is based on a real life story that happened in the United States.●

Read Teacher Resource: Introduction to the Game to the class prior to playing the game. The Air Dogs gamehas three streams of video: from the RCMP office in Quebec, the Homeland Security office in Vermont, andfrom the video chats of Luke and Marisol. Consider using a map to share with students the geographicallocation of the three areas.CyberCops - Inform students that they are taking on the role of a CyberCop to gather information and help●

solve challenges throughout the game. It is important for students to understand their overall purpose forcompleting the game is to 1) Beware of Internet Fraud; 2) Avoid Counterfeit Software; 3) Report Bullying.AirDogs Log Book - It is essential that students collect information as they go through the game. There will be●

five challenges throughout the game that the students must recognize and input information accurately inorder to move on. Provide each student with Student Resource: Air Dogs Log Book to record their responsesto the clues and important information as they play the game. Inform students that if they do not accuratelysolve the clue within three attempts, they are to bring the log book to the teacher who will provide the correctresponse.Time - Remind students that there is a limited amount of time to complete the game.●

A&E - Minds On

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Air Dogs Log Book

Action

The game may be played on a single computer (theatre style) or in small groups on multiple computers. Ifworking in a large group, assign one or two students to use the keyboard and have the rest of the classcall out their answers to the challenges. If playing in small groups of 2-3 students, consider assigning rolesfor each student in the group (e.g., timekeeper, keyboard user, recorder). It is important to support anddirect game play regardless of style chosen.

Begin the game.

Page 8: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 2 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Playing the GameGrade 8

Ophea | 2016 | CyberCops

Caution: If you press ‘Escape’, the program stops and you must restart from the very beginning of theprogram. The game must be played in sequence as it cannot be stopped and restarted at the pointstopped. Once a correct answer is entered, the program continues directly to the game and cannot bestopped. Thus, any important discussions or instructions should be given before the correct answer isentered or one must wait until the end of that game sequence so as to avoid disturbing students’concentration during the game. There is an opportunity to advance more quickly through the game; toskip a clue, wait for the dialog box to appear and type in the work “skip”.

A&E - Action

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Cyber Graphic Organizer and Student Resource: Air Dogs Log Book

Consolidation

Allow students time to complete Student Resource: Air Dogs Log Book. Have students make connectionsbetween the game and their life. “What is similar? What is different? How might you respond?” Addressand clarify any questions that may have arisen after playing the game.

In pairs, have students complete the sections on Student Resource: Cyber Graphic Organizer.

A&E - Consolidation

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Cyber Graphic Organizer and Student Resource: Air Dogs Log Book

Page 9: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 2 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Playing the GameGrade 8

Ophea | 2016 | CyberCops

Ideas for Extension

After playing the game, have students review and consider changes or additions to their StudentResource: Information and Communication Technology (ICT) Inventory. As a further task, have studentsindicate True or False under the “After” column on Student Resource: Be Safe! Know Information andCommunication Technology Uses.

Notes to Teacher

It is recommended to play the game prior to introducing it to the classroom to be familiar and comfortablewith the program.

When preparing this sub task, a copy of Teacher Resource: Introduction to the Game (The Real Story) willbe needed to read to the students.

Become familiar with Teacher Resource: Air Dogs Log Book Answers as it provides the correct responsesto each of the five main clues in the game. It is important to bring this sheet when playing the game as aquick reference. You cannot progress through the program without the correct responses.

Page 10: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 3 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Identifying Ways to be SafeGrade 8

Ophea | 2016 | CyberCops

Learning Goals

By the end of this lesson, students will be able to:

apply interpersonal skills and critical and creative thinking skills as they identify similarities and differences●

between the situations in the game and their own lives, and identify how to deal with them appropriately andsafely, as they describe the role of support services in prevention of violence.

Facility

Classroom, Computer Lab

Equipment List

Markers

Student Resource: Air Dogs Internet Safety Poster Sample

Student Resource: Air Dogs Internet Safety Poster Template

Student Resource: Cyber Graphic Organizer

Student Resource: Profile Recorder

Student Resource: Understanding Internet Safety Protocol

Minds On

Use a think pair share activity to generate discussion about what made Luke vulnerable. Ask students toindividually read and reflect on what each wrote in Student Resource: Cyber Graphic Organizer. Then inpairs have students share what each wrote in their Cyber Graphic Organizer. Students will discuss some of

Page 11: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 3 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Identifying Ways to be SafeGrade 8

Ophea | 2016 | CyberCops

the unsafe practices that Luke demonstrated during the game. What was it that made Luke vulnerable?

A&E - Minds On

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Cyber Graphic Organizer

Action

Lead a class discussion about what students saw in the game about how Luke was vulnerable to bullyingand extortion.

Have the students individually complete Student Resource: Profile Recorder in order to identify and recordhow Luke was enticed to make the choices that he did. Students examine the similarities and differencesbetween Luke’s character and themselves to complete the remaining sections.

A&E - Action

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Profile Recorder

Consolidation

Have students complete the questions on the bottom of the Student Resource: Profile Recorder as an “exitpass”. An “exit pass” refers to an activity that students will need to complete at the end of class toconsolidate their learning. Have students identify “three to five ways to prevent myself from being

Page 12: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 3 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Identifying Ways to be SafeGrade 8

Ophea | 2016 | CyberCops

cyberharassed” and “what supports are available to me”.

A&E - Consolidation

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using StudentResource: Profile Recorder

Ideas for Extension

Using Student Resource: Understanding Internet Safety Protocol have students read through the articleand discuss how they are currently being safe on the Internet and when sharing through social media, andwhat they could do to be safer when using ICT.

Using Student Resource: Air Dogs Internet Safety Poster Template (or create your own) have studentsdevelop a poster addressing Internet safety. Ensure that students include the three main points addressedin the Air Dogs resource:

Beware of Internet Fraud1.Avoid Counterfeit Software2.Report Bullying3.

Consider distributing Student Resource: Air Dogs Internet Safety Poster Sample as an example of anInternet Safety Poster.

Page 13: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 4 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Analyse Situations That ArePotentially Dangerous to PersonalSafetyGrade 8

Ophea | 2016 | CyberCops

Lesson 4 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Analyse Situations That ArePotentially Dangerous to PersonalSafetyGrade 8

Ophea | 2016 | CyberCops

Learning Goals

By the end of this lesson, students will be able to:

apply interpersonal skills and critical and creative thinking skills as they analyse situations that are potentially●

dangerous to their personal safety; and

identify support services and explain how to access them.●

Facility

Classroom, Computer Lab

Equipment List

Student Resource: Be Safe! Know Information and Communication Technology Uses

Student Resource: Steps in Decision-Making Model

Teacher Resource: Decision Making-Model Checkbric Assessment Tool

Teacher Resource: Decision Making-Model Sample for Luke

Teacher Resource: ICT Case Scenarios

Minds On

Model a decision-making process by working through one of the dilemmas that Luke encountered in thegame (e.g., the decision to help Terry sell laptops; the decision to not come forward with information

Page 14: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 4 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Analyse Situations That ArePotentially Dangerous to PersonalSafetyGrade 8

Ophea | 2016 | CyberCops

when Marisol questions him; the choice to not implicate Terry because he is worried about hissnowboarding career). Using Teacher Resource: Decision-Making Model Sample, lead a class discussion.

A&E - Minds On

Teacher observation of students’ demonstrated understanding of the decision-making process as theydemonstrate an understanding of cyberharassment and Internet safety while assessing potentiallyharmful situations

Action

Have students individually analyse a case scenario (see Teacher Resource: ICT Case Scenarios) bycompleting Student Resource: Steps in Decision-Making Model for one of the case scenarios.

Distribute or post Teacher Resource: Decision-Making Model Checkbric Assessment Tool and discuss theassessment tool.

Have students identify the problem, explore the options or alternatives, evaluate the possibilities,consider the consequences, make a decision, and reflect on that decision.

To help students in the decision-making process have them refer back to Student Resource: Be Safe!Know Information and Communication Technology Uses.

A&E - Action

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyberharassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using TeacherResource: Decision-Making Model Checkbric Assessment Tool

Page 15: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Lesson 4 of 430 minutesCurriculum expectations: C2.2, C3.2, 1.3, 1.4,1.5

CyberCops

Analyse Situations That ArePotentially Dangerous to PersonalSafetyGrade 8

Ophea | 2016 | CyberCops

Consolidation

Have students create a Public Service Announcement (PSA). Students choose one piece of Internet safety(direct messaging, social media, account security, hacking, blogging, etc.) and make their audience awareof how to stay safe. Students also choose a target audience and a medium for the PSA. The PSA can bedelivered through a poster, video, rap/song, story, or PowerPoint presentation. Students need to addressthe following areas:

Safety concern●

Strategies on how to be safe●

Available supports that assist victims of violence●

A&E - Consolidation

Teacher observation of students’ demonstrated application of interpersonal skills and critical and creativethinking skills as they demonstrate an understanding of cyber harassment and Internet safety whileassessing potentially harmful situations and analyse the impact of violent behaviours using TeacherResource: Decision-Making Model Checkbric Assessment Tool

Page 16: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Steps in Decision-Making Model

Healthy Living Air Dogs (Page 1 of 1)

What is the problem?

What are the situations that are dangerous?

What are the options and choices? Analyse and weigh the options keeping in mind the consequences (include supports that are available).

Option 1 Option 2 Option 3

Consequences Option 1 Consequences Option 2 Consequences Option 3

Make a decision based on your options Reflect on your decision. I chose this option because...

Page 17: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Understanding Internet Safety Protocol

Healthy LivingAir Dogs (Page 1 of 2)

As we begin to delve into this vast open space we refer to as the Internet, we must first examine and adhere to a set of protocols to ensure our safety needs are met.

It is very easy to hop onto a Direct Messenger (DM) service while at home doing homework or even in school when doing class work. As long as the computer you are using has allowed you to download and install the DM software, you’re set to chat with friends and anyone else who chooses to chat with you.

So what’s the big deal? Why does everyone want us to stay so anonymous when we’re using the Internet? I could win a trip to Florida by filling in the contest pop-up form. Or, I can win an iPod or the new X-box gaming console if I just give them my address and phone number. It will even get sent to my home!

The big deal is that there are many companies that use this information for other purposes. They can sell your personal information to anyone. The person who created the contest form may not even be part of a company, but possibly someone who is an ‘online predator’. By providing information and interacting (i.e. chatting) in an online environment like the Internet, we open up our vulnerabilities to people we just don’t know. This is what makes the Internet an ‘unsafe’ place. This is why we need to know and understand Internet safety protocols.

1 Chat with people you know. Be aware that the person you are chatting with via Instant Messaging may not be who he/she claims to be. There have been many instances where students are under the impression they are talking with a youth, when in fact the person is actually an older adult. Just because you talk to them on a regular basis online, does NOT make them a friend.

2 Keep all personal information off the Internet. We refer to information about you as personal information because it is just that – personal. Never give out specific information about yourself online, whether you are filling out an email application form or a contest form that states you’re a winner! Both attempts are made by the form designer to manipulate you into providing information to them. It’s easy to get caught – be cautious.

3 Keep your passwords private. When registering for email accounts – or a school network account – try to use a password that no one can guess. Family and pet names, birthdates and nicknames are too easy to guess for someone who wants access to your account. Never share you password with anyone – even a best friend. You never know how careful they are when using it. If you think someone might have guessed your password, change it right away.

4 Protect your computer. Another way to protect yourself is to actually protect your computer. Make sure that you have a current anti-virus software program installed on your computer. It’s also a good idea to make sure that you have installed an anti-spyware software. Spyware software can take partial control of your computer to do a variety of things without your consent. Protect yourself by protecting your computer.

Page 18: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Understanding Internet Safety Protocol

Healthy LivingAir Dogs (Page 2 of 2)

5 Cyberbullying can take many forms today. You may be bullied in an instant message; an online chat room; an email or text message; or you may even be mentioned on someone’s website in a negative way. If you feel you are being bullied online there are several steps to help your situation. a) T urn to a trusted adult. It might sound cliché, but trusting an adult with this information

really does help. This could be your parent/guardian, caregiver or a teacher you get alongwith. Talking about this with an adult can help the situation before it becomes even worse.

b) Never agree to meet someone you don’t know . If you like to DirectMessage (DM) then you’re just like most youth your age. This is a lot of fun to use, but be wary ofwhom you arechatting with. A friend of a friend who you don’t really know may simply be impersonatingsomeone your age. People you invite to chat with that you have never met may be dangerous people. Never agree to meet someone in person who you don’t know. If you really want to meet someone that you have met in an online environment, take an adult with you. If the personis safe they shouldn’t object to meeting you with another person. If someone continuallymakes you feel uncomfortable by inviting you to chat ‘privately’ online, or threatens you in some form, tell an adult or contact your local police.

c) Have you ever thought about blocking? If someone invites you to chat or wants to be addedto your DM ‘contact list’, but you don’t recognize the name – simply block that person. If they are indeed one of your friends then they can tell you their ‘online name’ when you see them in person. By blocking people you don’t know you are essentially blocking possible bullies. If the bully doesn’t get a rise out of you because you do not respond to their negativeemails or have blocked them, they may stop bullying you.

Page 19: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Be Safe! Know Information and Communication Technology Uses

Healthy Living Air Dogs (Page 1 of 1)

Before

True FalseStatement

After

True False

1. Direct Messaging people I do not know is dangerous.

2. It is important to always use a good, up-to-date anti-virusand spyware blocking program.

3. Bullying can instigate further violent acts such as assault,robbery and extortion.

4. Posting information that may be used to identify or findyou offline such as full name, address, cell or phonenumber, school or sports team, or links to sites thathave that information is not recommended at any time.

5. It is advisable to keep your password a secret even if anemail asks you to log on to a site.

6. It is possible to talk to several people at once withoutknowing it.

7. Your computer camera images could easily be sharedanywhere by anyone.

8. Software piracy and computer hacking are “cool” activities.

9. People can be bullied using Information and CommunicationTechnologies.

10. 21% of kids have received mean or threatening email orother messages.

11. 65% of students between 8-14 have been involveddirectly or indirectly in a cyberbullying incident as thebully, victim or friend.

12. 40% of students have had their password stolen andchanged by a bully (locking them out of their ownaccount) or sent communications posing as them.

Question Swap

One or two questions that I have are:

1.

2.

Page 20: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Code of Conduct

Healthy Living

Air Dogs (Page 1 of 1)

Code of Conduct

What does the Code of Conduct Say:

Standards of Behaviour

Respect, civility and responsible citizenship All school members must:

• respect and comply with all applicable federal,provincial, and municipal laws;

• demonstrate honesty and integrity;• respect differences in people, their ideas,

and their opinions;• treat one another with dignity and respect at all

times, and especially when there is disagreement;• respect and treat others fairly, regardless of,

for example, race, ancestry, place of origin,colour, ethnic origin, citizenship, religion,gender, sexual orientation, age, or disability;

• respect the rights of others;• show proper care and regard for school property

and the property of others;• take appropriate measures to help those in need;• seek assistance from a member of the school

staff, if necessary, to resolve conflict peacefully;• respect all members of the school community,

especially persons in positions of authority;• respect the need of others to work in an

environment that is conducive to learningand teaching;

• not swear at a teacher or at another personin a position of authority.

What needs to be added:

Standards of Behaviour

Respect, civility and responsible citizenship All school members must:

iMinistry of Education. (2001). Code of Conduct, Ontario Schools. http://www.edu.gov.on.ca/extra/eng/ppm/128.pdf

Page 21: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Cyber Graphic Organizer

Healthy LivingAir Dogs (Page 1 of 1)

What types of ICT does he use? What enticed Luke to get involved with the Laptop scheme?

What are the positive choices Luke makes?

What are his past experiences with the law?

What are the negative choices Luke makes?

Luke15 years old

What prevented him from reaching out for help?

What supports are available to him?

What are the dangers associated with the ICT used by Luke?

Page 22: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Information and Communication Technology (ICT) Inventory

Healthy LivingAir Dogs (Page 1 of 1)

What does ICT mean?

What types of ICT do you use?

What are the dangers associated with using ICT?

Types of ICT regularly used by the public are...

What are your family rules around using ICT?

Some inappropriate uses of ICT are...

ICT Inventory

Page 23: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8

Student Resource: Air Dogs Log Book

Healthy LivingAir Dogs (Page 1 of 1)

Air Dogs Log Book

Question 1: Stephen challenges the players to compare the legitimate disc with one that Luke has burned in the basement. How can you spot the fake?

Answer:

Question 2: a) Using the Bar Code Chart, what is the waybill number? b) What does Luke’s package contain? c) What are the credit card and expiration numbers from the waybill?

Answer: a)

b)

c)

Question 3: a) Can you find the password to open Luke’s email? b) Who has sent Luke emails? c) Who is responsible for creating the bullying website?

Answer: a)

b)

c)

Question 4: a) Whose bank statement is this? b) What is the hidden message? c) What is Terry’s bank account number?

Answer: a)

b)

c)

Question 5: What is the latitude and longitude of Terry’s location?

Answer: latitude: longitude:

Page 24: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Air Dogs Internet Safety Poster Sample

Healthy Living Air Dogs (Page 1 of 1)

Luke is an airdog. He pushes himself past the limit – on the mountain and on-line. Did he go too far this time?

A computer game about risks and consequences.

PROTECT YOURSELF

Don’t Pirate Software. Software piracy is copying games, movies or music without

permission. It is just like stealing from a store. If you thought about the consequenc-es, would you do it?

Don’t Steal On-line. Friends may ask you to get involved in credit card fraud, promising

to reward you. Remember, if they were really your friends they wouldn’t ask you to commit a crime.

Report Bullying. If people are bullying you into doing things that are wrong, don’t

get involved! Tell an adult you trust: a parent, teacher or police officer. They can make a difference.

1 2 3

Page 25: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Air Dogs Internet Safety Poster Template

Healthy Living Air Dogs (Page 1 of 2)

Page 26: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Air Dogs Internet Safety Poster Template

Healthy Living Air Dogs (Page 2 of 2)

Select One Photo

A B

C D

Page 27: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Student Resource: Profile Recorder

Healthy Living Air Dogs (Page 1 of 1)

How was Luke vulnerable and enticed into the choices he made? (Consider the ICT’s he used, his character, social influences, parent/guardian influences, past experiences and interests.)

How am I vulnerable and how could I be enticed into making unsafe choices? (Consider the ICT’s you use, your own character, social influences, parent/guardian influences, past experiences and interests.)

Similarities (between Luke and me) Differences (between Luke and me)

ASS

P

EXIT

3 - 5 ways to prevent myself from being cyberharrassed What supports are available to me?

Page 28: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Decision-Making Model Checkbric Assessment Tool

Healthy LivingAir Dogs (Page 1 of 1)

By the end of grade 8, students will: • Analyse situations that are potentially dangerous to personal safety

• Identify support services that assist victims of violence, and explain how to access them

To assist in the assessment of student understanding related to the above expectations, use the ‘checkbric’ below with the decision making model (Student Resource 6) following Lesson 4.

Level 1

Students have identifiedthe problem and or dangers associated with it with limited ability.

Students have identified the options and supports available with limited ability.

Evaluates decision made with a limited degree of effectiveness.

Analyses the alternative or consequences of the scenario with a limited degree of effectiveness.

Level 3

Students have identified most of the problems and or dangers associated with it.

Students have identified most of the options and supports available.

Evaluates decision made with a considerable degree of effectiveness.

Analyses the alternatives or consequences of the scenario with a considerable degree of effectiveness.

Level 4

Students have clearly and accurately identified the problem and or dangers associated with it.

Students have clearly identified the options and supports available.

Evaluates decision made with a high degree of effectiveness.

Analyses the alternatives or consequences of the scenario with a high degree of effectiveness.

Level 2

Students have identified some of the problems and or dangers associated with it.

Students have identified most of the options and supports available.

Evaluates decision made with some degree of effectiveness.

Analyses the alternatives or consequences of the scenario with some degree of effectiveness.

Page 29: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Four Corners - Student Sample

Healthy LivingAir Dogs (Page 1 of 1)

Cyberharassment is a big deal/problem

Cyberharassment is a big deal/problem

• It is a hot hot topic right now…• I have been in the hot seat with this…

• I have a group of friends that hadsome problems with harassment onthe Internet

• My friends and I block out people wedon’t know

• I am not really sure if I know what is safe?• What happens if you get caught?

• I have been warned to monitor how I usethe computer because of some issues withinappropriate use of the Internet

• There are laws around cyberbullying just like traffic laws

Page 30: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8

Teacher Resource: ICT Case Scenarios

Healthy LivingAir Dogs (Page 1 of 2)

ICT Case Scenarios Case Scenario #1: Copyright Sameer bought a CD compilation from his classmate Mark. Mark charges $6 for a personalized music CD. Sameer doesn’t know where Mark gets all his music from, and has never bothered to ask.

Mark is using a free Peer to Peer software program that allows him to download music for free from other user’s computers. He is not paying for these downloads and is profiting from this illegal action by selling music CDs to his friends.

a) Is Sameer putting himself at risk by purchasing these burned CDs from Mark? b) Is Mark putting himself at risk by downloading the music and then selling CD compilations? c) If you had access to a computer that could download music or videos, would you download them?

Is this okay?

Case Scenario #2: Direct Messaging Lucy isn’t the most popular girl in grade 9, but she has a few good friends. She is smart, does her homework all the time, and last year her parent/guardians bought her a computer as a reward for graduating with honours. She uses it all the time now that she is in high school.

In her grade 9 geography class, Lucy is assigned to a group which includes some of the “cool” kids from her previous school. She offers to have the group meet at her house after school to work on the project.

When Lucy left her room to get some snacks for the group, one of the “cool kids” noticed her school Direct Messaging App was open, and used this access to send some messages from her account: 1. A cruel and hurtful message to Lucy’s good friend

2. A love note to the captain of the football team, and 3. A rude message to one of their teachers.

These messages have hurt Lucy’s reputation as a quiet and good student and as a good friend.

a) How did Lucy put herself in a position to be bullied? b) What could Lucy do to protect herself from this happening again?

Case Scenario #3: Chat Room Meetings Anita and her best friend Sandra both joined an online chat room about basketball. The group discusses all kinds of basketball topics (events, players, new moves, etc). Both girls participate in many of the discussion threads.

Lately, Anita has been invited to private chats with Jonathan – another member of the online group. Recently, Jonathan has been talking about a lot more than just basketball. He has been talking about wanting a girlfriendto hang out with and to play more than just basketball with. Jonathan seems like a really nice guy and his online profile is really similar to Anita’s. Anita decides to accept his invitation to meet at a downtown mall.It’s a public place so she knows she’ll be safe.

Anita decides not to tell Sandra or her parent/guardians about Jonathan’s latest flirtatious emails – and will tell them about their encounter after they meet.

a) Did Anita make an informed decision when she chose to meet Jonathan? b) Is Anita putting herself in a situation that is potentially dangerous to her personal safety? c) How could Anita have handled this situation differently?

Page 31: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8

Teacher Resource: ICT Case Scenarios

Healthy Living | Air Dogs (Page 2 of 2)

ICT Case Scenarios (cont.) Case Scenario #4: The Cyberbully Website Some of the kids at SunnyviewMiddle School decided to set up an anonymous website expressing their views about different students at their school. The first page contains an Internet Polling Survey listing the fattest student, the ugliest boy and the sluttiest girl in grade 8. Pictures were placed beside the names in each survey. Anna showed the site to her friend Kathy. Both of them are listed on the site.

The second page of the website shows many pictures of a handful of students with rude or cruel captions. Again Kathy found herself portrayed on this page with a caption that took her school picture completely out of context. What is even more distressing is that Anna found out about this website because her older sister had the web link sent to her as a text message on her cell phone. The website is being passed around the local high school to vote.

a) Is there anything Kathy or Anna can do now that they have found this site? b) Is there anyone they can talk to about this situation?

Case Scenario #5: Credit Card theft/fraud Layla decided to invite some friends over for a small house party while her parents/guardians were out for the night. One of her friends accidentally forwarded the email invitation to everyone in her address book. The email was then widely circulated. The result was that by 8 p.m. her house was overflowing with people.

Gary, the older brother of one of Layla’s friends stopped by, grabbed a slice of pizza then snooped around the house. In a short period of time he found Layla’s room and her wallet with the credit card her parents/ guardians had given her for emergency use. Gary copied down the credit card information and used it to buy several items over the next month online.

Enjoying the fruits of his labour, Gary threatened to tell Layla’s parents/guardians about the party if she told on him. Since this was the first time Layla’s parents/guardians had trusted her to stay home alone, she does not want them to lose their trust in her.

a) How would you handle this situation if you were Layla? b) What would you do if you were one of her friends at the party? c) What are the potential consequences if she does not tell her parent/guardian? d) What are the potential consequences if she does tell her parent/guardian?

Case Scenario #6: Sext Jenny has been texting with a guy at school and after a couple of weeks of small talk he has started sending her sexts. She doesn’t like him that way and they make her feel uncomfortable. Now the guy has been pressuring her to send some back.

a) What are some of the risks Jenny is taking if she responds to the sext? b) In what ways might Jenny respond? c) Who could Jenny talk to for support?

Page 32: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8

Teacher Resource: Air Dogs Log Book Answers

Air DogsHealthy Living (Page 1 of 1)

Question 1: Stephen challenges the players to compare the legitimate disc with one that Luke has burned in the basement. How can you spot the fake?

Answer: hologram, TJ, logo

Question 2: a) Using the Bar Code Chart, what is the waybill number? b) What does Luke’s package contain? c) What are the credit card and expiration numbers from the waybill?

Answer: a) 0367294158

b) laptops, 2 laptops, two laptops

c) 4423 12/11

Question 3: a) Can you find the password to open Luke’s email? b) Who has sent Luke emails? c) Who is responsible for creating the bullying website?

Answer: a) snowboarder , snowboard and goggles

b) Terry, Continental Bank of Canada, Jeannette

c) Taylor and James or TJ

Question 4: a) Whose bank statement is this? b) What is the hidden message? c) What is Terry’s bank account number?

Answer: a) Luke’ s

b) You may need this GBAH DEBF GADE DDBC AB/AATerry

c) 02369257

Question 5: What is the latitude and longitude of Terry’s location?

Answer: latitude: 44.942˚ N longitude: 72.215˚ W

Please note if a computer malfunctions, teachers may want to go back to the same spot in the game quickly. To skip a clue, wait for the dialog box to appear and type the word “skip”.

Page 33: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Introduction to the Game (The Real Story)

Healthy LivingAir Dogs (Page 1 of 1)

The Air Dogs computer game is based on a 2003 police case from Massachusetts in which a U.S. snowboarding coach created an international cybertheft network and manipulated dozens of youth into assisting him.

In 2002, he was caught crossing the U.S./Canadian border with a notebook filled with stolen credit card numbers. He served three years in prison. After his release, he assisted LiveWires Design and the Massachusetts Association of District Attorneys in the development of this program.

In the fictionalized version of the story, Luke is a youth who shows great promise as a snowboarder. However, he needs money for gear and training in order to reach the top of the sport, so he begins to counterfeit software in his basement.

As the game opens, Luke has been arrested and convicted. Students examine the legal and illegal discs to see if they can spot the detail proving Luke has counterfeited the software.

Luke’s arrest is made all the more painful because his father, Stephen, is a police officer who works on joint projects with the U.S. Department of Homeland Security. Stephen’s counterpart in Vermont is Marisol, a by-the-book agent who has been sent in from New York City to step up law enforcement along the U.S./Canadian border.

When Stephen finds that his son is receiving courier packages from the U.S., he is suspicious. He asks students to track the waybill number of a parcel. They find it contains two laptop computers. But before Stephen can question his son, two bullies descend on Luke and threaten him. Luke hands over the laptops.

Stephen and Marisol disagree on how the problem should be addressed. As a father, Stephen wants to sort out the problem with the bullies privately; Marisol believes that the police should be involved. “Theft. Extortion. These are crimes, whether you are sixteen or sixty.”

The police seize the computers belonging to Luke and the two bullies. When students review the files they find that the older bullies were behind the software piracy. Luke, their younger accomplice, was pressured into taking the blame.

The files reveal there is only one bright light in Luke’s life: his snowboarding coach, Terry, who has praised Luke’s talent in a snowboarding magazine. But even Terry’s support proves to be a fantasy. When students strip away the color bands of a photograph Terry has sent, they discover a secret message with Terry’s bank account number.

Marisol suspects that Terry has been using stolen credit cards to buy laptops, which he ships to Luke. Although Luke believes he has a “job” selling laptops, he is actually fencing (selling) stolen property.

Faced with the possibility of spending the next year in jail, Luke gives Marisol a cell phone number she can use to track Terry. Students are given a 3-D map of the border area between Vermont and Quebec, and use triangulation to locate Terry.

The Department of Homeland Security tracks Terry with two infrared cameras, one on the ground and one in the air. Students must spot the tiny figure of Terry as he makes his way through the forest on snowshoes. When Marisol moves in for the arrest, Terry threatens his Canadian accomplice: “Luke, remember. If I go down, you go down.”

Page 34: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Decision-Making Model Sample for Luke

Healthy Living

Air Dogs (Page 1 of 1)

What is the problem?

Luke is being bullied by Taylor and James, both on the Internet and in person.

What are the situations that are dangerous?

Bullying can lead to more aggressive forms of violence. Other students may see that it is easy to bully Luke and may start to join in.

What are the options and choices? Analyse and weigh the options keeping in mind the consequences (include supports that are available).

Option 1

Ignore the problem and hope that it goes away.

Option 2

Fight back against Taylor and James.

Option 3

Go to a trusted adult for help, and tell them what Taylor and James have been doing.

Consequences Option 1

The bullying continues or it might even become more severe.

Consequences Option 2

The bullying might become more intense. More problems could be created by fighting back. The bullying might become more physical.

Consequences Option 3

Taylor and James could findthem ­selves in trouble . Taylorand James could come back to deal with Luke later. Other things that Luke has done may come out.

Make a decision based on your options

Go to a trusted adult for help, and tell the adult what Taylor and James have been doing.

Reflect on your decision. I chose this option because...

I chose this option because now someone else is aware of what is going on. Taylor and James now have to be aware that they might be seen by an adult when they are bullying Luke. Luke may find himself in trouble too, but at least the bullying will not continue from Taylor and James.

Page 35: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Word Cards

Healthy LivingAir Dogs (Page 1 of 2)

Smart Phone

A cell phone with a built-in camera with the ability to take photographs, access the Internet, and transmit video and video calls.

Information and Communication

Technologies (ICT)

Describe a range of technologies that are used to convey and or manipulate information. Examples of ICT include: Desktop Computers; Tablets; GPS systems; Mobile Cell Phones; Internet; Television; Satellite Radios; DVD’s and CD Rom’s; Digital Music Players; Digital Cameras and USB Flash Drives.

Instant Messaging

Communication software allows users to exchange information online in a synchronous (live) environment. Communication (usually between two people) is achieved instantaneously, hence the term ‘Instant Message’, also known as Direct Messaging [DM].

Peripherals

Include internal and external devices that are attached to your computer. Peripheral examples include: Scanners, printers, mice, keyboards, speakers, CD ROM drives and modems.

Page 36: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Word Cards

Healthy LivingAir Dogs (Page 2 of 2)

Pirating Software

The act of replicating software applications for the purpose of illegal distribution. Software is purchased with a specific licensing agreement. By copying CD ROMs a user is infringing upon this agreement.

URL (Uniform Resource

Locator)

The address of a resource or webpage displayed in the address bar of a web browser.

Web Browser

A software application that allows users to find, access and utilize information on the Internet.

Page 37: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Mo dified Word Wall - Student Sample

Healthy LivingAir Dogs (Page 1 of 2)

Modified Word Wall - Student Sample

Smart Phone Peripherals

ICT (Information and Communication technologies)

Instant Messaging

Pirating Software Web Browser

URL (Uniform Resource Locator)

Word Cards with Definitions

Smart Phone A cell phone with a built in camera with the ability to take photographs, access the Internet and transmit video and video calls.

Web Browser A software application that allows users to find, access and utilize information on the Internet.

Page 38: Reviewing Cyber Harassment and Internet Safety · Reviewing Cyber Harassment and Internet Safety. Grade 8. Ophea | 2016 | CyberCops. Minds On. Four Corners. Activate students’ prior

Ophea | 2016 | Air Dogs (Grade 8)

8Teacher Resource: Mo dified Word Wall - Student Sample

Healthy LivingAir Dogs (Page 2 of 2)

Peripherals Include internal and external devices that are attached to your computer. Peripheral examples include: scanners, printers, mice, keyboards, speakers, CD ROM drives and modems.

URL The address of a resource or webpage displayed in the address bar of a web browser.

Instant Messaging Communication Software allows users to exchange information online in a synchronous (live) environment. Communication (usually between two people) is achieved instantaneously, hence the term ‘Instant Message’, also known as Direct Messaging [DM].

Pirating Software The act of replicating software applications for the purpose of illegal distribution. Software is purchased with a specific licensing agreement. By copying CD ROMs a user is infringing upon this agreement.

ICT Describes a range of technologies that are used to convey and or manipulate information. Examples of ICT include: desktop computers; tablets; GPS systems; mobile cell phones; Internet; television; satellite radios; DVD’s and CD Rom’s; digital music players; digital cameras and USB flash