Orientation+-+Cybersafety+-+Social+Networking+-Ethical+Literacy+-+Digital+Citizenship+Curriculum



Week of December 7th - CyberSafety Week!!!! - We can go to PTSA, do video, do parent night...


 * PowerPoint for Social Networking Anticipatory Set **

5 characteristics Can you identify the social networks?

Cyber bullying, cyber predators, and phising



Standards:

5.3.2 Students use technology and other information tools to organize and display knowledge and understandings in ways that others can view, use, and assess.

5.3.5 Students demonstrate citizenship by working productively with others when using technology

5.3.9 Students practice safe and ethical behaviors in personal and electronic communication and interaction

Link to Our CyberSafety Videos[| Here] -Students will feel comfortable in the library (evidence: increased traffic) -Students will understand how to check out books and will know their way around the library (evidence: increased circulation and 80% or higher on a map test) -Students will know the rules of the library (evidence: students will score 80% or higher on a test or quiz about the library rules) -Students will have working knowledge of library catalog and online database(s) - maybe not databases!?! (evidence: students are able to complete a basic search of the library catalog and a basic database search) -Students will be familiar with the library and school websites (evidence: students will complete a "scavenger hunt" on the library's website and the school's website) -Students will be able to log into the library computers -Save to server space? -Check out a book - if time
 * Day 1 || Day 2 || Day 3 ||
 * Library Orientation || Social Networking || Cybersafety ||
 * Goals:

- Overview - Movie or Power Point - Passwords - || Materials Needed: the above template is for a paper thing if students are not allowed to use computers. we need to fix this PSA guidelines doc so that it's the same groups of TWO, not FOUR.



=Quia Worksheet for Day 2: http://www.quia.com/quiz/1943489.html=

Whiteboard or LCD with computer and Word Doc: I was thinking of writing cybersafety issues student might want to address on a whiteboard or something so they could choose one from the list. - good brainstorming activity!

More PSA examples: http://psa.americanheart.org/audio.html

Goals: -Assess what students learned on Day 1 - Quiz (QUIA) -Students will understand what an online "social network" is (evidence: students will be able to name 3 online social networks and the 3 basic characteristics of an online "social network") [] -Students will explain the appropriate way to behave in a social network (evidence: PSA, callout, script and/or poster) - []

[] -Students will know how to adjust their privacy settings in a social network (evidence: fill in the blank worksheet) - Marie does Power Point to show. -Students will discuss how set privacy

-Quiz on Rules and Map - on QUIA (10 minutes to take) -Reconvene and go over answers (5 mins) -Social networks Power Point - anticipatory set.... 9 slides - Traci (2 minutes) -What social networks are - who's on them? Why? - Discussion with students - Informal poll - who's on FB? Who's on MySpace? Use the 9... - 5 characteristics Power Point -Once it's there, it's never gone.... Bulletin BOard VIDEO (Ad Council Video) - 0:30 wHAT DO YOU think the message is behind this? and Profile Penalty Video - 3:03(Netsmartz) -Privacy -Privacy Settings - Slim's Power Point : How to fix your Privacy Settings -Callouts and scripts! -Give time to research? for tomorrow's PSA, callout, script, poster. Find one URL and post to wiki!

Pre-Survey of student online behaviors? will help us plan curriculum for CyberSafety Week and for next year's orientation.

CTAP CyberPoster: Digital Privacy with 3 Girls: http://www.thatsnotcool.com/VideoGuests.aspx?VideoID=meGnFYE43mk or on YouTube: http://www.youtube.com/watch?v=meGnFYE43mk - Marie is converting, CAN WE CONTACT THAT's NOT COOL for ORIGINAL???

PRIVACY MOVIE! - friend

VIDEOS: Netsmartz: Post to be Private - girl with purple hair. Marie is getting through ZAMZAR or http://www.netsmartz.org/education/download/resource.html?catalog=/feeds/video_catalog.rss&item=postprivate

Netsmartz: Profile Penalty: http://www.netsmartz.org/education/download/resource.html?catalog=/feeds/video_catalog.rss&item=profilepenalty - not on YouTube

WiredSafety.org's "Putting Your Best Foot Forward" - not putting up stuff you wouldn't want your parents to know...(converted from YouTube by Marie)

Think Before You Post: http://www.adcouncil.org/default.aspx?id=56 || Anticipatory Set: You Never Know Video with Inmate: http://wiredsafety.org/flashandvideo/index.html

Goals: -Assess what students learned Days 1 & 2 -Students will be able to define "cyberbullying," "cyber-predators," and "phishing." (evidence: PSA, callout, script, poster, quiz?) -Students

-Predators - A -Cyberbullying - B -Phishing - C This is the day of PSA with script or Poster!

Traci - will do Power Point of Definitions

Quia Quiz or Activity: Give Situations: 1) I got an email from Nations' Bank. What is this? A, B or C 2) dfjsldfjls.... 3) filling out an application for.... 4) someone on Facebook wants to meet you....

KACIE Rene Woody MOVIE: http://www.wiredsafety.org/wiredlearning/Einstein/kacie/

Netsmartz: Terrible Text Movie: (3:40) http://www.youtube.com/watch?v=xGKmlTtZnSk&feature=related (http://www.netsmartz.org/education/download/resource.html?catalog=/feeds/video_catalog.rss&item=terribletext)

WiredSafety.org's: You never know who you're talking to...2 boys taunting their big sister...http://www.youtube.com/watch?v=qcMyBguSwTE Converted from YouTube by Marie

Don't Believe the Type: http://tcs.cybertipline.com/knowthedangers7.htm

ID the Creep Game: http://www.idthecreep.com/ (time-killer)

Cyberbully Game: http://www.mcgruff.org/Games/cyberbully.php

http://www.kidscape.org.uk/childrenteens/cyberbullying.shtml

EXIT SURVEY: to assess Day 2 and 3 learning.

PSA SCRIPTS: have our frosh do the scripts for the PSA's: Then the DRAMA kids record the scripts for our CyberSafety

Week of December 7th - CyberSafety Week!!!!

We will NOT grade, but we will give an example or two and give a rubric of what is needed. 5 callouts = a PSA or something like that = one poster for 3rd graders.

4 per group

20 minutes =

We want

TELL THEM WE ARE GRADING THEM, But DON'T. 5 will be done in announcements.

10 groups per class. Will 4 kids be occupied with PSA and poster that goes with it?

4 in a group- assign roles -materials manager -artistic director -secretary -

brainstorming time. set a timer - five minutes to generate ideas. Then break up and 2 students write script., 2 students do poster that goes with script. 20 mins. || PSA - Scenarios:

some from [] :
 * Don't share your password - even with your best friend.
 * Know who your friends are! Make sure you know someone in person before you add them to your "friends" list.
 * [|Don't post anything you wouldn't want your grandmother to see].
 * What you post online stays online--forever--so [|think before you post].
 * Pay attention to how you are communicating. Don't say anything online you wouldn't say in person. Don't be rude online.
 * Protect your privacy and your friends' privacy too...get their permission before posting something about them.
 * Check what your friends are posting or saying about you. Even if you are careful, they may be putting you at risk.
 * Don't take, keep, or send nude or partial nude pictures of yourself or others. You could be prosecuted for creating or distributing child pornography if you possess or send nude or partial nude pictures of someone under the age of 18. One teen from Florida was prosecuted and had to register as a sex offender after forwarding a nude picture of his exgirlfriend to her family and friends.
 * Don’t hang around online places where people could treat you badly.
 * That cute 16-year old boy may not be cute, may not be 16 and may not be a boy! You never know!
 * Tell a trusted adult if someone does or says something online that makes you feel uncomfortable.
 * And, unless you’re prepared to attach your MySpace page to your college/job/internship/scholarship or sports team application, don’t post it publicly!
 * use privacy settings
 * Spam ads - too good to be true
 * phishing - requests for personal account information
 * bogus friend requests - mark as spam
 * DOn't trash talk others
 * Uncomfortable? Trusted adult, site owner, ISP, cybertipline.com
 * ONline photos can be copied and altered.
 * Never respond to messages that make you feel uncomfortable
 * Don't respond to or meet with a cyberbully
 * save proof of cyberbullies or predators: text messages, emails, screenshots, IM's, Blogs

Assignment for PSA;

-1 min. script - one callout (we will make template) - 8.5 x 11 poster -

Steve Zamora - liaison - can present to principals...

We will present to our principals and give them them info on SB 1492, AB 307 AND our 3 day lesson plan for Orientation. Do it in a positive, excited manner.

Give this to the La Sierra/La Vista people.

Great Resources:

REAL LIFE NETSMARTZ VIDEOS and ACTIVITIES!!!! http://www.netsmartz.org/resources/reallife.htm OTHER GREAT VIDEOS: http://wiredsafety.org/flashandvideo/index.html Cyberbullying Survey: https://www.wiredsafety.org/forms/interactive/poll_archive/poll.html That's not cool.com: http://www.thatsnotcool.com/VideoGuests.aspx?VideoID=meGnFYE43mk CTAP 4 Stuff: http://www.ctap4.net/projects/cybersafety/cyberposter-download.html http://www.ctap4.net/projects/cybersafety/cyberbullying.html http://www.ctap4.net/projects/cybersafety/social-networks.html

[] http://meganmeierfoundation.org/story/ http://vcpionline.org/online/flash.html http://www.onguardonline.gov/ http://www.onguardonline.gov/videos/phishy-store.aspx - Phishing Video http://www.onguardonline.gov/games/phishing-scams.aspx - Phishing Game cybertipline.com

We could have them do brainstorming and PSA's on THESE!!! (Above)

Ad Council: Think before you post Video: Marie Converted from You Tube http://www.youtube.com/watch?v=rvp-kZeoWW0&feature=fvw

Show to Admin and PTSA!

Day 1: Library Orientation!!!

Our Homework: -Update or create our Power Points - we can all

http://mfile.akamai.com/11327/wmv/ncmec.download.akamai.com/11327/media/cybertipline.asx http://www.netsmartz.org/resources/reallife.htm

Activities from Netsmartz:

1) Privacy 2) Be Wary: 3) Don't Respond Know that there are rules many Internet Service Providers (ISP) have about online behavior. If you disobey an ISP's rules, your ISP may penalize you by disabling your account, and sometimes every account in a household, either temporarily or permanently. 4) Talk it Out
 * privacy settings on social networks
 * are your friends private too?
 * keeping your info and pictures to yourself
 * Strangers you "Meet" Online
 * offers "to good to be true" or "to good to refuse"
 * remember that not everyone may be who they say they are. For example a person who says "she" is a 14-year-old girl from New York may really be a 42-year-old man from California.1 http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=207
 * instead:
 * If someone harasses you online, says anything inappropriate, or does anything that makes you feel uncomfortable, contact your Internet service provider.
 * http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=207
 * cybertipline.com
 * parents
 * friends
 * don't find online confidant you've never met before...

http://www.safeteens.com/teenrules.htm If you’re in any type of public forum, avoid giving out your full name, your mailing address, your telephone number, the name of your school, or any other information that could help someone determine your actual identity. The same applies to your family and friends. Never reveal anything about other people that could possibly get them into trouble. The biggest danger to your safety is if you get together with someone you “meet” online. Remember, you never know for certain if people you meet online are who they say they are. If you do feel it’s appropriate to meet with someone, discuss it with your parents and never go to the meeting by yourself. Arrange to meet in a public place like a coffee shop or mall that you, not just the other person, are familiar and comfortable with, and never go alone. The safest procedure is to have your parents talk with the parents of the other person and for both of you to bring your parents along on the first meeting. It isn’t your fault if you get a message that is mean or in any way makes you feel uncomfortable. If you get such a message, don’t respond. Instead, show it to your parents or a trusted adult to see if there is anything you can do to make it stop. Sending a response just encourages the person.
 * 1. **
 * 2. **
 * 3**.
 * 4. **

Orientation:

What we want them to know:

- Overview of 3 days (5 mins) - stress in letter to teachers that time is of the essence!!! (50 minutes library orientation!)

- the rules (how will we know that they know this - quia quiz after logging in on Day 2) with a worksheet they can study - use Traci's Power Point and Diane's Power Point to create Movie - change pictures!!!! (10 mins)

- where things are located in the library (how will we know that they know this - all students label map - 5 mins.) LOOK AT SIGNS!!! Put students in pictures!

- demo everything they are going to need to do on computers: websites, saving files, logins, passwords. (5 mins)

- Set up pairs - birthday, first name alphabetically, last name, height, - teachers need to help do this

- our website & school website (scavenger hunt) - virtual and real-life (could switch off)

- how to save files - we need to show them how to save so that they can access. (2nd day show us the file). http://tinyurl.com/jitcf - could be part of scavenger hunt.

- individual logins (we may need to reset passwords) – log in and send us an email - 10 mins.

- passwords - Microsoft website - create a "GREAT PASSWORD" - []

- Library Basketball (for review and assessment) to go over rules, all things - (10 minutes or remainder of period)

Social Networking: (Part of Cybersafety?) - why we are doing this - legislation - blog - Quia pre-quiz -
We want them to know how to set privacy settings and how to keep info private and that nothing is ever "gone" from the Internet. Social Networks allow you to see a LOT of stuff.

Resources: -Traci's social networking pp (3 mins.) -Jennifer Video Beware of Friends from WiredSafety.org -Scripts for how to deal - from thatsnotcool.com -Show how to do privacy settings -

[|Digital Privacy]
by whateverhollywood added 7/29/2009 4:09:35 AM 14042 Views

Assessment - Quia

Activities: Fill out a Facebook survey for a fictional character and decide create an email address for that person - professional - and give them a picture to choose from - give them some speech to contextualize

Quia Quiz

Morning Announcements Blurb / Marquee / Poster / Use for CyberSafety Week / Blurb are on different Social Networking Topics - Use Google Docs / PSA or a rap or a commercial. Or an audio - radio announcement / poster

Make it fun and easy - stay with them better.

They do a screen - capture and they set that as the desktop

Acknowledge that students know a lot and that we are directing this as.

> > Real-life examples - no nudity, sexting. Scripts for how to deal, tools. - 1 - Picture on web page for Rihanna - one avatar, one regular, right-click Save As - talk about how to save. (Z:) - Miss California - you don't know what people will go back and find - lost title 2009 - breached contract by keeping semi-nude pictures private. Teenage model. - Carrie Prejean
 * Quiz on rules and map (7 minutes)
 * Social Networks Power Point - Google Docs, Facebook, Delicious, Ning, Moodle, Flickr, Photobucket, Wikis, Twitter, Moodle, Hi5 - (anticipatory set) - 1 - identification (image identification Power Point - Traci will make Power Point with Pictures so that students can "identify" different social networking tools by shouting them out).
 * Social Networks
 * Limiting what people can see - do we need to show them how to do this using Twitter, Facebook, Moodle - 1 (students know to go to "settings" or "privacy" or "help." or ask another student for help) -
 * Lurking = good (check it out first)
 * terminate social contact? - how to terminate social contact - who do you go to? Librarian, Police Officer, taking down accounts. Removing applications from MySpace, Facebooks. - 2 - Make a link - Settings, http://www.digizen.org/socialnetworking/what.aspx
 * contextualize conversation - make sure that you use words that cannot be misconstrued, it's NOT Face to Face - be more explicit, use emoticons, use the right words for the right people. - 2 - Homer Simpson wants to let you know that he doesn't want to work on Fridays because he's chillin' with - some type of "regular speech" to "academic speech."
 * risk management of personal info - Avatars. No real pictures. Don't allow people to, you don't have to accept all friend requests
 * risk management of personal info - Avatars. No real pictures. Don't allow people to, you don't have to accept all friend requests
 * cyber-> real life: whatever they put up stays, nothing is ever "gone" from the Internet. Would you want your future children reading it? Mom blush? No self=esteem, employers, schools, voice mail, what you write will be there forever - future employers, colleges. - - 1 - - T/F Quiz at end? - log on to Quia.com
 * chatrooms - IM - (Instant Messaging) - block people (trillion, AIM, Yahoo Instant Messaging) - no flaming, Chatrooms (Instant Messaging) - block people (trillion, AIM, Yahoo Instant Messaging) - 2 - what can you do if someone is harassing you? Morning Announcements Blurb - after we finish Frosh Orientation - record and play.
 * Sense of caution
 * Pretending you're someone else.
 * Pretending you're someone else.

**Cybersafety**
-know what cyberbullying is and how to avoid it. -Online predators - Kacie Rene Woody video -Continue with secure passwords. -this is the day they do the PSA or announcement.

> Real-life examples - no nudity, sexting. Scripts for how to deal, tools. 1 - HIGH PRIORITY > I just came across a short video on cyberbullying [] - not sure if it will work with what we're doing but I didn't want to lose it ~ DJ
 * phishing and cybersafety - Credit Cards and Bank Accounts - suspicious? Ask your parents, friends or librarian. Call the bank. Check it out. Print out a picture. - Spammed on MySpace or Facebook, invading of email address books. - Credit card stuff, financial aid stuff - snopes. 4
 * information and identity safety - don't give out personal info: Phone number, address, pictures of house, SSN,Taking surveys with personal info, Give them a quiz from MySpace/Facebook to show people what NOT to do - Anticipatory Set - 1 - review Day 1 to remind them and do a small activity maybe
 * passwords - remembering, creating, NOT SHARING, be professional, email also: something professional - 1 or 2 -
 * cyber-predators - take control, bad things can happen - rape, murder, out there forever, kidnapping, human trafficking, craiglist killer, take precautions, never meet anyone alone, don't make yourself vulnerable. You are a target, they want you. (Shooting analogy - nerf darts). Avatars. No real pictures. Don't allow people to
 * online protection (filters? antivirus?) - we have district filters and county filters - no workarounds. Use antivirus and UPDATE! - 3
 * cyberbullying - it is Edcode and against the Law. All the kids that killed themselves over cyberbullying. - 1
 * Forwarding emails - obnoxious - does this let people get our email addresses? Do this and you'll get something good. - 2

Use Delicious - to annotate - links about predators, cyberbullying and identity safety. - Wiki. - Discussion. Google Docs.

Do the 1's and maybe the 2's.

We can do homework!

Documents: [|Internet Safety Quiz from Quia] Text of Internet Safety Quiz

[|Marie's Cyberbullying Quiz from Quia]

Pop Quiz from Quia: []

Kacie Rene Woody - chop up this video so it's just the story - online predators.... http://www.wiredsafety.org/wiredlearning/videos/kacie/

PSA Subjects - Use Audacity - group writes script and records: Posters or Announcements. Both Posters AND announcements will be used for CyberSafety week in Nov?
 * Chatrooms: []
 * IM (Instant Messaging): []
 * Online Privacy: [] and **Stop - Think - Click** Brochure page 3
 * Online Harassment and Bullying: []
 * E-mail and Spamming: [] and **Stop - Think - Click** Brochure page 10-11
 * Passwords: [] and **Stop - Think - Click** Brochure page 6
 * Social Networking like MySpace and Facebook: **FTC Facts Brochure**
 * Who to contact if something goes wrong online: **Stop - Think - Click** Brochure page 7
 * Phishing: **Stop - Think - Click** Brochure page 4
 * Cyber-etiquette!
 * Create a callout or script for one of the following situations:
 * jfdkfsjl
 * jkslfjdlksjf
 * jkldfjsljflskj
 * jfksjlfkjsdlkfjl

from Facebook:

  > > Phishing is an online attempt to trick a user by pretending to be an official login page or an official email from an organization that you would have an account with, such as a bank or an email provider, in order to obtain a user’s login and account information. In the case of a phishing login page, the login page may look identical to the login page you would normally go to, but the website does not belong to the organization you have an account with (the URL web address of the website should reflect this). In the case of a phishing email, the email may look like an email you would get from the organization you have an account with and get emails from, but the link in the email that it directs you to takes you to the above phishing login page, rather than a legitimate login page for that organization. > > To prevent your account information from being obtained in a phishing scheme, only log in to legitimate pages of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.
 * 1) **Never click suspicious links**: It is possible that your friends could unwillingly send spam, viruses, or malware through Facebook if their accounts are infected. Do not click this material and do not run any ".exe" files on your computer without knowing what they are. Also, be sure to use the most current version of your browser as they contain important security warnings and protection features. Current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at [] and [].


 * 1) **Have a unique, strong password**: From the [|Account Settings page], be sure to use a different password than you use for other sites or services, made up of a complex string of numbers, letters, and punctuation marks that is at least six characters in length. Do not use words found in the dictionary.

>> [] [] >> []
 * 1) **Run anti-virus software**: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove harmful programs and keep your information secure.
 * For Windows:
 * For Apple/Mac OS:

Facebook is committed to protecting your information. We have industry standard and proprietary network monitoring tools constantly running in our system in order to prevent security breaches and protect the security of your data.

In addition, Facebook always posts to a secure page when users are logging in and employs industry standard encryption. This may not always be apparent from the URL (web address), but rest assured our logins are secure.

From MySpace:

MySpace makes it easy to express yourself, connect with friends and make new ones, but who you let into your space, how you interact with them, and how you present yourself online are important things to think about when using social networking sites. Here are some common sense guidelines that you should follow when using MySpace: Find out more by clicking on the topics listed on the left.
 * **Don't forget that your profile and MySpace forums are public spaces**. Don't post anything you wouldn't want the world to know (e.g., your phone number, address, IM screen names, or specific whereabouts). Avoid posting anything that would make it easy for a stranger to find you, such as where you hang out every day or a picture of you in front of your office or school.
 * **People aren't always who they say they are.** Be careful about adding strangers to your friends list. It's fun to connect with new MySpace friends from all over the world, but avoid meeting people in person whom you do not fully know. If you must meet someone, do it in a public place and bring a friend or trusted adult.
 * **Harassment, hate speech and inappropriate content should be reported**. If you feel someone's behavior is inappropriate, react. Report it to MySpace or the authorities.
 * **Don't post anything that would embarrass you later.** It's easy to think that only our friends are looking at our MySpace page, but the truth is that everyone can see it. Think twice before posting a photo or information you wouldn't want your parents, potential employers, colleges or boss to see!
 * **Don't say you're over 18 if you're not. Don't say you're younger than 18 if you're not.** If MySpace customer service determines you are under 13 and pretend to be older, we will delete your profile. If customer service determines you are over 18 and pretend to be a teenager to contact underage users, we will delete your profile.

TIPS FOR TEENS

 * **Don't say you're older than you are.** MySpace members must be 13 years of age or older. We take extra precautions to protect our younger members and we are not able to do so if you do not identify yourself as such. If MySpace customer service determines you are under 13 and pretend to be older, we will delete your profile.
 * **MySpace is a public space.** Members shouldn't post anything they wouldn't want the world to know (e.g., phone number, address, IM screen name, or specific whereabouts). Don't post anything that would make it easy for a stranger to find you, such as your local hang out. It's always fun to post pictures but remember that what you might consider a harmless picture of you and your friends in your uniforms at a school football game, is actually a map telling a stranger exactly where you go to school.
 * **Don't post anything that could embarrass you later or expose you to danger.** Please remember that MySpace is public and many people have access to what you post, including potential employers, colleges, your teachers and peers at school that you might not even know. You shouldn't post photos or info you wouldn't want adults to see or people to know about you.
 * **Protect your privacy**. Set your profile to private which lets only your friends view your profile. Users under the age of 16 are automatically assigned a private profile. Only accept friend invitations from people you know and trust.
 * **People aren't always who they say they are.** Be careful about adding strangers to your friends list. It's fun to connect with new MySpace friends from all over the world, but avoid meeting people in person whom you do not fully know. Remember that you don't really know who is on the other end of an Internet connection.
 * **Harassment, hate speech and inappropriate content should be reported.** If you encounter inappropriate behavior, inform your parents or a trusted adult and report it to MySpace or the authorities.
 * **Don't get hooked by a phishing scam.** Phishing is a method used by fraudsters to try to get your personal information, such as your username and password, by pretending to be a site you trust. If you suddenly start receiving abnormal bulletins or messages from a friend, they might have been phished. Check with them before opening any files or clicking on any links. If you think you, or a friend, are a victim of phishing, change your password immediately.
 * **Avoid in-person meetings.** Don't get together in person with someone you "meet" online unless you are certain of their actual identity. Talk it over with an adult first. Although it's still not risk-free, arrange any meetings in a public place and bring along friends, your parents, or a trusted adult.
 * **Think before you post.** What's uploaded to the net can be downloaded by anyone and passed around or posted online pretty much forever. You shouldn't post photos or info you wouldn't want adults to see or people to know about you.


 * Today's Agenda 5-20-09**
 * 1) Review Logo entries - 7:30am to 8:15a
 * 2) English Curriculum Committee Meeting - Today, 5-20-09 at 2:30pm at DEC. Go over presentation 8:15-8:45am
 * 3) Board Meeting 5-20-09: Statement that we are working with ECC to get students ready for MLA 7 to combat plagiarism and get students ready for college, etc. - Do we want to do this tonight or in Sept.? Divvy up Board meetings - Sept., Nov., Jan., March, May 2010 8:45am to 9am
 * 4) Orientation Power Point to Movie - Got Traci's file.
 * 5) 9am to 9:30am: Go over Power Points from SAUSD Curriculum - [|Maggie Barnes from SAUSD]
 * 6) Review our work
 * 7) Make sure our objectives and learner outcomes are clear
 * 8) Generate assessments and activities for Day 2 (below)

Our stuff from March 20th Meeting:

2day: English or Social Science Late Sept, Early Oct. English will not be 20:1 anymore - can finish up more quickly



Sept. 2009

Spring 2010
Digital Citizenship (investigate what this REALLY is)
 * Acceptable Use
 * Google Docs
 * Group Work
 * Parent Letter
 * Public Spaces
 * real life to cyber-life
 * inappropriate content
 * netiquette
 * addictive behaviors
 * effective printer use
 * using computer for sharing files
 * flash drives
 * what students should KNOW to use technology safely and effectively
 * personal vs. professional email addresses
 * digitalcitizenship.net

Ethical Literacy:
 * attribution
 * piracy
 * plagiarism
 * copyright
 * hacking
 * threats against President
 * streaming media - bandwidth hogging
 * Downloading music
 * Games
 * Uploading
 * Installing Software
 * Virus
 * texting and phoning - time and place

Possible Activities:
 * CyberSmart! Your Onilne Image Prompts
 * Safety and Security: Meeting People Online
 * True and false line, turn right, turn left
 * Get up and stretch
 * Basketball
 * Santa Ana Unified Power Point
 * Presentation to parents with PTSA
 * Group Work

Evidence:
 * Completion of Cyber-Safety and Cyber-Ethics Orientation (certificate?)
 * Academic Use of email, email with attachments and flash drive
 * Participation in student groups to research, prepare a product, and present findings about a topic
 * Students know that the campus librarian is a safe person
 * evidence of power point projects that use info gathered from a variety of sources that provides clear attribution
 * Quia results
 * Moodle results
 * Format, organize and manage various pieces of information over the period of time of an assignment
 * peer editing evidence (Google Docs history, wiki history) - gmail account and group work
 * Works Cited
 * Orientation Website

Assessments:
 * Quia Survey
 * Completion of Cyber-Safety and Cyber-Ethics Orientation (certificate?)
 * Google Docs activity
 * Student use of Moodle as a social network (Edmodo?)
 * Annotated bookmarks results (delicious, wiki, or google doc)

Questions:
 * Can we export from Quia and import into Data Director?

Possible Curriculum Scope and Sequence: (we need to look at English Standards) 9th: Cybersafety 10th: Works Cited 11th: Plagiarism and Notetaking 12th: Professional vs. Personal (presenting a professional face online). (we go to classrooms and do 15 minute presentations).

== =[supplemental=]= =**[]**=

New in Town

ORIGINAL STUFF:

Day 1: Library Orientation!!!

Orientation:

What we want them to know:

- Overview of 3 days (5 mins) - stress in letter to teachers that time is of the essence!!! (50 minutes library orientation!)

- the rules (how will we know that they know this - quia quiz after logging in on Day 2) with a worksheet they can study - use Traci's Power Point and Diane's Power Point to create Movie - change pictures!!!! (10 mins)

- where things are located in the library (how will we know that they know this - all students label map - 5 mins.) LOOK AT SIGNS!!! Put students in pictures!

- demo everything they are going to need to do on computers: websites, saving files, logins, passwords. (5 mins)

- Set up pairs - birthday, first name alphabetically, last name, height, - teachers need to help do this

- our website & school website (scavenger hunt) - virtual and real-life (could switch off)

- how to save files - we need to show them how to save so that they can access. (2nd day show us the file). http://tinyurl.com/jitcf - could be part of scavenger hunt.

- individual logins (we may need to reset passwords) – log in and send us an email - 10 mins.

- passwords - Microsoft website - create a "GREAT PASSWORD" - []

- Library Basketball (for review and assessment) to go over rules, all things - (10 minutes or remainder of period)

Social Networking: (Part of Cybersafety?) - why we are doing this - legislation - blog - ask students "have you ever been pressured to do sexting." Quia pre-quiz -
> > Real-life examples - no nudity, sexting. Scripts for how to deal, tools. - 1 - Picture on web page for Rihanna - one avatar, one regular, right-click Save As - talk about how to save. (Z:) - Miss California - you don't know what people will go back and find - lost title 2009 - breached contract by keeping semi-nude pictures private. Teenage model. - Carrie Prejean
 * Quiz on rules and map (7 minutes)
 * Social Networks Power Point - Google Docs, Facebook, Delicious, Ning, Moodle, Flickr, Photobucket, Wikis, Twitter, Moodle, Hi5 - (anticipatory set) - 1 - identification (image identification Power Point - Traci will make Power Point with Pictures so that students can "identify" different social networking tools by shouting them out).
 * Limiting what people can see - do we need to show them how to do this using Twitter, Facebook, Moodle - 1 (students know to go to "settings" or "privacy" or "help." or ask another student for help) -
 * Lurking = good (check it out first)
 * Personal Information - no birthdays, no birth year, no identifying info, no credit card numbers, no pictures (identifying info) - Photojournalist in Iran Twittering, Facebook - Dr. Phil - friends gave money - 1 - give them something to fill out - trick them and see what they do. "Optional" - see what they do! Online Form. Groups of 4 - - Homer Simpson, Kanye West, Fictional Character, Authors, --> Person # 4 Reads the Card, Person #3, Types, Person #2 - Taskmaster - Create a persona...
 * terminate social contact? - how to terminate social contact - who do you go to? Librarian, Police Officer, taking down accounts. Removing applications from MySpace, Facebooks. - 2 - Make a link - Settings, http://www.digizen.org/socialnetworking/what.aspx
 * contextualize conversation - make sure that you use words that cannot be misconstrued, it's NOT Face to Face - be more explicit, use emoticons, use the right words for the right people. - 2 - Homer Simpson wants to let you know that he doesn't want to work on Fridays because he's chillin' with - some type of "regular speech" to "academic speech."
 * contextualize conversation - make sure that you use words that cannot be misconstrued, it's NOT Face to Face - be more explicit, use emoticons, use the right words for the right people. - 2 - Homer Simpson wants to let you know that he doesn't want to work on Fridays because he's chillin' with - some type of "regular speech" to "academic speech."
 * risk management of personal info - Avatars. No real pictures. Don't allow people to, you don't have to accept all friend requests
 * cyber-> real life: whatever they put up stays, nothing is ever "gone" from the Internet. Would you want your future children reading it? Mom blush? No self=esteem, employers, schools, voice mail, what you write will be there forever - future employers, colleges. - - 1 - - T/F Quiz at end? - log on to Quia.com
 * chatrooms - IM - (Instant Messaging) - block people (trillion, AIM, Yahoo Instant Messaging) - no flaming, Chatrooms (Instant Messaging) - block people (trillion, AIM, Yahoo Instant Messaging) - 2 - what can you do if someone is harassing you? Morning Announcements Blurb - after we finish Frosh Orientation - record and play.
 * Snopes.com, truthorfiction.com (Validity of internet and email) - 3
 * Sense of caution
 * Pretending you're someone else.
 * Pretending you're someone else.

Activities: Fill out a Facebook survey for a fictional character and decide create an email address for that person - professional - and give them a picture to choose from - give them some speech to contextualize

Quia Quiz

Morning Announcements Blurb / Marquee / Poster / Use for CyberSafety Week / Blurb are on different Social Networking Topics - Use Google Docs / PSA or a rap or a commercial. Or an audio - radio announcement / poster

Make it fun and easy - stay with them better.

They do a screen - capture and they set that as the desktop

Acknowledge that students know a lot and that we are directing this as.

**Cybersafety**
> Real-life examples - no nudity, sexting. Scripts for how to deal, tools. 1 - HIGH PRIORITY
 * phishing and cybersafety - Credit Cards and Bank Accounts - suspicious? Ask your parents, friends or librarian. Call the bank. Check it out. Print out a picture. - Spammed on MySpace or Facebook, invading of email address books. - Credit card stuff, financial aid stuff - snopes. 4
 * information and identity safety - don't give out personal info: Phone number, address, pictures of house, SSN,Taking surveys with personal info, Give them a quiz from MySpace/Facebook to show people what NOT to do - Anticipatory Set - 1 - review Day 1 to remind them and do a small activity maybe
 * passwords - remembering, creating, NOT SHARING, be professional, email also: something professional - 1 or 2 -
 * cyber-predators - take control, bad things can happen - rape, murder, out there forever, kidnapping, human trafficking, craiglist killer, take precautions, never meet anyone alone, don't make yourself vulnerable. You are a target, they want you. (Shooting analogy - nerf darts). Avatars. No real pictures. Don't allow people to
 * online protection (filters? antivirus?) - we have district filters and county filters - no workarounds. Use antivirus and UPDATE! - 3
 * cyberbullying - it is Edcode and against the Law. All the kids that killed themselves over cyberbullying. - 1
 * Forwarding emails - obnoxious - does this let people get our email addresses? Do this and you'll get something good. - 2

Use Delicious - to annotate - links about predators, cyberbullying and identity safety. - Wiki. - Discussion. Google Docs.

Passwords - http://www.microsoft.com/protect/yourself/password/checker.mspx

Do the 1's and maybe the 2's.

We can do homework!

Documents: [|Internet Safety Quiz from Quia] Text of Internet Safety Quiz

[|Marie's Cyberbullying Quiz from Quia]

Pop Quiz from Quia: []

from Facebook:

 <span class="UIFaq_OpenArrow"> > > Phishing is an online attempt to trick a user by pretending to be an official login page or an official email from an organization that you would have an account with, such as a bank or an email provider, in order to obtain a user’s login and account information. In the case of a phishing login page, the login page may look identical to the login page you would normally go to, but the website does not belong to the organization you have an account with (the URL web address of the website should reflect this). In the case of a phishing email, the email may look like an email you would get from the organization you have an account with and get emails from, but the link in the email that it directs you to takes you to the above phishing login page, rather than a legitimate login page for that organization. > > To prevent your account information from being obtained in a phishing scheme, only log in to legitimate pages of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.
 * 1) **Never click suspicious links**: It is possible that your friends could unwillingly send spam, viruses, or malware through Facebook if their accounts are infected. Do not click this material and do not run any ".exe" files on your computer without knowing what they are. Also, be sure to use the most current version of your browser as they contain important security warnings and protection features. Current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at [] and [].


 * 1) **Have a unique, strong password**: From the [|Account Settings page], be sure to use a different password than you use for other sites or services, made up of a complex string of numbers, letters, and punctuation marks that is at least six characters in length. Do not use words found in the dictionary.

>> [] [] >> []
 * 1) **Run anti-virus software**: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove harmful programs and keep your information secure.
 * For Windows:
 * For Apple/Mac OS:

Facebook is committed to protecting your information. We have industry standard and proprietary network monitoring tools constantly running in our system in order to prevent security breaches and protect the security of your data.

In addition, Facebook always posts to a secure page when users are logging in and employs industry standard encryption. This may not always be apparent from the URL (web address), but rest assured our logins are secure.

From MySpace:

MySpace makes it easy to express yourself, connect with friends and make new ones, but who you let into your space, how you interact with them, and how you present yourself online are important things to think about when using social networking sites. Here are some common sense guidelines that you should follow when using MySpace: Find out more by clicking on the topics listed on the left.
 * **Don't forget that your profile and MySpace forums are public spaces**. Don't post anything you wouldn't want the world to know (e.g., your phone number, address, IM screen names, or specific whereabouts). Avoid posting anything that would make it easy for a stranger to find you, such as where you hang out every day or a picture of you in front of your office or school.
 * **People aren't always who they say they are.** Be careful about adding strangers to your friends list. It's fun to connect with new MySpace friends from all over the world, but avoid meeting people in person whom you do not fully know. If you must meet someone, do it in a public place and bring a friend or trusted adult.
 * **Harassment, hate speech and inappropriate content should be reported**. If you feel someone's behavior is inappropriate, react. Report it to MySpace or the authorities.
 * **Don't post anything that would embarrass you later.** It's easy to think that only our friends are looking at our MySpace page, but the truth is that everyone can see it. Think twice before posting a photo or information you wouldn't want your parents, potential employers, colleges or boss to see!
 * **Don't say you're over 18 if you're not. Don't say you're younger than 18 if you're not.** If MySpace customer service determines you are under 13 and pretend to be older, we will delete your profile. If customer service determines you are over 18 and pretend to be a teenager to contact underage users, we will delete your profile.

TIPS FOR TEENS

 * **Don't say you're older than you are.** MySpace members must be 13 years of age or older. We take extra precautions to protect our younger members and we are not able to do so if you do not identify yourself as such. If MySpace customer service determines you are under 13 and pretend to be older, we will delete your profile.
 * **MySpace is a public space.** Members shouldn't post anything they wouldn't want the world to know (e.g., phone number, address, IM screen name, or specific whereabouts). Don't post anything that would make it easy for a stranger to find you, such as your local hang out. It's always fun to post pictures but remember that what you might consider a harmless picture of you and your friends in your uniforms at a school football game, is actually a map telling a stranger exactly where you go to school.
 * **Don't post anything that could embarrass you later or expose you to danger.** Please remember that MySpace is public and many people have access to what you post, including potential employers, colleges, your teachers and peers at school that you might not even know. You shouldn't post photos or info you wouldn't want adults to see or people to know about you.
 * **Protect your privacy**. Set your profile to private which lets only your friends view your profile. Users under the age of 16 are automatically assigned a private profile. Only accept friend invitations from people you know and trust.
 * **People aren't always who they say they are.** Be careful about adding strangers to your friends list. It's fun to connect with new MySpace friends from all over the world, but avoid meeting people in person whom you do not fully know. Remember that you don't really know who is on the other end of an Internet connection.
 * **Harassment, hate speech and inappropriate content should be reported.** If you encounter inappropriate behavior, inform your parents or a trusted adult and report it to MySpace or the authorities.
 * **Don't get hooked by a phishing scam.** Phishing is a method used by fraudsters to try to get your personal information, such as your username and password, by pretending to be a site you trust. If you suddenly start receiving abnormal bulletins or messages from a friend, they might have been phished. Check with them before opening any files or clicking on any links. If you think you, or a friend, are a victim of phishing, change your password immediately.
 * **Avoid in-person meetings.** Don't get together in person with someone you "meet" online unless you are certain of their actual identity. Talk it over with an adult first. Although it's still not risk-free, arrange any meetings in a public place and bring along friends, your parents, or a trusted adult.
 * **Think before you post.** What's uploaded to the net can be downloaded by anyone and passed around or posted online pretty much forever. You shouldn't post photos or info you wouldn't want adults to see or people to know about you.


 * Today's Agenda 5-20-09**
 * 1) Review Logo entries - 7:30am to 8:15a
 * 2) English Curriculum Committee Meeting - Today, 5-20-09 at 2:30pm at DEC. Go over presentation 8:15-8:45am
 * 3) Board Meeting 5-20-09: Statement that we are working with ECC to get students ready for MLA 7 to combat plagiarism and get students ready for college, etc. - Do we want to do this tonight or in Sept.? Divvy up Board meetings - Sept., Nov., Jan., March, May 2010 8:45am to 9am
 * 4) Orientation Power Point to Movie - Got Traci's file.
 * 5) 9am to 9:30am: Go over Power Points from SAUSD Curriculum - [|Maggie Barnes from SAUSD]
 * 6) Review our work
 * 7) Make sure our objectives and learner outcomes are clear
 * 8) Generate assessments and activities for Day 2 (below)

Our stuff from March 20th Meeting:

2day: English or Social Science Late Sept, Early Oct. English will not be 20:1 anymore - can finish up more quickly



Sept. 2009

Spring 2010
Digital Citizenship (investigate what this REALLY is)
 * Acceptable Use
 * Google Docs
 * Group Work
 * Parent Letter
 * Public Spaces
 * real life to cyber-life
 * inappropriate content
 * netiquette
 * addictive behaviors
 * effective printer use
 * using computer for sharing files
 * flash drives
 * what students should KNOW to use technology safely and effectively
 * personal vs. professional email addresses
 * digitalcitizenship.net

Ethical Literacy:
 * attribution
 * piracy
 * plagiarism
 * copyright
 * hacking
 * threats against President
 * streaming media - bandwidth hogging
 * Downloading music
 * Games
 * Uploading
 * Installing Software
 * Virus
 * texting and phoning - time and place

Possible Activities:
 * CyberSmart! Your Onilne Image Prompts
 * Safety and Security: Meeting People Online
 * True and false line, turn right, turn left
 * Get up and stretch
 * Basketball
 * Santa Ana Unified Power Point
 * Presentation to parents with PTSA
 * Group Work

Evidence:
 * Completion of Cyber-Safety and Cyber-Ethics Orientation (certificate?)
 * Academic Use of email, email with attachments and flash drive
 * Participation in student groups to research, prepare a product, and present findings about a topic
 * Students know that the campus librarian is a safe person
 * evidence of power point projects that use info gathered from a variety of sources that provides clear attribution
 * Quia results
 * Moodle results
 * Format, organize and manage various pieces of information over the period of time of an assignment
 * peer editing evidence (Google Docs history, wiki history) - gmail account and group work
 * Works Cited
 * Orientation Website

Assessments:
 * Quia Survey
 * Completion of Cyber-Safety and Cyber-Ethics Orientation (certificate?)
 * Google Docs activity
 * Student use of Moodle as a social network (Edmodo?)
 * Annotated bookmarks results (delicious, wiki, or google doc)

Questions:
 * Can we export from Quia and import into Data Director?

Possible Curriculum Scope and Sequence: (we need to look at English Standards) 9th: Cybersafety 10th: Works Cited 11th: Plagiarism and Notetaking 12th: Professional vs. Personal (presenting a professional face online). (we go to classrooms and do 15 minute presentations).

== =[supplemental=]= =**[]**=

New in Town