9-12

=**Social Networking, Chat, and Cyberbullying**= =**Curriculum and Resources for Grades 9-12**= = =
 * Foundation Concepts:**
 * 1) The Internet was designed for sharing information and for making information public.
 * 2) Regardless of privacy settings, digital information can easily be made public, shared with others, copied, and saved - forever.
 * 3) People do things online they would never do in person.
 * 4) People need to protect and monitor their online reputation.
 * 5) The virtual world has real-world consequences.

Another video on protecting your information. media type="file" key="Cyberbullying - Broken Friendship 2000k.wmv" width="300" height="300" || What do you want the world to know about you? How can what is out there about you on the web be used for ill? For good? || Situations to go with Tracking Teresa video: Information to go with Broken Friendship. || [] || How do you know that others are who they say they are? ||  || [] Another "Think before you post" PSA []& || Who can see what you post on a chat room or Twitter? Is everyone in a chat room or on Twitter your true friend? Do they have your best interests at heart? If not, how can their knowledge of your thoughts/opinions/feelings be used against you? ||  ||
 * In addition to covering the Goals/Objectives with will all students, we recommend that teachers:**
 * Insert an Appropriate Use of the Internet statement in their syllabi.
 * Add digital citizenship expectations for every assignment that uses Internet technology.
 * Dedicate appropriate instructional time to teaching acceptable use of the technologies that are used for that course and avoiding cyberbullying.
 * Chat 9-12 ||
 * Goals/Objectives || Videos/Activities || Discussion Topics/Questions || Documentation ||
 * Protect Personal Information || This video shows how fast someone can find information about a person just from a screen name. media type="file" key="Tracking Teresa 2000k.wmv" width="300" height="300"
 * Recognize identity uncertainty || The main character in the video is young, but the story is a good story.
 * Awareness of grooming ||  ||   ||   ||
 * Know your audience || Think before you post PSA
 * When texting goes to far || Sherry Turkle TED Talk about being Connected, but Alone: [] || Texting is a primary focus of teens today. When does it cross the line from texting to sexting and who should be contacted if inappropriate information is shared? ||  ||

How can what is out there about you on the web be used for ill? For good? ||  || Activity:. Students first talk about common impressions of “stranger danger.” They learn why the term “online predator” is misleading, and how to identify more realistic forms of inappropriate contact. Students then discuss a story about a teen’s risky online relationship, and draw conclusions about how to stay safe online. || Risky Online Relationship activity talks about how "online predators" aren't always "an old person." It could be someone the same age or a couple of years older. Once you send inappropriate pictures, etc, they are permanent and could be used against you later. || Risky Online Relationship has worksheets and quiz at end || See website to download assignment. Lessons includes introduction video, lesson plan, and worksheets [] || Do colleges look at your online presence to determine scholarships, entrances, etc? Is what you're posting hendering or helping your future? || [] ||
 * Social Networking 9-12 ||
 * Goals/Objectives || Videos/Activities || Discussion Topics/Questions || Documentation ||
 * Privacy Settings || Activity: Construct a "privacy web" in which students start with 5 "friends." Have them give each friend 5 other friends, connecting at least one friend to one of your friends or one of your friend's friends. Have students then pick one of the friends in the network, and color that friend's circle (they can pick a color). Based on the connections that exist, have them color in with the same color every person in the network who would know have access to that friend's information. Students can see from this activity that something shared by one person can be accessed by at least double the number of that person's friends. || What do you want the world to know about you?
 * Protect Reputation (Public and Permanent) || Activity: Have students go to the Way Back Machine ([]). You may want to create a "broken link" to a worksheet or handout you post on the web by deleting it. Then, put the web address for that link into the Way Back Machine to see if you can get it back. This can show students that there are simple, publically accessible tools anyone can use to access supposedly deleted information.
 * Friends/Parents Information ||  ||   ||   ||
 * Understand Libel and Slander || Activity: Acceptable Social Networking from CyberSmart - see website for worksheets. "Students explore a scenario in which an angry student creates a false online identity in order to seek revenge. They explore ways to resolve the situation and develop a list of tips to help other teens avoid cyberbullying situations." || Discuss the responsibilities of the bystander as well. || [] ||
 * Monitor your online image – Google Alert || [[file:9-12-privacy-collegebound-lessonplan[1].pdf]]
 * Monitor your online image – Google Alert || [[file:9-12-privacy-collegebound-lessonplan[1].pdf]]
 * Monitor your online image – Google Alert || [[file:9-12-privacy-collegebound-lessonplan[1].pdf]]

What is the difference between disagreeing with someone and bullying them? || || International Stand Up to Bullying Day ([]) [] || Who is responsible for standing up to a bully? ||  || Find current news articles and summarize article || What are the legal consequences of bullying? What are the school consequences of bullying? || summaries ||
 * Cyberbullying 9-12 ||
 * Goals/Objectives || Videos/Activities ||= Discussion Topics/Questions || Documentation ||
 * Define cyberbullying || Groups will create a Digital Citizenship Presentation || Different areas of digital citizenship are discussed
 * Avoid being or helping a cyber bully || National Crime Prevention Council ([])
 * Actions for victims || Create a class policy with students that outlines the grievance policy for students who feel bullied while doing school work online. || What is the difference between disagreeing with someone and bullying them? ||  ||
 * Understand virtual world has real-world consequences || Activity: Research laws that have been enacted recently regarding cyberbullying.