Home > Lesson 7: Netiquette

Lesson 7: Netiquette

Page 1
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University Page 19 www.carnegiecyberacademy.com
Lesson 7: Netiquette
Learning Objectives Materials You Will Need
Introduce new online terms and definitions. • Introduce students to online netiquette. • Reinforce protecting one’s private information and • respecting the online privacy of others. Enhance students’ motor skills while navigating the game. • Computers with Carnegie Cadets: The • MySecureCyberspace Game installed Worksheet for Lesson 7: Netiquette • Hint Sheet 06 (download from • http://www.carnegie cyberacademy.com/documents/hintSheet06.pdf)
Classroom Activities (Duration: 45 minutes)
Timeline Teacher Instructions Student Activities
Introduce Concepts (15 min) Lead students to the game and direct them to the • Cafeteria to complete the ReQuest with Dana. (10 min) Students who finish the ReQuest before their • peers can buy items from the Academy Store and decorate their dorm rooms. Start and log in to the game and go to the • Cafeteria. Click on Dana and offer to help her with her questions about personal information. After completing the ReQuest, buy items from • the Academy Store and decorate your dorm room. Develop and Practice (20 min) Hand out the worksheet and explain what • Netiquette is. Let students read and discuss the cartoon and attempt question #1. (Worksheet, part 1) (5 min) Discuss the differences between talking to friends • or family over the Internet and talking to them in person and how it can be easy to misunderstand intentions in cyberspace. Hand out Hint Sheet 06 and explain the details of • Netiquette. Have students attempt questions #2 and #3. (Worksheet, part 1) (10 min) Lead the students to the “Fun Stuff” page at the • Carnegie Cyber Academy website: http://www .carnegiecyberacademy.com/funstuff.html Have them play “Betty’s Netiquette Quiz.” Let • them play until they get a score of 80% or higher. (10 min) Read about Netiquette and think about the • cartoon. Discuss the differences between talking with • friends or family over the Internet and talking to them in person. Think about and discuss what Erika and Alan • should or shouldn’t have done. Read Hint Sheet 06 and think about the importance • of Netiquette. Go to the Carnegie Cyber Academy website’s “Fun • Stuff” page and play “Betty’s Netiquette Quiz.” Reinforce (10 min) Make sure that all students complete “Betty’s • Netiquette Quiz” and explain what it is to be a good cyber citizen. (5 min) Emphasize that it means being polite and • having good manners when chatting, playing games with others, sending messages, and posting comments in Cyberspace. Finish “Betty’s Netiquette Quiz” and discuss the • importance of being a good cyber citizen.
Learning Outcomes
At the end of this lesson, students will be able to: Define the cyber defense terms introduced in this lesson. • Demonstrate proper online communication behavior and respect of other cyber citizens. • Demonstrate an understanding of online communication, cyber threats and protective measures. • Apply safe behavior while using email, chat rooms, instant messaging and social networking sites. •

Page 2
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University Page 20 www.carnegiecyberacademy.com
Worksheet 7: Netiquette
1. What is Netiquette? 2. Being a Good Cyber Citizen
Date: Name:
Rules for how you should act in cyberspace. These rules help keep the Internet polite and help everyone get along.
Quiz 1: What are the differences between talking to your friends or family over the Internet and talking to them in person? Quiz 2: What could Erika have done to avoid this situation? Quiz 3: What could Alan have done to avoid this situation?
Betty, Clubhouse Supervisor
Email Blogs Instant Messages Video Sharing Sites Text Messages Social Networking Sites Multiplayer Online Games Internet Forums (Bulletin Boards) Chat Rooms Use Good Manners! Remember! To keep Cyberspace a safe, fun and happy place, you have to practice good netiquette everywhere in Cyberspace!

Page 3
If an email is from someone you don’t know and the Subject is like any of the examples below , it is probably Spam:
© 2012 Carnegie Mellon University. All Rights Reserved.
It sounds too good to be true
Sender: NotMCSpammer Subject: You just won millions!!
It is advertising something
Sender: Joe Schmoe Subject: Great Deals Here
There are lots of misspelled words
Sender: Sunsh1n3 Superst@r Subject: Brit3 dats R heer
It sounds really strange
Sender: Monica Lindsay Subject: Re: mango justified
The email sounds interesting but you weren’t expecting it
Sender: brouhaha Subject: Win a free game console!
T ips for Identifying Spam Emails
P ersonal Information is information about your OFFLINE identity that someone could use to figure out who or where you are, such as:
What school you go to Your teachers’ names Credit Card numbers License plate numbers Name of team you play for Your number on your team Places near your hous e, like stores, restaurants, or parks Places you visit regularly If you are home alone When you are going to be home alone Your full name Your User name or Password Your age Your ID numb er or Social Security Number Your email address Your home address Your phone number What city you live in What neighborhood you live in Your parents’ names Where your parents work Names or phone numbers of family members and friends
Examples of P ersonal Information
Some websites contain Dangers that can damage your computer or steal your personal information. When you are exploring websites, watch out for the following 4 Dangers:
T ips for recognizing Website Dangers
Links that download files Forms that ask for P ersonal Information Advertisements and P opups Threatening, hurtful, or adults-only content
These links usually ask if you want to save or open the file when you click on them and can say something like “Click to Download” or “Download Now ” Advertisements have content that is different than the website they are on (like a car Ad on a website about puppies), and sometimes they say “Ad” or “Advertisement” on them Forms can be a Danger if they ask for personal information like your full name or credit card number Content can be a Danger if it makes you feel icky or uncomfortable or says Adults-only or “You must be 18 or older” on it
T ips for De aling with Cyber Bullying
Cyber bullying is using the Internet to threaten, em barrass, pick on, or put-down people. They can make you pretty miserable, so if you ever run into a cyber bully , remember these tips:
When a Bully attacks, first try to ignore or block them. If the attacks become overwhelming or scary , you should probably let a trusted adult know about it.
The Bully is probably trying to pick a fight. If you can laugh it off instead of reacting or fighting back, the Bully doesn’t get what they want. Talk with your trusted adult about strategies to deal with the bullying and come up with a plan together.
Be prepared to report the bully. Be a good cyber citizen and help prevent cyber bullying .
Save any evidence of the bullying, such as email and instant messages and screenshots of web pages. See Hint Sheet 05 for information on how to report cyber bullying. If you witness cyber bullying, try to do something friend ly to help the victim, so they don't feel alone. Don't join in and make things worse.
Protect yourself from cyber bullying as much as possible .
Make sure that you won’t be an easy target for cyber b ullies. Don’t share your personal information in Cyberspace, especially photos and videos , and don’t try to pick fights with other people.
T ips for Re porting Cybe r Bullying
Cyber bullying is using the Internet to th reaten, embarrass, pick on, or put-down people. Remember to save evidence of cyber bu llying. Here’s some tips for deciding whom to report cyber bullying to: Contact the webmaster, site owner, or custom er service and request that the offensive materials be removed. If that doesn’t work, c ontact the Web site host and ask them to pull down the site if it violates the terms of agreem ent. Contact the bully ’s ISP to see if it qualifies as abuse. They may send a warning or suspend the user’s account. Contact your own ISP for help with blocking an account. Contact the phone service provider - most calls can be traced and they may be able to block the calls or let you know where they are coming from so you can report the abuse. Contact the school Principal or Counselor. If the cyberbullying happens at school or is affecting the school environment they may be a ble to intervene. If the school does not have a cyber bullying policy , ask them to create one.
If the bully goes to school with your child... If the bullying happens through a cell phone... If the bullying happens through a Web site... If the bullying happens through Email or Instant Message... If there is the threat of physical danger...
Contact the local law enforcement if there is the threat of physical harm. They may also have a special cyber crimes unit that can investigate .
T ips for Growing a P os itive Online Re putation
Your online reputation can be positive o r negative, it all depends on how you behave when you're in cyberspace and what other pe ople say about you.
Do share things that would improve your re putation as a good student, a good friend, and a te am playe r Don’t share things that would damage your re putation as a good friend and a respectable and trustworth y person Don’t share things that will make you a target for we irdo strangers or bullies Be careful about whom you trust with your re putation wh e n yo u add them to your friends and share thing s with the m Be on the lookout for others damag ing your re putation and act quickly to minimize the damag e
Search more related documents:Lesson 7: Netiquette
Download Document:Lesson 7: Netiquette

Set Home | Add to Favorites

All Rights Reserved Powered by Free Document Search and Download

Copyright © 2011
This site does not host pdf,doc,ppt,xls,rtf,txt files all document are the property of their respective owners. complaint#nuokui.com
TOP