You are on page 1of 13

INCLUDES MATERIALS AND ACTIVITIES FOR AGES 9-15

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
1
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
Dear teachers,
We are glad to have you on board! The International Standard of Internet Safety
understands the importance of digital citizenship etiquette in the modern era, to
respond to that, our team has curated this handbook for effective online safety
education. In this kit, you can find multiple fun activities and educational material
both also applicable for online teaching. We hope your students can benefit! Should
there be any inquiries please contact us on our Instagram page @isis_nh.

Sincerely,
The team

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
2
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL
FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
3
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
IMPLEMENT
PREVENT
INTERNET
CYBERBULLYING
MANNERS

IMPROVE
BETTER SAFETY DIGITAL
FOR YOU AND LITERACY
YOUR FAMILY
FAMILY
AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL
FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
4
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
QUESTION: HOW DO I KNOW IF THE
STRANGER I AM TALKING TO IS
DANGEROUS?

ANSWER: ASK YOURSELF THESE


QUESTIONS
• Has this person asked to keep
anything about our relationship a
secret?
• Has this person hinted at or
asked about anything sexual?
• Have I felt pressured or QUESTION: HOW DO I STAY SAFE
manipulated by this person? ON SOCIAL MEDIA?
• Do I feel true to myself –
sticking to my values – when I
ANSWER:
communicate with this person?
• Do not share personal
information. Keep it to yourself!
• Keep Privacy settings on
• Be cautious when meeting
with strangers online
• Keep anti-virus programs
up to date
• Only make online purchases
from secure websites
AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL
FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
5
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
QUESTION: WHAT DO I DO WHEN CONVERSATIONS GET
UNCOMFORTABLE?

ANSWER:
• Remember you have the power to end the conversation
• Ask yourselves if you are in an uncomfortable situation with
the person
• Consider the unknown risks of online relationships
(catfishing, hacking, etc.)
• Do not flirt or have long conversations with online
strangers

QUESTION: WHAT TO DO IF A STRANGER ASKS


PERSONAL INFORMATION?

ANSWER:
• Think if the situation is appropriate
• You can always end the call or conversation
• Tell your parents/elders
• Sometimes offers on the internet are too good to be true

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
6
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
WHAT ARE THE
DANGERS?
Inappropriate content such as
pornography
Possibility of cyberbullying and cyber
harassment
Piracy
Illicit content
Hacking
Malware
Catfished

WHAT TO DO IF A STRANGER
ASKS PERSONAL
INFORMATION?
1. Think if the situation is appropriate
2. You can always end the call or conversation
3. Tell your parents/elders
Sometimes offers on the internet are too good to be true

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
7
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
USE
NUMBERS
UPPER
CASES

USE HARD TO
SYMBOLS GUESS

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
8
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL
FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
9
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
Smishing- a security attack in which the user is tricked into
downloading a virus or other malware onto his cellular phone or another
mobile device

Spyware- is unwanted software that infiltrates your computing device,


stealing your internet usage data and sensitive information
Cloud computing- Cloud computing is the on-demand availability of
computer system resources, especially data storage and computing
power, without direct active management by the user.

Spamming- Spamming is the use of messaging systems to send an


unsolicited message, especially advertising, as well as sending messages
repeatedly on the same website

Cookie- are messages that web servers pass to your web browser
when you visit Internet sites, so it will help enhance the people’s website
experience. But they store your data from the website into a file on their
servers

Hacking- Unauthorized access given to a computer.


Phishing- Phishing involves getting sensitive information such as
usernames, passwords, and credit card detail, for malicious reasons, by
mimicking a reliable webpage on the network

Viruses: is a malicious computer program that, when executed,


replicates itself by modifying other computer programs and inserting its
own code

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
10
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
Because the data in cookies doesn't change, cookies themselves aren't harmful.
They can't infect computers with viruses or other malware, although some cyber-
attacks can hijack cookies and, therefore, browsing sessions. The danger lies in
their ability to track individuals' browsing histories.

So, it depends on the risk you are willing to take if the website is secure then you
can but there still be a chance your history on the website can be leaked if the
website is hacked. But if you want to enhance your website experience than go-
ahead

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
11
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
FOR MORE FUN ACTIVITIES,
VISIT @ISIS_NH FOR UPDATES. JOIN THE LINK
TO OUR KAHOOT QUIZ AND PRIVATELY
MESSAGE US FOR A DIGITAL CITIZENSHIP
CERTIFICATE.
https://instagram.com/isis_nh?igshid=bb8m3c2bbhpd

SOURCES

• https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-
internet-safety-rules-and-what-not-to-do-online

• https://kidshealth.org/en/parents/net-safety.html

• https://www.commonsense.org/education/digital-citizenship/internet-
safety

• https://www.mcgruff-safe-kids.com/2014/08/10-internet-safety-tips-
for-kids/

• http://www.safetynetkids.org.uk/personal-safety/staying-safe-online

• https://edu.gcfglobal.org/en/internetsafetyforkids/teaching-kids-about-
internet-safety/1/

• https://www.safety.com/internet-safety/

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
12
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15
GLOBAL PERSPECTIVES PROJECT
BY CELINE LITYO, FERRIL SUCAHYONO, JOSHUA EMMANUEL
Y11I AY 2019-2020

AUTHORED BY: FERRIL SUCAHYONO, CELINE LITYO, JOSHUA EMMANUEL


FREE REPRODUCE © THE INTERNATIONAL STANDARD OF INTERNET SAFETY
13
THIS HANDBOOK IS A PRINTABLE TEACHER’S KIT FOR INTERNET SAFETY EDUCATIONAL PURPOSES
SUITABLE FOR AGES 9-15

You might also like