-
Forever
-
Detectives
-
Hero
<
>
Cybersmart Forever addresses the risks involved in sharing digital images and how to approach any challenges that might come up.
DISCUSSION – Should I post this?
Discuss the benefits and challenges of sharing content/images online.
- What types of content have you posted online?
- Why do kids like to share online?
- What types of content/images should you think twice before posting?
- When should you get advice before posting content/images online?
- How can you keep your location private as an extra security measure?
- Who should you share content/ images with?
- How do you control who sees what you share online?
- When should you share something that doesn’t belong to you?
ACTIVITY – ‘Share/post/delete?’
Work in groups of 3 to decide what to share online. There are no right or wrong answers, however you should be ready to share why you chose to share, post or delete.
When deciding, consider the following:
* What would be the long-term effects of my action?
* Who might be hurt by my actions?
* What rights do I have in this situation?
* What responsibilities do I have in this situation?
Extension: Come up with your own example scenarios.
ADDITIONAL ACTIVITY – Instant respect design project
Design a visual product to encourage other students to be respectful when posting online. Consider a range of communication methods, e.g. flyer, infographic, artwork, poster or postcard.
Designs should include:
* An engaging design concept
* A range of media, e.g. paint, pencil, text, graphic design
* “How to” tips:
- protecting information and privacy
- when to accept friend requests and who to invite to be friends - do’s and don’ts of sharing content/images online
Design a visual product to encourage other students to be respectful when posting online. Consider a range of communication methods, e.g. flyer, infographic, artwork, poster or postcard.
Designs should include:
* An engaging design concept
* A range of media, e.g. paint, pencil, text, graphic design
* “How to” tips:
- protecting information and privacy
- when to accept friend requests and who to invite to be friends - do’s and don’ts of sharing content/images online
Cybersmart Detectives explores what could happen when someone reveals too much information online and it ends up in the wrong hands.
DISCUSSION
How did the Cybersmart Detectives video make you feel?
* What should you do when you receive a message that makes you feel worried? * What would you do if you were worried about your friend and did not know how to help?
* When would you get an adult involved with a friend’s problem?
* Discuss potential dangers linked with specific modes of online communication, such as social networking, gaming sites, smart phones, web cameras.
SOCIAL NETWORKING PROFILE - Protecting personal information
Create a personal profile, suitable to be posted online. Carefully consider the information this should include and exclude.
Safe profiles could include:
First name, nickname or pseudonym
Hobbies, interests with no specific details such as club name
Only photos where specific details can’t be identified such as school or sports uniform, location, time
Likes and dislikes such as movies or food
Safe profiles should not include:
Full name
Full name of friends or family
Birth date
Name of school or clubs/teams
Photos that can easily identify you e.g. school uniform
Home address, phone number
MY SUPPORT NETWORKS – self-reflection
Design your own list of trusted people you would contact if you were concerned about online harassment by a stranger or if you were
being cyber bullied.
Cybersmart Hero addresses the issue of cyberbullying and the power of those in the best position to disrupt cyberbullying—the bystander.
DISCUSSION -
* What does cyberbullying mean to you?
* How do you think you would feel if you were being cyberbullied?
* What can you do if you or someone you know is being cyberbullied? (bystander)
Read the following scenarios and choose the label that best describes the behaviour: Bullying or cyberbullying
A student creates a fake email address for a new classmate and uses it to send secret admirer emails to another classmate.
cyberbullying
Every lunchtime a student tells their friends to play in an area away from a new student.
bullying
A student uses a phone to take a funny photo of a friend. They think the pic is really funny so they add an embarrassing comment and send the photo to everyone at school.
cyberbullying
A student has a friend that loves horses. Before she gets to school you decorate her desk with pictures of horses.
not bullying
It is a casual dress day at your school. A student teases someone on the way to school, others joins in the name calling.
bullying
A student keeps sending anonymous text messages to someone they don’t like. That student, the recipient, does not find them funny.
cyberbullying
A new student starts at school and quickly becomes the most popular person at school. Someone creates a ‘We hate them’ group chat and encourages their friends to post nasty messages on it.
cyberbullying