Digital Citizenship


Take a look at the wheel above! Isn’t it amazing all the wonderful ways the internet can help us create, remember, apply, analyze, and evaluate assignments for school. It was created by Allan Carrington[@AllanADL], a professor from the University of Adelaide. He shows us that there are millions of connections we can make when we find the right resource out in the world wide web.

If you would like to use this wheel, I’ve linked the interactive PDF here:

It is pretty amazing!

Now that you know some connections for technology for the classroom, let’s talk about other types of connections. Of course, we can also connect with people on the web. We use Facebook, Twitter, Snapchat and all types of social media sites to connect with our friends, family and those out there in the world who share our interests.

Rules and Expectations

But there are rules and expectations for your time on the internet. Let’s break it into two parts:

1) Inside of school

2)outside of school

Englewood School District has clear rules for using all technology. Here is a link:

Yep, it’s 8 pages long. Let’s break it down!


We call it NETIQUETTE!

Screen Shot 2015-10-13 at 2.20.49 PM

Let’s start at this website and look at what you need to know!

Make sure you are logged in so you can take the quiz.

Hacks, scams, malware and more

Online threats

Internet Safety (9-12) 

Grade Level: 9-12

Based on ISTE – NET – Performance Indicators for Technology – Literate Students

Duration: One 45 minute session

Description: This program is designed to help students who are using the Internet to identify and avoid situations that could threaten their safety.


To increase student knowledge of Internet safety

To aid the student in identifying dangers on the Internet

To build critical-thinking and decision-making skills relating to computer usage

To help students protect themselves from inappropriate behavior online


            Handouts with relevant web sites and links

Parent or guardian/child agreement

Objectives: By the end of this training, students will be able to:

Identify five types of personal information

Identify types of online threats

Identify appropriate people for communication

Identify how to protect themselves from inappropriate Internet behavior

 Content Outline

A.  Going on the Internet is like going out on Halloween

Everyone’s identity is hidden

Unless you know your friend’s costume, you don’t know who you’re talking to

Any stranger can pretend to be a friend and you have no way of knowing whom they are

B.  Appropriate Websites

Feel embarrassed or uncomfortable with what you see – tell adult

C.  Appropriate Email and Messages

Do not open email from strangers

Do not open email with attachments

Do not give out email address (unless approved or to a classmate)

Do not open links or files from people you don’t know.

Never respond to e-mails with pornographic or other inappropriate material.

Do not respond to advertisements – this confirms that you have a working e-mail account, and you will only receive more junk e-mails.

D.  Giving Out Information

Do Not Give Out Personal Information


Where you live – city or address

Telephone Number





Parent’s name


Information you can give out

            Likes and dislikes

Be careful of online names – don’t give TMI in name





Question students about appropriate information—


Can you tell someone you like blue?  You like pizza?  Type of pets that you have?  Your favorite movie?


Your favorite movie theater?

Your favorite beach?

Teacher’s names?

Be careful in joining mailing lists, some may make your personal information public

Newsgroups, Forums, and Bulletin Boards – remember not to slip and say anything that can reveal your identity age (little pieces of info can be put together over time)

[You give out your school colors, and two conversations ago you said you were from a town by Seattle, and in another conversation you said the school mascot was the hawk – and you’ve just told someone where you are]

Profiles – be sure they do not reveal your town, name, school,

Website – if you build a website – do not put any specific information on it (even code that isn’t displayed can be read by anyone) Do not register it with your name

E.  Meeting People on the Internet

            If someone asks to meet you – tell an adult immediately

Chat rooms are particularly dangerous – people you meet in chat rooms can easily be adult “predators” with misleading  names such as “jason15”  “cutiepie08”

Never arrange a face-to-face meeting with someone you meet online

(You have no way of really knowing if that person is a 15 year old boy – or a 50 year old man.)

F.  Passwords

Your personal password is your own special identity, so keep it secret and only share it with a parent or guardian.   (Change it often)

G.  Summary – talk with adults about what you are doing on the Internet and have an agreement with your parents or guardian


Scenarios for Discussion

Cindy has been talking online to a girl named Julie for a few days now. Julie has told Cindy where she lives, how old she is, where she goes to school, and what she looks like. Julie asks Cindy what school she goes to.

Is it okay for Cindy to tell her?

(What else shouldn’t Cindy tell Julie?)

Michael is talking to his friend Chris from school online, studying for a test. They are working on their homework together. Chris says they should meet before class to review for the test. Is this okay?

(Should he also ask a parent just to make sure?)

Jennifer is talking to a friend online when she gets a message saying there is trouble with her computer and she needs to type in her online password again. Should she do it?

(What should she do?)

Jake is talking to a friend he met on the Internet. The friend offers to help him finish his homework, and asks for Jake’s phone number. Is it okay for Jake to give it to him, since it has to do with homework?

(What should he do?)

Allison has been talking to Linda online for several months. Linda says she is the same age as Allison, and lives nearby. Linda wants to meet Allison in the mall to go shopping. Should Allison go meet her?

(What should she do?)

Jeff got an e-mail from someone he doesn’t know, with a file attached. Should he open it?

(What should he do?)

Tina gets an online message from a woman who says her name is Mrs. Anderson, and that she is a math teacher. Mrs. Anderson wants to know what school Tina goes to and what her teacher’s name is. Should Tina tell her?

(What should she do?)

Paul is online when he gets a message saying he won a free Xbox! He just needs to send in his address and phone number so it can be mailed to him. Should he give the information?

(What should he do?)

Make Internet Safety Posters

Mentor Younger Children


Time to move on to the stuff that is not so fun. We need to talk about cyberbullying.

When a kid of any age, up to 18 is threatened, humiliated, harassed, or humiliated via use of technology — this is Cyberbullying.

Review: There are four things that can help you identify bullying over a normal argument between friends. Bullying is targeted and persistent behavior that is intended to:

  • demean
  • intimidate
  • embarrass, or
  • harass

Six unforgettable cyber-bullying cases

Smart phone rules to live by… always!

This is a serious topic, but to help you understand it better, here is a game called, “What happens next?”

Other on-line issues

We just talked about cyberbullying, but there are a bunch of other on-line issues we can talk about:

  1. Gaming
  2. Predators
  3. Revealing too much
  4. Privacy
  5. Safety

We can find these issues on this site:

Exit ticket:

Search the last 2 websites on this page for one topic that interests you! What would you tell the adult in your life about the concept?

Resources for parents:

For educators:


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s