LearnITWithMrC ⛯
0 results for
Responsive image

E-safety Introduction

0 results forGuest
Flight Path
Learning Objectives
0 results forGuest
 1 I can use technology safely and responsibly
 3 I can demonstrate understanding of ways to report concerns
 1 I can take measures to protect my identity and privacy when using the internet
 2 I can identify good and bad online behaviour, including cyberbullying and scams

🏁 Learning Objective E-safety Introduction


Staying Safe Online

The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to to be on your guard whenever you're online.

Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.

To learn more about the dangers of online predators, watch the video below.

Using technology safely

You'll need to know about the different types of online dangers that exist. For example, kids and teens may find inappropriate content on the Internet, such as pornography or obscene language.

There is also a possibility of cyberbullying or cyberharassment from others online. This does not mean you will encounter all of these threats. However, knowing about the dangers can help you and you make smart decisions online.

Task 1

Create a powerpoint with the title "Staying safe Online"

  1. On your first page explain how you can use technology safely and responsibly

Extension Task

Add another slide to your powerpoint

Explain in it the potential consequences of not using technology responsibly. Give an example.

Protecting your identity and privacy

To learn more about the dangers of online predators, watch the video below.

Setting up a social networking profile

Even though sites like Facebook give you some control over what information is shared, some parts of your profile are usually visible to everyone. If your children are setting up online profiles, they should take precautions to make sure their profiles aren't revealing too much information. Let's take a look at how to set up a safe and appropriate profile.

Screen name

Should you use your full name, first name only, or a pseudonym (fictitious name)? It may be okay to use your full name on sites like Facebook and Linkedln where you can limit your sharing to the people you know. On a message board or chat room, you should not use your full name, since you are interacting with people you don't know. Instead, you can just use your first name or a pseudonym.

Profile picture

Many sites allow you to choose a profile picture. This can either be a photo or an avatar, which is a graphical image that represents you. On Facebook, most people use photos of themselves. However, on a more public site (such as a discussion board), you may want to use an avatar, as it allows you to remain more anonymous.

Keep in mind that many different people will be able to see your profile picture. Therefore, it's important to choose a picture that won't reflect negatively on you. It's possible for a photo to get you into trouble at school or damage your reputation.

Profile information

You should be careful about what personal information you share. If you have the option of making your info private to just you and your friends, you should choose this option. You should never make your birthday or home address publicly viewable.

Contact information

Generally speaking, you do not want to include any contact information other than your email address. Do not use home phone numbers or addresses. If you must include a phone number, use a mobile phone number.

It may also be a good idea to create a separate email address for social networking connections in order to protect your normal account from getting cluttered with spam and phishing emails.

Image and personal information

Many sites allow you to customize your profile with wallpaper, personal interests, likes and other types of information like relationship status. Always keep in mind what type of public image you want to project as you choose how to customize your profile and what types of information to include.

Your online image will become more important when you begin applying for jobs or to college. Anything that is inappropriate may lower someone's impression of you. Even if you're not worried about it now, don't post anything that's going to come back to haunt you in a few years.

Task 2

Add another slide to your powerpoint with the title

Protecting your identity and privacy

  1. Explain the things you can do to protect your identity and privacy

Extension Task

Add another slide to your powerpoint

Explain in it how not protecting your privacy might affect your future wellbeing

Learning Outcomes

  • I have a basic understanding of how to use technology safely and responsiblyand how to report any concerns I might have.
  • I can describe how to use technology safely and responsiblyand identify good and bad behaviour and know how to report any concerns I might have.
  • I can explain what internet safety is and how I can protect my privacy. I can explain different types of bad online behaviour like cyberbullying and scams and can explain how to report any e-safety concerns.

Update your objectives


0 results forGuest
Recent Comments

Teacher Date: 2020-09-23