Presentation is loading. Please wait.

Presentation is loading. Please wait.

Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.

Similar presentations


Presentation on theme: "Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with."— Presentation transcript:

1 Personal Safety Level 5

2 Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.

3 All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

4 So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at www.isafe.org – Click on the link to contests and Incentives.www.isafe.org Empowerment is the Key to Learning!

5 Today you will be learning about personal safety when online. There are several activities incorporated into this lesson, including a cause and effect activity sheet. Additionally, you will be completing a presentation about Internet Safety while you learn, which can be used to support a Parent Night Event. The Plan

6 The Issue 1.What is Cyberspace, and how do we get there? 2.What are some of the ways we communicate in Cyberspace? 3.How do you know if someone is a stranger on the Internet? 4.What are possible reasons a stranger would contact you on the Internet? 5.What should you do if you get a message from a stranger on the Internet? Let’s figure out why personal safety is an issue in Cyberspace.

7 Teacher’s choice: For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups. When completed - Return here to Slide 13 Otherwise – let’s continue on…

8 We’re going to start with the Screen Name Game You can follow along on your activity page. We’re going to read through the information and complete the activities as we go along.

9 Online ID – What can you tell ? Directions: Look at the user names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative. 1.Jessica4dance 2.Smithstealshome 3.Bayareababe 4.dancinfun 5.Fred14

10 Time for Discussion Think about your own screen name. What does it say about you? When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information. Why do you think you shouldn’t include personal information? What are some of the dangers?

11 Password Protection Directions: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one. 1.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football. 2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake. 3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.

12 Time for Discussion Think about your own password. -Is it something obvious? -Could someone easily guess it? -Does anyone else know it? When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you. - What sorts of dangers are involved with others knowing or guessing your password?

13 Group Activity In small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information. Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.

14 Make sure you have a copy of the resource page to review: The FBI Internet Safety Tips i-SAFE’s 4’R’s RECOGNIZE REFUSE RESPOND REPORT

15 Let’s Brainstorm  Why do students feel safe on the Internet?  What are some dangers on the Internet?  What are some good things on the Internet?  How can you stay away from the dangerous things?

16 One-way to stay safe, is to not reveal any information about oneself online Never tell anyone: Your name Address Phone number Age Gender Family Names School Never give a stranger your picture These are all considered to be identifying or personal information.

17 I hope you learned something – I know I did! All right – let’s get into groups. Your teacher will divide you up for the next activity.

18 All right – Everyone in Groups? Good! Each group should have received a cause and effect sheet. I’m going to help you out and show you how to get started.

19 Here are the directions to get started  Brainstorm how each effect could have been avoided.  Brainstorm other possible effects of the person’s actions.  Present your information to the class.

20 So Get Started! Do your best on these cause and effect charts! Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.

21 Let’s Review! What have we learned about the following: Choosing a screen name? Choosing a password? Not revealing information? Consequences of actions?

22 What do you think? How are adults at risk on the Internet? List ways that adults use the Internet. How can issues such as screen name, password choice, and not revealing information online be important for parents/adults as well as children?

23 Create a Presentation Directions: As a class, run through the 5 slide presentation which begins with the next slide. The 5 Slide Presentation will be shown TWICE! Use the first time to become familiar with the slides and the information.

24 More Directions These slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet Safety. What information do your parents need to know to protect both themselves and their children? Use what you have learned to tell others how to stay safe online.

25 Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites and material And some that parents also face, such as: Identity Theft Monetary theft

26 Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online They use tools like chatrooms, Instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant – and chooses to talk to a stranger.

27 Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully People feel removed from what they say online – they feel anonymous. Unexpected participants – anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

28 Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you – use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to emails from strangers.

29 A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT

30 A Second Take… Now you are going to look at the slides again and write a “script” to coordinate with them. Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script. Practice the presentation so it flows smoothly for parent presentation.

31 Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites and material And some that parents also face, such as: Identity Theft Monetary theft

32 Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online They use tools like chatrooms, Instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant – and chooses to talk to a stranger.

33 Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully People feel removed from what they say online – they feel anonymous. Unexpected participants – anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

34 Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you – use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to emails from strangers.

35 A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT

36 Now Use It! Keeping others informed on Internet Safety is important. How can you use the presentation you just helped create to reach others in your school, faculty, and in your community? You can host a Parent Night using the slideshow! You can even order materials at www.isafe.org to help with the presentation. www.isafe.org

37 Tier 2 Opportunity The activity you've completed is set up to be used as a Tier 2 Activity. You can easily use it to host a Parent Night, School Assembly or other event. Find out how by going to the Kids and Teens page at www.isafe.orgwww.isafe.org Submit a plan online for a tier 2 activity/event and become eligible for larger incentives.

38 So How Do you Know When You’re Done? Have you: 1. Completed your cause and effect chart? 2. Shared your chart with your class? 3. Discussed as a class what you have learned about screen names, passwords, and online safety? 4. Checked out the Contests and Incentives link at www.isafe.org?

39 It doesn’t have to end here! Find out about DRiVE!

40 Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.www.isafe.org Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network.www.isafe.org It’s all online!

41 Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

42 www.isafe.org 1.Enroll online at www.isafe.org by clicking on Create an Account.www.isafe.org 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action


Download ppt "Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with."

Similar presentations


Ads by Google