Vous êtes sur la page 1sur 19

Cyber Ethics and Cyber Bullying

1. Table plan.
2. Plan detailed.
3. Power Point Presentation with notes from the slides.
• Jack Bristow – ST20106004 – Introduction for the workshop, covering the main
points.
• Ioana-Eliza Georgescu – ST20131753 – Cyber Ethics
• Matthew Thomas – ST20117212 – Cyber Bullying
4. Conclusion for the workshop.
5. Socrative Quizzes and Youtube Video Link
6. Reference.

1. Table Plan

Tutors: Audience Age Group: Workshop Subject / Title:


Ioana-Eliza Georgescu People aged between 18-50 years Cyber Ethics and Cyber Bullying.
Jack Bristow old.
Matthew Thomas
University:
Cardiff Metropolitan University
Academic School:
Cardiff School of Technologies
Workshop Introduction: Length of workshop: Goal/ Objectives of Workshop:
Introduce tutors and quick 30 Minutes. Teach the class about the different types of
overview of everything that is Cyber bullying and all the Cyber Ethics involved.
going to take place in the
workshop.
Materials Required: Workshop conclusion: Any known hazards / risks associated with
▪ A medium room in the The conclusion will provide a activities:
Cardiff Met’s Library. solution to our real-world ▪ Possible poor network connection for the
▪ A projector. problem. Socrative Quiz.
▪ A good computer. The short conclusion will show ▪ Possible people that will feel
▪ A Power Point how to behave in an ethical way on uncomfortable to answer some of the
presentation. social media in order to avoid questions.
▪ A Socrative Quiz for the cyber bullying.
activity section.
▪ A short Video with a
proposed scenario for a
possible debate.
Lesson Plan:
Time Objectives Pupil Activities Teacher Activities Resources
5 minutes. Introduction Listening to the Speaking about the Arendt H 1958 The human condition Chicago
of Cyber Ethics introduction. topic and objectives The University of Chicago Press | Course Hero.
and Cyber and workshop. [online] Available at:
Bullying. Main https://www.coursehero.com/file/p4k9a1ts/Arendt-
points that will H-1958-The-human-condition-Chicago-The-
be covered. University-of-Chicago-Press/ [Accessed 17 Nov.
2019].
5 minutes. Cyber Ethics Listening to the Speaking about the
Discussion. topic. topic and the effects. Hamade, S. (2019). Internet Filtering and
Censorship.
McCloskey, H. (2019). Privacy and the Right to
Privacy.
5 minutes. Cyber Bullying Listening to the Speaking about the Bullying Statistics. (2019). Text Bullying - Bullies
Discussion. topic. topic and the effects. That Use Text Messaging to Harass Others -
Bullying Statistics. [online] Available at:
http://www.bullyingstatistics.org/content/text-
bullying.html [Accessed 24 Nov. 2019].
Gordon, S. (2019). 6 Common Ways Kids Bully
Online. [online] Verywell Family. Available at:
https://www.verywellfamily.com/types-of-
cyberbullying-460549 [Accessed 24 Nov. 2019].
10 minutes. Discussion, Talking about Listening to
involving the the topic, the student’s questions, Based on the first part of the workshop,
audience, expressing their to their opinions. there will be possible questions and debates.
possible own opinion,
questions. asking
questions,
getting
involved.
5 minutes. Activities, Getting involved Waiting for the students Phones, a projector, Socrative website and a
quizzes and a in the activities, answer and then Youtube Video Link.
short video for answering waiting for further Socrative Student Room Number:
a possible questions, discussion. GEORGESCU2535
Youtube Video Link:
debate. taking part in the
https://www.youtube.com/watch?v=zm-FjtUklPI
quiz.
5 minutes. Finishing the Expressing their Presenting the main Based on the debates, all of us will create a
workshop/ own conclusion covered ideas and conclusion that will suit everyone’s opinion.
Conclusion. regarding the summarising the topic
Summary of topic. covered, the effects on
the covered cyber bullying on
topic. people.
2. Plan Detailed

Workshop Plan for Cyber Ethics and Cyber Bullying


1. Goal/ Objectives

This workshop intends to inform a group of people aged between 18 and 60 years old the fundamentals of
Cyber Ethics and Cyber Bullying. This area will be covered because this is a serious subject that needs to
be approached and the people should have knowledge about the negative effects, the impacts and how to
provide a better understanding about what can be done about it and how to behave in an appropriate way
with the other people on social media.
2. Who will attend?
This workshop is made to provide a knowledge and a solution to a real-world problem regarding the
behavior on social media. The people who will attend will be aged between 18 and 50 years old that have
at least a basic background regarding the new technology, the social media applications and/ or the IT
domain. The expected attendance will be set around 10 to 20 students at Cardiff School of Technologies
who will gain an extensive knowledge about the subject chosen.
3. Choosing the Right Location and resources
Based on the number of people who will attend, the workshop will have place in a medium room located
into the Cardiff Metropolitan University’s Library on Llandaff Campus. There will be no need to secure
accommodation or transport for these people as they all are students in this University and they already
have these facilities provided.
The location will be a medium room because the workshop will have 10 to 20 attendees who won’t
require a big space and also a medium room won’t require speaking to a microphone in order for the
others to be able to hear the presenters. The equipment used will be a projector, a good computer, some
interactive applications used to provide some activities and the Power Point tool to provide a short
presentation.
4. Agenda/ Plan

• Main points:
1. Introduction – Speaking about the chosen subject and what will be covered during the
workshop. Telling the attendees that after the short presentation there will be some activities
and after that the presenters and the other people together will build a conclusion based on a
short debating. In the end there will be provided 5 minutes for questions.
2. Covering the Cyber Ethics subject. Talking about what is right, wrong, legal and illegal in
terms of behaving ethical on social media.
3. Covering the Cyber Bullying subject. Talking about the negative effects, the impacts on other
people, what can be done about it and the proposed solution that will be given to the
attendees.
4. Short discussion/ debate and possible questions.
5. Activities- Quizzes and interactive games.
6. Conclusion and a short summary for Cyber Ethics and Cyber Bullying topic.
• Visual aids:
1. Power Point Presentation.
2. Socrative Quizzes
3. Short video and images regarding the topic.

• Discussions and activities:


1. Socrative Quizzes as an interactive activity.
2. Debating what the attendees think about the subject covered and what is their opinion
regarding what is ethical to do when using social media. Discussing about other proposed
solutions from the audience. Any other possible questions from the other people. The time
that will be allocated for this section will be around 5 minutes for the activity and another 10
minutes for possible questions and discussions.

• Develop a Follow-up Plan


The workshop intends to provide a better understanding about this real-world problem and to encourage
people to express their own opinion about this subject in order to create a conclusion that will suit
everyone’s thinking. The workshop will be made in a way that will make all the attendees feel
comfortable to ask questions and engage in the discussions.

3. Power Point Presentation with Notes


4. Conclusion for the Workshop
Based on the research that has been done for this topic and based on the possible debates regarding Cyber
Ethics and Cyber Bullying, it is essentials to have some of these main ideas in mind:

• Being ethical doesn’t mean to do what is in your advantage.


• Something ethical doesn’t mean something legal and the other way around.
• In order to avoid Cyber Bullying, keep your personal information secret, set your account to a
high privacy mode and the most important thing, don’t be a cyber bully, don’t be a bully!
• Treat others the same way you would like to be treated!
Edward Snowden’s Quote:
Snowden also said that the "if you have nothing to hide, you have nothing to fear" argument "doesn't
make sense." He believes privacy is in fact the "fountainhead" of rights, from which other freedoms flow.
"Because privacy isn’t about something to hide. Privacy is about something to protect. That’s who you
are," he said. "Privacy is baked into our language, our core concepts of government and self in every way.
It’s why we call it 'private property.' Without privacy you don’t have anything for yourself."
When people tell him, they don't fear surveillance because they have nothing to hide, Snowden says he
tells them: "Arguing that you don’t care about privacy because you have nothing to hide is like arguing
that you don’t care about free speech because you have nothing to say."
5. Socrative Quizzes and Youtube Video Link
Link: https://www.youtube.com/watch?v=zm-FjtUklPI
Socrative Quizzes:
6. Reference
Arendt H 1958 The human condition Chicago The University of Chicago Press | Course Hero.
[online] Available at: https://www.coursehero.com/file/p4k9a1ts/Arendt-H-1958-The-human-
condition-Chicago-The-University-of-Chicago-Press/ [Accessed 17 Nov. 2019].
Bullying Statistics. (2019). Text Bullying - Bullies That Use Text Messaging to Harass Others -
Bullying Statistics. [online] Available at: http://www.bullyingstatistics.org/content/text-
bullying.html [Accessed 24 Nov. 2019].
DoSomething.org. (2019). 11 Facts About Cyberbullying. [online] Available at:
https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying [Accessed 24 Nov. 2019].
Gordon, S. (2019). 6 Common Ways Kids Bully Online. [online] Verywell Family. Available at:
https://www.verywellfamily.com/types-of-cyberbullying-460549 [Accessed 24 Nov. 2019].
Hamade, S. (2019). Internet Filtering and Censorship.
McCloskey, H. (2019). Privacy and the Right to Privacy.
Von Weiler, J. and Seager-Smith, L. (2019). Expert offer advice on cyberbullying | Internet
Matters. [online] Internet Matters. Available at:
https://www.internetmatters.org/hub/question/how-likely-will-cyberbullying-happen-to-my-
child-and-how-can-i-protect-
them/?gclid=EAIaIQobChMI4sDN5ueD5gIVxLTtCh0F3gIaEAAYASAAEgJYAPD_BwE
[Accessed 24 Nov. 2019].

Vous aimerez peut-être aussi