Presentation on theme: "Grammar school 1567 Moscow LESSON IDEAS Ramilia Tikhonova Lisova Helena."— Presentation transcript:
Grammar school 1567 Moscow LESSON IDEAS Ramilia Tikhonova Lisova Helena
E - SAFETY INTERMEDIATE
WARM UP ANSWER THE QUESTIONS 1.What is your favourite online activity? 2.Do you use the Net for chatting? 3. What services do you use to chat with people online? 4.Who has a camera phone? 5.Whose phone has Bluetooth?
WHAT ARE THE RISKS OF USING THE NET and MOBILE PHONES?
THE RISKS OF THE NET -Inappropriate content -Unreliable information -Levels of violence in video games -Identity theft -Unwanted contacts by strangers -Internet addiction
Cyberbullying: A Victim’s Story (http://news.bbc.co.uk/2/hi/uk_news/education/ stm) (http://news.bbc.co.uk/2/hi/uk_news/education/ stm) “Cruel abuse She is an engaging and attractive girl, 17 years old, with curly brown hair who is good at judo and teaches swimming at her local pool. Yet she describes being the victim of the most cruel abuse from girls at her last school over several years. It started in the ordinary way, with taunts and shoves in the corridor. But then the bullies got access to Julianne's web page on her social networking site. "Cyberbullying is worse than face-to-face bullying because it's bolder," she says. "If they are willing to put insults up where more people can see them, it means they are more serious. "If they say it to you in a playground, you can forget about it, but when it's posted in front of you it's there for you to constantly see, it sinks in more and you feel more threatened." When the bullies managed to get access to Julianne's instant messaging service, things took on an even more frightening turn. "When the message came up I thought it was a friend," explains Julianne. Stab threat "The conversation started normally and then they started saying the things they'd been saying at school, calling me a slag and a slut and all those words. "Then they started saying they were going to get me tomorrow and I was going to be stabbed and my brothers and mum and dad would be hurt.“ Julianne printed the conversation and took it to her father. "He started shaking and crying," she remembers. "Then … “ WHAT HAPPENED THEN?
Answer the questions: 1.Describe Julianne. 2.When and how did she become a victim of cyberbullying? 3.How did she feel? 4.Who did she share her worries with? 5.What could happen then? 6.What does Julianne say about being bullied and cyberbullied?
Match the words in the left column with the definitions in the right one: 1. abuse a) the use of ICT deliberately to upset someone 2. victim b) to push a knife into someone or something 3. taunt c) rude or offensive things that someone says when they are angry 4. shove d) a remark or joke intended to make someone angry or upset 5. bully e) a strong push 6. insult f) someone who uses their strength or power to frighten or hurt someone who is weaker 7. stab g) a remark or action that is offensive or deliberately rude 8. cyberbullying h) someone who suffers because of something bad that happens
Correct answers - Match the words in the left column with the definitions in the right one : 1.abuse 2.victim 3.taunt 4.shove 5.bully 6.insult 7.stab 8.cyberbullying c) rude or offensive things that smn says when they are angry h) someone who suffers because of smth bad that happens d) a remark or joke intended to make smn angry or upset e) a strong push f) smn who uses strength or power to frighten or hurt smn g) a remark or action that is offensive or deliberately rude smn or smth b) to push a knife into a) the use of ICT deliberately to upset smn
- Bullying is behaviour by an individual or group, usually repeated over time, that intentionally hurts another individual or group either physically or emotionally. -Cyberbullying is the use of ICT, particularly mobile phones and the Net, deliberately to upset someone else (harassment, threats, insults). Definitions of:
WHAT’S THE DIFFERENCE BETWEEN BULLYING AND CYBERBULLYING?
THE DIFFERENCE BETWEEN BULLYING AND CYBERBULLYING: Cyberbullying can occur 24/7 and invade personal space The audience can be very large and reached rapidly Anonymity of people who cyberbully Cyberbullying can take both between peers and across generations Some cyberbullying is unintentional
Video ‘Let’s Fight Together’ - take notes - 1.What happened to Joe? 2.What types of technology have been used to bully? 3.Who was involved in cyberbullying? 4.How did the other pupils react? 5.How was the problem solved?
After watching the video work in pairs, discuss the questions and report to the class: 1.How did Joe face cyberbullying? How did he feel? What sort of messages did he receive on his mobile? 2.What kind of threats are facing children online? 3.Did the boy`s mother help him to deal with bullying online? In what way? Do you agree that parents should take personal things of their kids without permission? Give your reason. 4.We can see the boy`s mother rushed to school for help. What can parents do to help keep their kids safe online? 5.What would you do if you were involved in such a situation?
What happened then (http://news.bbc.co.uk/2/hi/uk_news/education/ stm) (http://news.bbc.co.uk/2/hi/uk_news/education/ stm) “... we went to the police." The police managed to track the bullies down and used harassment orders to keep them away from Julianne and her family. It turns out Julianne did exactly the right thing. The government's guidance on cyberbullying advises victims to gather evidence to show to their head teachers, or if it's more serious to the police. With the right information cyberbullies can generally be tracked down. But it's harder to tackle those who've taken part less directly. They may be forwarding insulting texts or humiliating videos sent to them by the bullies. They may be gathering round a computer screen with their mates to laugh at material posted on the web.” ( By Kim Catcheside Social affairs correspondent, BBC News)
QUESTIONS TO THE TEXT 1.What did Julianne and her father do? 2.What did the police do? 3.Who is difficult to tackle? 4. Do you think that there should be a new law that could potentially make it illegal to criticize or make fun of somebody online? 5.What should be done to prevent kids from being cyberbullied online? 6.What can your school do to prevent on-line harassment? Do we need to update our school regulations?
Complete the sentences with these words and expressions: to track smb/smt down, harassment, to keep smb/smth away, it turns out, to gather evidence, to tackle smb, humiliating 1.It took the police quite a while to……….the bully …………….., but they eventually found him. 2.He had to apologize in front of everyone – it was so …………………….. 3.If I were you, I'd ……………. ……………. from that area at night. 4.Many schools are now trying to ………………… the problem of on-line abuse. 5.They had little difficulty in ……………….. abundant ………………. against a cyberbully. 6.Passive …………………….. became more and more active. 7.As …….. …………. …………….., friends sometimes become bystanders or even cyberbullies.
Correct answers - Complete the sentences with these words and expressions: to track smb/smt down, harassment, to keep smb/smth away, it turns out, to gather evidence, to tackle smb, humiliating 1.It took the police quite a while to track the bully down, but they eventually found him. 2.He had to apologize in front of everyone – it was so humiliating. 3.If I were you, I'd keep away from that area at night. 4.Many schools are now trying to tackle the problem of on-line abuse. 5.They had little difficulty in gathering abundant evidence against a cyberbully. 6.Passive harassment became more and more active. 7.As it turns out, friends sometimes become bystanders or even cyberbullies.
Make a list of key advice to prevent and respond to cyberbullying, don’t forget to use modal verbs.
Key Advice to Prevent and Respond to Cyberbullying Always respect others Think before you send Treat your password like your toothbrush Block the bully Don’t retaliate or reply! Save the evidence Make sure you tell: - an adult you trust - a provider of the service - your school
Prepare a poster, leaflet or presentation on SAFETY in the NET