1 / 32

The key aim for the week is:

The key aim for the week is:. To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace. Learning outcomes. Explore benefits and risks of using new technologies

alice
Télécharger la présentation

The key aim for the week is:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The key aim for the week is: • To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace.

  2. Learning outcomes Explore benefits and risks of using new technologies Understand the difference between personnel and private information sharing online Know how cyberbullying differs from other forms of bullying behaviour

  3. Ground rules • Listen and respect other people’s points of view • Offer help and support if it is needed • Think about how others might be feeling • Join in and have fun

  4. Ice breaker – Diamond Ranking

  5. What we know….. • 8 out of 10 young people have a home computer, mobile phone and games console • 1,400,000 of young people in the UK have their own web space like a social network profile • The number of text messages sent every day exceeds the total population of the planet i.e. over 6 billion

  6. Discussion points • How many children have a mobile phone? • How many children have access to computer at home or in their bedrooms? • How many play online games with other people? • How many have a social networking profile e.g. Facebook page?

  7. What are the benefits & risks of new technologies?

  8. Mobile phones Outline below what you think the benefits and risks are when using mobile phones.

  9. Emails Outline below what you think the benefits and risks are when using emails.

  10. Social Networking Sites Outline below what you think the benefits and risks are when using Social Networking Sites such Bebo, Facebook, MySpace and Flickr.

  11. Video-hosting sites Outline below what you think the benefits and risks are when using video-hosing sites such as YouTube.

  12. On-line gaming Outline below what you think the benefits and risks are when on-line gaming.

  13. Whenever we use new technologies we leave behind information about ourselves. The "footprint" that we leave online is often referred to as our digital footprint.

  14. My digital footprint What sort of information do you leave online about yourself and where do you leave it?

  15. Discussion points • Who has ever ‘googled’ their own name? • Why did you ‘google’ yourself? • What could your digital footprint tell others about you?

  16. Personal information is more general information about a person which might be considered okay to share online. Private identity information is information about a person that should not shared online. To share or not to share …….

  17. To share or not to share ……. Personal Information Likes and dislikes e.g. music, food or sports Your opinions Your age Whether you are a boy or a girl Private Information Name Address Phone numbers School Passwords Credit card details

  18. What is bullying?

  19. What is bullying? • Deliberate e.g. intention to hurt or humiliate • Hurtful behaviour with no attempt to say sorry • Repeated i.e. usually ongoing & not just a one-off incident • Imbalance of power – it’s hard for the person being bullied to defend themselves or make the bullying stop

  20. Definition of bullying ‘Deliberate, hurtful behaviour, repeated over time, which is difficult to stop (power)’

  21. What is cyberbullying? How does it differ from other forms of bullying?

  22. Cyberbullying is....... ‘the use of Information Communication Technology (ICT), particularly mobile phones and the Internet, to deliberately hurt someone....’

  23. How does it differ? • Cyberbullying is not face-to-face • The person doing the bullying may be unaware of the consequences of their actions. • The person doing the bullying might try and hide who they are

  24. How does it differ? • Cyberbullying can reach large audiences very quickly • Most cyberbullying takes place outside of school in the community.

  25. Send jokes back and forth Alter photos of one another, in a funny (not mean) way Anything else? How do children sometimes tease each other online?

  26. The teasing begins to feel scary and not funny anymore You feel unable to stop what’s happening You feel worried about your safety When does teasing “cross the line” into cyberbullying?

  27. Avatar Does anyone have an avatar? What does the word mean? Which me should I be?

  28. Your online identity – cyber mask

  29. Your online identity – cyber mask

  30. Talking about your avatar. • Is your avatar’s online personality similar or different from who you are in real life? • How did they feel when you were going around the room as their avatar? Did they behave differently than they would have if they had just been going around the room as themselves?

  31. Talking about your avatar. • For those who have used avatars on the Internet, is their avatar like them or different? • What kinds of things does your avatar do that are like you? • What kinds of things does it do that are different?

More Related