CEV80309 Web Ethics and Safety Lesson Plan

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Web Ethics & Safety

Media Type: DVD


Duration: 59 minutes

Goal: To describe ethical and safety issues on the Internet and provide strategies and tactics to
effectively address those issues.

Description: The Internet has become an important tool in everyday life. While enjoying the
convenience of the Internet, one should also be aware of the ethical and safety issues online. This
presentation discusses the potential dangers and hazards of the Internet and provides skills to
prevent and respond to these issues.

Objectives:
1. To illustrate the issue of cyberbullying
2. To provide skills to respond to cyberbullying
3. To discuss the issue and provide skills to deter online predators
4. To illustrate the issue of sexting
5. To describe computer viruses and provide skills to avoid them
6. To state the issues and provide skills to deter identity theft
7. To demonstrate the security components in a network
8. To explain copyright law and address the issue of plagiarism

College & Career Readiness Anchor Standards for Reading

Reading Standards for Informational Text


Key Ideas & Read closely to determine what the text says explicitly and to make logical inferences from it; cite specific textual evidence
Details when writing or speaking to support conclusions drawn from the text.
Integrate and evaluate content presented in diverse formats and media, including visually and quantitatively, as well as in
Integration of words.
Knowledge &
Ideas Delineate and evaluate the argument and specific claims in a text, including the validity of the reasoning as well as the
relevance and sufficiency of the evidence.

College & Career Readiness Anchor Standards for Writing

Writing Standards
Text Types & Write arguments to support claims in an analysis of substantive topics or texts, using valid reasoning and relevant and
Purposes sufficient evidence.

Conduct short as well as more sustained research projects based on focused questions, demonstrating understanding of the
subject under investigation.
Research to Build
Gather relevant information from multiple print and digital sources, assess the credibility and accuracy of each source, and
& Present
integrate the information while avoiding plagiarism.
Knowledge
Draw evidence from literary or informational texts to support analysis, reflection, and research.
Web Ethics & Safety
College & Career Readiness Anchor Standards for Speaking and Listening
Speaking & Listening Standards
Comprehension &
Integrate and evaluate information presented in diverse media and formats, including visually, quantitatively, and orally.
Collaboration
Conduct short as well as more sustained research projects based on focused questions, demonstrating understanding of the
subject under investigation.
Research to Build Gather relevant information from multiple print and digital sources, assess the credibility and accuracy of each source, and
& Present integrate the information while avoiding plagiarism.
Knowledge
Draw evidence from literary or informational texts to support analysis, reflection, and research.

College & Career Readiness Anchor Standards for Language

Language Standards
Conventions of
Demonstrate command of the conventions of standard English grammar and usage when writing or speaking.
Standard English

Determine or clarify the meaning of unknown and multiple-meaning words and phrases by using context clues, analyzing
Vocabulary meaningful word parts, and consulting general and specialized reference materials, as appropriate.
Acquisition & Use
Demonstrate understanding of figurative language, word relationships, and nuances in word meanings.

Information Technology Career Cluster (IT)

Cluster Standard
Demonstrate positive cyber citizenry by applying industry accepted ethical practices and behaviors.

Describe trends in emerging and evolving computer technologies and their influence on IT practices.

Recognize and analyze potential IT security threats to develop and maintain security requirements.

Describe the use of computer forensics to prevent and solve information technology crimes and security breaches.

Compare key functions and applications of software and determine maintenance strategies for computer systems.

Web & Digital Develop, administer and maintain Web applications.


Communications
Career Pathway
(IT-WD) Comply with intellectual property laws, copyright laws and ethical practices when creating Web/digital communications.
Web Ethics & Safety
Class 7: Show the Network Security segment.
Remind students to use the Vocabulary
Handout and Worksheet as references.
Instruct students to complete the Map
Class1: Begin the class by distributing the
7 min. Your Network Activity. Allow time for
Vocabulary Handout and Worksheet for
students to complete the Assessment.
students to use as reference materials.
Show the Cyberbullying & Social Media
Class 8: Show the Copyrights & Plagiarism
6 min. segment. Complete the Words Matter
segment. Remind students to use the
Activity. Allow time for students to
Vocabulary Handout and Worksheet as
complete the Assessment.
references. Instruct students to start the
6 min. Style Guide Booklet Project. Allow time
Class 2: Show the Cyberbullying & Prevention
for students to complete the
segment. Remind students to use the
Assessment.
Vocabulary Handout and Worksheet as
references. Instruct students to start the
Class 9: Have students complete the Final
8 min. Stop Cyberbulling Project. Allow time
Assessment. Students will present their
for students to complete the
projects and turn in their essays.
Assessment.

Class 3: Show the Online Predators & Safety


segment. Remind students to use the
Vocabulary Handout and Worksheet as
references. Instruct students to Cyberbullying Research Center
 http://www.cyberbullying.us/
complete the What Did They Do
8 min. Institute of Electrical and Electronics Engineers
Wrong? Activity. Allow time for students
 http://www.ieee.org
to complete the Assessment. U.S. Copyright Office
 www.copyright.gov
Class 4: Show the Cell Phone Safety segment.
Remind students to use the Vocabulary
Handout and Worksheet as references.
Instruct students to start the Sexting
6 min. Cases Project. Allow time for students Business Professionals of America
to complete the Assessment.  Computer Network Technology
 PC Servicing & Troubleshooting
Class 5: Show the Viruses & Prevention  Computer Security
segment. Remind students to use the DECA
Vocabulary Handout and Worksheet as  Business Law & Ethics
references. Instruct students to start the Future Business Leaders of America
8 min. Protect Your Computer Project. Allow  Computer Applications
time for students to complete the  Computer Problem Solving
Assessment.  Cyber Security

Class 6: Show the Hacking & Identity Theft


segment. Remind students to use the
Vocabulary Handout and Worksheet as
references. Instruct students to start the  iCEV50533 Greg Bazar, Owner/Founder, Iron Fish
10 min. Investigating E-mail Scams Project. Technologies
Allow time for students to complete the  iCEV50481 Tom Kotara, IT Specialist, Med Group
Assessment.  iCEV50627 Shirley Dean, Educational
Diagnostician, Lubbock Independent School District
Web Ethics & Safety
Words Matter
Directions:
In order to gain an understanding of the role language plays on the Internet, ask students to list negative language they
have encountered on the Internet. In groups of three or four have students discuss how these words make them feel
and what would they do if someone said these words to them.

What Did They Do Wrong?


Directions:
To enhance the student’s understanding of unsafe or unethical computing practices, ask students to perform a skit of a
situation where inappropriate computer use such as posting private information online or adding a stranger as your
Facebook® friend has occurred. The audience will guess what the performers have done wrong and suggest the
appropriate computer use in the particular situations.

Map Your Network


Directions:
Distribute the Map Your Network Activity Sheet. Students will list the common network security devices discussed in the
segment. Students will draw graphics to explain the relationship among these devices and how they work to protect the
computer.

Stop Cyberbullying
Directions:
To increase awareness of cyberbullying prevention, students will create an informational poster. Divide students into
groups of three to four. Ask students to conduct research and create an anti-cyberbullying poster. Make sure they
include the definition, consequences and prevention methods of cyberbullying. The posters can be displayed in the
classroom.  
 
Sexting Cases
Directions:
Sexting has become an increasingly hot topic concerning today’s youth. Ask each student to use the Internet and find a
current event caused involving sexting. Students will write a 500-word essay discussing the case. Make sure students
thoroughly describe the case and provide suggestions about how the case could be avoided.

Investigating E-mail Scams


Directions:
E-mail scams are a common type of fraud used to target individuals on the web. Divide students into groups of three to
four. Ask students to conduct research about common e-mail scams. Students will create a Microsoft® PowerPoint®
presentation and share their findings with the class. Make sure they explain how these e-mail scams work and provide
skills to avoid becoming a victim.

Style Guide Booklet


Directions:
In order to not infringe on copyrights or violate intellectual property, have students to create a style guide booklet to
show proper citation. Ask students to conduct research about citing secondary sources. Choose a writing style such as
APA or MLA. Students will create a style guide booklet which can be used as a writing reference guide.

Protect Your Computer


Directions:
Computer viruses infect computers daily and can cause extreme damage to computers. Ask students to conduct
research about computer viruses. Each student will make a flyer to inform their friends and family about computer
viruses. Make sure they explain what a computer virus is, how a computer can get infected and how to protect a
computer from the attack of viruses.

You might also like