Developed in partnership with CIRA, this interactive quiz is designed to increase students’ knowledge of the cyber security risks they face every day.
In this game, designed for ages 8-10, the CyberPigs play on their favourite website and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf.
When we use digital devices we run certain risks – to our personal information, our financial data, and those devices themselves. This section describes different cyber security risks, with tips and strategies for managing them, and looks at issues of particular concern to children and teens.
In this lesson, students are introduced to the ways video games may impact their mental and physical health. Students start with a reflection on their use of video games, specifically the amount of time they play and the role of games in their lives. This is followed by a class activity based on several key questions relating to the positive and/or negative effects video games may have on our health. Finally, students will be given an opportunity to debate key claims on the health effects of video games.
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
Because of the ways that digital media leave out many of the cues that prompt us to feel empathy, it is easy for young people to sometimes forget that real people – with real feelings – are at the heart of online conversations. In this lesson, students are provided with opportunities to explore this concept and discuss the importance of using empathy and common sense when talking to others online.
In this lesson, students explore issues surrounding the marketing of alcoholic beverages on the Internet.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.