Stay informed with daily news and our newsletters!Learn more
|Home||Digital & Media Literacy||Research & Policy||Teacher Resources||Blog||About Us|
In this sequel to Privacy Playground, for ages 8-10, the three CyberPigs learn some important lessons about authenticating online information and observing rules of netiquette. They also learn how to distinguish between fact and opinion and how to recognize bias and harmful stereotyping in online content. As Les, Mo and Lil discover, "just because it's on the Internet, doesn't mean it's true."
Level: Grades 7 to 10
In this lesson students apply the "5W's of Cyberspace" to sources of information they find online. Assuming the role of a student researching a science project, students must authenticate the information in an online article about the artificial sweetener, Aspartame.
How does it work?
With file sharing systems, several computers can communicate directly through a network to trade files: most often music in MP3 format, but movie files are gaining in popularity (in the first week after its release in 2009, the blockbuster film Avatar was illegally downloaded one million times).
Someone encountering the Internet for the first time might be forgiven for assuming it was created specifically for teenagers. Indeed, the Internet could reasonably be said to have been aging backwards since its birth – the domain first of scientists and the military, then of university students in the 1990s and now children and teenagers.
Approximately four to six per cent of Canadian high school students are addicted to gambling and another 10 to 14 per cent is at risk of developing an addiction -- which means that they already show signs of losing control over their gambling behaviour. 
Young people are increasingly turning to Internet gambling, which is anonymous and convenient. A study of Montreal, Quebec high school students showed that nine per cent have gambled for money on the Internet. 
Making public content that was meant to be private – such as photos or videos – is another frequent bullying activity, and is particularly common in the context of relationships. Finally, bullying may take the form of impersonation or spoofing, in which the perpetrator actually represents him or herself as the target. These forms of psychological bullying can be even more devastating when conducted through digital media.