cyberbullying_vs_cybercharming_lesson_plan_mcshinsky.docx | |
File Size: | 106 kb |
File Type: | docx |
Lesson Plan:
Cyberbullying vs Cybercharming
By Libby McShinsky
Tentative Date: First week of the school year Aug 27, 2012
Purpose: Proper communication is vital when exchanging ideas when using online internet devices.
Objective: Document three reasons why you cannot be a cyber bully, giving evidence for each reason using a technology device.
Gaining Attention (Anticipatory Set)
Two students are picked to read a pre-made script in front of the class. At first they read the script facing each other, then they turn around and read the another script back to back where they can’t see the face of the other person. The class is told to be ready to discuss how they were feeling during this experience.
Script Items: 2 cell phones for props, maybe a movable wall for the 2nd part
Click here for a copy
Facing Each other
Student 1: Good morning
Student 2: Hi
Student 1: Your hair looks nice today.
Student 2: This mess? Well, thanks anyway.
Facing Away From Each Other (pretend to be texting)
Student 1: Good morning
Student 2: Hi
Student 1: You are wearing the most disgusting clothes! I hate that I have to sit next to you today.
Student 2: It’s not my fault. My stupid mom didn’t wash my clothes and I have to wear this.
Student 1: Well, you look ugly…really ugly! (Another person steps in and takes the phone and texts this line.)
Student 2: I know.
Discussion Questions from: http://www.netsmartz.org/Cyberbullying
· Why do you think people cyberbully?
· How does your school deal with cyberbullying?
· Have you ever sent a mean message because you were upset?
· What would you do if someone created a mean, fake profile for you or one of your friends?
· How can you stop yourself from being cyberbullied?
· Who would you talk to if it happened to you?
Directions (stating objective) Write up on board or with document camera
Document three reasons why you cannot be a cyber bully, giving evidence for each reason using a technology device.
Recall (using prerequisite information)
Students list all the different times in their life they have been bullied in three minutes. (Computer or paper)Use Word document and have them bullet the list. At this time they do not write in full sentences.
Content (presentation of new material)
Application feedback (level 1) guided practice
Definition of Cyber bullying
1. Create a class definition of what is cyber bullying. Divide students up into groups of four. One of the students is the scribe on Google docs. Give 3-5 minutes working as a team. Present/revise as a class which means that one team will read their definition and then break for one minute as the rest of the class revises their work with ideas that they hadn’t thought about. By the time the last definition is read it should be an accumulation of all the thoughts in the class.
2. Read what the law states about cyber bullying. Handout or http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf
Read what a website states on cyber bullying. http://www.netsmartz.org/Cyberbullying click here for a copy
3. Do a compare and contrast of the two definitions using the computer and the overhead projector. Highlight in red what they forgot to put in the class definition. Give them a few minutes to revise their definition. Put their work up on the classroom blog.
4. Check for understanding. Survey Monkey assessment http://www.surveymonkey.com/s/NNH6KJW is the link to give to students
Webpage html code: <ahref="http://www.surveymonkey.com/s/NNH6KJW">Click here to take survey</a>
or
Click here for a copy
Assessment on the definition of Cyber bullying
1. T or F A friend calls you a name as you walk down the hall. You have just been cyber bullied.
2. T or F You can be bullied when instant messaging with anyone.
3. T or F When you forward a message that wasn’t very nice, you have just been a cyber bully.
4. T or F My friend agreed that what you wanted to post was funny even though it was embarrassing. This was not cyber bullying.
5. The following is where you can be cyber bullied:
a. instant messaging
b. social networking sites (like Facebook)
c. cell phones
d. all of the above
6. Cyber bullying victims are targeted:
a. late at night
b. right after school
c. any time
d. during school
Application feedback (level 2) guided practice
Vocabulary
1. Anticipation list of words on a paper copy or uploaded from the school folder to their computers.
Anticipation Guide
Click here for a copy
2. Vocabulary Game made up by Mrs. McShinsky http://www.Quizlet.com
http://quizlet.com/13040477/cyberbullying-vocabulary-words-flash-cards/
3. List of words(1/2 of the words) http://www.netsmartz.org/Cyberbullying
Flaming and Trolling- sending or posting hostile messages intended to “inflame the emotions of others
Happy-Slapping- recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
Identity Theft/ Impersonation- stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information.
Photoshopping- doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
Physical Threats-- sending messages that involve threats to a person’s physical safety.
Rumor Spreading- spreading gossip through e-mail, text messaging, or social networking sites
Embarrass- to make someone feel humiliated, discomfort, and shame. (opposite-- honor)
Harass-- to pester, bother, stalk, tease, hound, and to be a nuisance.
Intimidate—to threaten, frighten, scare, coerce, terrify, and to alarm.
Threaten—to endanger, hover, lurk, and creep up.
Hazing-- various rituals and other activities involving harassment, abuse or humiliation used as a way of initiating a person into a group
Retaliation—to revenge (opposite—forgiveness and acceptance)
Check for understanding: Survey Monkey Assessment: http://www.surveymonkey.com/s/N3QBZ7S
Website html code: <ahref="http://www.surveymonkey.com/s/N3QBZ7S">Click here to take survey</a>
Application feedback (level 2) guided learning
Research Time: Reading and Watching Videos
1. Using a graphic organizer, document three reasons why you cannot be a cyber bully as they watch the videos and read from the online website.
http://www.greatsource.com/iwrite/students/s_research_graph_org.html
Outline Format for Research-- sample copy
2. Document evidence for each reason. Upload from School Folder (you will need three Gathering Grids for each reason you select):
Click here for a copy
1st SUBJECT
SOURCE 1 Title of your sources
SOURCE 2 Title of your sources
SOURCE 3 Title of your sources
QUESTION 1
Write answers and where you found them
QUESTION 2
Write answers and where you found them
QUESTION 3
Write answers and where you found them
3. Go to http://www.netsmartz.org/Cyberbullying and search the website. Click here for a sample of what the website looks like
4. Students have headphones and computers to watch the following videos.
of real life stories. http://www.netsmartz.org/RealLifeStories
Teens talk back: http://www.netsmartz.org/TeensTalkBack
5. Read: http://www.cyberbullying.us/Top_Ten_Tips_Teens_Prevention.pdf Preventing Cyberbullying Top Ten Tips for Teens. Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D. January 2012
6. Read: http://www.cyberbullying.us/Top_Ten_Tips_Teens_Response.pdf
Responding to Cyberbullying Top Ten Tips for Teens. Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D. January 2012
7. View the video "Megan Meier Story". Note: This video displays a tragic situation which ended in Megan's death. You do not have to watch this. http://www.youtube.com/watch?v=HFsfDLCkfQU
8. NetsafeUtah handouts
http://www.netsafeutah.org/
Click here for a copy
Click here for a copy of pledge
Evaluation (eliciting performance)
Assessment: Using the information you have gathered, create a Voice Thread of your information. On the last slide have them make a commitment to not be a cyberbully. If they use pictures they need ask permission from the source.
http://voicethread.com/
Turn in to the school folder under your name the following:
1. Three Gathering Grids
2. Screen shot of your Quizlet score
3. Screen shot of your survey monkey last page of definition of cyberbullying
4. Screen shot of your survey monkey last page of vocabulary of cyberbullying
5. Link to their Voice Thread
6. Make two comments on two different students voice threads
Closure (retention and transfer)
Class discussion using the same questions that we started the lesson with. End with the idea that instead of being a cyberbully, make a choice to be cyber charming.
By Libby McShinsky
Tentative Date: First week of the school year Aug 27, 2012
Purpose: Proper communication is vital when exchanging ideas when using online internet devices.
Objective: Document three reasons why you cannot be a cyber bully, giving evidence for each reason using a technology device.
Gaining Attention (Anticipatory Set)
Two students are picked to read a pre-made script in front of the class. At first they read the script facing each other, then they turn around and read the another script back to back where they can’t see the face of the other person. The class is told to be ready to discuss how they were feeling during this experience.
Script Items: 2 cell phones for props, maybe a movable wall for the 2nd part
Click here for a copy
Facing Each other
Student 1: Good morning
Student 2: Hi
Student 1: Your hair looks nice today.
Student 2: This mess? Well, thanks anyway.
Facing Away From Each Other (pretend to be texting)
Student 1: Good morning
Student 2: Hi
Student 1: You are wearing the most disgusting clothes! I hate that I have to sit next to you today.
Student 2: It’s not my fault. My stupid mom didn’t wash my clothes and I have to wear this.
Student 1: Well, you look ugly…really ugly! (Another person steps in and takes the phone and texts this line.)
Student 2: I know.
Discussion Questions from: http://www.netsmartz.org/Cyberbullying
· Why do you think people cyberbully?
· How does your school deal with cyberbullying?
· Have you ever sent a mean message because you were upset?
· What would you do if someone created a mean, fake profile for you or one of your friends?
· How can you stop yourself from being cyberbullied?
· Who would you talk to if it happened to you?
Directions (stating objective) Write up on board or with document camera
Document three reasons why you cannot be a cyber bully, giving evidence for each reason using a technology device.
Recall (using prerequisite information)
Students list all the different times in their life they have been bullied in three minutes. (Computer or paper)Use Word document and have them bullet the list. At this time they do not write in full sentences.
Content (presentation of new material)
Application feedback (level 1) guided practice
Definition of Cyber bullying
1. Create a class definition of what is cyber bullying. Divide students up into groups of four. One of the students is the scribe on Google docs. Give 3-5 minutes working as a team. Present/revise as a class which means that one team will read their definition and then break for one minute as the rest of the class revises their work with ideas that they hadn’t thought about. By the time the last definition is read it should be an accumulation of all the thoughts in the class.
2. Read what the law states about cyber bullying. Handout or http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf
Read what a website states on cyber bullying. http://www.netsmartz.org/Cyberbullying click here for a copy
3. Do a compare and contrast of the two definitions using the computer and the overhead projector. Highlight in red what they forgot to put in the class definition. Give them a few minutes to revise their definition. Put their work up on the classroom blog.
4. Check for understanding. Survey Monkey assessment http://www.surveymonkey.com/s/NNH6KJW is the link to give to students
Webpage html code: <ahref="http://www.surveymonkey.com/s/NNH6KJW">Click here to take survey</a>
or
Click here for a copy
Assessment on the definition of Cyber bullying
1. T or F A friend calls you a name as you walk down the hall. You have just been cyber bullied.
2. T or F You can be bullied when instant messaging with anyone.
3. T or F When you forward a message that wasn’t very nice, you have just been a cyber bully.
4. T or F My friend agreed that what you wanted to post was funny even though it was embarrassing. This was not cyber bullying.
5. The following is where you can be cyber bullied:
a. instant messaging
b. social networking sites (like Facebook)
c. cell phones
d. all of the above
6. Cyber bullying victims are targeted:
a. late at night
b. right after school
c. any time
d. during school
Application feedback (level 2) guided practice
Vocabulary
1. Anticipation list of words on a paper copy or uploaded from the school folder to their computers.
Anticipation Guide
Click here for a copy
2. Vocabulary Game made up by Mrs. McShinsky http://www.Quizlet.com
http://quizlet.com/13040477/cyberbullying-vocabulary-words-flash-cards/
3. List of words(1/2 of the words) http://www.netsmartz.org/Cyberbullying
Flaming and Trolling- sending or posting hostile messages intended to “inflame the emotions of others
Happy-Slapping- recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
Identity Theft/ Impersonation- stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information.
Photoshopping- doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
Physical Threats-- sending messages that involve threats to a person’s physical safety.
Rumor Spreading- spreading gossip through e-mail, text messaging, or social networking sites
Embarrass- to make someone feel humiliated, discomfort, and shame. (opposite-- honor)
Harass-- to pester, bother, stalk, tease, hound, and to be a nuisance.
Intimidate—to threaten, frighten, scare, coerce, terrify, and to alarm.
Threaten—to endanger, hover, lurk, and creep up.
Hazing-- various rituals and other activities involving harassment, abuse or humiliation used as a way of initiating a person into a group
Retaliation—to revenge (opposite—forgiveness and acceptance)
Check for understanding: Survey Monkey Assessment: http://www.surveymonkey.com/s/N3QBZ7S
Website html code: <ahref="http://www.surveymonkey.com/s/N3QBZ7S">Click here to take survey</a>
Application feedback (level 2) guided learning
Research Time: Reading and Watching Videos
1. Using a graphic organizer, document three reasons why you cannot be a cyber bully as they watch the videos and read from the online website.
http://www.greatsource.com/iwrite/students/s_research_graph_org.html
Outline Format for Research-- sample copy
2. Document evidence for each reason. Upload from School Folder (you will need three Gathering Grids for each reason you select):
Click here for a copy
1st SUBJECT
SOURCE 1 Title of your sources
SOURCE 2 Title of your sources
SOURCE 3 Title of your sources
QUESTION 1
Write answers and where you found them
QUESTION 2
Write answers and where you found them
QUESTION 3
Write answers and where you found them
3. Go to http://www.netsmartz.org/Cyberbullying and search the website. Click here for a sample of what the website looks like
4. Students have headphones and computers to watch the following videos.
of real life stories. http://www.netsmartz.org/RealLifeStories
Teens talk back: http://www.netsmartz.org/TeensTalkBack
5. Read: http://www.cyberbullying.us/Top_Ten_Tips_Teens_Prevention.pdf Preventing Cyberbullying Top Ten Tips for Teens. Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D. January 2012
6. Read: http://www.cyberbullying.us/Top_Ten_Tips_Teens_Response.pdf
Responding to Cyberbullying Top Ten Tips for Teens. Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D. January 2012
7. View the video "Megan Meier Story". Note: This video displays a tragic situation which ended in Megan's death. You do not have to watch this. http://www.youtube.com/watch?v=HFsfDLCkfQU
8. NetsafeUtah handouts
http://www.netsafeutah.org/
Click here for a copy
Click here for a copy of pledge
Evaluation (eliciting performance)
Assessment: Using the information you have gathered, create a Voice Thread of your information. On the last slide have them make a commitment to not be a cyberbully. If they use pictures they need ask permission from the source.
http://voicethread.com/
Turn in to the school folder under your name the following:
1. Three Gathering Grids
2. Screen shot of your Quizlet score
3. Screen shot of your survey monkey last page of definition of cyberbullying
4. Screen shot of your survey monkey last page of vocabulary of cyberbullying
5. Link to their Voice Thread
6. Make two comments on two different students voice threads
Closure (retention and transfer)
Class discussion using the same questions that we started the lesson with. End with the idea that instead of being a cyberbully, make a choice to be cyber charming.