Print

Clone of Slideshow - Identifying Online Predators

Description

Description
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Click on the slideshow image and/or the hyperlink below to download this resource to your computer or device. To provide your school or school district with necessary data to verify and report lesson implementation, download this resource each time that you use this slideshow for classroom instruction.

Click here



Lesson - Grade 8: Identifying Online Predators

Lesson - Grade 8: Identifying Online Predators

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Student Handout - Worksheet: Screen Name Evaluation

Student Handout - Worksheet: Screen Name Evaluation

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Teacher Reference Page - Answer Key: Screen Name Evaluation

Teacher Reference Page - Answer Key: Screen Name Evaluation

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Slideshow - Identifying Online Predators

Slideshow - Identifying Online Predators

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Student Handout 1S - Worksheet: Evaluación de Nombre de Pantalla (SPA)

Student Handout 1S - Worksheet: Evaluación de Nombre de Pantalla (SPA)

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Teacher Reference Page 1S - Clave de Respuesta para Nombre de Pantalla (SPA)

Teacher Reference Page 1S - Clave de Respuesta para Nombre de Pantalla (SPA)

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Teacher Reference Page 2S - Articulo de Recursos para el Maestro de la Leccion 4

Teacher Reference Page 2S - Articulo de Recursos para el Maestro de la Leccion 4

Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.

Terms of Use

ISAFE Digital Learning© content may NOT be shared with other educators (e.g., faculty or staff) in any school or district which is not currently covered by your school’s or district’s Subscription and License Agreement; may NOT be duplicated or published (e.g., websites, blogs or other means of public display) for any reason except for your classroom use; may ONLY be used for students to in your current classroom.

Duplication, sale, resale and any other form of unauthorized use of ISAFE Digital Learning copyrighted materials is prohibited and, therefore, a violation of law.