Professional Documents
Culture Documents
Project 2
Design Document
Name: Martha Rice
Date: July 19, 2010
1. Characteristics of the learners (e.g., age, gender, education, work experience, computer
skills, current knowledge/skill levels, etc.)
These modules are designed for junior high school students, especially those in 7 th and
8th grade, whose average age is 13. Students will be both boys and girls with little formal
computer skills training. Students of this age are especially attuned to technology in
their personal lives, but they may not be aware of the myriad dangers hiding on the
Internet.
This instructional unit will be assigned in middle school technology application classes.
Students will have use computers with Internet access. Students will have technology
skills necessary to use online eLearning, including using basic knowledge of opening and
saving different types of documents and researching to find information they need on
the Internet.
Module Objective
1 The student will demonstrate knowledge of safe Internet interaction with
Safety and unknown users including:
security online1.1. keeping personal information secret;
1.2. discriminating interaction with users that they do not know;
1.3. reporting suspicious Internet activity to the appropriate sources.
2 The student will demonstrate knowledge of
Cyberbullying 2.1. what bullying means;
2.2. how to avoid being a bully and to help students who are being bullied;
2.3. what specifically constitutes cyberbullying;
2.4. cyberbullying and mobile devices;
2.4. what steps to take if cyberbullying is occurring.
3 The student will learn about cyber manners and appropriate communication
Communications skills with different kinds of audiences in online communications, including:
and Internet 3.1. email;
manners 3.2. discussion boards and blogs;
3.3. social media sites.
4 The student will learn to discriminate when researching using the Internet,
Safe searching— demonstrating basic knowledge of
Truth and fiction 4.1. Internet scams and misinformation;
online 4.2. malware, viruses, and spyware;
4.3. searches using Internet search engines like Google;
4.4. judging websites by domains, ads, and layout;
4.5. benefits of researching with EBSCO and other scholarly sources.
Multimedia Objects
Introductory animation showing basics of what Internet is and
why it is important to be safe online. (Section 1)
Video about how to sign up for an online account, detailing
what kinds of information should be shared and why.
(Section 2)
Interactive game simulating online Interactions with unknown
people. (Section 3)
Video about reporting Internet safety concerns. (Section 4).
Module Challenge (Section 5)
Multimedia Objects
Introductory animation showing the effects of bullying on a
young teenager. (Section 1)
Graphic showing how to help stop bullying. (Section 2)
Videos dealing with cyberbulling. (Sections 3 and 4).
Interactive simulations about how to stop cyberbullying
(Section 5)
Module Challenge (Section 5)
Multimedia Objects
Introductory animation showing the effects of unacceptable
online communication. (Section 1)
ITED 523
Project 2
Multimedia Objects
Introductory scavenger hunt to allow students to find
information any way they want to on the Internet. (Section 1)
Game—choose the scam. (Section 2)
Video demonstrating how viruses work ( Section 3)
Graphic comparing types of malware (Section 3)
Animation explaining how to use Boolean search (Section 4)
Game—analyze the website (Section 5)
Animation demonstrating how to navigate EBSCO (Section 6)
Module Challenge (Section 7)
V. Instructional Strategies
Weekly plan
If project is acceptable, course will be set up online with appropriate links to quality
resources already existing on quality websites (see references) and written for the
course by course instructor.
Each module should last one-two weeks, with additional time provided if students need
more time to work on module challenges.
VII. References
Center for Safe and Responsible Internet Use. (2010). Mobilizing educators, parents, students,
and others to combat online social aggression. Retrieved from http://csriu.org/cyberbully
Children International. (2007). Digizen. Retrieved from http://www.digizen.org
Common sense media programs. (2010). Retrieved from http://www.commonsensemedia.org
Digital literacy. (2009). Retrieved from http://www.ikeepsafe.org/youtube.html
Dowell, E., Burgess, A., & Cavanaugh, D. (2009). Clustering of Internet Risk Behaviors in a
Middle School Student Population. Journal of School Health, 79(11), 547-553.
doi:10.1111/j.1746-1561.2009.00447.x. Retrieved from
http://search.ebscohost.com/login.aspx?
direct=true&db=pbh&AN=44605250&site=ehost-live
Federal Trade Commission. (n.d.). The children's online privacy protection act. Retrieved from
http://www.ftc.gov/privacy/privacyinitiatives/childrens.html
Fraud Watch International. (2010). Internet Fraud. Retrieved from
http://www.fraudwatchinternational.com/ife/ife-home/
Get Net Wise. (2008). Retrieved from http://getnetwise.org
Goddard, C. (2008). Cyber World Bullying. Education Digest, 73(7), 4-9. Retrieved from
Education Research Complete database. http://search.ebscohost.com/login.aspx?
direct=true&db=ehh&AN=31203799&site=ehost-live
ITED 523
Project 2
MTV-Associated Press. (2009, Sepetember 23). Digital abuse survey. Retrieved from
http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Full.pdf
MySpace. (2010). MySpaceSafety. Retrieved from http://www.myspace.com/index.cfm?
fuseaction=cms.viewpage&placement=safety_pagehome
The National Center for Missing and Exploited Children. (2010). NetSmartz workshop. Retrieved
from http://www.netsmartz.org
National Crime Prevention Council, . (2010). Cyberbullying. Retrieved from
http://www.ncpc.org/topics/cyberbullying
National Cyber Security Alliance. (2010). Stay Safe Online. Retrieved from
http://www.staysafeonline.org
Net Family News. (2010). Retrieved from http://www.netfamilynews.org
On guard online. (2010). Retrieved from http://www.onguardonline.gov
PBS Frontline. (2009, February 2). Digital nation: life on the virtual frontier. Retrieved from
http://www.pbs.org/wgbh/pages/frontline/digitalnation
Safe Kids. (2010). Retrieved from http://www.safekids.com
Safe Teens. (2010). Retrieved from http://www.safeteens.com
The SANS Institute. (2010). Computer security training, network research and resources.
Retrieved from http://www.sans.org
ITED 523
Project 2