Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Get this document free

11x17 - 6-8.docx - Wikispaces

VIEWS: 8 PAGES: 2

									GR Personal Safety                     Cyber Comm. Citizenship          Cyber Security                 Intellectual Property                   Predator Identification         Cyber Bullying
6  Build upon concepts                 The Internet Community is        An overview of cyber           Build upon concepts introduced in       Investigate and identify key    Build upon concepts
   introduced in previous grade        compared to the physical         security leads into a focus    previous grade levels, or use an age-   concepts associated with        introduced in previous grade
   levels, or use age-appropriate      community, with a focus on       on:                            appropriate introduction, to            responsible and safe online     levels, or use age appropriate
   introduction, to investigate and    rules and responsibilities as         Vocabulary               investigate and identify key concepts   interaction, with focus on      introduction to investigate
   identify key concepts               citizens.                                associated with e-     associated with responsible use on      issues associated with          and identify key concepts
   associated with responsible                                                  mail use               the Internet, focusing on the           Internet predators:             associated with cyber
   and safe Internet choices and       Student Activities:                   Attributes of            following concepts of Intellectual           Key characteristics       bullying and netiquette:
   behaviors as they pertain to:            Create a Venn                      computer viruses       Property:                                    Grooming process               Attributes and types
        Providing personal                    diagram to illustrate a       Consequences of               Attributes and types                   Proactive techniques           Expansion of
           information                         comparison of places             malicious behavior          Definitions of copyright and              to reduce risk                  definition
        Screen names and                      and citizenship                  involved in online             plagiarism                                                           Background on why
           passwords                           responsibilities, in the         communication               Techniques to avoid               Student Activities:                     – discuss motivation
        Online communication                  physical and cyber                                              intellectual property theft         Participation in the               for both
           methods                             communities              Student Activities:                    and plagiarism                         Information game
                                            Create a cyber-                 Develop a top ten             Consequences on intellectual             illustrates how          Student Activities:
     Student Activities:                       citizenship rule and             list of email rules            property theft                         indirect information         Complete a KEWL
         Create and Distribute                use a choice of               Create a slogan to                                                      is obtained                     (KWL) chart
            brochures about online             media/venue to share             reinforce the          Student Activities:                         Share Internet safety          Participate in an
            personal safety                    it with others:                  necessity of proper        Complete a persuasion chart               knowledge with                  Online Chat Aptitude
         Participate in a bingo               Display posters or               email etiquette            Create and share public                   parents/guardians               activity
            review game                        broadcast safe travel         Create a poster or              service announcements to                through a survey             Post suggestions for
         Host a Brochure                      tips                             webpage list                  promote information about            Incorporate the                   leading others in
            distribution table or           Incorporate this                   and/or slogan                 intellectual property rights            survey activity into a          learning about cyber
            cyber safety week                  activity into an I-              design                     Use PSA to promote an                     cyber safety week,              bullying on the bb.
                                               SAFE event such as a          Incorporate                     Internet Safety event                   open house, etc.             Incorporate ideas into
                                               Cyber-Safety                     activity into an i-                                                                                   a large cyber safety
                                               Day/Week                         SAFE event or                                                                                         event
                                                                                plan a separate
                                                                                event
7    Build upon concepts               The Internet is compared to      An overview of cyber           Build upon concepts introduced in       Investigate and identify key    Build upon concepts
     introduced in previous grade      the physical community,          security leads into a focus    previous grade levels, or use age       concepts associated with        introduced in previous grade
     levels, or use age appropriated   with a focus on the              on the aspects of cyber        appropriate introduction, to identify   responsible and safe online     levels, or use age-appropriate
     introduction to investigate and   following:                       bullying:                      key concepts associated with            interaction, with a focus on    introduction to identify key
     identify key concepts                  Who participated                Recognition              responsible use on the Internet,        issues associated with          concepts associated with
     associated with responsible            How people interact             Consequences             focusing on the following aspects of    Internet predators:             cyber bullying:
     and safe Internet choices and          The roles of the                Techniques to            Intellectual Property:                       Key characteristic             Attributes and
     behaviors as they pertain to:             community leaders                prevent or                  Attributes and types                   Grooming processes                types/expansion of
          Providing personal                                                   discourage                  Definitions of copyright and           Proactive techniques              definitions
             information               Student Activities:              Student Activities:                    plagiarism                              to reduce risk               Techniques to
          Screen names and                 Interview students              Participate in a              Techniques to avoid                                                       avoid/report bullying
             passwords                         about their online               self-esteem                    intellectual property theft     Student Activities:                  Consequences of
          Online communication                activities                       activity                       and plagiarism                      The Chat Race game                 cyber bullying
             methods                        Interview other                 Create a skit or              Consequences on intellectual             is used to identify
                                               school or community              scenario about a               property theft                         how predators in a       Student Activities:
     Student Activities:                       members about their              cyber security issu,                                                  chat room situation          Participate in the
           Create a lesson plan               online activities               which presents a      Student Activities:                            obtain information              Cyber Bullying
            and/or activity or use            Incorporate activity            modern problem            Complete a Cause and Effect              Share internet safety           scenario activity
            the library safe card, to          into an i-SAFE event            and appropriate              chart                                   knowledge with                 Create and broadcast
            teach others about                 or plan a separate              solution                  Create and share PSAs,                    parents/guardians               PSAs about Cyber
            online personal safety             event                          Use skits during             poems or jingles to promote             through a survey                bullying
         Choice of online or                                                  CLI for another              information about                      Incorporate the                Use PSAs to
            offline information                                                grade or                     intellectual property rights            survey activity into            advertise Internet
            review game                                                        incorporate into          Use PSAs to promote and                   CLI or another                  Safety event
         Engage in the Student                                                another event                Internet safety/responsibility          Internet safety event
            i-Adopt-a-School                                                                                event
            program
8   Build upon concepts                 The Internet community is      Overview of Cyber         Build upon concepts introduced in           Investigate and identify key    Build upon concepts
    introduced in previous grade        compared to the physical       security issues, with     previous grade levels, or use age-          concepts associated with        introduced in previous grade
    levels, or use age appropriate      community, with a focus on                               appropriate introduction, to identify
                                                                       details on specific threats                                           responsible and safe online     levels, or use age-appropriate
    introduction. To investigate        evaluating the                 and consequences of:      key concepts associated with                interaction, with a focus on    introduction to identify key
    and identify key concepts           appropriateness of websites         Computer viruses    responsible use on the Internet,            issues associated with          concepts associated with
    associated with responsible         considering:                        Trojan horses       focusing on the following aspects of        Internet predators:             cyber bullying:
    and safe Internet choices and           Age group                      Worms               intellectual property:                           Key characteristics            Expansion of
    behaviors as they pertain to :          Intended use                   Hacking                  Definitions of copyright and               Grooming process                  definition
         Providing personal                Reliability of                                              plagiarism                               Proactive techniques           Introduction of cyber
            information                        information             Student Activities             Laws governing intellectual                   to reduce risk                  stalking concept
         Screen names and                                                 Complete a KEWL              property                                                                 Laws governing
            passwords                   Student Activities:                   chart (KWLS-                                                   Student Activities:                     harassment online
         Online communication              Create a Webpage                 type)              Student Activities:                             Participation in the
            methods                            evaluation tool             Complete a topics         Playact a mock trial                         ID Match-up game         Student Activities provide
                                            Evaluate web pages               review crossword        Post, display or broadcast                   illustrates how screen   specific focus for grade
    Student Activities:                     Create and Display               puzzle                     mock trials and results                    names are used;          level:
        Engage in reading and                 posters or webpage to       Develop a way to          Hold a mock trial during                     including predator            Read victim stories
           discussion of true                  inform others about            share information          Internet Safety week or a                  example                          and write “Dear
           Internet crime stories              website evaluation             learned about              parent night                            Share Internet safety              Abby” type letters
        Create and present a               Incorporate activity             cyber security                                                        knowledge with                Create and publish
           presentation about                  into an i-SAFE event        Post suggestions                                                        parent/guardian                  articles about cyber
           online personal safety              or plan a separate             for leading others                                                    through a survey                 bullying and its
        Host an iSafe                         event                          in learning on the                                                 Incorporate the                    prevention
           Assembly Experience                                                designated online                                                     survey activity into          Incorporate published
                                                                              bulletin board                                                        the Assembly                     articles in a large
                                                                           Incorporate ideas                                                       experience or other              event: read over
                                                                              into larger cyber                                                     Internet safety event            school PA, handouts
                                                                              safety event

								
To top