Group+Two

Introduction:
Andrea was IMing a friend of hers. A third person she didn't know asked to join. She assumed her friend knew who it was and accepted. Then this person started asking personal questions and making comments that made Andrea uncomfortable.

Activity
Develop a safety guidelines for you and your peers when navigating the Internet.

Focusing questions:

 * What is a “cyber-predator”? Why do Cyber-predators tend to prey on teenagers? How can you protect yourself against a cyber-predator?
 * How can we distinguish between private identity information and personal information?
 * What type of information is private?
 * How can we recall that private identity information should not be communicated in cyberspace without permission of a teacher or parent?
 * Give examples of how to keep your information confidential.

Think Before You Post http://www.teachertube.com/view_video.php?viewkey=97eeae6788aa3348e553

media type="custom" key="473059"

How hard is it to target kids online? http://www.teachertube.com/view_video.php?viewkey=f05ec77714a215134914

media type="custom" key="451267"

Resources:

1. Sher, Julian. "The not-so-long arm of the law." __USA__ __Today__ 1 May 2007. 2 Sept. 2008 .

2. Keeping kids safe from online predators http://www.podtech.net/home/?p=839

3. "Growing Up Online: Keeping Kids Safe: Protecting Kids Online." __PBS Frontline__. 22 Jan. 2008. PBS. 7 Sept. 2008 .

4. "Don't Believe the Type." __Think Before You Post__. The National Center for Missing & Exploited Children. 7 Sept. 2008 .

5. Threats Online: Student Guide to CyberThreats []

6. [|http://cybersmartcurriculum.org/safetysecurity/]

7. []

Back to Webquest: