This interactive tutorial (Licensed Resource) teaches students the critical thinking skills they need to apply to their online experiences, including online safety, authenticating online information, recognizing online marketing ploys, protecting their privacy, managing online relationships and dealing with cyberbullying.
The three CyberPigs learn some important lessons about authenticating online information and observing rules of netiquette. They also learn how to distinguish between fact and opinion and how to recognize bias and harmful stereotyping in online content.
In this game, designed for ages 8-10, the CyberPigs play on their favourite website and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf.
This tutorial introduces children, ages 7-9, to the concept of online privacy and teaches them to distinguish between information that is appropriate to give out and information better kept private – and to recognize how this may change in different contexts.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.
CIRA and MediaSmarts have partnered on a series of five tip sheets to educate Canadians about online security issues. The 5th tip sheet in the series, Socializing and Interacting Online, looks at negative issues that can come up when interacting with others through networked technologies including phishing scams and hoaxes, and strategies for dealing with them.
The new movie Zero Dark Thirty, which tells the story of the tracking and eventual killing of Osama Bin Laden, has received several Oscar nominations (including Best Picture), but it’s attracting another kind of attention as well: several writers, including Jane Meyer at The New Yorker and Peter Maass at The Atlantic, have accused it of condoning or even glorifying the use of torture by US intelligence agencies.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
Trend Micro’s “What’s Your Story?” Contest Awards $10,000 to a Trio of Ottawa High School Students: Poetry Performance Video Highlights the Internet’s Impact on a Generation