Top Banner
29

How To Use This Lesson

Jan 02, 2016

Download

Documents

blair-eaton

How To Use This Lesson Go-Givers ’ PowerPoints are designed to inform and support critical thinking and discussion. They can be used in their entirety . However, please feel free to save this lesson to your computer and edit, omit or add content as appropriate for your pupils. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: How To Use This Lesson
Page 2: How To Use This Lesson

How To Use This Lesson

Go-Givers’ PowerPoints are designed to inform and support critical thinking and discussion. They can be used in their

entirety. However, please feel free to save this lesson to your computer and edit, omit or add content as appropriate for

your pupils.

Please remember:

• Always show the PowerPoint in ‘slide show’ view. Links and animations will only work when in this mode.

• The green dot in the bottom right hand corner of the slide indicates when the slide animation is complete.

•The Learning Activities are intended for use in conjunction

with the PowerPoints and are linked at the end.

Page 3: How To Use This Lesson

In this lesson we will be exploring the benefits and dangers of the global computer network – cyberspace!

Page 4: How To Use This Lesson
Page 5: How To Use This Lesson

Jun and her friend Jasbir have fallen out. Jasbir has sent Jun a text.

How could she?

Page 6: How To Use This Lesson

How could Jasbir text those awful

things about me?

Page 7: How To Use This Lesson

Now she’s sent a horrible

picture of me that she must have taken at

the sleep-over a few weeks ago!

Later …….

Page 8: How To Use This Lesson

… it seems she’s copied it

to all her friends!

Page 9: How To Use This Lesson
Page 10: How To Use This Lesson

What Jun should doShe should: • tell a responsible adult that she is being

cyber-bullied.• ask her parents to get in touch with the

phone company and ask them to block the calls.

She should NOT:• respond/retaliate, as this could make things

worse. • delete the text messages. They are

evidence!

Page 11: How To Use This Lesson

Cyber-bullying is an especially nasty form of bullying because it can follow children into their homes outside school hours, and even when they’re on holiday.

Page 12: How To Use This Lesson
Page 13: How To Use This Lesson

My name is Ahmeti. I am 13 years old.

My address is 12, Ashbourne Road, Tellminster, TL1 3NY.

My tel no. is 07918 238811

Page 14: How To Use This Lesson

Hi Ahmeti,

You sound really fun. Shall we meet up? I think we could be good friends.

Alex

Great …. I’ve found

a new friend on

the internet!

Page 15: How To Use This Lesson
Page 16: How To Use This Lesson

Where Ahmeti is Going Wrong

• She has posted personal information on the internet. You should never share your address or telephone number on line!

• She should have used an avatar instead of a real photo.

• She appears to be about to arrange a meeting with a stranger who she has met online. Alex could be anyone - a young girl or a thirty year old man! ! S/he seems nice but could mean her harm ! !

Page 17: How To Use This Lesson
Page 18: How To Use This Lesson

Cyber-bullies can send their messages to a lots of people at lightning speed.

Page 19: How To Use This Lesson

Callum has just received a text from one of his classmates. He is asking Callum and his friends to meet him at the corner of the street to beat up his neighbour on his way home from school!

Page 20: How To Use This Lesson
Page 21: How To Use This Lesson

The same thing you would do whenever you become aware that someone is being bullied!

REPORT IT to a trusted adult.If anyone is in immediate danger call 999.

Of course, if everyone treated each other with

proper respect there would be no bullying –

of any kind!

Page 22: How To Use This Lesson
Page 23: How To Use This Lesson

Go-Givers

My little safety tip:

I never tell anyone my passwords.

Can you guess why I don’t?

Page 24: How To Use This Lesson

Teefa knows that if someone has her password they can change things on her social network page without her permission, and could post false information and nasty photos to make her feel bad.

Mums and dads have to be careful too, especially when they use passwords for important and private matters like banking.

Page 25: How To Use This Lesson
Page 26: How To Use This Lesson

One more thing guys: ……. Don’t forget that when you post comments on the Go-Givers blog section, you make yourselves look bad when you write horrid things, especially when you are being cruel about your friends!

THINK before you write anything in cyberspace

Page 27: How To Use This Lesson

Glossary• Cyberspace – global computer network• Cyber-bullying – use of technology, e.g.

the internet or a mobile phone,to deliberately hurt, humiliate, or threaten someone

• Avatar – a movable three-dimensional image used to represent somebody in cyberspace

• Social network sites – sites that help people connect to each other (e.g. Myspace, Facebook, Bebo) .

Page 28: How To Use This Lesson

Activities to complete this lesson include:

Rate this lesson here.

Click on the image above to view and/or download learning

activities.

• Role play ‘Options’• True or False

Cyber Quiz •‘Consequences’

stories.

Page 29: How To Use This Lesson

If you would like to see more FREE lessons and resources from Go Givers visit our website at www.gogivers.org