UEN Security Office
Technical Services Support Center (TSSC)
Eccles Broadcast Center
101 Wasatch Drive
Salt Lake City, UT 84112
(801) 585-6105 (fax)
Health Education I (7-8)
Standard 1 Objective 4
1 class periods of 45 minutes each
Students will learn what cyber-bullying is, the consequences of it, and how to handle a cyber-bullying situation effectively.
Activities are provided which take students through real-life situations. They have the opportunity to evaluate how they might feel and how they would act in certain situations.
The following activity sheets provide real-life scenarios for the students to discuss.
Teachers may want to preview the video on Megan Meier and look over the activity sheets prior to introducing this lesson to their students.
Students will be able to recognize cyber-bullying, understand the consequences, and demonstrate effective methods of solving the problem.
Introduction: Review the definition of cyber-bullying with your students.
Cyber-bullying: using technology to harass, intimidate, or threaten another person.
Show students the video about Megan Meier, a victim of cyber-bullying.
I. Identify different types of technology used in cyber-bullying.
Give each student one of the three activity sheets found in the materials section of this lesson plan. Ask students to read through the scenario and answer the questions on their own.
Have each student share their solution to the problem with a partner who studied the same scenario.
Next, have 2 pairs who were given the same scenario share their solutions.
Finally, have all students in the class who were given the same scenario (8-10 in each group) share the solutions generated and vote on the best solution.
Each group should choose a spokesperson to describe the scenario to the class and then explain the solution agreed upon by the group.
The gifted student can act as a mentor for the struggling student as they share their ideas.
Have the students turn in the completed CyberSmart activity sheets.
Students may be given a participation grade based on their work in the group discussion and the presentation to the class.
This lesson plan was adapted from CyberSmart! cybersmartcurriculum.org