You are on page 1of 7

ITED 523

Project 2

Design Document
Name: Martha Rice
Date: July 19, 2010

I. Project Topic and Scope


This project is to serve as an introductory course in safe and smart Internet usage for middle school
students taking technology applications at Pewitt Junior High School in Naples-Omaha, Texas.
Although young middle school aged students are digital natives, they still need adult supervision and
guidance when they are using the Internet. Through the modules in this course, students will learn
about basic Internet safety, cyberbullying, Internet communications etiquette, and deciphering what
is true and what is false on Internet sites. Students will mainly concentrate on computer technology
and Internet sites, but will also examine certain associated topics as they pertain to mobile
technology. The final module of this course should segue into the next course, which will deal
wholly with Internet research and 21 st Century learning skills.

II. Target Audience and Context

1. Characteristics of the learners (e.g., age, gender, education, work experience, computer
skills, current knowledge/skill levels, etc.)

These modules are designed for junior high school students, especially those in 7 th and
8th grade, whose average age is 13. Students will be both boys and girls with little formal
computer skills training. Students of this age are especially attuned to technology in
their personal lives, but they may not be aware of the myriad dangers hiding on the
Internet.

2. Description of learning environments (e.g., learning environments, tools required)

This instructional unit will be assigned in middle school technology application classes.
Students will have use computers with Internet access. Students will have technology
skills necessary to use online eLearning, including using basic knowledge of opening and
saving different types of documents and researching to find information they need on
the Internet.

III. Instructional Objectives

1. Overall goal of instruction


2. Objective Matrix
ITED 523
Project 2

Module Objective
1 The student will demonstrate knowledge of safe Internet interaction with
Safety and unknown users including:
security online1.1. keeping personal information secret;
1.2. discriminating interaction with users that they do not know;
1.3. reporting suspicious Internet activity to the appropriate sources.
2 The student will demonstrate knowledge of
Cyberbullying 2.1. what bullying means;
2.2. how to avoid being a bully and to help students who are being bullied;
2.3. what specifically constitutes cyberbullying;
2.4. cyberbullying and mobile devices;
2.4. what steps to take if cyberbullying is occurring.
3 The student will learn about cyber manners and appropriate communication
Communications skills with different kinds of audiences in online communications, including:
and Internet 3.1. email;
manners 3.2. discussion boards and blogs;
3.3. social media sites.
4 The student will learn to discriminate when researching using the Internet,
Safe searching— demonstrating basic knowledge of
Truth and fiction 4.1. Internet scams and misinformation;
online 4.2. malware, viruses, and spyware;
4.3. searches using Internet search engines like Google;
4.4. judging websites by domains, ads, and layout;
4.5. benefits of researching with EBSCO and other scholarly sources.

IV. Content and Media Objects

1. Course Modules: The course will be presented in the following modules:

 Module 1: Safety and security online


 Module 2: Cyberbullying
 Module 3: Communications and Internet manners
 Module 4: Safe searching—truth and fiction online

2. Module Description & Media Objects

Module Description & Media Objects


Module 1: This module introduces basic Internet safety and security online.
Safety and
security online 1. Introduction
2. What kinds of information can I share on the Internet?
3. Who is this person, and what does he really want?
4. How do I tell somebody something is wrong?
ITED 523
Project 2

5. Module challenge: Students will each read an article about


Internet safety and will summarize their articles for their
classmates.

Multimedia Objects
 Introductory animation showing basics of what Internet is and
why it is important to be safe online. (Section 1)
 Video about how to sign up for an online account, detailing
what kinds of information should be shared and why.
(Section 2)
 Interactive game simulating online Interactions with unknown
people. (Section 3)
 Video about reporting Internet safety concerns. (Section 4).
 Module Challenge (Section 5)

Module 2: This module introduces addresses the pervasive problem of bullying,


Cyberbullying especially as it occurs online.

1. Introduction: What is a bully?


2. How can I stop bullying?
3. How is cyberbullying different than regular bullying?
4. How do cyberbullies use mobile devices?
5. How can I stop cyberbullying?
6. Module Challenge: Students will write scripts and make PSAs
simulating what they would do in a cyberbullying situation.

Multimedia Objects
 Introductory animation showing the effects of bullying on a
young teenager. (Section 1)
 Graphic showing how to help stop bullying. (Section 2)
 Videos dealing with cyberbulling. (Sections 3 and 4).
 Interactive simulations about how to stop cyberbullying
(Section 5)
 Module Challenge (Section 5)

Module 3: This module introduces (explains, provides, etc.)…


Communications
and Internet 1. Introduction
manners 2. How do you use email correctly?
3. What are discussion boards and blogs?
4. What are right ways to use social media sites?
5. Module Challenge: Students will participate in class
discussion online following proper Internet etiquette.

Multimedia Objects
 Introductory animation showing the effects of unacceptable
online communication. (Section 1)
ITED 523
Project 2

 Interactive diagrams of the parts of an email. (Section 2)


 Simulation of using a discussion board ( Section 3)
 Video discussion of a blog (Section 3)
 Video describing how to be safe on social media sites.
(Section 4)
 Simulation—to friend or not to friend? (Section 4)
 Module Challenge

Module 4: This module introduces (explains, provides, etc.)…


Safe searching—
truth and fiction 1. Introduction
online 2. Can I really lose 50 lbs overnight? Internet scams and
misinformation
3. Why is my computer messed up? malware, viruses, and
spyware
4. If it’s on Google, it’s okay, right? searches using Internet
search engines like Google
5. Where is the information? All I see is ads! judging websites
by domains, ads, and layout
6. Where can I find really good information then? benefits of
researching with EBSCO and other scholarly sources
7. Module Challenge: Students will analyze websites and report
their findings to the class.

Multimedia Objects
 Introductory scavenger hunt to allow students to find
information any way they want to on the Internet. (Section 1)
 Game—choose the scam. (Section 2)
 Video demonstrating how viruses work ( Section 3)
 Graphic comparing types of malware (Section 3)
 Animation explaining how to use Boolean search (Section 4)
 Game—analyze the website (Section 5)
 Animation demonstrating how to navigate EBSCO (Section 6)
 Module Challenge (Section 7)

V. Instructional Strategies

In this course, students will

 use prior knowledge to activate new learning


 use modalities
 discuss and simulate problems and solutions
 solve problems
ITED 523
Project 2

 work in collaborative groups


 use technology to research

VI. Development and Production Plan

 Weekly plan

If project is acceptable, course will be set up online with appropriate links to quality
resources already existing on quality websites (see references) and written for the
course by course instructor.

Each module should last one-two weeks, with additional time provided if students need
more time to work on module challenges.

Module 1: week of August 23-27.


Module 2: week of August 30-September 3.
Module 3: week of September 7-10.
Module 4: week of September 13-17.

VII. References
Center for Safe and Responsible Internet Use. (2010). Mobilizing educators, parents, students,
and others to combat online social aggression. Retrieved from http://csriu.org/cyberbully
Children International. (2007). Digizen. Retrieved from http://www.digizen.org
Common sense media programs. (2010). Retrieved from http://www.commonsensemedia.org
Digital literacy. (2009). Retrieved from http://www.ikeepsafe.org/youtube.html
Dowell, E., Burgess, A., & Cavanaugh, D. (2009). Clustering of Internet Risk Behaviors in a
Middle School Student Population. Journal of School Health, 79(11), 547-553.
doi:10.1111/j.1746-1561.2009.00447.x. Retrieved from
http://search.ebscohost.com/login.aspx?
direct=true&db=pbh&AN=44605250&site=ehost-live
Federal Trade Commission. (n.d.). The children's online privacy protection act. Retrieved from
http://www.ftc.gov/privacy/privacyinitiatives/childrens.html
Fraud Watch International. (2010). Internet Fraud. Retrieved from
http://www.fraudwatchinternational.com/ife/ife-home/
Get Net Wise. (2008). Retrieved from http://getnetwise.org
Goddard, C. (2008). Cyber World Bullying. Education Digest, 73(7), 4-9. Retrieved from
Education Research Complete database. http://search.ebscohost.com/login.aspx?
direct=true&db=ehh&AN=31203799&site=ehost-live
ITED 523
Project 2

Google.com and YouTube. (2010). Safety center. Retrieved from


http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&hl=en-US
Internet Keep Safe Coalition. (2009). I Keep Safe. Retrieved from http://www.ikeepsafe.org
Internet Policy Committee. (2010). Consumer advice on phishing. Retrieved from
http://www.antiphishing.org
Internet Solutions for Kids, Inc. (2010). Retrieved from http://is4k.com
Internet Solutions for Kids, Inc., . (2010). Internet safety task force report published. Retrieved
from http://is4k.com/press-releases/internet-safety-task-force-report-published
Internet Solutions for Kids, Inc. (2010). Prevent cyberbullying. Retrieved from
http://www.cyberbully411.org/
iSafe. (2010). iLearn online. Retrieved from http://ilearn.isafe.org
Love is not abuse. (2010). Retrieved from http://loveisnotabuse.com
Miller, N., Thompson, N., & Franza, D. (2009). Proactive Strategies to Safeguard Young
Adolescents in the Cyberage. Middle School Journal, 41(1), 28-34. Retrieved from
Education Research Complete database. http://search.ebscohost.com/login.aspx?
direct=true&db=ehh&AN=43972246&site=ehost-live
MTV. (2010). A Thin line. Retrieved from http://www.athinline.org

MTV-Associated Press. (2009, Sepetember 23). Digital abuse survey. Retrieved from
http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Full.pdf
MySpace. (2010). MySpaceSafety. Retrieved from http://www.myspace.com/index.cfm?
fuseaction=cms.viewpage&placement=safety_pagehome
The National Center for Missing and Exploited Children. (2010). NetSmartz workshop. Retrieved
from http://www.netsmartz.org
National Crime Prevention Council, . (2010). Cyberbullying. Retrieved from
http://www.ncpc.org/topics/cyberbullying
National Cyber Security Alliance. (2010). Stay Safe Online. Retrieved from
http://www.staysafeonline.org
Net Family News. (2010). Retrieved from http://www.netfamilynews.org
On guard online. (2010). Retrieved from http://www.onguardonline.gov
PBS Frontline. (2009, February 2). Digital nation: life on the virtual frontier. Retrieved from
http://www.pbs.org/wgbh/pages/frontline/digitalnation
Safe Kids. (2010). Retrieved from http://www.safekids.com
Safe Teens. (2010). Retrieved from http://www.safeteens.com
The SANS Institute. (2010). Computer security training, network research and resources.
Retrieved from http://www.sans.org
ITED 523
Project 2

Savvy Cyber Kids. (2010). Retrieved from http://www.savvycyberkids.org

Social networking basics. (n.d.). Retrieved from


http://iKeepsafe.org/prc/videotutorials/myspace/index.html
Stop badware. (2010). Retrieved from http://www.stopbadware.org

Tech Partnering Group. (2009). ConnectSafely. Retrieved from http://www.connectsafely.org


U.S. Department of Health and Human Services Health Resources and Services Administration.
(2010). Stop bullying now!. Retrieved from http://www.stopbullyingnow.hrsa.gov/kids/
Verizon. (2009). Verizon parental controls center. Retrieved from
http://parentalcontrolcenter.com
Wired safety. (n.d.). Retrieved from http://www.wiredsafety.org

You might also like