This interactive module for Grades 7 and 8 is designed to increase students’ ability to recognize bias, prejudice and hate propaganda on the Internet and in other media.
This interactive tutorial (Licensed Resource) teaches students the critical thinking skills they need to apply to their online experiences, including online safety, authenticating online information, recognizing online marketing ploys, protecting their privacy, managing online relationships and dealing with cyberbullying.
The three CyberPigs learn some important lessons about authenticating online information and observing rules of netiquette. They also learn how to distinguish between fact and opinion and how to recognize bias and harmful stereotyping in online content.
This interactive narrated tutorial teaches students about the benefits and drawbacks of sharing information online. Students give their opinion about what the characters in the story should do about their privacy dilemmas, from posting photos to buying music online, and they receive feedback on their responses as the story unfolds.
Developed in partnership with CIRA, this interactive quiz is designed to increase students’ knowledge of the cyber security risks they face every day.
This interactive unit is designed to help kids between the ages of 5 and 8 recognize the marketing techniques used on commercial websites that target children.
In this game, designed for ages 8-10, the CyberPigs play on their favourite website and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf.
This tutorial introduces children, ages 7-9, to the concept of online privacy and teaches them to distinguish between information that is appropriate to give out and information better kept private – and to recognize how this may change in different contexts.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.