Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lesson Plan 1a - Cyber Safety

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Lesson Plan: Cyber Safety

Class: Year 4 stage 2 Full Class

Date: 8/9/2010

Time: Start: 2pm Finish: 2:55pm

Key Learning Area: PDHPE


Lesson Topic: Cyber safety
Recent Prior Experience (specific relevant concepts, skills and values the school students have experienced prior to this
lesson):
Students have had a visit from police about cyber bullying and safety, they have some knowledge about the topic.
Syllabus
Indicators of Learning for this lesson. By the end of this
Assessment:
Outcome(s):
lesson, the students will:
Strategies which will be used
- S2.3 Makes positive
S2.3:
to assess learners
contributions in- Works independently or in a group to devise a simple game.
attainment of learning
group activities.
- Discusses personal strategies to deal with difficult situations
outcomes. Should be linked
SL2.313:
to each learning indicator.
- Describes certain behaviors that can create a safe environment
- SLS2.13 Discusses
how safe practices
for themselves, their school and community.
Teacher will assess students
- Creates a multi-media safety presentation
on their spelling, grammar
promote personal
wellbeing
- Explain the need for rules for safe behaviour in familiar setting
and punctuation throughout
the written tasks. Students
will be encouraged to write
out full sentences although
dot points for some questions
will be accepted.
Resources:
Ipads, Interactive whiteboard, whiteboard, writing materials, Handouts (appendix 1 & 2), access to Book Creator and
Youtube.

Ella Rose 21/10/2015 12:59 PM


Comment [1]: 2.6 Information and
Communication Technology (ICT)
I have successfully used and implemented a
range of ICT within this lesson plan. In
regards to the lesson topic (Cyber safety) I
thought it was an appropriate tool to
incorporate into their work.

Australian Catholic University

2013

LESSON SEQUENCE
Lesson Content / Indicators
of Learning (What is Taught):
Note key skills, concepts and
values addressed in each
section. Link to your Indicators
of Learning.

Students will be seated on the


floor and engage in a
discussion about their previous
experience.

Timing
(mins)
60
minutes

Teaching Strategies / Learning Experiences:


(How it is taught)
Write detailed steps showing what the teacher (T)
will do and what students (Ss) will do.

INTRODUCTION

T will ask questions about their prior


experience: who came yesterday? What did they
talk to you about?
o
T will ask five or so students to talk about
what they experience
o
Ss will provide somewhat detailed response

15 min

Students will view a short video


about Cyber safety whilst the
station are set up.
https://www.youtube.com/watch
?v=H0Qg1_-Xmr8

Whilst Ss are viewing the videos, T will set up


activity placing resources on tables for students to
access or call on students after to set up the stations
worksheets.

The teacher will then explain


the use of Book Creator, asking
students to include various
media tools including images,
sound and text to demonstrate
their understanding of
Cybersafety and Cyberbullying.
Students will be asked to
include definitions and
strategies to prevent misuse.

When video ends T will explain each


workstation. At the end of every rotation a Ss will
pack up their resource and take it to the other table,
only 3 Ss should be walking around at this time.

T will bring up Book Creator on the computer


and explain how to use the tool. T will use clear
instructions, and ask them to look at the resources
carefully.

Interactive
whiteboard
Laptop.
Access to
youtube Make
cyberspace a
better place Katie Cybersafety
https://www.yo
utube.com/wat
ch?v=H0Qg1_Xmr8

Ella Rose 21/10/2015 1:00 PM


Comment [2]: 2.6 Information and
Communication Technology (ICT)
This video demonstrates the effects of using
ICT innapropriately within the classroom.
Through viewing this content students are
able to engage in new knowledge and
deepen their current understanding.

Ella Rose 21/10/2015 1:01 PM


Comment [3]: 2.6 Information and
Communication Technology (ICT)
The Book Creator app, is an application that
encourages students to design and format
an information booklet and then upload it
onto a google drive. I found that this use of
technology created a unique learning
experience for students as they were able to
produce a booklet that showed their
understanding and demonstrated their
knowledge.

Ella Rose 21/10/2015 1:02 PM

The Teacher will go through the


content for each station, and
goals for the students to
Australian Catholic University

Resources
and
Organisation:

Ss will break of into reading groups

2013

Comment [4]: This teaching strategy


provides students with the opportunity to
view how the Book creator works and what
to do with it once they are finished. This
instruction helps students with developing
their information.

achieve ie: getting a


presentation drafted about
cyber safety and bullying.
Station 1: Teacher-Lead
discussion
Students will be involved in a
small-group discussion using a
series of questions developed
around cyber safety. Students
will be given some time to think
about their response and write
out on a worksheet. Students
will then share their responses
in the small group, and then
with a whole group.

DEVELOPMENT
Station 1:

T will present Ss with a series of questions.


The discussion is led in a think-pair-share style.

Ss will be given time to think about their


responses to their questions and write down their
responses in a space provided before the T will ask
Ss to share.

Once the students are comfortable with the


discussion structure the T will leave to assist other
stations

30
minutes
in total

Station 2:

Station 2: Book creator


Presentation
Working in pairs, students will
be asked to create a book
presentation using the Book
Creator App about Cyber
safety. Students will need to
include a variety of resources
such as images, text and sound
clips, which show their
understanding of the
importance of safety online.
Students will upload finnish
products onto their Google
Drive

T will ask open questions that prompt Ss to


discover new resources for their Book Creator
presentation. T will ask about the resources used to
ensure students understand their content

Ss will work independently.


Station 3:

T will encourage collaboration with ideas,


through the use of discussion between mind-map.

Ss will work collaboratively to produce


responses for their mind-maps.

Once Ss are finished with their mind map, Ss


can decorate and colour in their person.

Station 3: mind-map.
Students are given a template

Australian Catholic University

2013

Question
worksheet
(Appendix 1)
Writing
materials
Ipads access
to Book
Creator.
Mind-map
worksheet
(appendix 2)
Writing
materials

Ella Rose 21/10/2015 1:04 PM


Comment [5]: 2.6 Information and
Communication Technology (ICT)
Students are able to engage in technology
to produce meaningful classwork that
highlights the need for cyber safety.

of a child. They will be asked to


mind map around the image
ways to avoid over-sharing
information online, ways to stop
someone from cyber bullying
and why some people might
leave nasty comments.
Students will come together on
the floor to share their
responses for the questions and
share ways to prevent cyber
bullying and misuse of
technology.
Time left will be spent on
packing away materials and
getting ready for the next
lesson.

Australian Catholic University

CLOSURE

Ss will use prior and learnt knowledge to


mind-map a collaborative response.

Ss will share some of their written responses


on an interactive whiteboard to the discussion
station.

T will use open-ended questioning to retrieve


Ss learnt knowledge.

15
minutes

2013

Interactive
white board
White board
Laptop
Ella Rose 22/10/2015 9:24 PM
Comment [6]: Through the use of discussion
students will be able to demonstrate current
knowledge and understanding, reflecting the
lessons content. Students will also be able to
expand on their knowledge if their peers
demonstrate a different understanding to them.
This allows the to gain further information about
Cyber Safety.

Appendix 1:
Questions for discussion:
1.
2.
3.
4.
5.
6.

What do you think cyber bullying is?


What are some social networks where people can contact each other?
If youre being bullied on a social media site I can:
What is a bystander in a bullying situation?

A Cyber Bully is usually


What are some ways to stop cyber bullying?

Appendix 2:

Australian Catholic University

2013

You might also like