The Internet Proficiency Scheme

Transcription

The Internet Proficiency Scheme
Teachers’ Guide
Introduction
1
The Internet Proficiency Scheme
3
Why have an Internet Proficiency Scheme?
How to use this pack
Involving parents
2
Implementing the Internet Proficiency Scheme
7
Profiling pupils
3
The benefits and risks of new technologies
11
Learning benefits from using ICT
The risks
Strategies for keeping children safe
The future
4
Understanding the technologies
16
The Internet
E-mail
Chat
Instant messaging
SMS
MMS
Lesson plans using the technologies
31
Lesson 1 – Using technology to communicate
Lesson 2 – Introducing the Cybercafé web site
Lesson 3 – Communication and information
Lesson 4 – Using e-mail safely
Lesson 5 – Responsible use of the Internet
Lesson 6 – Chatting with care
Lesson 7 – Using text and picture messaging
Lesson 8 - Behaving responsibly
Extension/refresher activities
1
Introduction
The Internet Proficiency Scheme is designed to help
Key Stage 2 pupils learn how to use the Internet
and other technologies safely and responsibly.
The aims of the scheme are to:
• develop a set of ‘safe and discriminating behaviours’ for pupils to adopt when using the
Internet and other technologies
• provide teachers with easily accessible support materials to help develop safe and
discriminating behaviours when pupils are using the Internet and other technologies
• offer pupils a set of activities that allow them to demonstrate what they know and
understand about using communication technologies
• ensure that the safe and discriminating behaviours will be directly related to the skills,
knowledge and understanding as set out in the National Curriculum and schemes of
work for ICT and Citizenship, and the guidance for PSHE at Key Stage 2
• support teachers’ own professional development through the information and guidance
contained within this pack.
The scheme consists of this teacher’s pack and a supporting web site. The pack contains
important information for implementing the Internet Proficiency Scheme, including methods
of working and integration with the curriculum. You will need to familiarise yourself with
much of the teacher’s notes before embarking on the lesson plans and activities.
Cybercafé, the accompanying web site (http://www.gridclub.com/cybercafe), allows pupils to
demonstrate what they have learnt about safe and discriminating behaviours in an interactive
and supportive environment. The site also contains an on-line audit of pupils’ Internet
proficiency skills, which will help you to group pupils according to their ICT experience.
The Cybercafé materials can be used as a whole-class teaching resource
or as an ICT activity at school or in the home. There is also a teachers’
area of the Cybercafé web site, which provides additional advice and
resources for teachers (http://www.Gridclub.com/cybercafe/teachers).
You can find details on how to use the pack on page 5.
3
1 – The Internet Proficiency Scheme
Why have an Internet Proficiency Scheme?
The Internet and other digital information technologies are powerful tools, which open up new
prospects for communication and collaboration. Education is embracing these new
technologies as they bring with them fresh opportunities for both teachers and learners.
However, alongside the new technologies is a need for new skills to be learnt and applied in
the classroom and beyond. While these technologies can have a positive effect, pupils need
to be taught about their appropriate and effective use.
Government investment in Information and
Communications Technology (ICT) from 1998 to
2002 has been £1,835 million for primary,
secondary and special schools for teaching, learning
and administration. The ratios of computers to
pupils have been increasing year on year since
1998: in 1998, there was one computer for every
1
17.6 primary pupils, now there is one for 9.7 .
This huge investment reflects the need for ICT to
be embedded into teaching and learning. However,
the Internet is by nature ‘open’. Open to all, at all
times, unregulated and unpoliced. This is an
attractive prospect, especially for educationalists
who are able to allow pupils to research, explore
and create. Unfortunately, this attractive prospect
exists also for those wanting to take advantage of
young and vulnerable people.
The pace of technological change – in schools as
elsewhere – has been so fast that there is little
material available for teachers to use in the
classroom to teach pupils how to employ safe and
discriminating behaviours when using the Internet
and other technologies. The Department for
Education and Skills (DfES) and Becta have been
providing advice to schools through the
Superhighway Safety pack and web site since
1998 (http://safety.ngfl.gov.uk/schools). This pack
and the Internet Proficiency Scheme aim to
support teachers in this area, by providing practical
advice on the teaching and learning of Internet
safety in the classroom for Key Stage 2 pupils.
Schools are relatively ‘safe areas’ for pupils to use
ICT. They are likely to have filtering and/or monitoring
software, an acceptable use policy that teachers,
pupils and parents sign up to, classroom
supervision, a firewall and perhaps even a ‘walled
garden’ of web sites that pupils can access. In
contrast, pupils’ access to the Internet at home may
be lacking in all these safety mechanisms. At most,
there may be some sort of filtering product that is
offered by an Internet Service Provider (ISP) or
software developer. If the role of school is to prepare
young people for the wider world, then schools
ought to be teaching them how to behave safely and
appropriately on line – wherever they may be.
1
DfES Statistics of Education: Survey of Information and Communications Technology in Schools, 2002
(http://www.dfes.gov.uk/statistics/DB/SBU/b0360/sb07-2002.pdf])
4
How to use this pack
The pack comprises background information for teachers, lesson plans with supporting
materials, worksheets for pupils, certificates for schools and pupils, and details of the
Cybercafé web site (http://www.gridclub.com/cybercafe). The activities are intended to be
carried out alongside those on the Cybercafé web site.
While the Scheme is designed to be taught at
Key Stage 2, the activities are particularly
suitable for pupils aged 9 to 11. Pupils in this
age group will be more familiar with the
technologies and will have greater awareness of,
and ability to debate, the issues.
The scheme is taught using a variety of methods
including whole class teaching, pairs, small
group and plenary sessions. Before commencing
the scheme, it is worth while profiling pupils to
determine their level of ICT experience, their
exposure to Internet safety advice, and their level
of engagement in on-line behaviour which could
be deemed ‘risky’. This profiling exercise is key
to the success of the scheme, and further details
and resources are included in Section 2.
Pupils are encouraged to talk about the issues
raised by the Scheme, and findings are recorded
for whole-class discussion. Once all the activities
have been completed the pupils have the
opportunity to demonstrate their learning
through an on-line quiz and an end-of-unit task.
Once pupils have completed the classroom
activities, interactive on-line activities and the
on-line quiz, they should be awarded a
certificate. A photocopy master of this is
contained in the pack.
Internet safety should not be seen as an
exclusive ICT issue. The pack suggests that you
may want to tie this in with other areas of the
curriculum, namely Citizenship and PSHE.
Children should be taught that how they behave
in the ‘on-line’ world should be the same as the
'off-line' world. Therefore teaching this issue
across subjects can reinforce this message.
The Internet Proficiency Scheme was piloted in
schools during the summer of 2002, and teachers
used the materials in a variety of ways. Colette
Cotton, of St Mary’s CE Primary School,
Folkestone, introduced Internet safety lessons in
different ways depending on the age of the pupils.
She sometimes discussed issues with them
before going into the computer suite. Other times,
she would use one computer in the suite to
demonstrate a particular web site to the pupils, so
that they could see what they would be doing as
part of the lesson. Her groups concentrated on
Internet safety for two sessions per week. Colette
linked this work to PSHE, but had she been using
the scheme over an academic year, she would
have linked it to other parts of the curriculum as
well. “I would plan it in with the general timetable
for the year. I might use some of the activities in
PSHE, and others in the ICT lesson.”
Karl Hopwood, of Greystoke School in Cumbria
linked Internet safety issues to activities going on
in the school, such as police visits to talk to
children on the subject of ‘stranger danger’. He
also introduced Internet safety as part of the
topic of communications and conversations in
literacy. In Four Elms Primary School, June
Cooke taught 26 Year 5 and Year 6 pupils about
Internet safety as part of a special curriculum
week. “We did a little bit every day. We worked
on the Cybercafé web site throughout the day,
and occasionally through lunchtime, with pupils
taking it in turns to work individually on the
computer”. June taught Internet safety as well as
the units of work for drug and sex education,
citizenship and PSHE: “I could also fit it in with
the literacy hour, as part of speaking and
listening, and the drama workshop.”
5
1 – The Internet Proficiency Scheme
Involving parents
It is important that the ‘safe and discriminating behaviours’ taught as part of this scheme are
adopted by pupils whenever they are using the Internet and other technologies, not just in the
school environment. Parental involvement can help reinforce the messages of this scheme,
and extend the learning process into the home environment.
In addition to individual pupil certificates, a school
certificate is also enclosed in the pack. This is to
demonstrate to parents and others that the school
is involved in the scheme. You may also want to
make parents aware that your school is
participating in the scheme by making reference to
it in the schools’ parental Internet permission form
or by mentioning it in your school’s Acceptable
Internet Use Policy.
Additionally, the teachers’ area of the Cybercafé
web site (http://www.gridclub.com/
cybercafe/teachers) provides a presentation that
outlines the issues associated with ICT use and
highlights how they are tackled through the Internet
Proficiency Scheme. Schools may wish to present
this at a parents’ evening or hold a specific event on
ICT awareness.
Involving parents was seen as essential in the pilot
schools. Most schools wrote a letter to parents to
let them know about the Internet Proficiency
scheme. For example, Colette Cotton says, “I
asked the children what they would do if they saw
something on the Internet at home. They said they
would tell their parents, but would parents
necessarily know what to do? You’ve got to make
parents aware of the need to have filtered sites at
home, because I’m quite sure that many parents
are not aware of the problems.”
In some respects, the pupils who need to develop
awareness of safe practice with the technologies
are more aware of the possible dangers than their
parents. Taking part in the scheme will not only
reinforce their awareness but also help them to
develop safety-conscious behaviours. As one of
the pilot school teachers remarked, “The Internet
Proficiency Scheme has had a huge impact on
pupils, as we hadn’t broached the subject before.
6
Pupils are now discussing safety with their
teachers, who encourage them in that discussion
without being judgemental.”
2 – Implementing the
Internet Proficiency Scheme
The QCA Schemes of Work for ICT include two units which use some of the technologies.
These are Unit 3E – E-mail, and Unit 6D – Using the Internet for Research. These units provide
a useful starting point for implementation of the scheme and it is suggested that pupils have
had opportunities to use these technologies before they start the IP scheme.
There are eight lessons in this scheme plus extension or refresher activities. The first three lessons
focus on generic safety messages which can be applied across the technologies. Lessons 4 to 7
are focused on individual technologies and the issues relating to their use. Lesson 8 seeks to pull
together what pupils have learnt and draws out the types of behaviours that could be adopted.
You may feel that, through constraints of time, pupils will not be able to complete the whole
proficiency scheme. In this case, you may well select lessons which cover those technologies
which pupils are most likely to use, or with which they may be most at risk. It’s important,
however, to be aware that although pupils’ access to certain technologies may be limited at
school, they may have unlimited access in the home. An audit of Internet safety practices in
schools, for example, which was conducted in June 2002 by Loughborough University,
showed that only 5 per cent of schools allowed the use of on-line chat – but recent statistics
show that 1 in 10 children between the ages of 7 and 12 use on-line chat elsewhere. While
parents and carers naturally have responsibility for how children access technologies at home,
you may feel that it is important for schools to address these issues too, so that children learn
safe behaviours in all environments.
Profiling pupils
During the pilot phase of this scheme, three groups
of pupils were identified. These groups were based
upon the level of ICT experience of pupils, their
exposure to Internet safety advice and the degree
to which they engaged in ‘risky’ on-line behaviour.
Depending on the type of communication being
studied or used, pupils could be assigned to
different groups. For example, pupils with a high
level of experience in using the Internet and risky
behaviours may be less experienced and
adventurous when confronted with a chat situation.
exposure to Internet safety advice, and moderate
ICT skills. This group of children can be considered
as having a moderate skill and knowledge base.
Children generally fall into one of three broad
categories:
• Group A pupils need the teacher to model the
experiences and activities and provide
appropriate prompts
• Group B pupils benefit most from resourcebased learning to help them to develop
information literacy skills and independent
learning skills
• Group C pupils need to develop their abilities to
reflect and apply their thinking to new situations.
Group A: Those with low levels of experience of
using the Internet, low levels of prior exposure to
Internet safety advice, and poor ICT skills. This
group of children generally require guided learning.
Group B: Those with moderate levels of experience
of using the Internet, moderate levels of prior
Group C: Children with high levels of experience of
using the Internet, high levels of prior exposure to
Internet safety advice, and good ICT skills. This
group of children generally has a good skill and
knowledge base.
During the pilot phase of these materials, it was
found that to derive maximum benefit:
7
2 – Implementing the Internet Proficiency Scheme
The lesson plans in this scheme try to build on
these suggestions and lessons have been
differentiated into groups A, B and C.
To help group the children into the above
categories, we have developed an on-line auditing
tool on the teachers’ area of the Cybercafé web
site. This asks pupils a series of simple questions
which are submitted to the site and the teacher
receives a list of pupils grouped into either A, B or
C. We strongly recommend that you make use of
the on-line audit, as it will help pupils to get the
best out of the scheme.
If you are unable to make use of the auditing tool,
then Group A children can generally be viewed as
those at the lower end of the spectrum, who may
need additional support from teachers, classroom
assistants or other pupils. Group B children are
the ‘middle band’ and these children will probably
make up the majority of the class. Group C
children are at the top end of the spectrum and
could be used to support pupils who are in Group
A. It is important to remember that these groupings
are in relation to the three areas outlined above
and may not reflect academic achievement in other
areas or subjects.
Some pupils will have little or no experience of
using some of the technologies. If this is the case,
these pupils will need opportunities to have some
hands-on experience if they are to understand and
gain benefit from this scheme.
Resources
There are a range of resources which can be used
in the lessons. Prompt sheets and pupils’
worksheets are included as photocopiable printouts in this pack, and can also be downloaded
from the teachers’ area of the Cybercafé site
(http://www.gridclub.com/cybercafe/teachers). In
either case, you may wish to modify the examples
provided to suit your own pupils.
Presentations which can be used to deliver the
lessons, can also be downloaded from the
teachers’ area of the Cybercafé site.
8
Methods of working
The scheme is designed to be taught using a
variety of working methods, and these are
highlighted in the lesson plans. Most lessons begin
with whole-class sessions, followed by pupils
working in pairs or small groups. Group
discussions in plenary sessions are encouraged to
allow pupils to feed back their findings, talk about
their experiences and decide collectively on safe
and appropriate behaviours. Exercises can be
tailored to fit available resources, and suggestions
are made for homework or follow-up activities.
Duration
This scheme can be taught in two ways:
• As a continuous unit throughout Key Stage 2 (or
more likely through Years 4, 5 and 6)
• As a discrete unit during Year 5 and/or 6.
You will need to consider which is most appropriate
for your particular situation. Other points you may
want to consider include the following:
• Pupils in Years 3 and 4 are likely to match
‘Group A’ characteristics and will therefore need
a lot of structured teaching before they can
derive maximum benefit from the scheme.
• Cross-curricular contexts where communications
technologies could be used might provide
opportunities for pupils to develop their ICT
experience and capability in meaningful contexts.
However, the thrust of this scheme is to develop
an awareness and understanding of potential
risks and how to develop appropriate strategies
and behaviours to deal with risky situations. To
try and combine the two aspects, with younger
pupils and over an extended period, may
undermine the impact in both aspects.
• Pupils in Years 5 and 6 are more likely to have had
some experience of using a broader range of
communication technologies and should have had
some exposure to safety guidance. In addition,
some pupils may have experienced some ‘risky’
situations and be able to share those with peers.
• Conversely, pupils in Years 3 and 4 might not have
been exposed to much safety guidance and
therefore be more likely to encounter risky
situations without the necessary skills to be able to
deal with them. Do we, therefore, try and protect
pupils before anything happens but in a relatively
abstract context where they have had little or no
experience with the technologies or the risky
situations? Is school the place to expose pupils to
risky situations?
If you decide to begin in Years 3 and/or 4, then
teaching the scheme as a continuous unit is likely
to be most appropriate. If you decide to commence
the scheme in either Year 5 or 6, then teaching it as
a discrete unit is likely to be more productive.
Teaching as a continuous unit
If cross-curricular contexts are to be used as the
starting points for elements of this scheme, a
programme such as the one below might be
appropriate:
Year
Autumn
Spring
Summer
3
IP Scheme – introduction
Hi – Tudors
ICT – Guided Internet research
Introduce the Internet element
and raise some of the issues
Gg – Weather around the world
ICT – e-mail
Introduce the e-mail element and
raise some of the issues
4
Gg – Village Settlers
Hi – Case studies of invaders
ICT – Guided Internet research
IP Scheme – study the safety
aspects related to using the Internet
Gg – How and where do we
spend our time?
ICT – SMS
Introduce the SMS element and
raise some of the issues
5
Gg – What’s in the News?
ICT – Internet research, chat and IM
Introduce the chat and IM elements
and raise some of the issues
Gg – Contrasting UK locality
ICT – e-mail and Internet Research
IP Scheme – study the safety
aspects related to using e-mail
Tudor Exploration
ICT – Internet research
Recap on the Internet safety aspects
6
Gg – What’s in the News?
ICT – Internet research, Chat and
Instant Messaging
IP Scheme – study the safety
aspects related to using chat and
instant messaging
Gg – A sense of place
ICT – SMS and MMS
Gg – Connecting ourselves to the
world
ICT – IP Scheme
IP Scheme – study the safety
aspects related to using SMS and
MMS
Gg – Connecting ourselves to the
world
ICT – IP Scheme
IP Scheme – recap on aspects as
appropriate
9
2 – Implementing the Internet Proficiency Scheme
Teaching as a discrete unit
If a discrete approach is adopted, pupils will have
had hands-on experience of most of the
technologies by the beginning of the spring term in
Year 5. It should therefore be possible to introduce
and teach the scheme by the end of Year 5, still
allowing opportunities for pupils to reinforce their
problem-solving strategies and appropriate
behaviours as their range of experiences and
expertise is enhanced through Year 6.
Monitoring
Pupils are encouraged to record their findings as
they progress through the lessons, and feed these
back during group sessions. Once all the activities
have been completed, pupils have the opportunity
to demonstrate their learning through an on-line
quiz and an end-of-unit task.
On completion of the teaching activities, interactive
on-line activities and the on-line quiz, pupils will
have qualified for a certificate (a photocopy master
is contained in this pack, or it may be ordered by
e-mail from: internetprof@becta.org.uk).
Learning outcomes and objectives
Each of the lesson plans in Section 5 gives an
overview of learning objectives and learning
outcomes. Where appropriate, lesson plans are
also linked to the National Curriculum Programmes
of Study.
10
3 – The benefits and risks
of new technologies
The range of on-line services is growing constantly. Useful information – news, weather
reports, sports results, movie reviews, encyclopaedias – and services such as making on-line
travel reservations, banking, and shopping are becoming readily accessible. The growth in the
numbers of people using technology over the last ten years has been astounding:
• In 200-01, 40–50 per cent of households had a personal computer
• In 2000, around four out of five children surveyed in England, Wales and Northern Ireland
had access to a home computer (78 per cent of primary school pupils and 85 per cent of
secondary school pupils). Over half were able to access the Internet at home.2
• In 2000-01, 47 per cent of households had at least one mobile phone
• In England, Wales and Northern Ireland in 2000 approximately 20 per cent of children of
primary school age and 60 per cent of secondary school pupils owned a mobile phone.3
Future developments in technology are predicted to see a growing convergence between
computers and telephones, with Internet access becoming increasingly easy, wherever you are.
Education too has seen rapid growth in the use of technology, both in ICT use in the classroom
and the availability of teaching and learning materials on line.4
Learning benefits from using ICT
Many schools are making use of the technology to
dissolve boundaries between the home and the
school. Access to school intranets outside school
hours and laptop lending schemes help pupils to
extend their learning beyond the classroom. By
using e-mail, pupils and parents can communicate
with teachers outside the traditional school day. ICT
has a particular strength for pupils who are unable
to attend school on a regular basis. They are able
to still feel part of the school environment and retain
some continuity.
Research findings suggest that ICT can be beneficial.
Becta’s Primary Schools of the Future – Achieving
Today5 suggests that ICT is having a positive
educational impact. By analysing data from Ofsted
reports, Becta found that there is a consistent trend for
pupils in schools with better ICT resources to achieve
better grades for English, mathematics and science.
Becta also found that at Key Stage 2, schools with
‘good’ ICT resources deliver better results than schools
with ‘poor’ ICT resources – even when compared with
schools of a similar type and taking into account socioeconomic circumstances. Becta’s research on
secondary schools shows similar findings.
The ImpaCT2 study further supports this. A largescale longitudinal study tracking over 2000 pupils’
use of ICT for three years, ImpaCT2 discovered a
positive association between individual pupils’ use
of ICT and their performance in the Key Stage 2
national tests in English and mathematics. Similar
positive associations were found between ICT use
and national tests for science at Key Stage 3.6
Office for National Statistics, Social focus in brief: Children 2002
(http://www.statistics.gov.uk/downloads/theme_social/social_focus_in_brief/children/Social_Focus_in_Brief_Children_2002.pdf)
2
Office for National Statistics, Ownership of mobile phones: by income quintile group, 1996-97 and 2000-01: Social Trends 32
(http://www.statistics.gov.uk)
3
4
As footnote 3
5
Primary Schools of the Future – Achieving Today, Becta, 2001 (http://www.becta.org.uk/news/reports/primaryfuture/)
The full findings from the ImpaCT2 study are available on the research area of the Becta web site
(http://www.becta.org.uk/research/).
6
11
3 – The benefits and risks of new technologies
Apart from the increasing evidence that supports
the positive aspects of ICT in education, there is
plenty of anecdotal evidence too. For instance,
teachers continue to report that pupils of all ages
find using ICT to be highly motivating. Sending
e-mails and designing web pages provide an
audience for pupils which they otherwise would not
have. One teacher reported: “They would much
rather write an essay for their fellow pupils in our
Canadian partner school than they would for me!”.
The risks
Unfortunately, alongside the education and social
benefits that available through ICT, there are also
risks, particularly for young users. As in any other
area of life, children are vulnerable, needing adult
supervision and the ability to learn sets of safe
behaviours. Below is a summary of the kinds of
risks that pupils might be exposed to:
• Exposure to inappropriate material
One risk is that a child may be exposed to
material that is pornographic, hateful or violent
in nature or encourages activities that are
dangerous or illegal. Schools will provide some
sort of protection against this sort of exposure
but even the installation of filtering software is
not always foolproof and nothing should replace
supervision in the classroom. While there is a
growing awareness of the dangers to young
people of visiting (whether deliberately or by
accident) web sites that contain sexually explicit
or offensive material, there are other sites that
can be equally dangerous. Since the web is
open to all, it is attractive to those with extreme
political, racist or sexist views. It is natural for
children to believe what they read, and the web
appears to have as much authority as the
printed word, however undeserved. It’s
important, therefore, that schools play their part
in teaching children to become critical and
discriminating users of the web. While this is a
challenging area, Lesson 5 offers a framework
for helping them to do this.
• Physical danger
Although rare, there is a risk that whilst on line, a
child might provide information or arrange a
meeting that could risk his or her safety or the
safety of other family members. This is perhaps
the most worrying and extreme risk associated
with Internet use.
A criminal minority make use of the Internet, and
related services such as chat rooms, to make
contact with children with a view to establishing
and developing relationships with the sole purpose
of persuading them into sexual activity. The
techniques used by sex offenders are often known
as ‘on-line enticement’ or ‘grooming’.7
The relative scale of the risk to children being
approached in this way via the Internet is difficult
to establish. Evidence from both the United States
and the UK provided by actual incidents and
supporting research does appear to indicate a
growth in criminal activity of this nature over recent
years.8 In a news story, the BBC report that in the
past two years, at least 12 children have been
sexually assaulted by people who first contacted
them via the internet.9 Although their attackers
were sent to prison, child protection campaigners
say the law needs strengthening. The situation is
likely to change under the Sexual Offences Bill,
due to be introduced in 2003, which includes a
new offence of grooming, based on meeting a
child with the intention of committing a sex offence
to apply both to the Internet and off line.10
7
Online grooming and UK law: A submission by Childnet International to the Home Office’, Childnet International, 2001
(http://www.childnet-int.org/downloads/online%20grooming.pdf).
8
Chat Wise, Street Wise – children and Internet Chat services. Internet Crime Forum, March 2001
(http://www.internetcrimeforum.org.uk/chatwise_streetwise.html)
9
BBC News web site, 16 August 2002 (http://news.bbc.co.uk/1/hi/uk_politics/2196734.stm)
10
12
Sexual Offences Bill, Home Office, 2002 (http://www.sexualoffencesbill.homeoffice.gov.uk/)
It is important to note, however, that the number
of known cases is currently very low in proportion
to the rapidly growing rate of Internet use. The
danger of children being approached by a
stranger on line is thought to be relatively much
lower than a child being at risk, off line, from
someone known to them.
The concept of danger is a difficult one to
establish with young pupils – there is no easy,
guaranteed method of identifying an adult who is
untrustworthy. Striking the balance between
making children aware of potential dangers but at
the same time confident enough to express their
natural curiosity requires skilled teaching. Teachers
will also need to be aware that the activities in
Lesson 3 in particular could lead to pupils
disclosing personal information, which they will
need to address with sensitivity.
• On-line bullying
A child might encounter e-mail, chat or text
messages that may make him or her feel
embarrassed, upset, depressed or afraid. They
may not be in any physical danger, but it could
affect their self-esteem. Messages from people
they can’t identify can be particularly frightening.
Individuals can receive hoax messages and pupils
need to be aware that if they cannot identify who
the person is, they should tell an adult.
• Legal, financial and commercial considerations
There is also the risk that a child could do
something that has legal or financial
consequences such as giving out a parent’s
credit card details or doing something that
contravenes another person’s rights. Plagiarism
and copyright are becoming particular issues
which are associated with the Internet especially
in relation to the downloading of music or
games. Research also shows that children are
not able to differentiate between what is
advertising and what is not.
• Inappropriate behaviour
Pupils may get involved in inappropriate
behaviour such as bullying. They should be
taught how to behave on line and to avoid being
rude, mean or inconsiderate. Pupils should
understand that how they behave in the ‘off-line
world’ is the same as they should behave in the
‘on-line world’.
• Bridging the gap between the home and the
school
Schools are relatively protected areas where
pupils are able to access different technologies
under human and technological supervision and
monitoring. In the home, however, there is likely
to be minimal technological protection and
parental supervision may not be to the same
degree as the supervision operated in a school
environment. Schools will operate policies which
will allow pupils access to certain types of ICT
(they may, for example, allow pupils to access
e-mail through their network but not via web
mail). However, a pupil may go home and
access e-mail through the Internet. Therefore it
is important that even if schools do not allow the
use of a particular technology in school, they still
teach pupils how to behave sensibly and
appropriately when using it, and educate them
about the particular risks associated with it.
Strategies for keeping children safe
The over-arching aim of these materials is to help
children to develop patterns of behaviour that will
protect them from the risks of certain technologies,
and to provide them with strategies for dealing with
anti-social behaviour (bullying via text messages,
for example).
Given that different technologies may involve
different risks, there are some complex messages
for younger pupils to assimilate. There are some
general rules, however, and these are presented in
a simpler, more memorable message as
‘SMARTthinking’. Based on the SMART mnemonic
developed by Childnet, the SMARTthinking rules
are reinforced throughout these materials. It may
be helpful to display the colour version of the rules
so pupils become familiar with it; a shorter version
is also printed on the Pupil Passports contained in
this pack.
13
3 – The benefits and risks of new technologies
The future
The future undoubtedly holds a great deal of
promise in terms of technological developments,
bringing great benefits and offering new
opportunities for education, entertainment and
social interaction. Increased integration of
technologies will make communication even easier
– we will be able to send messages from mobile
phones to e-mail accounts and vice versa, picture
messaging may become commonplace, and the
physical and geographic constraints of using
technologies will diminish.
However, with these developments and benefits will
also come increased risks. The ease of access to
electronic communications, especially to young
people, will become more difficult to control, and
filtering and monitoring systems will become more
complex to implement. Those individuals or
organisations with ulterior, untrustworthy or unlawful
motives are likely to encompass the multimedia
benefits of these technologies for their own personal
gain, and ultimately there is a fear that young people
will more readily be at risk of exposure to
inappropriate materials, content and contact.
Although over time it is likely that technical
solutions will be found to minimise some of the
risks associated with new technologies, as with
filtering systems and similar solutions today, these
can never be guaranteed to be absolutely infallible.
It is important, therefore, that children are taught,
and continue to learn, safe and responsible
behaviours to protect them when using any
technology, and become discriminating users of
the wealth of technology available to them both
now and in the future.
14
SMARTthinking
S
M
A
R
T
= Secret
This is about personal information and whether it is
safe to give it out. For example, it might apply to
an on-line registration form or someone requesting
contact details so they can send you a prize.
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
STOP and THINK
= Meeting
This is about someone you have never met before
contacting you on-line or through a messaging
service to invite you to a meeting.
WHY should you never arrange to meet
anyone you have only met on-line?
STOP and THINK
WHO should you tell?
WHAT might happen?
= Attachments
This is about e-mail and attachments and what you
need to think about before opening them.
WHO sent it?
STOP and THINK
WHAT can I do to protect myself and
the computer?
WILL it be safe to open it?
= Reliable
Anyone can put anything on the Internet and
anyone can use the communication technologies
(such as chat, SMS, e-mail, IM) to contact others.
STOP and THINK
WHETHER I can rely on information on
web sites to be true
WHETHER I can rely on someone I can’t
see telling me the truth
WHAT can I do to check?
= Tell
No matter how careful we are, sometimes we might
come across things that upset us.
WHAT can I do when web sites and
messages make me feel uncomfortable?
STOP and THINK
WHO can I tell?
WHAT can I do to stop it happening again?
STOP! THINK! … GO?
15
4 – Understanding the technologies
This section highlights the different technologies, how they work and the particular benefits
and risks associated with them. Most of the risks that materialise from the use of various
technologies are not new and if pupils can be taught to behave sensibly and appropriately,
many risks can be eliminated.
The Internet
The Internet is a worldwide system of computer
networks, in which users at any one computer can,
if they have permission, get access to information
made available on other computers.
The Internet enables users to obtain information
and resources, to communicate with each other
and to publish information. The World Wide Web
(WWW) or Web provides easy access to the vast
quantity of information and resources available on
the Internet and is the facility which people use to
‘surf’ for information. It is made up of millions of
screens, or ‘pages’, of information. The collection
of pages created by one individual or organisation
is known as a web site. Each page can include
text, images, sound, animation and video and has
its own unique address. Any individual or
organisation can create and publish a web site.
Most Internet Service Providers (ISPs) offer free
web space to their subscribers.
To access information on the Internet, you need to
use a web browser such as Netscape or Internet
Explorer. This allows you to move around web
pages just by clicking on words and graphics which
are linked to other pages. Sometimes these links
will take you to someone else’s web site.
Web pages have a unique address or Uniform
Resource Locator (URL). For example, if you
wanted to go to the DfES web site you would need
to type http://www.dfes.gov.uk in the address bar
of your web browser.
The amount of information available on the web is
so vast that it can be daunting, especially when
searching for specific facts. To help sift through this
huge array of information there are search engines
which make it much easier to find what is required.
16
What are the benefits?
The Internet enables access to a vast range of
cultural, scientific and intellectual material which
might otherwise not be freely or readily available. It
extends the school’s resources far beyond the
school walls, to museums, galleries, organisations of
every kind and displays many of them interactively,
so pupils can see how things work. The Internet
provides a powerful resource for learning as well as
an efficient means of communication.
What are the risks?
While the web is a useful educational tool, there are
some risks. Some content on the Internet is clearly
unsuitable for children, such as pornography, hate
material or information that encourages illegal
activities. Whilst it is easy to judge the suitability of
some web pages, other pages may look appropriate
on the surface but the actual content of the site may
be unreliable or unsuitable. Some commercial sites
may be inappropriate for young people.
There is also the question of reliability, credibility
and validity of information on some web sites. In a
school setting, teachers will also want to check the
educational value of a web site, and pupils should
be taught to evaluate the material they find.
If children or schools are involved in publishing web
pages, there is a risk that personal information
about individual pupils is published. Schools need
to exercise caution when deciding what information
should appear on their web site.
An overview of the Internet as a communication
tool is given in Lesson 1; pupils also have an
opportunity to explore web browsing, via the
Cybercafé web site, in Lesson 2. Lesson 5 tackles
the issues in more depth and helps pupils to
question what they see and read on web sites.
Avoiding the dangers
General information on safe use of the Internet is
available on the Superhighway Safety web site
(http://safety.ngfl.gov.uk/). There are also some
specific issues to consider.
Acceptable use policies (AUPs)
As part of the their responsibility for ensuring safe
access to the Internet, schools should develop an
Acceptable Use Policy. This provides a framework
for safe and responsible use of the Internet in
school, and guidance for pupils and parents for use
of the Internet at home. It will typically outline safe
and responsible behaviours for pupils, procedures
for reporting unsuitable material, and information on
protecting the computer network from viruses.
Acceptable use policies, and pupils’ understanding
of them, are covered in Lesson 2 of the Internet
Proficiency Scheme. Information on acceptable use
policies is also available on the Superhighway Safety
web site (http://safety.ngfl.gov.uk/schools/document.
php3?D=d39). The ICT Advice also site provides
further guidance and resources for developing an
Acceptable Use Policy (http://ictadvice.org.uk).
Evaluating web materials
While there is plenty of reliable information on the
Web, there is also plenty that is incorrect, out of
date and/or seriously biased. Equally, not all
educational materials are appropriate for pupils
because they are written with adult readers in mind.
The evaluation of web resources is therefore
necessary to determine the reliability, accuracy and
currency of the material, and pupils should be
taught the value of this process as part of their core
ICT skills development.
When evaluating web materials, pupils might ask
themselves:
• Do the headings look relevant for what they need
to find?
• Does the content seem up to date?
• Where does the content originate from?
• Is the content easy to read and understand?
• Does it provide everything they need?
• Are the links useful?
• Does it present a one-sided point of view?
The ICT Advice site also provides guidance on
evaluating web sites, including some key
considerations for teachers, in the ‘How to’ section.
Evaluating web sites is covered in Lesson 5 of this
Scheme, and additional resources are available in
the teachers’ area of the Cybercafé web site
(http://www.gridclub.com/cybercafe/teachers).
Internet filtering
Most educational ISPs provide a filtered Internet
service. This can help prevent access to undesirable
content. Additional filtering software can be used in
school or at home to supplement this service.
The Becta Accreditation of NGfL Internet Service
Providers enables schools and other educational
establishments to make an informed choice of ISP.
The standards for assessment have been
developed in consultation with partners in
education and industry to ensure reliable and
relevant information is provided. Through the
accreditation process, there is a technical
assessment of filtering services provided by ISPs
for factors such as browsing of web-based content,
web-based e-mail servers, and level of restrictions,
for example, a walled garden approach.
Assessments of service options such as the ability
to filter by age appropriateness and the flexibility to
offer site-specific services are also made. Further
information is available on the Becta Accredited
ISPs web site (http://ispsafety.ngfl.gov.uk/).
Further guidelines for Internet filtering are available
on the Superhighway Safety web site, and the ICT
Advice site also provides a range of guidance on
Internet filtering.
Internet search tools
The Web offers users a vast quantity of information,
in a wide range of formats. However, having such
an extensive resource can also be a major
drawback, and locating information quickly and
effectively may require the use of a variety of search
tools and techniques.
Internet search tools provide a mechanism to search
the information available on the Internet. They operate
using a keyword search or by a directory structure,
with content organised by predefined categories.
17
4 – Understanding the technologies
Searching the Internet successfully requires careful
planning and definition of the exact information
needs, and pupils should be taught the benefits of
doing this before going on line as part of their core
ICT skills development. Whilst typing a keyword or
phrase into a search engine will quickly provide a
number of links to sites that contain those words,
unfortunately the sheer volume of links is often
unworkable.
Most search engines now offer advanced searching
techniques which allow the user to define their
searches more precisely. Although search
commands may vary from one search engine to
another, the concepts remain the same, and hence
the skills acquired are transferable. Many search
engines will rank results, placing priority on the first
search term, and some search engines may also
allow searches to be confined to UK sites only.
Common words such as ‘of’ or ‘the’ aren’t normally
recognised for the purposes of the search.
However, there will still be occasions when no
amount of refining will result in a manageable
number of links. In this case, in order to save time,
you can probably assume that the first few sites
listed will provide the most useful information.
As an alternative to keyword searching, a menubased search provides a method of finding specific
information by gradually narrowing down through
predefined categories. The search engine will divide
the information on the Web into topic areas,
starting with very general topic menus, which are
gradually refined through the choices of the user
until the relevant information is reached. A menubased search can provide a structured method of
searching the Internet, but will only return results of
those sites classified by the search engine provider.
Many search engines will also provide filtering
facilities to remove unsuitable sites and advertising
from search results. Additionally, there are a
number of child-friendly and family-friendly search
engines available. Search Engine Watch
(http://www.searchenginewatch.com/links/kids.html)
provides tips and information about searching the
web, along with a comprehensive listing of search
engines for children. It lists services which are
18
designed primarily to serve the needs of children,
either in focus, or by filtering out sites that some
teachers and parents might find inappropriate.
Here are a few examples of child-friendly search tools:
• Ask Jeeves for Kids
Designed to be a fun destination site focused on
learning and ‘edutainment’, which searches
using natural language. The service combines
editorial judgment with filtering technology to
enable children to find both relevant and
appropriate answers on the Web.
(http://www.ajkids.com)
• Family friendly search
Searches Yahooligans, AOL Kids, Kids Click and
Saluki Search from a single search screen.
(http://www.familyfriendlysearch.com/)
• Mirago Zone
Uses content filters to provide a special ‘family
friendly’ area where search results are filtered for
offensive content. It also provides a ‘preference’
facility for the user to set their own filtering
requirements. (http://zone.mirago.co.uk)
• Yahooligans
A version of Yahoo, designed specifically for
children aged 7 to 12.
(http://www.yahooligans.com)
Further information on effective search techniques
is available on the ICT Advice site in ‘How to find
information on the web’.
Customising web browsers
Most web browsers provide some customisation
facilities to allow security, privacy and content
settings to be adjusted. The ICT Advice site
provides information on how to do this.
Publishing web sites
Many schools are developing their own web site to
provide information for pupils and parents,
showcase pupils’ work and promote the school
within the wider community. It is essential that
schools protect the identity of their pupils by not
publishing personal information, names, e-mail
addresses or photographs of individual children.
Guidelines for developing school web sites are
available on the Superhighway Safety web site
(http://safety.ngfl.gov.uk/schools/document.php3?D
=d27). The ICT Advice site also provides guidance
on publishing web sites.
The importance of keeping personal information
private is covered in Lesson 3 of the Scheme.
When children find inappropriate material
When children are using the Internet there is always
the risk they will click on a link which takes them to
unsuitable content. Children should be taught the
appropriate behaviours if they come across
inappropriate pages: press the ‘back’ button on the
browser, exit the browser or turn off the computer
monitor. This will allow the teacher to go back and
check out the pages the child was using, talk
through the some of the issues and reassure the
child that this was not their fault.
The ICT Advice site contains case studies on safe
use of the Internet.
Further information
There are many sources of help and advice for safe
use of the Internet:
For Kids By Kids Online (http://www.fkbko.net)
A site for children which helps them understand
more about technology in general, as well as its
safe use; it has specific guidance on e-mail, chat
and instant messaging, along with advice on
defending your system against viruses
ICT Advice site (http://www.ictadvice.org.uk)
Information, services and tools for those who use,
implement and manage ICT in schools. Advice is
given on management issues of Internet access,
how to evaluate filtering products, developing
acceptable use policies, along with case studies for
safe use of the Internet.
Internet Watch Foundation (IWF)
(http://www.iwf.org.uk)
The IWF works in partnership with ISPs, software
providers, police and others to minimise the
availability of illegal, offensive and inappropriate
material over the Internet
Kidsmart (http://www.kidsmart.org.uk)
A practical Internet safety advice web site resource
produced by the children’s Internet charity Childnet;
it provides sections for teachers, pupils and parents
Be Safe Online (http://www.besafeonline.org)
General information on Internet safety
NCH IT OK (http://www.nch.org.uk/itok)
Advice on maximising the opportunities and controlling
the risks of ICT for disadvantaged young people; it
contains an Internet safety guide, a NetSmart checklist
for children and useful guidance for parents on how to
deal with spam and offensive e-mail
ChildLine (http://www.childline.org.uk)
This contains a safe surfing guide
NSPCC (http://www.nspcc.org.uk)
Advice for young people and parents on surfing safely
Childnet International (http://www.childnet-int.org)
A children’s Internet charity committed to helping
make the Internet a safe place for children, this
provides safety advice, projects, resources and a
section for children
Parents Information Network (PIN)
(http://www.pin.org.uk)
An independent service helping parents to support
their children’s learning through the use of computers,
software and the Internet; it provides information on
safety issues and filtering, along with specific
guidance on text messaging and childsafe chat
BBC WebWise (http://www.bbc.co.uk/webwise)
The Internet made simple by the BBC, with basic
guides to searching, e-mail and Internet safety
Children’s Charities Coalition for Internet Safety
(CHIS) (http://www.nch.org.uk/itok/chis)
The coalition, which consists of Barnardo’s, ChildLine,
NCB, NCH, NCVCCO, NSPCC and The Children’s
Society, works with the government, the Internet
industry and others to campaign on a range of safety
issues affecting children’s use of the Internet
Search Engine Watch
(http://www.searchenginewatch.com/links/kids.html)
Tips and information about searching the web, along
with a comprehensive listing of search engines for
children; it lists services which are designed primarily
19
4 – Understanding the technologies
to serve the needs of children, either in focus, or by
filtering out sites that some parents and teachers
might find inappropriate
Superhighway Safety web site
(http://www.safety.ngfl.gov.uk)
Information for schools and parents on safe use of
the Internet; it provides examples of good practice
for Internet use, information on filtering models,
advice on developing acceptable use policies and
guidelines for developing web sites
Wiredkids.org (http://www.wiredkids.org)
An American site dedicated to on-line safety for
children and teenagers; it provides games, puzzles,
stories and activities to reinforce the messages of
safe surfing, and contains specific safety advice for
instant messaging. There are also sections for
teachers and parents.
E-mail
E-mail (electronic mail) is a message that can be
sent over the Internet to someone else. It is one of
the services that is offered by an Internet Service
Provider (ISP). It is like posting a letter or a
postcard, except that it can be sent just about
anywhere on the planet in seconds at any time of
the day or night. E-mail is great for communicating
with people, and just about anything can be
attached to, or included in an e-mail – text,
pictures, even music and movies. To be able to
send or receive e-mail a person must have an
e-mail address.
The ISP supplies the school or individual with an
e-mail account which can be set up on an
individual machine using e-mail software such as
Outlook Express or accessed using a web browser.
Browser access to e-mail is called web-mail. This
means that with the right username and password,
e-mail can be accessed from any Internetconnected computer or mobile phone.
Each e-mail address has two parts, the mailbox
username and the domain name of the school,
separated by an @.
20
A school e-mail address would look something like
teacher@anyschool.county.sch.uk.
E-mail addresses used at home would look
something like me@anydomain.com.
The e-mail is sent and kept on the ISP’s mail server
until the user logs on to a computer and accesses
their mail. The e-mail is then sent to the computer
they are working on.
An overview of e-mail as a communication tool is
given in Lesson 1 of these materials. Pupils will have
an opportunity to explore e-mail, via the Cybercafé
web site in Lesson 2, and detailed guidance on
using e-mail safely is given in Lesson 4.
What are the benefits?
The use of e-mail in a school context can be
extremely valuable as it enables pupils to
communicate with other people across the world.
Teachers have also reported that using e-mail helps
pupils to take greater care with spelling (a misspelt
e-mail address won’t go anywhere) and be more
precise with their choice of words, since e-mail
encourages brevity and clarity. E-mail can also be
particularly rewarding for pupils with special needs:
those with physical or cognitive impairments may
take a long time to create a message, but no one
receiving it would know that they have difficulties,
while pupils with severe hearing impairment find it
another channel for communication. Examples of
good practice of pupils using e-mail in the
classroom can be found on the Teacher Resource
Exchange (http://tre.ngfl.gov.uk/).
What are the risks?
Despite the benefits, e-mail is open to abuse,
which may take various forms:
• Spam or spamming – this is unwanted e-mail
that has been sent by a source that may be
unfamiliar, such as a company trying to sell you a
product. Names can be gleaned from discussion
groups but there are companies which specialise
in creating e-mail distribution lists.
• Flaming – this is the term used for abusive or
insulting e-mail sent to people by others who do
not agree with an opinion, usually in news or
discussion groups.
• Bombing – a bomb is a program that is intended
to crash or damage a computer; a mail bomb is a
huge message sent to someone's e-mail address
to try and make their e-mail program crash.
• Stalking – it is possible to be harassed with
unwanted and obsessive attention via e-mail.
• Viruses – a virus can be sent as e-mail
attachments and some even pretend to come
from known sources. These viruses can cause
serious problems to computers, even allowing
hackers to access the hard disk to take or
destroy files.
• Inappropriate content – undesirable content such
as pornography can arrive as unwelcome e-mail.
• Bullying – e-mail can facilitate on-line bullying
between children.
What are the risks?
Even taking into account the dangers, e-mail is still
an exceptional and successful way to share
information and communicate. But it does require
supervision and education about the risks and how
to avoid them. Listed below are some specific issues
to consider for remaining safe while using e-mail.
Acceptable use policies (AUPs)
In addition to providing guidelines for acceptable
use of the Internet, a school’s AUP should also
provide clear guidelines for e-mail use. These
guidelines should also be shared with parents as a
framework for acceptable e-mail use in the home.
Acceptable Use Policies, and pupils’ understanding
of them, are covered in Lesson 2 of this pack.
Attachments
E-mail attachments should be treated with
caution. Some viruses can attach themselves to
messages without the sender’s knowledge, so
care should always be taken with an attachment
even if received from a known source. A virus
checker should always be used before opening
any attachment.
E-mail addresses
Most schools will need to limit the use of pupils’
e-mail addresses within school for management
reasons, but in any case care should be taken to
ensure that individual pupils cannot be identified or
contacted via their e-mail address. A class or
teaching group e-mail address may be more
appropriate for use beyond an internal mail system.
The Superhighway Safety site provides guidance
and examples of good practice on e-mail
addresses at school.
E-mail bullying
Pupils should be made aware of the facts of e-mail
bulling, the effects this can have on the recipient,
and strategies for dealing with it. Sites such as Be
Safe Online (http://www.besafeonline.org) and
Bullying Online (http://www.bullying.co.uk) provide
useful resources to tackle the issue.
E-mail bullying is covered in depth in Lesson 4 of
this Scheme.
Filtering
In the same way that Internet access may be
filtered, e-mail messages should also be filtered for
inappropriate material and removal of spam.
Although e-mail filtering systems are effective tools,
they are not completely foolproof, and so must be
supported by a safe and responsible approach to
using e-mail.
The ICT advice site has a case study on filtering e-mail.
Mail from unknown senders
Pupils should be taught to recognise when
messages come from unknown senders, and
exercise caution over opening them. If in doubt as
to their validity, pupils should delete the message or
seek advice from an adult. If they receive messages
that upset them or make them feel uncomfortable
in any way, they should tell an adult. If possible use
software to filter e-mail into ‘real’ messages and
likely spam.
Strategies for dealing with mail from unknown
senders and spam is covered in Lesson 4 of these
materials.
21
4 – Understanding the technologies
Safe and responsible behaviours
When children are using e-mail, there is always a risk
that they might receive unsuitable messages. Pupils
should be taught the appropriate behaviours if they
receive offensive or inappropriate e-mail messages,
such as deleting the message, or closing it and
seeking advice from their teacher – and never replying
to them. This will allow the teacher to go back and
check out the message, talk through some of the
issues, reassure the child that this was not their fault,
and take any other action as appropriate.
Pupils should be taught how to use e-mail
appropriately and safely and to develop suitable
writing conventions for the technology.
Lesson 2 encourages pupils to explore safe and
responsible behaviours when using e-mail, via the
Cybercafé site. These behaviours are developed in
Lesson 4, and are reflected upon and consolidated
in Lesson 8.
Viruses
A virus is a piece of programming code usually
disguised as something else that causes some
unexpected and usually undesirable event. A virus is
often designed so that it is automatically spread to
other computer users, for example as an e-mail
attachment, as a file download, or on floppy disk or
CD. The sender of the e-mail is often unaware that
they have sent a virus. Some viruses become active
as soon as their code is executed; other viruses will
lie dormant until circumstances cause their code to
be executed by the computer. If a virus attacks your
computer, it can corrupt or delete all stored
information from the hard drive, including system
software. All computer users are advised to guard
against viruses by installing anti-virus software.
CERT, the Computer Emergency Response Team,
provides a wealth of information on viruses, and
recommends a simple five-stage test to avoid viruses:
• The Know test: is the e-mail from someone that
you know?
• The Received test: have you received e-mail
from this sender before?
22
• The Expect test: were you expecting e-mail with
an attachment from this sender?
• The Sense test: does e-mail from the sender
with the contents as described in the subject line
and the name of the attachment(s) make sense?
• The Virus test: does this e-mail contain a virus?
Always check it using anti-virus software.
Further information on protecting against viruses is
available on the CERT web site (http://www.cert.org).
Anti-virus software is a program that searches your
e-mail messages, hard drive and floppy disks for
any known or potential viruses, and either deletes
or repairs the problem. Some anti-virus software is
free of charge and can be downloaded directly via
the web, some you will have to pay for. Anti-virus
software offers different levels of protection and the
level of protection required should be a key
consideration when making your choice.
The UK online centres area of the Superhighway
Safety web site provides some useful guidance on
viruses, including detailed information on both free
and priced anti-virus software. The ICT Advice site
also provides information on how to protect
computers from viruses.
Viruses are covered in depth in Lesson 4 of the
Internet Proficiency Scheme.
Web mail
Using free web-based e-mail accounts has
inherent dangers, especially for younger children.
Many allow e-mail addresses to be shared with
third parties resulting in numerous unsolicited
messages. Teach pupils to watch out for stringent
privacy statements when signing up for web-based
e-mail accounts.
The importance of keeping personal information
private is covered in Lesson 3 of this pack.
Further information
Many of the general guides listed in the Internet
section will also provide general guidance on safe use
of e-mail. Some specific resources are listed below:
Be Safe Online
(http://www.besafeonline.org/English/e-mail.htm)
A general Internet safety web site, which also
provides detailed information on e-mail; information
on e-mail bullying, and strategies for dealing with it,
is also included
Bullying Online (http://www.bullying.co.uk)
On-line help and advice to combat all forms of
bullying, with sections for teachers, pupils and
parents; it includes a guide to staying safe in
cyberspace
For Kids By Kids Online (http://www.fkbko.net)
A site for children which helps them understand
more about technology in general, as well as its
safe use; it has specific guidance on e-mail, chat
and instant messaging, along with advice on
defending against viruses
NCH IT OK (http://www.nch.org.uk/itok/)
Offers advice on maximising the opportunities and
controlling the risks of ICT for disadvantaged
young people; it contains an Internet safety guide,
a NetSmart checklist for children and useful
guidance for parents on how to deal with spam
and offensive e-mail
Chat
Chat is a way of communicating with people at the
same time by typing messages which then appear
on your computer screen, and are sent across the
Internet to be read by everyone else participating
in the chat at that time. Chat happens in ‘chat
rooms’ – a virtual meeting place, and the process
of taking part is known as ‘chatting’. Participants
are sometimes referred to as ‘chatters’.
There are many different chat rooms available on
the Internet. They can be a dedicated part of a
web site or a service offered by an ISP.
Fundamentally they all work in the same way.
Users have to register in a chat room of interest by
choosing a username and password; this is often a
pseudonym or false name. Normally there will be a
list of users currently chatting. These users will be
alerted when someone new enters the chat room.
To contribute to the chat, the user can type
messages into a text box and the message is
immediately seen by the others in the chat room
so that they can respond. Users can enter a chat
room without contributing to the discussion but still
be able to read what the others are saying. This is
known as ‘lurking’ which is accepted practice and
is a good way of getting to know how to use a
chat room.
Some chat rooms are public and can be joined by
anyone. Other chat rooms are private and open only
to invited chatters or specific groups. Another
mechanism that is offered by some chat rooms is
‘whispering’. This is where you can go off to one
side and have a private conversation with someone.
To help speed up the flow of conversation in a chat
room, acronyms have been invented. Some
examples are listed below:
LOL – laugh out loud
BTW – By the way
j/k – just kidding
An overview of chat as a communication tool is
given in Lesson 1 of this pack. Pupils will have an
opportunity to explore chat, via the Cybercafé web
site, in Lesson 2 and the topic is covered in depth
in Lesson 6.
What are the benefits?
Chat rooms can have real educational benefits.
Pupils are able to chat with peers anywhere in the
world, in real time, sharing experiences, comparing
lifestyles or working collaboratively. Frequently, online chats are hosted with notable figures, such as a
successful business person, a television presenter
or a pop idol, giving children access to a wealth of
information and experience in a way that would not
be possible in the real world.
Examples of schools using chat in the classroom
can be found on the Superhighway Safety web site
(http://safety.ngfl.gov.uk/schools) and the ICT
Advice web site (http://www.ictadvice.org.uk/).
23
4 – Understanding the technologies
What are the risks?
Chat rooms have an element of anonymity, so
children often talk about things they may not have
the confidence to say face to face. They can
pretend to be someone else: older, smarter, and
more popular. Taking on a pseudonym is an
accepted and encouraged practice in chat rooms.
Anyone who uses a chat room has to be careful
about how much personal information they give out
to the people they are chatting to. This is particularly
difficult with young people, who may feel that they
know the people they are chatting to very well,
especially if they are talking about intimate or
sensitive subjects with them. Unfortunately, for those
who want to attract children, using chat rooms is an
excellent means of doing so. They are able to win
their confidence by appearing to be ‘on their side’.
This is known as ‘grooming’, as already discussed
under risks earlier in this section. It is important that
young people understand it does not matter how
well they think they know someone on line: they
never know who they really are. Young people
should be told that they should never arrange to
meet anyone they have met on line, no matter how
well they think they know them.
Groups are often formed just like at school, with an
invented set of acronyms as a way of keeping
conversations private or excluding others from the
‘in crowd’. Bullying can also happen in a chat room.
Potential risks of chat and chat rooms are a topic
of discussion in Lesson 1 of these materials. The
importance of keeping personal information private,
particularly in chat rooms, is covered in Lessons 3
and 6.
Avoiding the dangers
There are a number of strategies for helping to
keep children safe.
Acceptable use policies (AUPs)
In addition to providing guidelines for acceptable
use of the Internet, a school’s AUP should also
provide clear guidelines for use of chat, both in
school and beyond. These guidelines should be
shared with parents.
24
Acceptable Use Policies, and pupils’ understanding
of them, are covered in Lesson 2 of this pack.
Moderated chat rooms
Some chat rooms are monitored or moderated.
This means that there is either a human moderator
checking what is being said and ensuring the
conversations stay on topic or there is some sort of
software that monitors the conversations and alerts
a moderator should there be any unsuitable ‘chat’
going on. This is known as proactive or reactive
monitoring. Proactive is the best type in an
educational context as the moderator is able to
step in if things are straying off topic. All good chat
rooms should have clear policy and privacy
statements, an archive of previous conversations
and an outline for forthcoming topics.
Young children should always use moderated chat
rooms. GridClub (http://www.gridclub.com) is a
good example of a moderated chat room for Key
Stage 2 pupils. It is moderated by trained
professionals and all members have to be verified
through their school. GridClub can only be used by
pupils in this age group and they can gain access
at home or at school.
The ICT Advice site provides information on how to
use chat in the classroom safely.
Outside school, it is likely that children will come
across unmoderated chat rooms, so it is essential
that they are aware of safe and responsible
behaviours to adopt when engaged in chat.
Moderated chat rooms are covered in Lesson 6 of
these materials.
Safe and responsible behaviours
While chatting, children should never give out
personal details that would identify who they are,
such as surname, address, phone number or
school, or arrange any face-to-face meetings with
anyone they have met in a chat room (unless their
parents or carers agree and go with them).
Children should also be taught not to rely on
strangers they meet in a chat room for important
advice. If there is bad language or if anyone writes
anything that makes a child feel uncomfortable
should not reply to the message but instead tell a
teacher, parent or carer. The chat room moderator
can be told of this and the perpetrator removed from
the chat room. Children should also be aware that
their actions in a chat room will affect others and be
taught to behave responsibly with respect for all.
If a situation occurs where a child is suffering abuse in
a chat room they should be taught what to do. One
method that they can apply is to save the
conversation. Some chat rooms allow users to ‘log
their chat’, or alternatively users can use the ‘save as’
function, copy and paste, or print screen. Instructions
on how to do this along with other useful tips are
detailed on the For Kids By Kids Online web site
(http://www.fkbko.net). The charity Childnet also has
some useful information for pupils on how to stay
safe in chat rooms (http://www.chatdanger.com/).
Further information
Many of the general guides listed in the Internet
section will also provide an overview on safe use of
chat, in addition to the specific resources below:
Be Safe Online
(http://www.besafeonline.org/English/chat.htm)
A general Internet safety web site, which also
provides detailed information on chat
GridClub (http://www.gridclub.com)
General information on Internet safety, with fun
activities and a moderated chat room for Key Stage
2 pupils
Chatdanger
(http://www.chatdanger.com/home/index.htm)
Information on how to keep safe in chat rooms,
including sections on using chat in schools, and a
parents’ guide to using chat at home
For Kids By Kids Online (http://www.fkbko.net)
A site for children which helps them understand
more about technology in general, as well as its
safe use; it has specific guidance on e-mail, chat
and instant messaging, along with advice on
defending against viruses
Parents Information Network (PIN)
(http://www.pin.org.uk)
An independent service helping parents to support
their children’s learning through the use of computers,
software and the Internet; it provides information on
safety issues and filtering, along with specific
guidance on text messaging and childsafe chat
Yahooligans! (http://www.yahooligans.
com/Arts_and_Entertainment/Chat/)
Yahooligans! web guide for kids provides a list of
safe chat areas for children
The main Yahooligans! area also provides guidance
for teachers and parents on safe communication on
line (http://www.yahooligans.com).
Instant Messaging (IM)
Instant messaging is a form of on-line chat but it is
private between two people. It is not moderated
and cannot be joined by others. When you send
an instant message it goes straight to the person
you sent it to and appears on their computer
screen almost immediately. Some services also
allow the sending of files to one another. Internet
messaging is also known as IM, IMing, Internet
Relay Chat (IRC), or ICQ (‘I Seek You’).
Instant messaging is a service offered by Internet
Service Providers (ISPs) and other web companies.
To use instant messaging you will need to install a
piece of software on your computer. The person
you want to talk to will need the same software
installed on their computer. When a user logs on to
the Internet, their computer registers them as
being on line with the instant messaging service.
When another user registers and connects, they
will know that he or she is logged on. Many
services now also offer the facilities for users to
‘appear’ off line if they don’t wish to be disturbed.
Using the service usually requires registration,
giving a username and e-mail address. Instant
messaging allows the user to maintain a list of
people that they wish to interact with. They can
send messages to any of the people in their list,
often called a buddy list or contact list, as long as
that person is on line. They are then able to send
notes back and forth with friends who are on line or
create their own customised chat rooms.
25
4 – Understanding the technologies
An overview of instant messaging as a
communication tool is given in Lesson 1 of the pack.
Further information is provided in Lesson 6.
What are the benefits?
Instant messaging is quick and effective when used
in the right context and can be a very easy way of
communicating with somebody instantly. In an
educational context instant messaging could be
used to work collaboratively with a friend when
doing research on the Internet, although typically it
is used in a social context.
What are the risks?
Instant messaging notifies others when a user
signed up to the service goes on line. This is the
reason instant messaging works so well. The
downside is that they could be added to someone
else’s buddy list and be contacted by a total
stranger. There is also an issue of privacy. To use
messaging you need to register on line to an instant
messaging service. These are usually free, but
when registering providers usually ask for a lot of
personal information. This information could
potentially be made publicly available to others.
Avoiding the dangers
Many schools will block access to instant
messaging and so the following issues may be are
more associated with home usage than school.
Nevertheless, it is important that pupils are made
aware of the safe use of IM as part of their general
ICT skills development.
Attachments
Care should be taken when sending or receiving
attachments via instant messaging. Similar caution
should be exercised with e-mail attachments, and
attachments should always be virus checked.
Automatic login
Many instant messaging programs automatically log
on registered users when they access the Internet.
This could be an issue, particularly when
computers are shared, meaning that a ‘buddy’ who
is apparently on line may be a brother, sister or
other family member of the person with the IM
account. Children should always check that the
person they are instant messaging with is who they
26
think they are, perhaps by using a simple password
and response as the first message of the IM
session. It may also be possible to adjust privacy
settings in the instant messaging software to
always ask for a password before signing a user in.
Buddy lists
Pupils should only add people to their buddy list
that they know, and if possible, they should always
use an instant messaging service that prevents
others from adding themselves to buddy lists
without the owner’s permission. It may also be
possible to adjust privacy settings in the instant
messaging software to prevent this from happening.
Harrassment
If a child is harassed by IM, the service’s system
administrators should be informed giving the
nickname or ID, date, times and details of the
problem. The system administrators will then take
appropriate action, which could involve a warning
or disconnection from the IM service. It might also
be worth re-registering for instant messaging with a
new user ID.
Registering
When registering for an IM service, pupils should
ensure that they give as little personal information as
possible and only use services that have clear
privacy policies that state that they will not make
information publicly available. Many services also
provided members’ directories – it’s always best to
decline an entry in such directories, as any details
provided may be made publicly available, and hence
available for any members of that community to see.
Safe and responsible behaviours
As with any form of electronic communication,
pupils should be taught safe and responsible
behaviours when using IM. They should never give
any personal information when instant messaging,
or any other information which might make them
identifiable. If at any point during an instant
messaging conversation pupils are made to feel
uncomfortable, they should end the conversation,
and seek advice from an adult.
Further information
Many of the general guidance in the Internet
section will also apply to instant messaging, but
some specific resources are also listed below:
Be Safe Online (http://www.besafeonline.org/
English/instant_messagin.htm)
A general Internet safety web site, which also
provides detailed information on instant messaging
For Kids By Kids Online (http://www.fkbko.net)
A site for children which helps them understand
more about technology in general, as well as its safe
use; it has specific guidance on instant messaging
Wiredkids.org (http://www.wiredkids.org/safety/im/)
An American site, providing general on-line safety
information with guides on instant messaging safety
for both children and their parents
Short Message Service (SMS) or Text
Messaging
Short Message Services (SMS) enable users to
send and receive text messages via mobile phones.
Messaging is usually short and often replaces a full
conversation with someone, particularly if the other
person is not available to take a voice call. It’s also
known as text messaging, mobile text messaging,
texting or g-mail.
In order to send and receive SMS, the user usually
has to pay a monthly fee to their service provider
or a small fee for each text message. Some
companies offer SMS free of charge. Text
messages can also be sent from some web sites
that offer to send messages to mobile phones.
The text can comprise words or numbers. Typically
messaging is used to say hello, arrange a meeting,
provide snippets of information or prompts.
Messages are usually created using button
combinations from the mobile phone keypad.
As typing messages with the limited keys on the
phone is time consuming, many words can be
written as abbreviations:
AFAIK – As far as I know
CUL8r – See you later
Gr8 – Great
ILBL8 – I’ll be late
LOL – Laugh out loud
NMP – Not my problem
THNQ – Thank you
What are the benefits?
As messages are delivered to mobile phones and
can be stored for later reference, SMS is often
more convenient than e-mail to communicate with
groups of people. Once familiar with reading,
sending and replying to messages, SMS is a useful
way of exchanging information and keeping in
touch with friends. Almost three quarters of a billion
text messages are sent every day.
What are the risks?
Young people aged 14 to 16 are the biggest users
of mobile phones. Almost two thirds of young
people in that age group have access to a mobile
phone. Of all of the technologies this is the one that
pupils are most likely to be familiar with. Therefore it
is imperative that they use it effectively and safely,
and avoid any risks.
Texting is more casual than a phone call as
messages can be sent and received at times when
other communication is not convenient. It is also
perceived as being more anonymous, particularly if
the message is sent via a web site. Sometimes text
messages are sent to embarrass, threaten or bully
someone. This can be particularly upsetting as the
message can arrive when the receiver least expects
it and if the person’s number is not listed in the
receiver’s address book then the receiver will not
know who has sent the message. There have also
been instances where a message has been sent
out to various random numbers. These messages
can be flirtatious in nature. If receivers respond, it
lets the sender know that the number is in
operation and they can be bombarded with
inappropriate messages.
The use of texting for unsolicited advertising is
becoming more common, often with promises of
free offers for responding, or notifying of a
competition ‘win’. If an offer sounds too good to be
27
4 – Understanding the technologies
true, it generally is. This is just another form of
spam and so should be ignored. Texting can also
be used inappropriately, such as during a test.
An overview of SMS as a communication tool is
given in Lesson 1 of these materials. Pupils will
have an opportunity to explore SMS, via the
Cybercafé web site, in Lesson 2, and detailed
guidance is given in Lesson 7.
Avoiding the dangers
There are a number of ways of avoiding problems.
Abusive text messages
Abusive messages are sometimes sent. When
alerted, the mobile phone service provider will help
trace where the message came from and block any
further messages from that number. Keeping a note
of the times and dates of abusive messages will
help identify the sender. As a last resort, mobile
service providers can change a mobile number.
Bullying by text message
Bullying by text message has become an
unfortunate result of the convenience that SMS
offers. If being bullied by text message, children
should immediately seek help from a teacher,
parent or carer. They should not respond to the
messages, but should keep a detailed diary
recording information such as the content of the
message, the date, the time, the caller ID, or
whether the number was withheld or not available.
Sites such as Be Safe Online
(http://www.besafeonline.org) and Bully Online
(http://www.bullyonline.org/schoolbully/mobile.htm)
provide detailed advice on tackling the issue of
bullying by text message.
Safe and responsible behaviours
As with any form of electronic communication,
pupils should be taught safe and responsible
behaviours for text messaging. As with any
personal information, mobile phone numbers
should never be given to an unknown source, such
as an on-line registration form. It is also important
to give and type mobile numbers accurately as
messages can go astray to be read and replied to
by unknown parties.
28
Lesson 2 of the Internet Proficiency Scheme
encourages pupils to explore safe and responsible
behaviours using SMS, via the Cybercafé web site.
These behaviours are further developed in Lesson 7,
and are reflected upon and consolidated in Lesson
8. The importance of keeping personal information
private, such as mobile telephone numbers, is
covered in Lesson 3.
Spam by text
Text messages received from an unknown number
are likely to be spam. The message should be
deleted or if in doubt, pupils should be encouraged
to ask an adult for advice.
Further information
Be Safe Online (http://www.besafeonline.org/
English/bullying_online.htm)
A general Internet safety web site, which also
provides information on bullying by e-mail, over the
Internet and by text messaging
Bully OnLine
(http://www.bullyonline.org/schoolbully/mobile.htm)
A general guide to bullying, which provides
specific advice on tackling bullying by text
messaging for children
Office of Telecommunications (Oftel)
(http://www.oftel.gov.uk)
Guidance and further links on dealing with
unsolicited text messages
Parents Information Network (PIN)
(http://www.pin.org.uk)
An independent service helping parents to support
their children’s learning through the use of
computers, software and the Internet, the site
provides specific guidance on text messaging
Multimedia Message Service (MMS) or
Picture Messaging
Multimedia Message Service (MMS) is the latest
development in mobile messaging, and like the
short message service (SMS), multimedia
messaging provides automatic and immediate
delivery of personal messages using mobile phone
technology. Unlike SMS, however, MMS allows the
sender to incorporate sound, images and video into
their message. It’s also known as multimedia
messaging, mobile multimedia messaging, picture
messaging and enhanced messaging service (EMS).
Whereas most modern mobile phones incorporate
SMS facilities, MMS requires an MMS-enabled
mobile phone. Whilst at present these are expensive,
over time prices will undoubtedly fall and their use
will become more widespread. The user usually has
to pay a fixed monthly charge for multimedia
messaging facilities, or a charge per message
depending on the service provider. Unlike SMS,
MMS is not yet available to users who pre-pay.
Many MMS phones feature integrated cameras
allowing users to take photos to incorporate with
their message, although this is not standard.
Messages are sent as multimedia presentations in a
single entry, as opposed to text files with
attachments as many other forms of electronic
communication. MMS technology provides support
for e-mail addressing, so that messages can be
sent from phone to e-mail and vice versa.
What are the benefits?
Like SMS, MMS is set to become more convenient
than e-mail to communicate with groups of people,
providing automatic, immediate delivery of personal
multimedia messages from phone to phone, or
phone to e-mail. With its enhanced ability to send
audiovisual files, some predict that MMS will
revolutionise mobile communications.
What are the risks?
Whilst the costs of MMS phones are probably
prohibitively expensive at present, it is thought that
young people will provide a key market in the future.
MMS will present all the same risks as SMS, but
with its multimedia capabilities, and ease of sending
images there is real concern that children will either
be exposed to inappropriate materials, or be asked
to send photos of themselves via their MMS
phones. This is of particular concern if friendships
formed on line, in chat rooms for example, progress
to texting as a means of communicating. MMS will
undoubtedly also be used for unsolicited
advertising as the market matures.
The full extent of the risks posed by MMS,
however, are still to be seen.
Avoiding the dangers
Various strategies can be adopted to minimise risk.
Abusive multimedia messages
As with SMS, any abuse of MMS should be
reported to the mobile phone service provider and
details logged. Mobile phone numbers should not
be passed to any unknown source, and caution
should be exercised before opening any multimedia
message from someone unknown to you. If in
doubt, delete the message.
Bullying by MMS message
Bullying by MMS message will probably become
inevitable. As with bullying by SMS, children should
seek immediate help from a teacher, parent or carer.
They should not respond to the messages, but
should keep a detailed diary recording information
such as the content of the message, the date, the
time, the caller ID, or whether the number was
withheld or not available. Sites such as Be Safe
Online (http://www.besafeonline.org) and Bully
Online (http://www.bullyonline.org/schoolbully)
provide detailed advice on tackling the issue of
bullying by text message, but the basic advice will
equally apply to picture messaging.
Safe and responsible behaviours
As with any form of electronic communication,
pupils should be taught safe and responsible
behaviours for multimedia messaging. It is also
important to give and type mobile numbers
accurately as messages can go astray to be read
and replied to by unknown parties. As with any
personal information, mobile phone numbers
should never be given to an unknown source, such
as an on-line registration form.
29
4 – Understanding the technologies
Spam by MMS
Spam by MMS is also likely to become inevitable.
The message should be deleted, or if in doubt,
pupils should be encouraged to ask an adult for
advice. Children should not be tempted to respond
to spam in any form, even if wild promises and
incentives are offered for replying.
The importance of keeping personal information
private, such as mobile telephone numbers, is
covered in Lesson 3. Safe and responsible
behaviours to adopt when using MMS are covered
in Lesson 7, and these are reflected upon and
consolidated in Lesson 8.
Further information
As yet there is little available information on MMS,
but this is likely to develop over time. Sources of
information and advice for SMS will generally apply
to MMS also.
30
Lesson 1
Using technology to communicate
Lesson 1
This lesson sets the context for the Internet Proficiency Scheme and helps to establish the
level of experiences pupils have had in using ICT.
In this lesson pupils are encouraged to talk about their own experiences of using technology
to communicate – what they have used and for what purposes. They consider the
advantages that technology offers as well as possible disadvantages. An important message
to include is that this scheme is designed to help them to learn to use these technologies
safely, effectively and responsibly.
It will be helpful if pupils have undertaken the IP Scheme audit before they tackle this lesson
Details on this can be found in the ‘Implementing the Internet Proficiency Scheme’ section of
this pack. This will provide information on which pupils have already used which technologies
and highlight gaps in experience. This lesson provides opportunities for differentiation to take
prior experience into account.
Resources for this lesson can be downloaded from
http://www.gridclub.com/cybercafe/teachers.
Learning objectives
Pupils will:
• recognise that communication has a purpose and that there are many ways of communicating
• recognise that technology can provide effective ways of communicating with people
• recognise the benefits of using technology to communicate but realise that there are risks in using
communication technologies and these can be reduced if appropriate behaviours are adopted.
More experienced pupils will be able to select appropriate technologies for specific purposes and
justify their choices.
Organisation
This lesson begins with a whole-class introduction followed by pupils working in small groups to share
ideas. These ideas are then shared with the whole class. Further group discussions follow and a
plenary session is used to share and record what has been learned.
Timing
The lesson should take
approximately 55 minutes
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
33
Lesson 1
Relevant to the following areas of the English National Curriculum:
PSHE and Citizenship Framework at Key Stage 2
Developing confidence and responsibility and
making the most of their abilities
1. Pupils should be taught:
c) to face new challenges positively by collecting
information, looking for help, making
responsible choices, and taking action
e) about the range of jobs carried out by people
they know, and to understand how they can
develop skills to make their own contribution in
the future
Preparing to play an active role as citizens
2. Pupils should be taught:
a) to research, discuss and debate topical issues,
problems and events
c) to realise the consequences of anti-social and
aggressive behaviours, such as bullying and
racism, on individuals and communities
Breadth of opportunities
5. During the key stage, pupils should be taught
the knowledge, skills and understanding
through opportunities to:
a) take responsibility (for example, for planning
and looking after the school environment; for
the needs of others, such as by acting as a
peer supporter, as a befriender, or as a
playground mediator for younger pupils; for
looking after animals properly; for identifying
safe, healthy and sustainable means of travel
when planning their journey to school)
d) make real choices and decisions (for example,
about issues affecting their health and wellbeing such as smoking; on the use of scarce
resources; how to spend money, including
pocket money and contributions to charities)
k) to explore how the media present information.
Resources
Below is an outline of the activities and the resources required for the activities in lesson 1. Bold typeface
indicates the name of the resource, e.g. ‘Slogans’. All the resources are contained in this pack or can be
downloaded from http://www.gridclub.com/cybercafe/teachers
34
Part of the Lesson
Type and Title of Resource
Activity 1, Part 1
Communication Devices – a visual aid (a set of pictures that could be used if
artefacts are unavailable). Alternatively an electronic presentation of these
devices can be downloaded from http://www.gridclub.com/cybercafe/teachers
Activity 1, Part 2
Communicating – a Pupil Recording sheet for Group A pupils (they should work in
groups to record their ideas
How we communicate (remove bold) – a pupil recording sheet for groups
B and C (One sheet per group)
Plenary
Slogans – a Pupil Recording sheet (one set for each group of pupils; you may also
want to enlarge this, ask pupils to choose the best slogan for each different
technology and turn it into a classroom display)
Follow-up
Diary – a Pupil Recording sheet (as a follow-up activity pupils could record what and
how often they use different technologies; each pupil would need a copy)
You might begin by telling pupils that this is an
introductory lesson to the IP scheme, which is
about learning to use the technology safely. Where
a lot of pupils have considerable experience of
using some of the technologies, you could suggest
that they will be able to help others by sharing the
lessons they have learned about Internet safety.
You could give additional support to pupils who
have difficulties by asking specific questions to
encourage them to focus their thinking. For
example, “How does the Head Teacher speak to
children?” (face to face); “How do people speak to
the secretary?” (face to face, over the telephone or
fax, via e-mail); “How do you speak to relations that
live in another town or village?” and “Who do you
communicate with?”.
As a whole class, ask pupils to suggest different ways
of communicating. These suggestions could include:
Groups B and C
Part 1
• Traditional methods
– talking (face to face, telephone, fax)
– writing (letters and notes)
– pictures/signs
• New technologies – Internet, mobile phones,
teletext, e-mail, chat rooms, text messaging
(SMS and MMS – multimedia messaging), instant
messaging (IM), TV, video or digital recording.
If pupils are struggling to think of ideas, you could
show them the presentation Communication
Devices. Alternatively, the pictures in
Communication Devices could be copied on to an
OHT and used to initiate discussion. It might be
possible to supplement this with actual artefacts such
as mobile phones. Check that every pupil is familiar
with at least one of them.
(20 minutes)
Part 2
Divide pupils into three groups according to their
experience in using technology (starting with Group
A as the least able/experienced).
Group A
Ask all the children to work in twos or threes to discuss
how different people in the school communicate with
others within the school, in the community and in the
wider world. They should use the brainstorm template,
Communicating, to record their ideas. Remind pupils
that all ideas should be recorded.
Lesson 1
Activity 1: Communication tools and their uses
Working in groups of two or three, ask children to
consider which method of communication would be
best for a number of situations, such as:
• inviting a visitor into school
• telling parents about a school assembly
• sending a picture/photograph
• asking children in another country about school life
• sending a copy of a poster you have made (by
hand and on the computer)
• asking for a copy of a catalogue with school
resources in it.
Ask them to think of something that needs to be
communicated, the method they would choose and
why they think it is most appropriate for that particular
purpose. They could record their ideas in a simple
chart, like the example How we communicate.
Encourage pupils to reflect on their own uses and
their own behaviours: Why did they choose
particular approaches? Were they the most
effective? Did they come across any potentially risky
situations? What did they do? If pupils do not have
any examples of potentially risky situations that they
can describe you will need to present one or two –
perhaps receiving an e-mail with a virus attached or
unsolicited text messages on your mobile phone.
Ask pupils what they would do in each situation.
It will be important to de-sensationalise responses. The
important aspect of this activity is to encourage pupils
to reflect on why they chose the approaches they did
and to be able to record/communicate those choices.
(15 minutes)
35
Lesson 1
Plenary
Encourage each pair to describe one communication tool they have used and why they chose it.
If possible, collate responses but do not let it slow
down the flow of ideas. Start with less able and
less experienced pupils, Group A, as they will have
a smaller repertoire on which to draw.
Suggest that they make a note of which pupils are
confident with each device. They might produce a
simple chart. Explain that the purpose of this is to
show who to ask if they get into difficulties. This
should encourage those more experienced pupils
to adopt a responsible approach to supporting
their peers.
Pupils could create slogans for electronic
communication. The file, Slogans, could be used
as a starting point. Print out the sheets and
enlarge them using a photocopier if possible, and
then cut on the lines. Slogans might include: ‘Chat
with a chum’ (which could be using a chat room or
on a telephone), ‘Fax a photo’, ‘Mail a message’,
‘Add an attachment’. Pupils should select the
appropriate illustrated strip for their slogan. These
slogans can be displayed to illustrate the different
purposes for which we can use the technologies.
(10 minutes)
(10 minutes)
Follow-up (optional)
Learning outcomes
Ask pupils where they use the technologies and
how often. They might keep a record of their
electronic communications for a week using the
Diary template.
Pupils will be:
• able to name several different ways of
communicating with and without technology
• able to identify appropriate methods for
particular purposes
• aware that there are potential risks but that they
can learn how to deal with them.
36
Lesson 1
Visual Aid
Lesson 1, Activity 1, Part 1
Resource: ‘Communication Devices’
All Groups
37
Visual Aid
Lesson 1, Activity 1, Part 1
38
Resource: ‘Communication Devices’
All Groups
Lesson 1
Visual Aid
Lesson 1, Activity 1, Part 1
Resource: ‘Communication Devices’
All groups
39
Visual Aid
Lesson 1, Activity 1, Part 1
40
Resource: ‘Communication Devices’
All Groups
Lesson 1
Visual Aid
The chat topic is : Sport
Who won the World Cup in 2002?
Dinosaur says
Wasn’t it Germany v Brazil in the final?
Brains says
Yes the Germans lost 2.0
Jackie has joined the conversation
But didn’t Germany win in 1990, it was in Italy I think
Dinosaur leaves the conversation
I always preferred rugby myself
Phil has joined the conversation
Who cares!!
Jackie leaves the conversation
How is the project going? Is it all on schedule?
Greg says
Yes, it’s all going to plan we are only waiting on
approval to change one small detail
Sarah says
When will it be complete then?
Greg says
By the end of the month as planned
Sarah says
Fantastic! Keep up the good work!
Greg says
Lesson 1, Activity 1, Part 1
Resource: ‘Communication Devices’
All groups
41
Visual Aid
Lesson 1, Activity 1, Part 1
42
Resource: ‘Communication Devices’
All groups
Lesson 1
Visual Aid
Lesson 1, Activity 1, Part 1
Resource: ‘Communication Devices’
All groups
43
Visual Aid
Lesson 1, Activity 1, Part 1
44
Resource: ‘Communication Devices’
All groups
Lesson 1, Activity 1, Part 2
Resource: ‘Communicating’
How we communicate
with each other
Lesson 1
Group A
Pupil Recording
Sheet
45
Pupil
Recording Sheet
How we communicate
Purpose
what do we want to
communicate?
Lesson 1, Activity 1, Part 2
46
Method
Why
how do we do it?
what makes this method
the best for this purpose?
Resource: How we communicate
Groups B and C
Lesson 1, Plenary
Resource: ‘Slogans’
Lesson 1
All groups
Pupil Recording
Sheet
47
48
Lesson 1, Plenary
Jackie leaves the conversation
Who cares!!
Phil has joined the conversation
I always preferred rugby myself
Dinosaur leaves the conversation
But didn’t Germany win in 1990, it was in Italy I think
Jackie has joined the conversation
Yes the Germans lost 2.0
Brains says
Wasn’t it Germany v Brazil in the final?
Dinosaur says
Who won the World Cup in 2002?
The chat topic is : Sport
Resource: ‘Slogans’
All groups
Pupil Recording
Sheet
Lesson 1, Plenary
Resource: ‘Slogans’
Lesson 1
All groups
Pupil Recording
Sheet
49
50
Lesson 1, Plenary
Greg says
Fantastic! Keep up the good work!
Sarah says
By the end of the month as planned
Greg says
When will it be complete then?
Sarah says
Yes, it’s all going to plan we are only waiting on
approval to change one small detail
Greg says
How is the project going? Is it all on schedule?
Resource: ‘Slogans’
All groups
Pupil Recording
Sheet
Lesson 1, Plenary
Resource: ‘Slogans’
Lesson 1
All groups
Pupil Recording
Sheet
51
52
Fax
SMS
MMS
Resource: ‘Diary’
Comments:
Comments:
Lesson 1, Follow-up
Any problems?
Any problems?
Internet
Was it a good way to do it?
Mobile phone
E-mail
Was it a good way to do it?
Terrestrial phone
Methods used:
Time it took:
Chat
Time it took:
Internet
E-mail
Purpose:
Purpose:
Methods used:
Date:
Chat
Fax
Terrestrial phone
Communication Diary
Date:
Communication Diary
MMS
Mobile phone
SMS
All groups
Pupil Recording
Sheet
Lesson 2
Introducing the Cybercafé web site
During this lesson children will have the opportunity to use the Cybercafé web site
(www.gridclub.com/cybercafe), learning how to navigate around the web site, what activities
are available and how the characters can help them with the activities. You will find it helpful
to read the ‘How to use the Cybercafé web site’ section in this pack beforehand.
Lesson 2
Children will also be introduced to the SMARTthinking section of the Cybercafé and have the
opportunity to discuss the messages and questions. This is an introduction to
SMARTthinking; there will be plenty of opportunities in subsequent lessons to develop pupils’
thinking about applying the SMARTthinking process to different situations.
This would also be a useful opportunity to remind pupils about the school’s Acceptable Use Policy.
The materials for this lesson can be downloaded from www.gridclub.com/cybercafe/teachers.
Learning objectives
Organisation
Pupils will:
Ideally this lesson should take place in an ICT suite
so that pupils can explore the Cybercafé at their
own pace. If access to an ICT suite is not possible,
you will need to demonstrate how to enter the web
site and navigate around it. Plenty of time will be
needed for pupils to explore the web site, working
in pairs, and to find out where the SMARTthinking
area is located. Some pupils may need support
with reading some of the text on the web site.
• be able to navigate the Cybercafé web site
• explore the different sections of the Cybercafé
web site – e-mail, chat, web browsing, SMS text
messaging
• develop or reinforce appropriate vocabulary and
navigation skills as they explore the web site,
such as navigation tools (arrows on the tool bar
and arrows at either side of the web site), hot
links/hyperlinks, ‘Help’ and ‘Glossary’ buttons
• experiment with methods of communication
that they are unfamiliar with, such as chat
rooms
• be able to use the glossary to find the
meaning of new terminology
• become aware of the SMARTthinking
messages that are designed to help them use
the Internet and communicate safely.
Timing
65 minutes (approx.); longer if
pupils would benefit from
investigating the Cybercafé
This lesson begins with a whole-class
introduction, during which you or a pupil could
demonstrate how to log on to the Cybercafé and
how to navigate around it. Pupils then work in
pairs to explore the site. They may need to be
directed to the section containing the
SMARTthinking messages and to consider
whether they think any of them have been
applied in the activities on the web site.
Please note pupils should not complete the quiz
at this stage. They should wait until they have
undergone all of the lessons and completed all of
the sections on the web site.
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
53
Lesson 2
Relevant to the following
PSHE and Citizenship Framework at Key Stage 2
Knowledge, skills and understanding
2. Pupils should be taught:
f) to resolve differences by looking at alternatives,
making decisions and explaining their choices
k) to explore how the media present information.
Resources
Part of the Lesson
Type and Title of Resource
Activity Part 1
Cybercafé web site – www.gridclub.com/cybercafe
(this is to be found in Appendix 1 of the teacher’s pack)
Activity Part 2
Decisions A – a Pupil Worksheet (Group A)
Decisions B – a Pupil Worksheet (Group B)
Decisions B and C – Pupil Worksheet (Group C)
Activity Part 3
Glossary – a Pupil Recording sheet (pupils should note down terms and type in their
meaning in the template)
Plenary
SMARTthinking – a visual aid (you may want to print this out on an OHT)
Stop, Think, Go! – a visual aid (you may want to print this out on an OHT)
A colour version of both these resources is included in this pack.
Introducing the lesson
You could start by asking the children how many of
them have used the Internet for research, e-mails
or chat rooms. Have they ever had any problems
when using these technologies? What did they do?
Have they ever thought about possible risks with
using this type of technology for communicating?
54
Explain that they are going to visit a Cybercafé that
has been specifically designed to help them learn
how to keep themselves safe when using the
different types of technologies.
(5 minutes)
Activity 1
Demonstrate how to load the web site to the whole
class (or ask a pupil to do so). Tell the children that
this is the Cybercafé. Point out to pupils that there
are four main areas to investigate: web browsing,
e-mail, SMS/text messaging and the chat room. It
may be helpful if you allocate different areas to them
so they will not all be feeding back on the same area
during the plenary session.
Now ask them to work in pairs at a computer, and
look around the site to see what sorts of activities are
on offer. There are characters who will help them if
they get stuck. Remind pupils to read the information
carefully. If they get stuck, Griff, the ‘help’ character,
will help them or they can refer to the specific help
sections situated in the different areas.
(5 minutes)
Part 2
In pairs, pupils explore the Cybercafé site. As pupils
settle into the activity, ask them if they have come across
any new vocabulary. Make a note of the words, perhaps
by encouraging pupils to write them on a blank OHT as
they come across them, or on a flipchart or interactive
whiteboard. Depending on the age, ability or experience
of the children, you might show them how to find and
use the site’s glossary as they identify the words.
After a brief exploration, pupils should investigate
one activity in more detail.
(25 minutes: 5 for general exploration, 15 minutes
for focused investigation, 5 minutes for recording
their decisions as described below)
Group A
As suggested in the first part of this activity, pupils
should spend a few minutes exploring all areas briefly
and then look at the most appropriate area in detail.
This group is likely to need quite a lot of support, as
there are lots of things to look at. They might also need
help in identifying and recording new terminology. They
should try and recall the decisions they were asked to
make to help the character. If they are struggling, they
could be presented with the appropriate page from the
prepared question sheets, Decisions A, in which they
are asked to highlight their decision.
Some pupils may benefit from having an adult or other
more experienced pupils supporting them, helping to
read the text or discuss it as necessary. It may also
benefit pupils if they investigate one character/activity at
a time rather than browsing the entire site at once. A
note should be made of any terminology with which
children are unfamiliar. It might be helpful to print out
the screen where the new words are found and record
the words on small pieces of card or paper which can
then be attached to the print-out.
Lesson 2
Part 1
Group B
Pupils in this group will have had more experience of
using the Internet and possibly, of using a wider range of
communication methods. Some pupils might need a little
support to navigate around the site, but hopefully, when
they select an area to investigate more closely, they will be
more confident. Many pupils in this group are likely to
have been exposed to more safety guidance and should
be able to explain the reasons behind their decisionmaking. They may be able to relate some of the decisions
to their own personal experiences. Pupils in this group
could use the appropriate pages from the prepared
questions sheets, Decisions B. In this, they are asked to
explain why they made that decision.
Group C
Pupils in this group will have had considerably more
experience with some aspects of communication
technology, or of a broader range. They are also more
likely to have had some experience of risky situations.
Ask pupils to look at the Cybercafé and to select one
area per pair for closer investigation. Ask them to
compare the activities with their own experiences. Do
they think that the advice is appropriate? Could they
add anything else to the advice? What do they think
are the most significant safety messages that children
need? Show them the questions in Decisions B and
ask them to devise some safety-related decision-
55
Lesson 2
making questions for the rest of the group. These
should be restricted to the areas being covered: web
browsing, e-mail, chat and SMS. They could use the
template, Decisions C, to record their ideas.
Part 3 – Glossary
If you have not already shown pupils how to use the
glossary, do this now. Ask for volunteers to locate some
of the words. As they find them, they should write the
word and their version of the meaning on to the
Glossary template and attach the finished speech
bubble to their monitor. (Ideally, templates will be printed
out on card, and cut out, prior to the lesson.) After the
lesson, the templates can be added to a class display.
(10 minutes)
Plenary
Discuss the web site – what do they like about it? Is
there anything they dislike? Discuss how easy it is to
move around the web site. Did anyone have any
problems? How did they solve the problem?
Did they notice a particular slogan that kept being
used? What was it? Was it helpful? Use the Stop,
Think, Go! visual aid to reinforce this message.
Which characters did they come across? What did the
characters need help with? Were you able to help? Did
they use the Stop, Think and Go! approach? Did it help?
Ask them what messages they were given (e.g. don’t
copy chunks of text out, it might get you into trouble
at school – instead read it and write it in your own
words; don’t tell anyone your name and address –
these are part of your unique identity). Make a list of
the suggestions on the board, a flipchart or an OHT.
Ask them which areas of the Café they were in.
Encourage pupils to feed back their decisions. Ask
pupils in Group A how they responded to a particular
situation and then ask children in Group B if they
made the same decisions. Ask the pupils in Group B
why they made that decision. Is this why those in
Group A made the decision?
Ask pupils in Group C to read out or talk through
their scenarios. Ask pupils what they would do. Does
this match what the Group C pupils did? If not, what
did they do? What was the best decision?
(10 minutes)
SMARTthinking
Ask if any pupils discovered the SMARTthinking
messages section. Encourage one of these pupils to
demonstrate and ask all pupils to find SMARTthinking
on their computer. Ask them to read through the
messages twice and then to turn off their monitors as
you are going to have a quick-fire quiz!
• How many messages are there?
• What did they notice about each section?
• Who can remember any of the significant messages?
• What do we need to think about when we
receive ‘anonymous’ messages?
• What are the ‘reliable’ messages? E.g. you
can’t rely on people telling you the truth.
• What are the ‘secret’ messages?
• What are the ‘meeting’ messages?
• What are the ‘tell’ messages?
Remind them to keep the clues in their head when
they are using the Internet. “Remember to Stop,
Think and Go to keep yourself safe”.
(10 minutes)
Follow-up (optional)
Learning outcomes
Ask pupils to prepare a badge, or a poster based
on one of the rules they have looked at today or
on the Stop, Think, Go! slogan.
Pupils will:
• know how to navigate the Cybercafé web site
• realise that the characters will help them to learn
how to keep themselves safe.
Children will be able to talk about some of the
rules that they have come across. However, there
will be a lot more time and many opportunities for
them to develop a real understanding of these
rules as they work through the scheme.
56
Pupil Worksheet
Lesson 2
Decisions A
Web browsing
Lesson 2
You decide to use a search engine. What should you do? Stop, think and
• Go to a child-friendly search engine
• Go to a search engine that is not child-friendly
You see an advert linking to another site. What should you do? Stop, think and
• Go ahead and click it
• Go, leaving the page without clicking it
You arrive by mistake at an unsuitable web site. What should you do? Stop, think and
• Go straight to the ‘back’ button and get off the page
• Turn off the monitor and Go and tell your parent/carer
You are asked to register your details on a site. What should you do? Stop, think and
• Go from the page without registering
• Go ahead and register
You find a useful site that will help you with your homework. What should you do? Stop, think and
• Go ahead and copy large chunks – no one will know
• Go and write it up in your own words
Lesson 2, Activity Part 2
Resource: ‘Decisions A’
Group A
57
Pupil Worksheet
Lesson 2
Decisions A
E-mail
A friend sends you an attachment you’re not sure of. What should you do? Stop, think and
• Go ahead and open it
• Go to the ‘Reply’ button to check that the attachment’s genuine
Someone you’ve only met on line asks you to send them a photo of yourself. What should
you do? Stop, think and
• Go ahead and send it
• Go and tell your parent/carer or teacher
You get an e-mail from someone telling you that you’ve won a prize. What should you do?
Stop, think and
• Go ahead and reply – you may have won something big!
• Go to the ‘Delete’ button to get rid of the message
Lesson 2, Activity Part 2
58
Resource: ‘Decisions A’
Group A
Pupil Worksheet
Lesson 2
Decisions A
Chat rooms
Lesson 2
You’re looking for a chat room. What should you do? Stop, think and
• Go to a moderated chat room
• Go to an unmoderated chat room
Someone you’ve only met on line asks you to meet up. What should you do? Stop, think and
• Go ahead, it will be fun
• Go and tell your parent/carer or teacher
Someone in a chat room says something unpleasant. What should you do? Stop, think and
• Go ahead and reply
• Go and leave the chat room
Lesson 2, Activity Part 2
Resource: ‘Decisions A’
Group A
59
Pupil Worksheet
Lesson 2
Decisions A
SMS/Text messaging
You have your own mobile phone and you want to use it in what you think could be an
unsafe place. Stop, think and
• Go somewhere that you think might be safer to use it
• Go ahead and use it anyway
You are crossing the road and your phone rings. Stop, think and
• Go ahead and answer it
• Go ahead and wait until you have crossed the road safely – you can always ring them back!
You are in the cinema watching a film and your phone rings. Stop, think and
• Go ahead and answer it – no-one will mind
• Go straight for the ‘off’ button and remember to turn it off next time!
You want to send a text message to a friend but you are not sure of their number.
Stop, think and
• Go ahead and guess – you’ll probably get it right!
• Go ahead and text you friend who knows the number – then you can be sure!
Lesson 2, Activity Part 2
60
Resource: ‘Decisions A’
Group A
Pupil Worksheet
Lesson 2
Decisions B
Web browsing
You decide to use a search engine. What should you do? Stop, think and
Lesson 2
• Go to a child-friendly engine
• Go to an search engine that is not child-friendly
Why?
You see an advert linking to another site. What should you do? Stop, think and
• Go ahead and click it
• Go, leaving the page without clicking it
Why?
You arrive by mistake at an unsuitable site. What should you do? Stop, think and
• Go straight to the back button and get off the page
• Turn off monitor and Go and tell your parent/carer
Why?
You are asked to register your details at a site. What should you do? Stop, think and
• Go from the page without registering
• Go ahead and register
Why?
You find a useful site that will help you with your homework. What should you do? Stop, think and
• Go ahead and copy large chunks – no one will know
• Go and write it up in your own words
Why?
Lesson 2, Activity Part 2
Resource: ‘Decisions B’
Group B and C
61
Pupil Worksheet
Lesson 2
Decisions B
E-mail
A friend sends you an attachment you’re not sure of. What should you do? Stop, think and
• Go ahead and open it
• Go to the ‘Reply’ button to check that the attachment’s genuine
Why?
Someone you’ve only met on line asks you to send them a photo of yourself. What should
you do? Stop, think and
• Go ahead and send it
• Go and tell your parent/carer or teacher
Why?
You get an e-mail from someone telling you that you’ve won a prize. What should you do?
Stop, think and
• Go ahead and reply – you may have won something big!
• Go to the ‘Delete’ button to get rid of the message
Why?
Lesson 2, Activity Part 2
62
Resource: ‘Decisions B’
Group B and C
Pupil Worksheet
Lesson 2
Decisions B
Chat rooms
You’re looking for a chat room. What should you do? Stop, think and
Lesson 2
• Go to a moderated chat room
• Go to an unmoderated chat room
Why?
Someone you’ve only met on line asks you to meet up. What should you do? Stop, think and
• Go ahead, it will be fun
• Go and tell your parent/carer or teacher
Why?
Someone in a chat room says something unpleasant. What should you do? Stop, think and
• Go ahead and reply
• Go and leave the chat room
Why?
Lesson 2, Activity Part 2
Resource: ‘Decisions B’
Group B and C
63
Pupil Worksheet
Lesson 2
Decisions B
SMS/Text messaging
You have your own mobile phone and you want to use it in what you think could be an
unsafe place. Stop, think and
• Go somewhere that you think might be safer to use it
• Go ahead and use it anyway
Why?
You are crossing the road and your phone rings. Stop, think and
• Go ahead and answer it
• Go ahead and wait until you have crossed the road safely – you can always ring them back!
Why?
You are in the cinema watching a film and your phone rings. Stop, think and
• Go ahead and answer it – no-one will mind
• Go straight for the ‘off’ button and remember to turn it off next time!
Why?
You want to send a text message to a friend but you are not sure of their number.
Stop, think and
• Go ahead and guess – you’ll probably get it right!
• Go ahead and text a friend who knows the number – then you can be sure!
Why?
Lesson 2, Activity Part 2
64
Resource: ‘Decisions B’
Group B and C
Pupil Worksheet
Lesson 2
Decisions C
Lesson 2
Scenario
Choice 1:
Choice 2:
What you
would do
OR
What you did
Scenario
Choice 1:
Choice 2:
What you
would do
OR
What you did
Lesson 2, Activity Part 2
Resource: ‘Decisions C’
Group C
65
Lesson 2, Activity Part 3
Resource: ‘Glossary’
66
All groups
Pupil Recording
Sheet
Visual Aid
Lesson 2
SMARTthinking
Lesson 2 Plenary
This is about personal information and whether it is
safe to give it out. For example, it might apply to
an on-line registration form or someone requesting
contact details so they can send you a prize.
WHO wants the information?
Lesson 2
S
M
A
R
T
= Secret
WHY are they asking for it?
WHAT will they do with it?
STOP and THINK
= Meeting
This is about someone you have never met before
contacting you on line or through a messaging
service to invite you to a meeting.
WHY should you never arrange to meet
anyone you have only met on line?
STOP and THINK
WHO should you tell?
WHAT might happen?
= Attachments
This is about e-mail and attachments and what you
need to think about before opening them.
WHO sent it?
STOP and THINK
WHAT can I do to protect myself and
the computer?
WILL it be safe to open it?
= Reliable
Anyone can put anything on the Internet and
anyone can use the communication technologies
(such as chat, SMS, e-mail, IM) to contact others.
STOP and THINK
WHETHER I can rely on information on
web sites to be true
WHETHER I can rely on someone I
can’t see telling me the truth
WHAT can I do to check?
= Tell
No matter how careful we are, sometimes we might
come across things that upset us.
WHAT can I do when web sites and
messages make me feel uncomfortable?
STOP and THINK
WHO can I tell?
WHAT can I do to stop it happening again?
Resource: ‘SMARTthinking’
All groups
67
Pupil Worksheet
Lesson 2
STOP
STOP
THINK
THINK
GO
Lesson 2 Plenary
68
GO
Resource: ‘Stop! Think! Go?’
All groups
Lesson 3
Communication and Information
The focus for this lesson is to encourage children to think about why we communicate with
other people and about the information we give them. It builds on Lessons 1 and 2.
Children will consider why we communicate with each other – to exchange information, to
ask for information or to share information. It is helpful if examples of different types of
communications – letter, fax, household bill, text message, application form, newspaper,
advert, for example – are available for pupils to look at during the lesson. Most examples will
be of giving information, so you may need to create one or two specially – a fax or letter,
perhaps – which can be examples of requesting or sharing information.
Lesson 3
From thinking about information in general, pupils move on to consider the idea of ‘personal’
and ‘private’ information about themselves. The activities also help them to think about how
small bits of seemingly inconsequential information can enable someone to find out a lot
more about them, and therefore put them in a vulnerable position. Then, through a role-play
activity, the focus moves to the question of whether people always tell the truth and whether
they can tell the difference between answers that are true or false when they cannot see the
speaker. Finally, the pupils think about people they can expect to trust because they know
them, and strangers, with whom they need to be cautious.
This is a difficult area for young children and needs to be handled with sensitivity. The
emphasis needs to be on how they can take steps to act safely rather than on the dangers
they might encounter. Equally, they need to learn about what they should do if they are
uncertain or feel uncomfortable about a situation.
Resources for this lesson can be downloaded from www.gridclub.com/cybercafe/teachers.
Learning objectives
Pupils will:
Pupils will learn to question:
• begin to think about what personal information
should be kept private
• the purpose of any communications they receive
• why the person requesting information wants
it, whether they really need it and what they
will be using it for
• whether it is safe to give out personal information.
Subsequent lessons will provide opportunities for
discussing the circumstances under which it is
appropriate to give out personal information and
when caution should be used.
Timing
75 minutes (approx.); younger pupils
may need longer. The lesson could
be split in two, after Activity 1.
• understand that there are possible risks and
consequences in sharing too much information
and that this scheme will help them to develop
their own safety strategies
• be able to identify personal information that is
unique to them
• be able to relate some of the safety rules to the
communication technologies.
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
69
Lesson 3
Organisation
• A whole-class activity relating to personal information
The lesson has five parts:
• An activity looking at how we communicate with
someone when we cannot see them; in small
groups, pupils sort out a set of statements that
describe face-to-face or on-line scenarios
• An introductory whole-class discussion on why
we communicate
• Pupils working in small groups to look at a
selection of printed communications which
should be sorted out according to the criteria of
asking for or giving information
• A plenary session in which pupils consider if any
of the safety rules are particularly relevant to what
they have learned during the lesson.
Relevant to the following
PSHE and Citizenship Framework at Key Stage 2
1. During the key stage, pupils should be taught
the knowledge, skills and understanding
through opportunities to:
a) take responsibility, (for example, for planning
and looking after the school environment; for
the needs of others, such as by acting as a
peer supporter, as a befriender, or as a
playground mediator for younger pupils; for
looking after animals properly; for identifying
safe, healthy and sustainable means of travel
when planning their journey to school)
d) make real choices and decisions (for example,
about issues affecting their health and wellbeing such as smoking; on the use of scarce
resources; how to spend money, including
pocket money and contributions to charities)
g) consider social and moral dilemmas that they
come across in life (for example, encouraging
respect and understanding between different
races and dealing with harassment)
Resources
Part of the Lesson
Type and Title of Resource
Activity 2, Part 1
Personal – a visual aid (pupils should have a copy each or one per group)
Activity 2, Part 2
Who Would You Tell? – a Pupil Activity Sheet (each group should have a set of cards)
Private Information – a Pupil Activity Sheet (each group should have 3 or 4 sets of these)
Activity 3, Part 1
True or False? – a prompt sheet for the teacher
Activity 3, Part 2
Statements – a Pupil Activity Sheet (one set per group, for pupils to cut up and sort
accordingly)
Scenarios – a Pupil Recording Sheet (pupils should use the cut-out statements from
the above resource and sort them into relevant sections on an enlarged Scenarios sheet)
Plenary
70
Tara’s Story – (optional – this can be downloaded from
http://www.gridclub.com/cybercafe/teachers)
Introducing the lesson
You could begin the activity by asking pupils to look at a selection of written ‘communications’. Ask pupils if
they can sort out these items according to the type of information they contain – which ones give
information, which ask for it, or share it?
(5 minutes)
Working in groups of 4 or 6, pupils should try and
sort out a selection of paper-based communications. The criteria should be:
• asking for information
• giving information
• sharing information.
After a few minutes, ask pupils, as a whole class,
to make a list of the types of communications that
give information – letters, flyers, programmes and
tickets, for example. Now ask them to make a list
of types of communications that ask for information
(this might include items such as application forms
and registration forms).
Lesson 3
Activity 1: Asking, giving or sharing information
Pupils may find that they are unsure which category to
put some items in. Spend a few minutes discussing
these. Some forms of communication can be in more
than one category, of course: a letter might be telling
you that you have won a prize – but you will probably
have to fill in a claim form in order to collect it. Older
pupils will be able to understand that ‘no one gives
anything for nothing’. If someone says that you have
won something they must want something back! They
need to think about how their information might be
used – will they be inundated by advertising for all
sorts of products and services, for example? Ask
pupils to recount personal experiences related to this.
(10 minutes)
Activity 2: Personal Information
Part 1
Introduce this section by playing a guessing game
with pupils. Start by saying something like:
“I am thinking of a boy in class 4. Can you guess
who it is?”
“I am thinking of a member of the football team in
Class 3. Can you guess who it is?”
“… someone who lives at ….”
“… A nine-year-old in Class 5 with blonde hair who
plays the violin ….”
“… Someone with the family name ‘-----’ ….”
Ask pupils to think about the pieces of information
that enabled them to identify the person you were
thinking of. Sometimes only one piece of information
was needed; on other occasions it was necessary
to use more that one; sometimes seemingly
unrelated bits of information can be put together like
71
Lesson 3
a jigsaw to help us to identify someone. We need to
think very carefully about the information we give to
anyone, particularly on line, as we cannot be sure
they are who they say they are.
Discuss what sorts of information are safe. Introduce
the idea of personal information, that is, information
that can identify each person individually. Give each
pupil a Personal card. Fire a few questions at
individual pupils: if it is safe to do so, they can answer
but if it requires personal information, they should hold
up the Personal card (or simply say, “Personal”).
Part 2
Give each group a set of cards cut from the Who
Would You Tell? sheet, plus 3 or 4 sets of cards
cut from the Private Information sheet. It helps if
the two sets of cards are printed on different
coloured paper. Ask the pupils to spread out the
Who Would You Tell? cards on a flat surface. They
should position the Private Information cards next
to the characters to show what information they
would give. Discuss the outcomes briefly.
(15 minutes)
Introduce the idea that people who ask for
information using the new technologies might not
be who they say they are.
(10 minutes)
Activity 3
Part 1 – Mystery people
For this activity it would be useful if you could
‘borrow’ an adult, an older pupil, or a pupil from
another class, to hide behind a screen. This person’s
role is to reply to pupils’ questions, telling some
untruths and/or pretending to be someone else.
Introduce the children to the role-play, where they
have to find out about the person behind the screen.
Encourage them to ask questions in turn. It may be
useful to have some questions prepared (True or
False?). The person behind the screen should answer
some questions truthfully and some untruthfully.
After each of the questions has been asked, ask the
children if they thought the answer they were given
was truthful or not. They could indicate this by a
show of hands. The numbers should be recorded
on the True or False? sheet. After each question,
ask the person behind the screen whether it was
true or false. Check to see who was right.
Now ask the children to guess who is behind the
screen. Ask them why they think that. See if
anyone was correct by bringing the person from
72
behind the screen. Try asking the same questions
again and see if it is easier to tell whether someone
is telling lies in a face-to-face situation.
(10 minutes)
Part 2
Pupils should work in small groups. Give each
group a pair of scissors, and a copy of Statements
and Scenarios. Ask them to spend a few minutes
looking at the different statements before they cut
them into individual strips.
Discuss some of the statements and demonstrate
how to organise the statements into those that are
more appropriate to face-to-face interactions, those
that describe on-line communications or those that
could apply to both methods. If children are
struggling with some statements, they can leave
them to the end. Pupils should discuss each
statement and think about whether it applies to
communicating face to face, on line or both and
place it in the appropriate area on Scenarios.
(10 minutes)
This is a good opportunity to refer to the
SMARTthinking section on the Cybercafé web site
and in Lesson 2. Consider how the messages
relate to what has been covered in this lesson.
(5 minutes)
With younger pupils, this is also a good opportunity
to ask whether, if they were in a chat room, they
would always tell the truth. What might they tell lies
about (adding a year or two to their age is quite
common, and even changing gender)? Can they
think of any dangers this might involve?
cybercafe/teachers). Tell them that you are going to
tell them a story about a girl called Tara to illustrate
the things they have been discussing. Reassure
them that they need not panic and think that they
are going to be in danger because they have given
out some personal information. Tell them that if they
are concerned or worried they should talk to you, a
parent or carer. Remind them that the story
describes a very unusual situation. Tell them that
you would like them to make a note of three or four
bits of information that Tara disclosed as they will
be discussing this in a later lesson.
(10 minutes)
Lesson 3
Plenary
With older pupils, you could read out Tara’s story
(or download it from http://www.gridclub.com/
Learning outcomes
• Pupils will begin to think about whether the
information they are being asked for is necessary
and will be used properly. They will be able to
look for privacy clauses on registration and
application forms.
• They will be aware of the differences between
private and personal information that can identify
them uniquely, and general information. They will
be aware of the difficulties associated with
communicating with people on line.
73
Lesson 3, Activity 2, Part 1
Resource: ‘Personal’
Lesson 3
Personal
All groups
Pupil
Visual Aid
75
76
Your friend’s
Grandad
David Beckham
Man in the
street
Resource: ‘Who would you tell?’
Competition on
a web site
Lesson 3, Activity 2, Part 2
Your teacher
Lady on the bus
Bus driver
Chat room
friend
Dustbin
collector
Doctor
Your favourite
aunt
Shop assistant in
the supermarket
Who would you tell?
All groups
Pupil Activity
Sheet
full name
address
full name
address
first name
telephone number
first name
telephone number
age
post code
age
post code
age
post code
Lesson 3
Resource: ‘Private Information’
address
telephone number
Lesson 3, Activity 2, Part 2
full name
first name
All groups
Pupil Activity
Sheet
77
Teacher’s
Prompt Sheet
True or False?
True
False
What is your name?
Where do you live?
What is your favourite
television programme?
Who lives in your house?
How old are you?
Do you like reading?
Which football team
do you support?
Have you any brothers
or sisters?
What is your
best friend called?
Lesson 3, Activity 3, Part 1
78
Resource: ‘True or False?’
All Groups
Pupil
Activity Sheet
Communicating with people
Cut out these statements and sort them into two piles: those that describe talking face-to-face
with someone and those that describe a conversation on line.
1 You know who you’re talking to
because you can see them
7 It’s easy to tell what people mean
because you can hear the tone
of their voice
2 You can talk to someone in
another country
8 You must think carefully about
giving them personal information,
such as where you live
3 You don’t know who you’re
talking to because you can’t
see them
9 You should tell a grown-up you
trust if someone is bullying you
4 You can pretend to be someone
you’re not
10 You should tell a grown-up you
trust if someone says
something that makes you feel
uncomfortable
5 You can tell what sort of age the
person is
11 Even if you can see someone,
you don’t always know who
you’re talking to
6 You can’t always tell if they are
joking or serious
12 The person you are talking to
may not be telling the truth
Lesson 3, Activity 3, Part 2
Resource: ‘Statements’
Lesson 3
Some statements may belong in both piles – put these in the middle along with any which you
are unsure of.
All groups
79
Lesson 3, Activity 3, Part 2
Face-to-face
80
Resource: ‘Scenarios’
Both
Electronic
All groups
Pupil Recording
Sheet
Plenary
Clues We Give Away: Tara’s story
She rushed to the computer and signed on as “FootieGirl”
– and there he was! Right where he always was, in her
favourite teen chat room, Teen Sports.
FootieGirl: Hi Jamie21. Guess what? We won!
Jamie21: Hi FootieGirl. What was the score?
FootieGirl: 2 goals to 0! I scored the first goal! We even
had our photo taken by the local paper. I’m going to be
famous!!
Jamie21: Cool. Who do you play next week?
to give out anything that could help anyone find her in real
life. Just then her mother called her, and she ran down the
stairs to dinner to share the good news with her family
about the match.
The following week, Tara had a team practice every day.
Somehow things didn’t feel right, though. It was as though
someone was following her. She kept looking over her
shoulder when she walked home, and it was starting to
get dark earlier. She found herself picking up her pace,
and was winded when she arrived home. She unlocked
the door quickly and looked around. Although she didn’t
see anyone, she was very uncomfortable. As she got into
her house on wednesday, she remembered that her Mum
would be working late today. She wished her Mum had
been there, as it would have been good just to say “Hello”.
FootieGirl: Hi Jamie21 . . .
Jamie21: Hi FootieGirl, what’s up?
FootieGirl: Green Lane School. They were the champs last
year. It’ll be a tough game.
FootieGirl: I was nervous today. Must be worrying about
the next game. Thought someone was watching me on
the way home.
Jamie21: Are you still wearing the No.9 shirt?
Jamie21: Spooky! Did you see anyone following you?
FootieGirl: No, I’m No.8 now.
FootieGirl: No, but it felt weird. Like I could feel someone
watching me . . . but no one was there every time I looked.
Jamie21: What happened to the last No. 8?
FootieGirl: She moved to another school. The coach said
that No.8 girls have to be blonde, so he chose me! ;-)
Jamie21: Are your parents home?
FootieGirl: Yes. It’s okay. Probably just pre-match nerves. ;-)
Jamie21: Great! I gotta go. Mum’s calling me for dinner.
See you tomorrow.
Jamie21: You haven’t told anyone on line where you live or
your real name or anything, have you?
FootieGirl: CU L8R
FootieGirl: No, stop lecturing me! You sound like my
parents! ;->
Tara chatted with a few other friends for a while and then
logged off. Jamie21 was her favourite on-line friend. He
was fourteen, like Tara, but he lived in Birmingham. He
played football too and said he thought they should have
mixed football matches so they could play each other.
Although she didn’t even know his real name, and he
didn’t know hers, she knew lots about him. He was much
more fun than most of the other kids in the chat room. He
knew everything about football and they liked the same
pop groups. She wished she lived closer to Birmingham,
so they could go to football matches together.
Jamie21 really cared about her – he was always warning her
not to tell anyone her real name or address. It was nice that
he cared, but Tara already knew not to share any personal
information. Her parents and her teachers had all discussed
this with her and the other kids. She was very careful never
Lesson 3, Plenary
Lesson 3
Tara Peterson grabbed her backpack from the bench,
waved to the other members of the football team and
rushed off home. She was in a hurry, because she wanted
to catch Jamie21 in the chat room before he had to get
off-line for dinner. She turned the key in the lock and
rushed through the door, yelling, “Mum! I’m home!" She
took the stairs two at a time – there were only five minutes
left before Jamie21 would be going off line.
Jamie21: Oh! Oh! Gotta stop that!
FootieGirl: LOL [laughing out loud]
Jamie21: ROFLOL . . . [rolling on the floor laughing out loud]
Tara forgot her fear and chatted until her Mum came home
and dinner was ready.
The next day was the big game. Tara played really well,
and although she didn’t score a goal, the team won, going
on to the finals.
When she got home that night, she logged on and told
Jamie21 about their big win, and complained that they had
practice the next day after school, so she might not be
able to chat to him.
At the next day’s practice, she looked around the school
Resource: ‘Tara’s Story’
81
Plenary
field and saw a man standing there looking right at her.
He looked okay, but she felt uncomfortable because he
was only looking at her, not the other girls. Every time she
glanced in his direction, he was still watching, but once the
practice got going, she needed to concentrate. It was
when she was walking home that she remembered him.
This time, she was sure someone was following her. She kept
looking around, and although she didn’t see anyone, she was
really scared. She took the long way home, because it was
busier and better lit, but wished she were already safe and
sound in her home. Once, when she looked in a shop
window, she saw a reflection of someone she thought might
be the man at school, but when she turned around no one
was there. At one point she even heard footsteps.
As she neared her house, she broke into a run. It sounded
like the footsteps were speeding up, too, and she ran even
faster. She unlocked the door and slammed it shut. Her
mother, alarmed at the noise, walked into the living room
from the kitchen. “Are you okay, Tara?” she asked. “You
look upset.” Tara caught her breath, and said that she was
just in a rush to get home.
When she took the stairs this time, she took them slowly,
thinking while she climbed. She really had to talk to
Jamie21. She was very scared. But when she logged on,
Jamie21 wasn’t in the chat room. She sent him an instant
message, and saw that he wasn’t even on line. Just when
she really needed him!
Then the doorbell rang. She heard her mother answer it
and heard a male voice. A few minutes later, her mother
called her down. She was still trying to figure out how to tell
her parents about her fear without alarming them. When
she climbed down the stairs, her thoughts were elsewhere.
Her mother was sitting in the living room with a man – the
one she had seen on the football field! She started to worry.
Her mother said, “Tara, please sit down. This is Sergeant
Thompson from the police.”
"Hi, FootieGirl," said the man. “I’m Jamie21.”
She couldn’t believe her ears. Jamie21? This policeman?
But Jamie21 was only fourteen, and he lived in
Birmingham!
was simple enough for me to find out where Green Lane
School is. I called them and asked which team they were
playing this week. Then I looked in the local paper and
found your photo with the team, with all the names on it.
Then I looked up all the Petersons in the telephone
directory, and found your address and telephone number. I
called your parents and told them I was concerned.”
Tara was stunned. How could this policeman sitting in front
of her be her friend Jamie21? Besides, the police officer
said he was from her local town. How could that be when
Jamie21 was from Birmingham?
She knew who Jamie21 was because he told her things
about himself. And she didn’t take his word for it, she
checked him out. He told her she could see his photo on
his school web site, where he was in the football team for
Year 9. She’d looked at the web site, and there he was –
he looked really fit, too. That was written proof! But Tara
started paying attention when Sergeant Thompson
explained how he had made it up just to help convince her
of his false identity. He then explained that he had followed
her home, after spotting her on the field, as the blonde girl
wearing the number 8 shirt.
“I did this to help you,” he said. “Even when you think you’re
being careful, you can give away information that an adult
could use to find out who you are, and where you live.”
“But you sounded like a 14-year-old!” said Tara. “And you
said you liked Manchester United and your favourite pop
group was the same as mine.”
“Yes, I did, and it was quite easy to pretend to be the
same age as you. I want you to promise me two things.
First, that you will be very, very careful from now on about
what you disclose to other people in a chat room. The
second thing is that I have to give a talk to another school
next week, about keeping safe on line. Will you come and
help me give the talk?”
Tara agreed, of course. She still uses chat-rooms and has
made lots of friends that way – but every time she’s asked
something personal, she thinks hard before she answers.
She also knows that you can’t always believe what other
people say.
“Let me explain,” he said, and proceeded to tell her that
he worked undercover in chat rooms trying to protect
children from adults on line.
“But how did you find me?” Tara asked. “I never gave you
my real name or any real information.”
“No, you never gave me your name, but you gave me lots
of other information about you. You gave me the name of
the team you were playing football against this week. It
Lesson 3, Plenary
82
Adapted from Tiffany's story http://wiredkids.org.safety/tiffany.html
Resource: ‘Tara’s Story’
Lesson 4
Using e-mail safely
During this lesson children learn about safe and responsible behaviours related to e-mail.
They will meet the Cybercafé character, Sunil, and help him to decide how to respond to
e-mails safely, appropriately and responsibly. All pupils will need to have had opportunities to
use e-mail prior to this lesson, if only briefly. Opportunities should be provided for pupils to
talk about their personal experiences in relation to both spamming and bullying via e-mail.
They should be encouraged to develop their own strategies to protect themselves.
Materials for this lesson can be downloaded from
http://www.gridclub.com/cybercafe/teachers.
Learning objectives
Pupils will know that there are safe and appropriate behaviours to use when sending and receiving
e-mail. They will know that there is a range of strategies that they can use to deal with:
• viruses
Lesson 4
• spamming
• bullying via e-mail.
The approaches they choose will depend on their previous experiences.
Organisation
After a whole-class introduction, the activity is carried out in three groups (A, B and C), so it may be
helpful if pupils are grouped as they were for Lesson 1. Part 1 of Activity 1 involves pupils working in
pairs and accessing the Cybercafé web site, so you will need sufficient computers to enable this.
A print-out of an e-mail inbox screen (as an OHT, which could be taken from the school system) might
be a useful resource if most pupils have had limited experience of using e-mail.
Timing
The lesson should take
approximately 65 minutes
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
83
Lesson 4
Relevant to the following:
QCA Scheme of Work for ICT – unit 3E – E-mail
PSHE and Citizenship framework at Key Stage 2
teasing, bullying and aggressive behaviours, and
how to respond to them and ask for help
Preparing to play an active role as citizens
2. Pupils should be taught:
c) to realise the consequences of anti-social and
aggressive behaviours, such as bullying and
racism, on individuals and communities
g) where individuals, families and groups can get
help and support.
f)
5. During the key stage, pupils should be taught
the knowledge, skills and understanding through
opportunities to:
to resolve differences by looking at alternatives,
making decisions and explaining choices
Developing a healthy, safer lifestyle
3. Pupils should be taught:
e) to recognise the different risks in different
situations and then decide how to behave
responsibly, including sensible road use, and
judging what kind of physical contact is
acceptable or unacceptable
f) that pressure to behave in an unacceptable or
risky way can come from a variety of sources,
including people they know, and how to ask for
help and use basic techniques for resisting
pressure to do wrong.
Developing good relationships and respecting the
differences between people
4. Pupils should be taught:
a) that their actions affect themselves and others,
to care about other people’s feelings and to try
to see things from their points of view
d) to realise the nature and consequences of racism,
Breadth of opportunities
a) take responsibility (for example, for planning and
looking after the school environment; for the needs
of others, such as by acting as a peer supporter,
as a befriender, or as a playground mediator for
younger pupils; for looking after animals properly;
for identifying safe, healthy and sustainable means
of travel when planning their journey to school)
d) make real choices and decisions (for example,
about issues affecting their health and well-being
such as smoking; on the use of scarce resources;
how to spend money, including pocket money
and contributions to charities)
g) consider social and moral dilemmas that they
come across in life (for example, encouraging
respect and understanding between different
races and dealing with harassment)
h) find information and advice (for example,
through helplines; by understanding about
welfare systems in society).
Resources
84
Part of the Lesson
Type and Title of Resource
Introduction
Glossary – on Cybercafé site
Activity 1, Part 1
Cybercafé web site – www.gridclub.com/cybercafe
Activity 1, Part 1
FKBKO web site – www.fkbko.net
Activity 2
Jennifer – a Pupil Activity sheet (one per small group)
Introducing the lesson
Ask the pupils to consider:
• What is e-mail?
• Why might they use it?
• Who might they communicate with?
• Do they ever get e-mails from people they do not
know?
• Why do people we do not know contact us?
(Increasingly, e-mail is used for ‘spamming’ –
sending messages to try to sell us products or
persuade us to visit web sites, for example.)
• What is an appropriate message? What is
inappropriate? How would they feel if someone
sent them an offensive message, or one which
was bullying?
In addition, ask the children if they have heard
about computer viruses. Has anyone ever had
problems with a virus? What happened? Do they
know where it came from?
Tell them that viruses can do a lot of damage to
computers and the materials stored on them, and
they are usually sent from strangers who have set
out to do damage. Explain how they are often sent
as attachments, which become active when the
attachment is opened (see the Technology section
for more information).
Ensure that pupils understand what the terminology
means – use the Glossary on the Cybercafé web
site, re-wording it if necessary.
Lesson 4
It may be helpful to begin by recapping on Lesson
3 – Communication and Information, reminding
pupils about the purposes of communication and
the difference between personal and impersonal
information. It’s likely that most pupils will have
access to a computer at home, but they may have
only a limited experience of using e-mail.
Ask pupils to split into three groups and focus on a
particular aspect (viruses, spamming or bullying)
and report back to the class during the plenary.
(15 minutes)
Activity 1: Communication tools and their uses
Part 1
Group A
Tell pupils that they are going to visit the Cybercafé
and work with the character, Sunil, to help him
make the right decisions. Pupils will already have
had chance to have a brief look around the
Cybercafé web site but they are now going to
investigate the e-mail section in more detail.
Demonstrate logging on to the web site and locating
the e-mail section. Tell them about the characters and
that they need help with deciding what to do. You
may need to work with pupils to provide support,
prompting them to think about the safety aspects.
Working in pairs, pupils should look at the e-mail
section on the Cybercafé web site. Griff will tell
them what to do. They should discuss what they
think Sunil should do with each of the e-mails.
Does Sunil know who he is talking to? How much
does he know about this person? They can click on
the ‘help’ button for more information if they don’t
know what to do.
Encourage them to identify e-mails from people
they know. What should they do about e-mails from
addresses they do not recognise? What are the
possible risks? Pupils should talk about the
problems associated with spamming. If they
discover spam, what can they do?
85
Lesson 4
• Delete it without opening it
• Report it to their teacher (at school) or parent (at
home). The Internet Service Provider (ISP) who
operates the e-mail system should be told about
the spammed messages. Do they know who
their ISP is?
Details of all of the technologies are included in the
Technology section of this packs
• The NSPCC offers an interactive on-line service
(which is primarily aimed at teenagers but still a
useful reference point) at http://www.nspcc.org.uk/
html/Home/Needadvice/needadvice.htm. They
also have general advice on bullying.
Pupils should discuss approaches. They may need
to work through the various processes to refresh
their memories.
(20 minutes)
Group B
This group will focus on viruses and how to deal
with suspect attachments. Looking at the
Cybercafé e-mail section, pupils should focus on
the e-mail with the attachment and the decisions
associated with e-mail. To help pupils find out
about computer viruses, they could visit the For
Kids By Kids Online (FKBKO) (www.fkbko.net) web
site before carrying out a search.
Encourage pupils to write safety statements to
remind themselves to virus check their e-mails.
Group C
This group will focus on problems associated with
e-mail bullying and spamming.
Bullying e-mails
Ask them to think about who might send bullying
e-mails – do we need to accept or even read
them? What can we do? The options presented
and discussed should come from the pupils and
will depend on their previous personal experiences.
• They should be encouraged to tell an adult they
trust (a teacher, parent or carer, for example).
• Find out the e-mail address of the sender – the
FKBKO.net web site has information on how to
do this in the ‘Tracing e-mail’ section.
Several of the children’s charities have useful advice
for children on handling on-line bullying:
• NCH (http://www.nch.org.uk/itok/)
• Childline – their web site contains advice but
pupils can also ring the national helpline for advice
(tel. 0800 11 11) or visit www.childline.org.uk
86
Part 2
Bringing the whole class back together, ask the
children to talk about the type of e-mails Sunil
received. Did they find any clues to help them
decide if any of them might have caused a
problem? What clues did they find? Would it help if
they had followed the Stop, Think, Go! guide? Ask
them to think about using e-mail at home; have any
of them had similar situations to Sunil? Do they
think they will know what to do in future?
(10 minutes)
Activity 2
Pupils should work in small groups to consider the
scenarios described on the activity sheet, Jennifer.
Some pupils may need help with reading the
information as well as considering the options.
Remind them they are thinking about keeping safe
all the time. Pupils may make notes and then orally
explain the recommended actions rather than write
them down in great detail.
(10 minutes)
Plenary
• Always use a virus checker – where could they get
one from, how do they know if they have one?
Reflect on the Stop, Think, Go! slogan and whether
it can be applied to the use of e-mail. Also, refer to
the safety rules and talk about whether any of them
are particularly relevant to e-mail.
Lesson 4
Recap on what pupils have learned about keeping
safe with e-mail. Make a note of the main safety
messages. These might include the following:
(10 minutes)
• Don’t open e-mails from anyone they do not
know
• If they receive a bullying e-mail, tell a teacher,
parent or carer
• Always be polite in e-mail messages.
Follow-up (optional)
Learning outcomes
Pupils could keep an e-mail diary showing when
they received e-mails, who they were from,
whether there was an attachment, what they
decided to do and why they made that decision.
• Pupils will know how to handle messages
appropriately and safely.
Pupils could create slogans or posters portraying
safety messages (possibly for homework).
• Pupils will be able to explain that there could be
risks with using e-mail but there are actions they
can take to keep themselves and their computers
safe, such as checking for viruses, and not
opening e-mails from anyone they do not know.
87
Pupil
Activity Sheet
Jennifer’s e-mails
Jennifer finds a new e-mail in her inbox. The message says
that she has won a competition she doesn’t remember
entering and gives a link to a web site. She clicks on the
link and it takes her to a site with pictures that make her
feel very uncomfortable. Jennifer thinks it’s her fault so she
deletes the e-mail and doesn’t tell anyone. What would
you have done? Here are some notes to help you:
Strangers
You never know what the intention of a stranger is.
Stop and think before you give your e-mail address to
others, particularly while you are on-line. The more people
who have your e-mail address, the greater the chance you
will receive Spam e-mail.
Spamming
Spam e-mails are adverts and other unwanted messages
that are sent to hundreds or thousands of mail boxes at a
time. Sometimes these messages can be rude or insulting,
sometimes they ask for money. They often come from
people or companies pretending to be friends or offering
great prizes and deals. Never respond to Spam messages
as the Spammers are only likely to send you more.
Computer viruses
Computer viruses are often sent as attachments to
e-mails. A virus is nasty piece of software that can do
great damage to your computer or the programs on it.
It is very important to use anti-virus programs to prevent
viruses getting into your system and to prevent you from
passing them on to anyone else.
Lesson 4
How might the sender have got hold of Jennifer’s e-mail address?
What sort of problems might Jennifer have met by replying to this e-mail?
Lesson 4, Activity 2
Resource: ‘Jennifer’
All Groups
89
Pupil
Activity Sheet
What should she do if she finds herself accidentally on a web site that makes her feel uncomfortable?
Jennifer gets an e-mail with an attachment from someone she doesn’t recognise. What should she do?
Lesson 4, Activity 2
90
Resource: ‘Jennifer’
All Groups
Lesson 5
Responsible use of the Internet
In this lesson pupils reflect on the different types of information published on the Internet.
They will consider the advantages and disadvantages of the Internet as a source of
information. In addition, they will visit the web browsing section of the Cybercafé web site
(www.gridclub.com/cybercafe) and help Jason to use it responsibly, appropriately and
critically. They will begin to consider whether all the information available on the Internet is
valid and reliable and spend some time evaluating a selection of web sites.
Pupils should be encouraged to think about the way they use the Internet and about
‘behaving responsibly’. They also need to have plenty of opportunities to develop their
searching skills. The ‘Understanding the Technologies’ section of the teachers’ notes contains
a section on the Internet which details the risks and benefits of using the Internet.
All materials for this lesson can be downloaded from
www.gridclub.com/cybercafe/teachers.
Learning objectives
Pupils will:
• be able to find information on the Internet
• be aware that some of the information on the Internet is biased, and has to be verified
Lesson 5
• be able to evaluate and think critically about web sites
• know that anyone can publish on the Web
• know what to do if they come across anything that makes them feel uncomfortable on the Internet
• know that companies can and do advertise on some web pages.
Organisation
Pupils will need access to the Cybercafé web site. Following a brief, whole-class introduction to discuss
different types of publishing and the advantages and disadvantages of using the Internet to find
information, pupils will work in pairs on the Cybercafé site. They will then evaluate selected web sites in
groups. You will need to think about and bookmark some suitable web sites in advance – they might be
selected to fit in with current topic work, or at least a topic that pupils are reasonably knowledgeable
about. You will need to check them thoroughly, of course, to ensure that the material they include is not
inappropriate or offensive. They may contain text that is too difficult for the age group or ability of the
pupils or not particularly suited to the topic – but this is what pupils need to consider. The lesson closes
with a short plenary session during which pupils can discuss the web sites they looked at.
Timing
The lesson should take
approximately 85 minutes
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
91
Lesson 5
Relevant to the following:
QCA ICT Scheme of Work – Unit 6D: Using the internet to search large databases and
interpret information
PSHE and Citizenship Framework at Key Stage 2
Preparing to play an active role as citizens
2. Pupils should be taught:
a) to research, discuss and debate topical issues,
problems and events
c) to realise the consequences of anti-social and
aggressive behaviours, such as bullying and
racism, on individuals and communities
e) to reflect on spiritual, moral, social and cultural
issues, using imagination to understand other
people's experiences
h) to recognise the role of voluntary, community
and pressure groups
i)
to appreciate the range of national, regional,
religious and ethnic identities in the United
Kingdom
k) to explore how the media present information.
Developing a healthy, safer lifestyle
3. Pupils should be taught:
e) to recognise the different risks in different
situations and then decide how to behave
responsibly, including sensible road use, and
judging what kind of physical contact is
acceptable or unacceptable
f) that pressure to behave in an unacceptable or
risky way can come from a variety of sources,
including people they know, and how to ask for
help and use basic techniques for resisting
pressure to do wrong
Developing good relationships and respecting
the differences between people
4. Pupils should be taught:
b) to think about the lives of people living in other
places and times, and people with different
values and customs
92
d) to realise the nature and consequences of
racism, teasing, bullying and aggressive
behaviours, and how to respond to them and
ask for help
f) that differences and similarities between people
arise from a number of factors, including
cultural, ethnic, racial and religious diversity,
gender and disability
Breadth of opportunity
5. During the key stage, pupils should be taught
the knowledge, skills and understanding
through opportunities to:
e) meet and talk with people (for example, people
who contribute to society through
environmental pressure groups or international
aid organisations; people who work in the
school and the neighbourhood, such as
religious leaders, community police officers)
f) develop relationships through work and play (for
example, taking part in activities with groups
that have particular needs, such as children
with special needs and the elderly;
communicating with children in other countries
by satellite, e-mail or letters)
g) consider social and moral dilemmas that they
come across in life (for example, encouraging
respect and understanding between different
races and dealing with harassment)
h) find information and advice (for example,
through helplines; by understanding about
welfare systems in society)
Resources
Part of the Lesson
Type and Title of Resource
CyberCafé web site
www.gridclub.com/cybercafe
Activity 2
Evaluating web sites – a teacher presentation (download from
www.gridclub.com/cybercafe/teachers)
Web sites – a prompt sheet or visual aid for pupils in Group A
Credibility caterpillars – a pupil activity sheet (Groups B and C)
A selection of bookmarked web sites related to current topic work
Introducing the activity
Ask pupils if there are any disadvantages or risks
associated with using the Internet. Ask if any of them
have had personal experiences. Encourage pupils to
describe briefly what happened and how they felt.
What did they do about it? Was there anything else
they could have done? Make a note of any
suggestions that they make, as these suggestions
will be useful for the plenary session. Be aware that
while this may throw up some issues, it is important
that risks are balanced against benefits.
Lesson 5
As a whole class, discuss the different types of
information that is published on the Internet. Ask
pupils how information on the Internet is different
from that in books, newspapers, magazines or
television. Is it necessarily more accurate and up to
date? Why do we use it? What are the
advantages? (For more information, see the
Internet section in the Understanding the
Technologies chapter.)
(10 minutes)
93
Lesson 5
Activity 1
Ask pupils to work in pairs and log on to the
Cybercafé web site (www.gridclub.com/cybercafe)
and locate the web browsing section. If necessary,
remind pupils how to get to the site and explain
that they will be helping the character Jason with
his homework. They should make a note of
anything that happens in the web site that might
not be considered to be responsible behaviour.
(10 minutes)
As a class, discuss the problems faced by Jason
when he was trying to find the best site to help him
with his homework. How difficult was it to choose
the most appropriate site? Is it as easy as that in
real life? What are the difficulties?
Ask pupils if they have used the Internet to help
them with their own homework. Encourage pupils
to talk about what they wanted to achieve and how
they did it. They might also talk about search
engines they have used. There are several ‘child
friendly’ search engines that have been set up to
94
screen out inappropriate materials (some of these
are listed in the Internet section of this pack).
There are also approaches that parents can adopt
to protect pupils at home, for example, installing
filtering software on machines and actively
engaging with their child’s Internet use.
Demonstrate doing a search on a topic suggested
by the pupils (or encourage pupils to carry it out).
Look at how many ‘hits’ there were. Carry out one
or two more similar searches. Discuss the need to
evaluate the web sites. If pupils are conducting the
search, encourage them to use different search
engines and compare the results. Make a simple
record of the search engine, the number of hits and
the time it took. Either outline possible effective
search strategies or link them to another area of
curriculum/activity where they can do this e.g.
putting in – or + in search terms etc.
(15 minutes)
Activity 2
Group A
Group B
Introduce the Credibility caterpillars recording
sheets, and explain how the credibility caterpillars
work. To help pupils decide whether the site is
‘credible’ they should consider the following key
questions (within each of these, there are subquestions that also need to be considered; these
are contained in the activity):
The prompt sheet, Web Sites, uses the same theme.
Evaluating web sites is a PowerPoint presentation
and ‘Web sites’ is a paper-based one for pupils.
Who wrote the information?
It asks pupils to consider:
Where is the web site?
Is it attractive and user friendly?
What information are you getting?
Does it contain anything that makes them feel
uncomfortable?
When was the information produced?
Do the headings look relevant for what they want to
find out?
Why was the web site created?
Is the body text easy to read?
Are the links useful?
Does it have everything they need?
Does it stand up to close scrutiny?
The visual image should help them to ask the right
questions.
Who is the intended audience?
How did you find the web page?
Why are you using the web site?
Lesson 5
Discuss with pupils what they think about when
deciding whether a web site is useful or not. Use
the presentation, Evaluating web sites, to offer an
alternative perspective or to provide a visual aide
memoire that might prove useful, particularly for
less confident users.
Using the web sites that have been bookmarked,
pupils should consider them in light of the questions
detailed on the Credibility caterpillars worksheet.
There are no right or wrong answers but this helps
pupils to evaluate what they read on web sites and to
know what key things to look for.
Group C
Ask pupils to evaluate one or two web sites from a
selection that you have bookmarked perhaps using
this approach as a starting point. How will they
record their views? Pupils may decide to print out a
page from the web site and annotate this. Others
may prefer to take a screen shot of the web page
and paste the image into a word processor where
they can annotate it.
Pupils in this group could be asked to look for more
detailed information about the web site. They might
try to identify where it is hosted and whether an
individual has created it, perhaps to publish a
personal message.
Pupils could devise an evaluation/recording sheet.
If possible, this should be in electronic format so
that they can cut and paste their evidence into the
document.
(35 minutes)
95
Lesson 5
Plenary
Give pupils an opportunity to talk about the
process of evaluating web sites. Did they find the
visual aids useful? Did they experience any
problems in their groups? What were the
problems? Did everyone in the group have the
same view? Ask one or two pupils to talk about
one web site and to illustrate their points by
referring to the site itself.
Encourage pupils in each group to share their
findings. Did they find it useful to know where the
web site was hosted? Did they find it useful to
know whether the information was a personal
posting or about the links to and from it?
Talk about how they might use information from
the Internet. Can they copy pictures and text from
web sites? What do they need to think about if
they are using materials written by someone else?
Pupils should be reminded that, although it is
possible to copy materials, someone else has
written them and they should acknowledge the
source and, if using text, repurpose it for their own
specific needs. Remind them of Jason (in the
Cybercafé) thinking about copying large chunks
from the Internet.
It may happen that pupils come across
pornographic/rude/disturbing web sites. All
schools will have some sort of filtering software in
place but they are not completely foolproof, so
pupils need to be taught what they can do if they
come across a web site which offends them.
Reassure pupils that it is not their fault. Encourage
them to talk about what they can do. They might
suggest using the back arrow on the tool bar or
the home page icon, minimising or closing down
the window. They should also know that they
should inform a responsible adult who can:
• help them to report it to the Internet Watch
Foundation (www.iwf.org.uk); the address of the
offending site should be visible in the History list –
the Internet Watch Foundation will decide whether
the content is illegal or not. If so, they will report it
to the Internet Service Provider and the police.
• ask the school’s ISP (or whichever ISP provides
the connection at home) to filter out or ban the
web site. At home it may be more difficult to get
the offending material removed but pupils
should be encouraged to talk to their parents,
who should in turn talk to their ISP.
• provide some counselling, if necessary.
(15 minutes)
Follow-up
Learning outcomes
Pupils should choose a web site which they think
is ‘good’. They might like to produce a set of bullet
points saying why they think it is good and include
a print-out. Pupils with more ICT experience might
produce an electronic version, incorporating a
screen shot and annotated labels.
• Pupils have evaluated a selection of web sites
against a set of criteria.
• They can explain and justify why they think
some sites are better than others.
• They are beginning to think about the sorts of
things they need to consider when selecting
web sites.
• They are developing an awareness of
‘responsible’ use of the Internet and what they
should do if they come across inappropriate
content on web sites.
96
Is the author
named?
Lesson 5, activity 2
Who wrote the
information?
Who?
Is the author
or organisation
well known?
Are you able
to contact the
author or
organisation?
Lesson 5
Resource: ‘Credibility caterpillars’
Who is the
intended
audience?
Is anyone
reading the
Is the site
information
written for
likely to be
children or
adults?
Is it written upset by it?
from only one
point of view?
This activity involves visiting some web sites. For each web site that you visit, answer the questions in the
caterpillars. When you have completed all the questions in each caterpillar, colour the caterpillar’s head red,
orange or green, depending on whether you think you should Stop, Think or Go!
Credibility caterpillars
Group B
Pupil
Worksheet
97
98
Lesson 5, activity 2
Why are
you using
make its
money through the internet?
advertising
banners and
links?
Is it there
just to share
information
freely?
Does the site
Is the site
there to make
money?
Why was
the web site
created?
Why?
Is it quicker
than looking
at a book?
Resource: ‘Credibility caterpillars’
Is this the
best source
for the
information
you need?
Is the
information
telling you
something you
don’t already
know?
Is the
information
necessarily
more up to
date?
Group B
Pupil
Worksheet
Can you
believe
everything
that you read
or see?
Lesson 5, activity 2
What
information
are you
getting?
What?
Where?
Does the
information
seem
reliable?
Are there
important
details that
seem to be
missing?
Where is the
web site?
Do other
web sites or
sources back
up the
information?
Are there
links to other
trusted web
sites?
In which
country was
the web site
created?
Lesson 5
Resource: ‘Credibility caterpillars’
Do the
pictures or
charts on the
site seem
trustworthy?
Is it a company,
an organisation
or someone’s
What does home page?
the site’s
address tell
you?
Group B
Pupil
Worksheet
99
100
Do the links
on the
page work?
Resource: ‘Credibility caterpillars’
Did you find
it through a
search engine?
Is there a
date given?
Were you
given the
address by
a trusted
Did you come
source?
across it by
accident?
Does the
information
seem up to
date?
How did you
find the web
page?
Lesson 5, activity 2
How?
When was
the
information
produced?
When?
Group B
Pupil
Worksheet
Teacher
Prompt Sheet
Evaluating web sites
Is it attractive and
user-friendly?
Do the headings look
relevant
Is the body
text easy to
read?
Does it have
everything you need?
Lesson 5, Activity 2
Lesson 5
Can you see
anything that
makes you
uncomfortable?
Are the
links
useful?
Is the info
one-sided?
Does it stand
up to close
scrutiny?
Resource: ‘Evaluating web sites’
Group A
101
Evaluating web sites
Is it attractive and user-friendly?
No
Yes
Does it have sound?
No
Yes
Do the headings look relevant?
No
Yes
Is the
body
text easy
to read?
No
Yes
Are the links useful?
No
Yes
Does it have
everything you
(k)need?
No
Yes
Is the info
one-sided?
No
Yes
Can you see
anything that
makes you feel
uncomfortable
?
No
Yes
Does it stand
up to close
scrutiny?
No
Yes
Try a different web site?
Good luck with your
research!
Lesson 6
Chatting with care
This lesson considers safety issues related to on-line chat and instant messaging. These
technologies are well used by young people, as they are quick and fun and offer them lots of
opportunities to communicate with different people. However, they can present difficulties
when pupils are required to give personal information, such as when registering for one of
these services or when asked for it by another person using a chat room.
Pupils will have the opportunity to play a game to enhance their understanding of when, to
what level and in what context it is appropriate to give out personal information, especially
within an instant messaging and chat environment. They will consider what information they
are required to give out when registering for a service and what information they should not
give out when they are chatting on line. Pupils also visit the Cybercafé to help Chantelle to
make decisions in the chat room. As a follow-up activity, pupils can also look at a selection of
moderated chat rooms designed for children.
Learning objectives
Pupils should:
• understand what constitutes personal information and enhance their understanding of when and
where it is appropriate to give it out
• know how to respond when asked for personal details
• know that some chat rooms are moderated so they are safer
• know that anyone can participate in a chat room
• know that people in chat rooms do not always tell the truth
Timing
The lesson should take
approximately 90 minutes
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Lesson 6
• know that if they make their personal information available through an instant messaging service it
can be seen and used by others.
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
✔
103
Lesson 6
Relevant to the following:
PSHE and Citizenship framework at Key Stage 2
Developing confidence and responsibility and making
the most of their abilities
Pupils should be taught:
a)
to talk and write about their opinions, and explain their
views on issues that affect themselves and society.
c)
to face new challenges positively by collecting
information, looking for help, making responsible
choices, and taking action.
b) to think about the lives of people living in other
places and times, and people with different values
and customs
d) to realise the nature and consequences of racism,
teasing, bullying and aggressive behaviours, and how to
respond to them and ask for help
e) to recognise and challenge stereotypes
f)
Preparing to play an active role as citizens
that differences and similarities between people arise
from a number of factors, including cultural, ethnic,
racial and religious diversity, gender and disability.
Pupils should be taught:
a) to research, discuss and debate topical issues,
problems and events
k) to explore how the media present information
Developing a healthy, safer lifestyle
Pupils should be taught:
e) to recognise the different risks in different situations
and then decide how to behave responsibly,
including sensible road use, and judging what kind of
physical contact is acceptable or unacceptable.
f)
that pressure to behave in an unacceptable or risky
way can come from a variety of sources, including
people they know, and how to ask for help and use
basic techniques for resisting pressure to do wrong.
Developing good relationships and respecting the
differences between people
Breadth of opportunity
During the key stage, pupils should be taught the
knowledge, skills and understanding through
opportunities to:
a) develop relationships through work and play (for example,
taking part in activities with groups that have particular
needs, such as children with special needs and the
elderly; communicating with children in other countries by
satellite, e-mail or letters)
g) consider social and moral dilemmas that they come
across in life (for example, encouraging respect and
understanding between different races and dealing
with harassment)
h) find information and advice (for example, through
help lines; by understanding about welfare systems
in society)
i)
prepare for change (for example, transferring to
secondary school).
Pupils should be taught:
a) that their actions affect themselves and others, to
care about other people’s feelings and to try to see
things from their points of view.
Resources
Part of the Lesson
Type and Title of Resource
Before the lesson
Print-outs of registration forms from chat rooms or instant messaging services;
you could copy these onto OHTs or make photocopies for pupils
Activity 1
Activity 3
Activity 4
104
Access to one or two chat rooms (see the list at the end of this lesson plan)
Two gongs, cymbals, tambourines, chime bars or bells that can be sounded; a stop-watch
Cybercafé web site – www.gridclub.com/cybercafe
Before the lesson
Visit one of the chat rooms listed at the end of
this lesson and print off a registration form. You
also need to visit an instant messaging service
and print off one of their registration forms.
Please note that not all instant messaging
services are appropriate for users under the age
of 13 and some companies specify this.
Introducing the lesson
If pupils have read it, you could re-visit Tara’s story
and remind pupils of its salient points. It is important
that pupils realise the dangers whilst retaining a
degree of perspective on all of this. Ask pupils if
they can recall the snippets of information that Tara
accidentally gave away and which, like pieces of a
jigsaw puzzle, were put together to identify her.
(Remind them that this is a worst case scenario, but
it is worth being aware of what might happen.)
Recap on the game played in Lesson 3 where
pupils had to identify other pupils from little bits of
information. Ask them to think about the
information that helped to identify each individual
uniquely. For example: name – first name, family
name or both; address – full address or house
number and postcode; school, class, teacher,
teams; home phone number; mobile phone
number; town; gender; age; e-mail address. Ask
pupils if they can think of ways to categorise this
information such as ‘General information’ and
‘Personal information’.
Lesson 6
Remind the class about the discussions in Lesson
3 – Communication and Information, in which they
discussed the purposes of communication and
how information might be used. The most
important message is about personal information
and how easy it can be to give away little bits of
information that someone can piece together to
identify you. Remind them of the ‘Mystery People’
role-play and how difficult it was to know whether
someone was telling the truth.
(10 minutes)
105
Lesson 6
Activity 1
Tell pupils that they are going to look at a
moderated chat room for children. Explain that this
is necessary because of the safety aspects
adopted by schools to protect pupils. Explain to
the pupils that most chat rooms require you to take
on a nickname or persona. You can use the
Cybercafé example if you prefer.
You will need to make sure that display facilities are
adequate for all pupils to see clearly. Talk about the
rules that should apply to using a chat room. These
are common courtesies such as being polite, not
swearing or using bad language, and not ‘flaming’
(trying to incite arguments or winding people up).
Ask pupils who have used a chat room or instant
messenger to talk about their experiences and to
explain to the group how it works, the types of
things discussed, and the types of questions that
might be asked. Discuss the issue of contact; if
someone asks to meet you, what should you do?
Consider some of the roles/vocabulary associated
with chat room activities; for example, lurking,
flaming. There is a useful list of issues on
Childnet’s Chatdanger web site
(http://www.chatdanger.com)
(10 minutes)
(10 minutes)
Activity 2 – Personal information
106
You have already introduced the lesson and asked
pupils to think about how seemingly
inconsequential pieces of personal information can
help to identify someone individually. They need to
develop their understanding of where, when and to
what level they give out personal information.
Group A
Show pupils the registration forms for chat rooms or
instant messaging services, either as OHTs or copies
that they can share. Go through the information that
is required – what information do they have to give
out, and what is optional? Do they need to give out
their e-mail address when registering for instant
messaging/chat services? Do they need to give out
their home address? Make pupils aware that when
they register for services like instant messaging their
information may be viewed and used by others.
Encourage pupils to think about what information they
had to give out. Get them to draw up a list of what
information they gave out and ask them to consider
whether they needed to and the reasons for doing so.
Would they give out the same information to someone
else in a chat room?
Encourage pupils to think about what information they
had to give out and to make up a list of what
information they gave out.
Groups B and C
Reinforce with pupils that they should question any bits
of information that they are asked to provide.
(20 minutes)
Activity 3 – Personal Info? No way!
You will need:
• two gongs, cymbals, tambourines, chime bars or
bells that can be sounded whenever the person
being questioned gives out true personal
information
• an interrogator
• a contestant
• two adjudicators
• some prepared questions (a mixture of general
and personal questions)
• a timekeeper and a stopwatch
• a scorer and score sheet.
The idea of the game is for the interrogator to fire
questions at the contestant, to try and obtain
personal information from them. The contestant
must try not to reveal personal information unless
he or she can justify it. At either side of the
contestant there should be an adjudicator with an
instrument of some sort with which they can make
a noise when they think personal information has
been released. The timekeeper should start the
stopwatch as the first question is asked and should
stop it when the sound is made. The scorer will
write down the name of the contestant and the
time they lasted. It is unlikely that each contestant
will last more than one or two minutes.
Invite pupils to take part as contestants and
change the interrogator, too. The same sets of
questions can be used more than once. Try and
write down the questions and answers that caused
the adjudicators to stop the game. (You may need
to resume the game if the decision was incorrect.)
Some example questions are listed below.
How old are you?
What is your name?
Where do you go to school?
What’s your favourite type of music?
What’s your favourite colour?
What’s your teacher’s name?
Where do you live?
After a few minutes, discuss what pupils
considered to be personal information and how
easy or difficult it is to let something slip. Some
pupils in the audience may think that some
opportunities to stop the game were missed.
Encourage them to discuss their ideas.
Lesson 6
This is a game designed to make pupils aware of
when they are being asked for personal information
and to think whether they can safely provide it. You
may need to contextualise it for them, by saying
that they are chatting to someone on line, or
registering for a service etc.
(20 minutes)
107
Lesson 6
Activity 4 – Cybercafé Chat room
Remind pupils how to log on to the Cybercafé
web site.
Group A
Pupils visit the Cybercafé and help Chantelle make the
right decisions as she uses a chat room.
Groups B
These pupils should make a note of all the questions
that requested Chantelle to divulge personal
information. (You could do this by printing out the
conversation and highlighting the relevant sections.)
Group C
Pupils should be encouraged to report on personal
experiences and how they dealt with difficult situations.
Can pupils write up their experiences of chat or instant
messaging as scenarios like those in the Cybercafé?
They should record what happened and identify three
possible courses of action. They might make
recommendations based on their own successful
choices or alternatives to what they did.
(10 minutes)
Plenary
Recap on the similarities between chat and instant
messaging. Recap on the risks of both and
produce a list using a flipchart, an OHP or an
interactive whiteboard.
Refer to the SMARTthinking messages. Identify
those that are particularly relevant to chat and
instant messaging.
Discuss when you might need to give personal
information – in registering for an e-mail account or
a chat room, for example. Do people need to
know your real name, where you live, your e-mail
address or telephone number for this purpose?
(Unless it involves billing, they should not need this
information, and if it does involve billing, pupils
Follow-up activity
Pupils could visit some of the moderated chat
rooms for children, listed on the next page.
108
should not be signing up without parental
permission!) Some organisations such as GridClub
ask for school-based information to authenticate
the registration, in order to guarantee pupils’
safety. Remind pupils that they should ask an adult
to help them to decide what information they
should divulge in such a situation.
Pupils should report back on their findings from the
Cybercafé visit. Note down the types of questions
that they feel they should not answer or need to
think about first.
(10 minutes)
Learning outcomes
• Pupils will recognise that certain information is
personal and they will understand the potential
risks associated with divulging such information
to people they do not know, especially people
they have met on line because they cannot be
sure the contact is telling the truth.
• They will be aware that there are times that some
personal information is needed and that they
should ask an adult for guidance if they are unsure.
• Pupils will be aware of some of the potential
risks associated with chat rooms and instant
messaging and they will have a range of
strategies, such as an on-line persona, that they
can use to keep themselves safe.
Some moderated chat rooms
• Headbone Zone Chat Rooms: monitored
chat for kids, with several rooms to choose
from. http://www.headbone.com/hbzchat/
• NPR Science Friday: listen to past shows,
find resources for all sorts of science topics,
and learn about the scientists on the NPR
radio programme.
http://www.sciencefriday.com/
• Kidlink: kids from around the world connect
with conversations about a variety of topics.
http://www.kidlink.org
• Kids Learning Network (KLN) Live: a ‘kiddriven’ talk show featuring a guest or topic.
Also includes a boys’ and a girls’ guide to
life, homework help, and some games.
http://klnlive.com/kln/
• NASA Quest Calendar of Events: scientists
or astronauts you can chat with on line. You
can also participate in projects and
challenges designed for kids.
http://quest.arc.nasa.gov/calendar/
• Scholastic Author Calendar: a range of
authors available for on-line chat.
http://www2.scholastic.com/teachers/authors
andbooks/authorstudies/calendarhome.jhtml
• Women of NASA: this showcases outstanding
women who are enjoying successful careers
in maths, science and technology.
http://quest.arc.nasa.gov/women/intro.html
Lesson 6
• A Girl’s World Online Clubhouse: check out
daily, weekly and monthly features written
and edited entirely by girls and teens from all
over the world or sign up to chat.
http://www.agirlsworld.com/
• CBBC Newsround – Chat: see which
celebrity is answering questions on the
Hotseat or add comments or messages.
http://news.bbc.co.uk/cbbcnews/hi/chat/
• ChatDanger: learn how to have fun while
staying safe with Internet chat rooms.
http://www.chatdanger.com/
• Gridclub – a fun interactive web site for
7–11-year-olds. All pupils have to be verified
through their schools and it is fully
moderated. http://www.gridclub.com
• KidChatters: chat with other kids aged 9 to
12 in a moderated chat room – for a small
monthly fee. http://www.kidchatters.com/
109
Lesson 7
Using text and picture messaging
In this lesson pupils consider the possible risks associated with using mobile phones
including services like text messaging (Short Messaging Service) and multimedia messaging
services (MMS) which are a feature of MMS or picture phones. They will begin to develop
strategies to protect themselves.
Pupils are likely to use SMS/text messaging quite frequently, so the positive aspects – it being
quick, easy, and cheap, for example – need to be reinforced. MMS is relatively new but usage
is increasing and although the dangers might seem quite obvious (and rare) it is important
pupils understand how to use the technology effectively and safely. This lesson also involves
visiting the SMS/text messaging section of the Cybercafé site, where pupils will help the
character, Chloe, to make the right decisions.
You will find it helpful to read the sections on SMS and MMS in the teachers’ notes. The
materials for this lesson can be downloaded from www.gridclub.com/cybercafe/teachers.
Learning objectives
Pupils will know that there are safe and appropriate behaviours to use when receiving and sending text and
multimedia messages. They will know that there is a range of strategies that they can use to deal with:
• spamming
• bullying and/or offensive messages
• requests for meetings, photographs, etc.
Pupils will also learn about the level of personal detail it is safe to include in their own messages, and
how to look after their phones.
The approaches that they select and choose will depend on their previous experiences. Tell pupils that
the focus of this lesson is about using the messaging services on mobile phones, rather than on the
use of mobile phones per se, as you are assuming that they know the risks with talking to people on
the telephone and not giving out personal information, etc.
Lesson 7
Organisation
During this lesson pupils will need access to the Cybercafé web site (www.gridclub.com/cybercafe).
The lesson begins with a whole-class discussion and sharing of personal experiences. They will need
to reflect on their own uses of messaging, perhaps within the context of asking, giving or exchanging
information. With whom do they communicate? Do they only communicate with people they know,
such as friends and/or family? From whom do they receive messages?
For Activity 1, they split into three groups (as in earlier lessons) and access the Cybercafé.
Timing
The lesson should take
approximately 65 minutes
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
✔
111
Lesson 7
Relevant to the following:
PSHE and Citizenship framework at Key Stage 2
Knowledge, skills and understanding
Developing confidence and responsibility and
making the most of their abilities
1. Pupils should be taught:
f) that pressure to behave in an unacceptable or
risky way can come from a variety of sources,
including people they know, and how to ask for
help and use basic techniques for resisting
pressure to do wrong
c) to face new challenges positively by collecting
information, looking for help, making
responsible choices, and taking action
g) school rules about health and safety, basic
emergency aid procedures and where to get help.
Preparing to play an active role as citizens
Developing good relationships and respecting
the differences between people
2. Pupils should be taught:
c) to realise the consequences of anti-social and
aggressive behaviours, such as bullying and
racism, on individuals and communities
k) to explore how the media present information
Developing a healthy, safer lifestyle
3. Pupils should be taught:
e) to recognise the different risks in different
situations and then decide how to behave
responsibly, including sensible road use, and
judging what kind of physical contact is
acceptable or unacceptable
4. Pupils should be taught:
a) that their actions affect themselves and others,
to care about other people's feelings and to try
to see things from their points of view
d) to realise the nature and consequences of racism,
teasing, bullying and aggressive behaviours, and
how to respond to them and ask for help
e) to recognise and challenge stereotypes
g) where individuals, families and groups can get
help and support.
Resources
112
Part of the Lesson
Type and Title of Resource
Activity 1
Cybercafé web site – www.gridclub.com/cybercafe
Activity 2
Text messages – a pupil activity sheet; cut out the messages and give each pupil in
the groups a card
Follow-up (optional)
Safety Stars – a Pupil Recording Sheet
Introducing the lesson
Discuss with pupils the statistics on mobile phone
theft (this is detailed on the SMS section of the
Cybercafé site).
Recap on how pupils use e-mail and compare the
technologies. Make a note of the main advantages
and disadvantages of each one. Advantages of
e-mail could include the ability to send attached
files and to write longer messages. Disadvantages
may include the fact that many computers with
Internet connections are fixed so they cannot be
used anywhere else. However, WAP PDAs enable
you to use both e-mail and SMS wherever there is
an Internet connection. A PDA is a small hand-held
computer which accesses the Internet using
wireless technology (WAP). The advantages of SMS
and MMS are that it is quick, cheap, easy to use
and can be used almost anywhere. The
disadvantages might include the limitation on
message length (160 characters), the fact that
people do use them anywhere and, because they
are small, they can easily be lost.
Recap on some of the risks associated with e-mail
(spamming, bullying and viruses, for example). Ask
pupils if they have experienced similar things on
their mobile phones. Have they ever had a message
telling them that they have won a competition and
need to ring a specific number? Similarly, have they
ever received a bullying or offensive message? If any
pupils have received such messages, ask them how
it made them feel. Has anyone been asked to meet
someone or send personal information? Ask them
what they did in these situations and if that was not
the best approach, how they might respond now.
Make a list of possible responses: erasing the
message, replying, trying to find details of the
person who sent it, telling a responsible adult who
might inform the police or the service provider so
that calls from that number can be barred, or your
number can be changed.
(15 minutes)
Lesson 7
Ask pupils how they use their mobile phones,
whether they use them to talk, to send text
messages or play games. Do they ever use a
computer to generate a text message? What are
the disadvantages of sending messages this way?
(For example, although it is easier to type a
message on a keyboard than on a phone keypad, it
is not as portable unless you are using a WAP
(Wireless Application Protocol) PDA (Personal
Digital Assistant). Many mobile phones can be used
to send e-mails and will even allow you to speak
your e-mail messages rather than type them.) Ask
pupils what sort of service/account they have –
whether it is Pay as You Go or a monthly rental.
Ask if they have insured their phones and whether
anyone has ever lost one. What happens if
someone finds your phone? Can they use it? How
can you protect yourself?
113
Lesson 7
Activity 1 – the Cybercafé
Split the class into three groups (A, B and C) as in
earlier lessons – they will all need to access the
Cybercafé and visit the SMS section.
All the groups should:
• help the character Chloe to make the right
decisions
• decide whether the examples given are
appropriate uses of text messaging or whether
they are examples of spamming or bullying
• look at the responses made by Chloe: did she
give out any personal information that was
unnecessary?
Group A
Pupils in this group may need some help in reading the
messages and text on the web site. If there is time,
encourage pupils to create additional scenarios.
Groups B and C (extension)
Ask pupils in Groups B and C to create additional
scenarios to the ones detailed on the Cybercafé site
and to identify three alternative courses of action. As
a prompt you might use one or two examples from
the Scenario sheet.
(15 minutes)
Activity 2 – Responding to messages
Divide pupils into groups of four, and give each
pupil a card (cut out from the Text messages
activity sheet) ensuring that no two pupils in the
same group have the same card. Ask them to
discuss the messages and decide what they would
do if they were to receive such a message on their
mobile phone. Draw a continuum on the board:
Delete
Reply
Ask the pupils where they would place their cards.
Would they delete the message, or reply? With
several of the messages, they will need to come to
a decision as to how well they know the sender.
They might also like to consider the difference
between receiving the same messages from
strangers and from their friends.
114
It is through discussion that some of these grey
areas can be teased out. As children are deciding
in their groups, wander round and intervene with
appropriate questions, for example – ‘What might
happen if you do decide to reply?’, ‘How well do
you know the sender?’ etc.
After about 15 minutes, ask all the pupils with card
1 to tell you where they would place it on the
continuum. Did they all agree? If not, why not?
Proceed through all the message cards.
Reinforce the Stop! Think! Go? safe behaviour
message. Rather than deleting the message, when
might it be advisable to show it to an adult?
(25 minutes)
Plenary
Remind pupils that the activities and messages
were deliberately created to help them to make
appropriate decisions about what to do in those
situations. Tell pupils that they should not send
bullying or offensive messages and that sending
these kinds of message can be a serious offence.
Link this to the school’s anti-bullying policy and tell
them that bullying through phone messages or
e-mail is the same as bullying in the playground.
Ask them to reflect on how they felt or would feel if
they received a bullying or offensive message.
Remind them that if they receive bullying
messages, they are not at fault and they do not
have to accept such calls. Remind them also that
they should tell a responsible adult who can
contact the service provider to get calls barred
from specified numbers or perhaps tell the police.
suggest ways of keeping their phones safe. They
may suggest keeping it inside a particular pocket
in a bag which they always have with them, not
leaving it lying around or in the pocket of a coat
that is left unattended, not taking it to places
where they will not need them. Some pupils might
suggest having ‘unlock codes’ that need to be
entered when the phone is turned on – without the
code the phone cannot be used.
Discuss with pupils the number of mobile phones
that are stolen every month. Ask pupils if they can
(10 minutes)
Follow-up (optional)
Learning outcomes
Ask pupils to use these ideas to design Safety
Stars to add to a safety display. Ideally, pupils
should create their own shapes and posters using
ICT. To reinforce that texting can be fun, ask the
children to fill in blank message cards to send to
each other. Encourage them to use some of the
text messaging forms they encountered in the
Cybercafé.
• Pupils will be able to identify types of potentially
risky messages and will be able to take
appropriate action.
Ask pupils to suggest safety messages to
remember when using mobile phones to send
messages. These might include: if you do not
recognise the number – don’t open it because it
might be a spam or bullying message; don’t
arrange to meet anyone you do not know; be
careful how much detail you include in a message
in case someone else finds your phone.
Lesson 7
• They will be aware of how vulnerable mobile
phones are and should be able to look after their
own more carefully.
115
Pupil Activity Sheet
Text Messages
Message Card 1
Message Card 2
Message:
You’ve won a competition!
Reply now to see what prize you’ve got.
Message:
I’m going to get you after school.
From:
From:
Jaky
Unknown
Message Card 4
Message:
Do U want 2 come to my house L8R?
Message:
TX 4COOL CARD WILL CALL SOON
From:
From:
Satinder
Sam
Message Card 5
Message Card 6
Message:
We hate you
Message:
Free ring tones. Just reply to download.
From:
From:
Helen
Unknown
Lesson 7, Activity 2
Lesson 7
Message Card 3
Resource: ‘Text Messages’
All groups
117
Pupil Activity Sheet
Text Messages
Message Card 7
Message Card 8
Message:
Can we meet up sometime?
Message:
Want to see a movie?
From:
From:
Paul
Philip
Message Card 9
Message:
For daily horoscopes and quizzes just
reply with the message ’yes’
Message:
Send me a picture of you
From:
From:
Unknown
Tim
Lesson 7, Activity 2
118
Message Card 10
Resource: ‘Text Messages’
All groups
Lesson 7, Plenary
Lesson 7
Resource: ‘Safety Stars’
Safety stars
All groups
Pupil Recording
Sheet
119
Lesson 8
Behaving responsibly
This lesson is designed to draw together pupils’ understanding and interpretations of safety
messages developed through this scheme. Pupils consider what constitutes ‘irresponsible’
behaviour on the Internet and in communicating with technology and think about how to deal
with this sort of behaviour. They also act out a selection of scenarios depicting irresponsible
behaviour and decide on appropriate outcomes.
Learning objectives
Pupils will:
• be able to identify irresponsible and unsafe behaviour when using the Internet and other
technologies
• be able to suggest appropriate strategies to deal with this type of behaviour
• be aware of the effect that irresponsible behaviour has on others.
Organisation
Lesson 8
In this lesson pupils work in groups to act out a range of scenarios depicting inappropriate behaviour
using various technologies. They will need time to plan and practise their performance. After pupils
have acted out their play, they will work in small groups to suggest practical ways of dealing with
irresponsible behaviour in a range of settings.
Timing
Approximately 50 minutes, plus
5 minutes per play
Suggested age group of children
Year 4
Year 5
Year 6
✔
✔
Useful for
Whole class teaching
Large group work
Small group/pairs
✔
✔
✔
121
Lesson 8
Relevant to the following:
PSHE and Citizenship framework at Key Stage 2
Developing confidence and responsibility and
making the most of their abilities
1. Pupils should be taught:
c) to face new challenges positively by collecting
information, looking for help, making
responsible choices, and taking action.
Preparing to play an active role as citizens
2. Pupils should be taught:
a) to research, discuss and debate topical issues,
problems and events
b) why and how rules and laws are made and
enforced, why different rules are needed in
different situations and how to take part in
making and changing rules
c) to realise the consequences of anti-social and
aggressive behaviours, such as bullying and
racism, on individuals and communities
Developing a healthy, safer lifestyle
3. Pupils should be taught:
e) to recognise the different risks in different
situations and then decide how to behave
responsibly
f) that pressure to behave in an unacceptably or
risky way can come from a variety of sources,
including people they know, and how to ask for
help and use basic techniques for resisting
pressure to do wrong.
Developing good relationships and respecting
the differences between people
4. Pupils should be taught:
a) that their actions affect themselves and others,
to care about other people’s feelings and to try
and see things from their point of view.
Health and safety
2. When working with tools, equipment and
materials, in practical activities and in different
environments, including those that are
unfamiliar, pupils should be taught:
a) about hazards, risks and risk control
b) to recognise hazards, assess consequent risks
and take steps to control the risks to
themselves and others
c) to use information to assess the immediate and
cumulative risks
e) to explain the steps they take to control risks.
Links to National Literacy Strategy
5. Term 1 Text level work: Writing composition
24: to write recounts based on subject, topic or
personal experiences (for a variety of readers)
Y6: Term 1 Text level work: Writing composition
15: to develop a journalistic style…
Links to English Programme of Study
En1 Speaking and listening:
6
Language variation: Pupils should be taught
about how language varies:
a) according to context and purpose (for
example, choice of vocabulary in more formal
situations)
8 Speaking: The range should include:
a) presenting to different audiences.
Resources
122
Part of the Lesson
Type and Title of Resource
Activity 1 –
Classroom dramas
Scenarios – Pupil Task Sheet (one per group)
Before the lesson
During this lesson pupils will be acting out a
selection of scenarios. You will want to choose
ones which are most appropriate for your pupils.
The number of characters in each scenario may
be a determining factor, but they could be
modified. More than one group could tackle
each scenario, to see whether they opt for
different outcomes.
The scenario titles are as follows:
• “I hate my school” – 12 characters
• Voting Booth – 8 characters
• Bullying Phone Messages – 5 characters
• The Borrowed Phone – 4 characters.
Before the lesson, decide which scenarios to use
and who will be in each group.
Introducing the lesson
It’s helpful to start by discussing with pupils some
characteristics of inappropriate conduct using
technology and how to deal with this behaviour.
What sorts of things go on and how can they be
dealt with? Ask if any of the pupils have experienced
problems. How did they feel? What did they do?
Was it the best solution? Make a note of these
situations as they can be used in Activity 2.
Tell pupils that you have some examples of
irresponsible behaviour and that you would like
them, in groups, to consider what should be done.
Explain that they are going to pretend to be acting
out their scenario. Tell them that they will have
about 25 minutes to prepare their play and each
group will have about 5 minutes in which to
perform it.
Remind pupils that they should be thinking about
responsible and irresponsible use of the technology.
Pupils should be given the relevant Scenario task
sheet for their scenario as this suggests a list of
characters and prompts to start them off.
(10 minutes)
Allow pupils time to get themselves organised with
parts and to ensure that they understand the story
line. Give them time to practise their play. Remind
them that they have a fixed amount of time to
prepare – probably 25 minutes – and warn them
when they have only 10 minutes left.
performed. The acting will probably take at least five
minutes per group.
Pupils should act out their drama but discussion
should be postponed until all the plays have been
(25 minutes + 5 minutes per play)
Lesson 8
Activity 1 – Scenarios
After the performances, draw the class together to
discuss whether they felt that the behaviour was
irresponsible and whether the headteacher’s
decision was fair in each case.
123
Lesson 8
Activity 2
Make a list of examples of irresponsible behaviour.
Write each one on a separate sheet or OHT. Divide
the pupils into small groups and distribute the sheets/
OHTs. Ask each group to add some practical advice
that will help them to stay safe in these situations.
Group A
Less able pupils and those with special needs may
need help in recording their ideas. Pupils with
limited experience of using the technology and who
may not have personally experienced irresponsible
behaviour may need some prompts to remind them
of suggestions that have been made in earlier
lessons. Pupils in this group might make a list of
things they should and should not do. These could
be presented as slogans, using strips of A3 paper.
The slogans can then be sorted out to match each
technology; it is likely that many of these will apply
to more than one technology. Slogans might
include ‘Always be polite’, ‘Don’t try to annoy
people’ or ‘Don’t reply to people you don’t know’.
Group B
Pupils should be encouraged to reflect on previous
lessons and identify one or two examples of
irresponsible behaviour that they have discussed or
encountered. They should prepare ‘Positive
Posters’, that is, posters that promote positive
approaches or messages. For example, always be
polite, treat others as you would like to be treated.
These posters should not include ‘don’t’ messages.
Group C
Pupils could draft a guidance sheet for parents so
that they can help their own children to know how
to communicate responsibly.
(10 minutes)
Plenary
Learning outcomes
Pupils should share their advice about what to do
in difficult situations. Sheets of paper, slogans,
positive posters and guidance sheets could be
displayed to reinforce their message.
• Pupils will have discussed what they consider to
be irresponsible behaviour.
• Pupils will have talked about a range of
strategies to deal with difficult situations.
(5 minutes)
124
Pupil
Task Sheet
“I Hate My School”
A group of pupils create a web site called “I Hate My School”. On it, they list pupils and
teachers they don't like, and add rude and insulting comments about them. When other
pupils visit the web site, they print out the comments and post them around the school.
The pupils and teachers see the hurtful remarks.
Your task
Think about…
Your task is to act out a scenario of what happens
after the pupils who created the web site have been
discovered, and they have to go and see the
headteacher.
• What sort of nasty remarks might have been made
about pupils? How would these pupils feel?
You will need the following characters:
• Why did some pupils print out the comments?
What did they intend to do with them?
3 pupils who had nasty remarks made about them
2 teachers who had nasty remarks made about them
2 pupils who printed out the hurtful comments
2 pupils who posted the comments around the
school
2 pupils who created the web site
The headteacher
• What sort of nasty remarks might have been made
about teachers? How would these teachers feel?
• Why did some pupils stick the comments around
the school?
• When the pupils created the web site, what did
they think it would contain?
• What could have been done to make sure no one
was hurt?
• What do you think the headteacher should do?
Lesson 8
You have 25 minutes to talk about your scenario and
write down some ideas for the script. You will then
have about 5 minutes to act it out.
Lesson 8, Activity 1
Resource: ‘Scenarios’
All Groups
125
Pupil
Task Sheet
The Voting Booth
Two pupils set up a voting booth where children from their school can vote on the best
looking boy and girl in each class. Instead of getting what they expect, many of the pupils
who take part add rude, insulting and even threatening comments about their classmates.
Before the pupils have a chance to remove their booth, a teacher discovers it. Because
they set up the booth, these two pupils are held responsible, even though they didn't post
anything offensive themselves.
Your task
Think about…
Your task is to act out a scenario of what happens
once the teachers have found out about everyone
involved, and the pupils have to go and see the
headteacher.
• The pupils who set up the booth. How do they
feel?
You will need the following characters:
• The pupils who had nasty comments made about
them. How do they feel?
2 pupils who set up the voting booth
2 pupils who write nasty comments about other pupils
2 pupils who have nasty comments made about them
1 teacher who discovered the voting booth
The headteacher
• The pupils who made nasty comments. Why did
they do it?
• The teacher who discovered the voting booth. Who
does he/she think is to blame – the pupils who set
it up, or the pupils who made nasty comments?
• How could things have turned out differently?
• What will the headteacher do about it?
You have 25 minutes to talk about your scenario and
write down some ideas for the script. You will then
have about 5 minutes to act it out.
Lesson 8, Activity 1
126
Resource: ‘Scenarios’
All Groups
Pupil
Task Sheet
Bullying phone messages
A boy has received several threatening text messages on his mobile phone. He doesn’t
know who is sending the messages but they are upsetting him. He wonders if he should
send a reply asking the person to stop.
Your task
Think about…
Your task is to act out a scenario of what happens
next. You will need the following characters:
• The pupil who sent the messages. Why did they do
it? Why are they so sure they won’t be found out?
The boy who receives the bullying messages
2 pupils who have been sending bullying messages
A telecommunications expert
The headteacher
• The pupils who received the messages. How does
he feel? Who can help him?
• What will happen if he replies to the messages?
• How can he find out who is sending the
messages? The telecommunications expert might
go and look at the advice on Be Safe Online
(http://www.besafeonline.org/English/bullying_
online.htm) or Bullying online
(http://www.bullying.co.uk/children/
mobile_phone.htm).
• Assume that after investigations, they find the bully
is another pupil in the same class. What do you
think the headteacher should do?
Lesson 8
You have 25 minutes to talk about your scenario and
write down some ideas for the script. You will then
have about 5 minutes to act it out.
Lesson 8, Activity 1
Resource: ‘Scenarios’
All Groups
127
Pupil
Task Sheet
The Borrowed Phone
A teacher gets a rude text message from someone at school. The telephone number is
that of your mobile phone. You lent your phone to a friend yesterday because they said
they had to contact home. You think that it must have been this friend who sent the
message. What do you do?
Your task
Think about…
Your task is to act out a scenario of what happens
when the owner of the phone realises what has
happened and decides to report it to the headteacher.
You will need the following characters:.
• The pupil who owns the phone. How does he/she
feel about getting into trouble?
The pupil who owns the phone
The pupil who borrowed it
The teacher who received the rude text message
The headteacher
• The pupil who borrowed the phone. How does
he/she feel about the trouble they have caused?
• The teacher who received the message. How will
he or she feel? Should they have given their phone
number to pupils?
• What will the headteacher do about it? Should the
pupils’ parents be told?
You have 25 minutes to talk about your scenario and
write down some ideas for the script. You will then
have about 5 minutes to act it out.
Lesson 8, Activity 1
128
Resource: ‘Scenarios’
All Groups
Extension/refresher
Activities
This section contains creative activities which could be used
either to reinforce the messages of the earlier lessons or act as
a refresher to remind pupils at a later date of the material they
have covered.
There are three activities:
• Creating a board game to reinforce the Stop! Think! Go?
message
• Designing an information leaflet for parents, informing them
about an aspect of Internet safety
• Writing a short play, highlighting the actions, impact and
consequences of irresponsible behaviour when someone is
using communication technology.
These activities are designed for pupils in Years 5 and 6;
activities 2 and 3 include opportunities to use ICT.
Extension/refresher Activities
Activity 1 – Creating a board game
The objective of this activity is to give pupils an opportunity to think of creative ways of
reinforcing the Stop! Think! Go? message when using on-line technologies. They will need
about 3 hours to plan, design, refine and try out their games. This activity could be linked
with work in design and technology.
Resources
• Materials to plan the board game
• Materials to make the board game, including
pens, card, pictures (of different types of
communication technologies)
• Materials to play the game with e.g. dice, counters
Introduce the activity to the whole class but then
organise the children into small groups who will work
together to create the board game. Encourage pupils
to think about what they have learned about using
the Internet and communication technologies safely.
Could they make a game that would help other
people remember the advice to keep them safe?
Ask the children to brainstorm different types of board
games that they know about. Ask for brief descriptions
of how they are played. Put the information on a chart
for display to remind the children how they could
design the game, incorporating features from a
number of different games.
130
How will their game work? It may be a traditional
game with positive and negative cards – for
example, ‘You make a new friend – move forward
two spaces’ or ‘You give out your e-mail address to
a stranger – move back three’. It could be like
snakes and ladders – make the correct choice and
move up the ladder, make the wrong choice and
zoom down the snake, or it may be something
completely different. Make the game and write the
rule booklet.
Once the games have been made, allow the
children to play each other’s games, discussing
how they work, how effective they are in reinforcing
the SMARTthinking messages, and how they could
be modified to improve them.
Activity 2 – Designing a leaflet
This activity gives pupils an opportunity to demonstrate their knowledge of the risks involved
in using communication technologies and awareness of associated safe, responsible
behaviours. It is likely to take pupils about two hours. There are a number of potential links
with work in English, design and technology, ICT and PSHE and Citizenship.
Resources
• SMARTthinking messages
• Materials to make the leaflet, e.g. paper, pencils,
pens, pictures
• Access to a computer if they are using ICT
• A selection of samples from other safety
campaigns or leaflets.
It may be a good idea to split the activity into two
parts: during the first part pupils could work in pairs
to design and make the leaflet and in the second part
they could refine their work. They will need to start by
thinking about the various forms of technology and
the risks they pose. Providing samples of other safety
campaigns and suitable illustrations or clip-art will be
helpful. You will also need to decide on the scale of
the leaflet – if they use an A4 page landscape, they
could make it a four-page leaflet, whether they’re
using ICT or pasting text onto it.
Working in pairs, they should then choose the
particular technology – e-mail, texting, chat rooms,
browsing the Internet – that they will focus on.
They will need to remember that their audience is
adults, but telling them how they can help children
to keep safe.
Once they have completed the leaflets, allow time for
pupils to discuss them all. Are the messages clear
enough? Is there too little detail, too much? Will
adults, parents and carers understand what is being
said? If the leaflets were for children rather than
adults, what would they change?
131
Extension/refresher Activities
Activity 3 – Writing a play
This activity involves pupils in writing a short play, highlighting the actions, impact and
consequences of irresponsible behaviour when someone is using communication technology.
There are potential links with work in ICT, English and drama.
You will need to allow approximately 2–3 hours for writing, reviewing and performing the play.
Pupils will need to work in groups to write the play. Group sizes will depend on how familiar
the pupils are with this type of work. They need to be large enough to enable a wide range of
ideas, but not so large that some individuals feel inhibited.
Resources
They should also think about the action in the play:
• Samples of rules, messages, leaflets etc. from
earlier lessons
• SMARTthinking messages
• Stop! Think! and Go? cards to insert into the
play – encouraging children to adopt the
appropriate strategies to inform their decisions.
•
•
•
•
Explain to the children that they are going to write a
play script to highlight an aspect of using
communication technology. Ask them to talk about
the different aspects they have investigated via the
Cybercafé, including text messaging, e-mail, chat
rooms and searching for information on the
Internet. They will develop the play by including
some aspect of irresponsible or inappropriate
behaviour – sending bullying text messages,
perhaps, or giving personal information in a chat
room. They will need to create the characters for
their play and consider the consequences of the
actions. They will also need to think about how they
will present using the technology – are there ways
they could show a computer or telephone screen
(an interactive whiteboard, perhaps), or can they
pretend to be typing and reading from a screen?
Some pupils may find this activity difficult to work
on in an abstract way. It may be more relevant to
ask them to suggest a scenario and then allow
them to ‘act out’ the scene with other pupils. You
could record the play for them, stopping them as
you scribe. Ask them to ‘replay’ the scenes so that
they follow what is happening and can suggest
sensible actions to take.
Once they have decided on the storyline, they need
to think about how people really behave: would
people try to hide what they’d done or would they
admit it straight away?
132
Who finds out about the action?
How do they find out?
Who feels hurt or at risk?
If there is a culprit (in the case of bullying, for
example), what happens to them? What should
the victim have done?
After the writing, ask the children to perform their
plays, discussing how powerful the messages are.
Do they help children to Stop! Think! and Go?
when using communication technology? Are they
more likely to think about safe behaviours now they
have seen the plays?
Visual Aid
Lesson 2
SMARTthinking
S
M
A
R
T
Lesson 2 Plenary
= Secret
This is about personal information and whether it is
safe to give it out. For example, it might apply to
an on-line registration form or someone requesting
contact details so they can send you a prize.
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
STOP and THINK
= Meeting
This is about someone you have never met before
contacting you on line or through a messaging
service to invite you to a meeting.
WHY should you never arrange to meet
anyone you have only met on line?
STOP and THINK
WHO should you tell?
WHAT might happen?
= Attachments
This is about e-mail and attachments and what you
need to think about before opening them.
WHO sent it?
STOP and THINK
WHAT can I do to protect myself and
the computer?
WILL it be safe to open it?
= Reliable
Anyone can put anything on the Internet and
anyone can use the communication technologies
(such as chat, SMS, e-mail, IM) to contact others.
STOP and THINK
WHETHER I can rely on information on
web sites to be true
WHETHER I can rely on someone I
can’t see telling me the truth
WHAT can I do to check?
= Tell
No matter how careful we are, sometimes we might
come across things that upset us.
WHAT can I do when web sites and
messages make me feel uncomfortable?
STOP and THINK
WHO can I tell?
Resource: ‘SMARTthinking’
WHAT can I do to stop it happening again?
All groups
Pupil Worksheet
Lesson 2
STOP
STOP
THINK
THINK
GO
Lesson 2 Plenary
GO
Resource: ‘Stop! Think! Go?’
All groups
Using the
Cybercafé web site
www.gridclub.com/cybercafe
The Cybercafé is a virtual café where kids go to interact with technology. This section is
intended to familiarise you with some of its features, and to help you to explore the café
before using it in the classroom.
By scrolling on the arrows and passing the mouse over the characters the pupils can
find out about different types of technology and help some of the customers behave
safely on-line. They are given help by the café owner, Griff.
The scroll bars are to the left and right of the screen.
The café is a 360 degree view so pupils will have to scroll
around to find the characters they need. The character
at the desk is Griff, the help guy. He provides instruction
throughout the web site. There are five interactive areas
of the web site – chat, e-mail, web browsing, SMS/text
messaging and the quiz. Sound is included throughout
the site, and on the home page pupils are able to select
music from a jukebox. The site also contains a glossary.
The web site follows the theme of
STOP! THINK! GO?
It steers pupils towards making the right choices; if the
choice they have made is unsuitable, they are asked to
make another choice and to STOP and THINK.
The web site can be used as a whole class activity or
something that pupils can do individually either at
home or at school.
E-mail
Sunil is in the Cybercafé to check his e-mail. He has
four messages. The pupils need to read them and
then help him to decide what to do with them from a
selection of choices. The choices take the form of
buttons similar to those found in popular e-mail
programs – reply, delete and download. The pupils
are asked to press each button in turn to see the
consequences of their actions, then from the
information given, make a decision on Sunil’s best
course of action. If they make the wrong choice they
are asked to think again. Finally the children need to
work through a series of hypothetical questions to
test their understanding of what they have learnt
during this section.
Pupils are welcomed by Griff. They are invited to read
the messages, look at the options and make a choice.
E-mail
Pupils should click on the names and work their
way through the e-mails systematically.
After pupils have read the e-mail they need to click
on the reply or delete buttons.
If they choose the correct answer they are advised
to ‘Go’ ahead.
E-mail
If they make the wrong choice they are advised to
think again!
After reviewing the options pupils are asked to make
a choice.
E-mail
Once they have completed the whole of the
e-mail section, they are asked a series of
questions to check their learning.
Pupils should click on ‘reveal’ to get the
correct answer.
On all of the features there is a link to
SMARTthinking.
There is also a ‘help’ section. Depending on the
section this is either called Help with e-mail,
Help with chat, Help with web browsing or Help
with SMS/text messaging.
Words that are highlighted appear in the
Glossary section.
Chat
Chantelle is a ten-year-old girl who is about to enter a
chat room for the first time. The pupils first need to
find a suitable chat room for her then, after reading the
ongoing chat, to help her make safe responses
through a series of multiple-choice questions. Once
they have completed the task the pupils need again to
work through a short series of hypothetical questions
in order to reinforce their learning.
Pupils are welcomed to the chat room by Griff.
‘Popstar’ will automatically appear in the search box.
Pupils need to select a chat room from the left-hand
side. ‘Pop Mad’ is the correct choice in this instance.
They will not be allowed access to the others as they
are inappropriate.
Chat
The chat will begin and ‘Popstar’ will join in. Popstar
will be asked a series of questions throughout the
chat. Pupils will need to make various choices.
The chat proceeds. The ‘pause’ button in the bottom
right-hand corner pauses the chat if required.
At the end of the feature, pupils will be asked a
series of questions. They should click on one of the
options to reveal the answer.
Web Browsing
Jason is lounging around in the café when he should
be getting on with his homework. The pupils need to
help him research his assignment on ‘Life on Mars’.
After Jason finds a list of sites through the use of a
search engine, the children need to access and read
them one by one, deciding whether or not they will be
of use. Along the way Jason will be tempted by links
and adverts on the web sites he visits. The pupils
need to help him make safe decisions. To underpin
their learning, the pupils are again asked to complete
a short series of hypothetical questions.
Griff gives the pupils instructions on what to do.
The assignment they have to complete appears on
screen.
Pupils are advised to use a child-friendly
search engine
Web Browsing
‘Life on Mars’ automatically appears as the
search term.
The search results appear. Pupils need to click on
each of them in turn. They may want to print them
off instead of reading them on screen.
Pupils need to read the contents of the web page
by scrolling down on the right-hand side. They will
then be asked to make a choice about whether it
will be useful.
Once they have completed all five of the web pages,
they need to answer the questions by clicking on
one of the two options.
Quiz
After pupils have completed all of the interactive
sections on the web site they will need to complete
the on-line quiz, to test their learning. Pupils are
asked a series of multiple-choice questions and asked
to select either A, B or C. The correct answers from
the quiz can also be printed off from the web site.
Griff gives initial instruction on screen.
The first question appears. Pupils need to choose A,
B or C from the buttons at the bottom of the screen.
Quiz
If they make an incorrect choice they are asked to
‘think again’ and go back.
If they make a correct choice they can ‘Go’ and
proceed to the next question. There are some
additional extension/refresher activities in the pack
that you may want to use to reinforce the key
messages. There is also SMARTthinking which
features on the web site and which could be used
as the basis for class discussion and perhaps
developed further.
SMS/text messages
Chloe has received 5 messages on her mobile
phone and the pupils need to read them and help
decide what to do with each one from a selection
of choices.
Before they do this they have to help Chloe choose
a new phone cover and a new ring tone by dragging
and dropping their choice on to the phone.
Pupils need to click on to Chloe’s
phone to start the exercise.
SMS/text messages
Five messages are listed plus one stored message.
They can select the message they want to read by
using the arrow keys to highlight it and clicking on
the blue button.
Abbreviations and emoticons, as commonly used on
mobile phones, are used in the messages. See
Jamie’s (listed as JMe) for examples of these and
what they mean.
Pupils need to use the arrow keys and click the blue
button to select their choices from the list of options
that appears. The ‘C’ button takes them back to the
message inbox.
SMS/text messages
If pupils choose the wrong option they are advised
to stop and think!
If pupils choose the correct answer they are advised
to go ahead!
Pupils work through the
messages systematically using
the arrow keys.
SMS/text messages
Griff’s message consists of his top tips for mobile
safety and security.
Jamie’s message gives a selection of emoticons
and abbreviations.
Pupils can see what each abbreviation means by
moving the curser over each one.
Pupils can see what each emoticon means by moving
the curser over each one.
Using the Cybercafé web site
(name of pupil)
has successfully completed the Internet Proficiency Scheme.
I am a SMARTthinker and know how to use the Internet and other
technologies safely. I know that I must always use the Internet and
other technologies safely and if I am unsure or worried I will talk to my
teacher, parent or carer.
Signed (pupil)
Signed (Headteacher)
Name of school
Date
S = Secret
M = Meeting
A = Attachments
R = Reliable
T = Tell
www.gridclub.com/cybercafe
(name of pupil)
has successfully completed the Internet Proficiency Scheme.
I am a SMARTthinker and know how to use the Internet and other
technologies safely. I know that I must always use the Internet and
other technologies safely and if I am unsure or worried I will talk to my
teacher, parent or carer.
Signed (pupil)
Signed (Headteacher)
Name of school
Date
S = Secret
M = Meeting
A = Attachments
R = Reliable
T = Tell
www.gridclub.com/cybercafe
This school participates in
the DfES/Becta Internet
Proficiency Scheme.
The Internet Proficiency Scheme aims to develop
safe and discriminating behaviours for Key Stage 2
pupils who use the Internet and other technologies.
These behaviours should be regularly reviewed and
updated and are supported by our school’s
‘Acceptable Use Policy’.
Signed
S
M
A
R
T
=
=
=
=
=
Headteacher
Secret
Meeting
Attachments
Reliable
Tell
http://www.gridclub.com/cybercafe
http://www.gridclub.com/cybercafe/teachers
http://safety.ngfl.gov.uk/schools/Internetproficiency
This school participates in
the DfES/Becta Internet
Proficiency Scheme.
The Internet Proficiency Scheme aims to develop
safe and discriminating behaviours for 9–11-yearolds who use the Internet and other technologies.
These behaviours should be regularly reviewed and
updated and are supported by our school’s
‘Acceptable Use Policy’.
Signed
S
M
A
R
T
=
=
=
=
=
Headteacher
Secret
Meeting
Attachments
Reliable
Tell
http://www.gridclub.com/cybercafe
http://www.gridclub.com/cybercafe/teachers
http://safety.ngfl.gov.uk/schools/Internetproficiency
SMARTthinking
S
M
A
R
T
= Secret
This is about personal information and whether it is
safe to give it out. For example, it might apply to
an on-line registration form or someone requesting
contact details so they can send you a prize.
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
STOP and THINK
= Meeting
This is about someone you have never met
before contacting you on line or through a
messaging service to invite you to a meeting.
STOP and THINK
WHY should you never arrange to meet
anyone you have only met on ine?
WHAT might happen?
WHO should you tell?
= Attachments
This is about e-mail and attachments and what
you need to think about before opening them.
STOP and THINK
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself
and the computer?
= Reliable
Anyone can put anything on the internet and anyone
can use the communication technologies (such as,
chat, SMS, e-mail, IM) to contact others.
STOP and THINK
WHETHER I can rely on information on web
sites to be true
WHETHER I can rely on someone I can’t
see telling me the truth
WHAT
can I do to check?
= Tell
No matter how careful we are, sometimes we
might come across things that upset us.
STOP and THINK
WHAT can I do when web sites and
messages make me feel uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
STOP! THINK! … GO?
SMARTthinking
S
M
A
R
T
= Secret
This is about personal information and whether it is
safe to give it out. For example, it might apply to
an on-line registration form or someone requesting
contact details so they can send you a prize.
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
STOP and THINK
= Meeting
This is about someone you have never met
before contacting you on line or through a
messaging service to invite you to a meeting.
STOP and THINK
WHY should you never arrange to meet
anyone you have only met on line?
WHAT might happen?
WHO should you tell?
= Attachments
This is about e-mail and attachments and what
you need to think about before opening them.
STOP and THINK
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself
and the computer?
= Reliable
Anyone can put anything on the internet and anyone
can use the communication technologies (such as,
chat, SMS, e-mail, IM) to contact others.
STOP and THINK
WHETHER I can rely on information on web
sites to be true
WHETHER I can rely on someone I can’t
see telling me the truth
WHAT
can I do to check?
= Tell
No matter how careful we are, sometimes we
might come across things that upset us.
STOP and THINK
WHAT can I do when web sites and
messages make me feel uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
STOP! THINK! … GO?
Be a SMARTthinker!
S = Secret
Be a SMARTthinker!
S = Secret
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
M= Meeting
WHY should you never arrange to meet anyone you have only
met on line?
WHAT might happen?
WHO should you tell?
A = Attachments
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself?
R = Reliable
WHETHER I can rely on information on web sites to be true
WHETHER I can rely on someone I can’t see telling me the truth
WHAT can I do to check?
T = Tell
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
M= Meeting
WHY should you never arrange to meet anyone you have only
met on line?
WHAT might happen?
WHO should you tell?
A = Attachments
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself?
R = Reliable
WHETHER I can rely on information on web sites to be true
WHETHER I can rely on someone I can’t see telling me the truth
WHAT can I do to check?
T = Tell
WHAT can I do when web sites and messages make me feel
uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
WHAT can I do when web sites and messages make me feel
uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
Be a SMARTthinker!
S = Secret
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
M= Meeting
WHY should you never arrange to meet anyone you have only
met on line?
WHAT might happen?
WHO should you tell?
A = Attachments
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself?
R = Reliable
WHETHER I can rely on information on web sites to be true
WHETHER I can rely on someone I can’t see telling me the truth
WHAT can I do to check?
T = Tell
WHAT can I do when web sites and messages make me feel
uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
Be a SMARTthinker!
S = Secret
WHO wants the information?
WHY are they asking for it?
WHAT will they do with it?
M= Meeting
WHY should you never arrange to meet anyone you have only
met on line?
WHAT might happen?
WHO should you tell?
A = Attachments
WHO sent it?
WILL it be safe to open it?
WHAT can I do to protect myself?
R = Reliable
WHETHER I can rely on information on web sites to be true
WHETHER I can rely on someone I can’t see telling me the truth
WHAT can I do to check?
T = Tell
WHAT can I do when web sites and messages make me feel
uncomfortable?
WHO can I tell?
WHAT can I do to stop it happening again?
Passport
Passport
Name
Name
Signature
Signature
School
School
Date
Date
I am a SMARTthinker.
I am a SMARTthinker.
I have successfully completed the
I have successfully completed the
Internet Proficiency Scheme and I
Internet Proficiency Scheme and I
always use the Internet and other
always use the Internet and other
technologies safely.
technologies safely.
Passport
Passport
Name
Name
Signature
Signature
School
School
Date
Date
I am a SMARTthinker.
I am a SMARTthinker.
I have successfully completed the
I have successfully completed the
Internet Proficiency Scheme and I
Internet Proficiency Scheme and I
always use the Internet and other
always use the Internet and other
technologies safely.
technologies safely.