In this section, you can find...
Minimize screen use, especially for the youngest children:
In this lesson, students use mind maps to explore concepts of “respect” and “consent” in an online context. They consider a wide range of scenarios that shed light on different aspects of consent relating to digital media and draw on those to create a detailed definition. Finally, students create an “explainer” video in which they illustrate one of the aspects of consent.
Framed around key concepts of media literacy, the Facing Online Hate tutorial examines how the Internet is used to spread and incite hate, how radicalization occurs, and how youth encounter hate online both through traditional hate sites and “cultures of hatred”. The tutorial also provides strategies for building critical thinking skills in young people to help them understand the nature of online hate, how they may be targets and how to respond appropriately when bias, stereotyping and hatred are encountered online.
Developed in partnership with CIRA, this interactive quiz is designed to increase students’ knowledge of the cyber security risks they face every day.
The Responding to Online Hate guide assists law enforcement personnel, community groups and educators in recognizing and countering hateful content on the Internet – especially as it pertains to youth.
I have a special secret,
Whenever I’m online -
I don’t share with others
The things that are just mine.
This lesson allows students to explore the concepts of rules, values and ethics and learn how they influence our decision-making. Students are then invited to consider how they can contribute to create positive online cultures.
In this lesson, students learn about and discuss the legal aspects of cyberbullying. They review a variety of hypothetical scenarios and a case study, and they consider the seriousness of the situations, who is legally responsible, what action (if any) should be taken and by whom.
In this lesson, students learn about and discuss the legal aspects of cyberbullying.
CyberSense and Nonsense is the second online adventure of the three CyberPigs. In their first adventure, Privacy Playground, the pigs learn to protect their personal privacy online and to recognize Internet marketing ploys. This time, they explore the world of online chat rooms.
The three CyberPigs learn some important lessons about authenticating online information and observing rules of netiquette. They also learn how to distinguish between fact and opinion and how to recognize bias and harmful stereotyping in online content.
In this lesson, students reflect on the ways in which digital media can cause stress. Through a series of role-playing exercises, they consider how social media can cause stress by making us compare the highlights of others’ lives to the lowlights of our own, and practice strategies for coping with digital stress.
In this lesson, students apply the «5Ws of Cyberspace» to sources of information they find online. Assuming the role of a student researching a science project, students must authenticate the information in an online article about the artificial sweetener, aspartame.
Defining Popular Culture is part of a three-lesson unit designed to introduce students to the concept of popular culture and the role that it plays in their lives.
This lesson asks students, in groups, to take their issue and solution to the streets. In order to enact real change through action for the benefit of the larger community, each chosen topic will need to be exposed to and understood by other members of the community. In this lesson, students will design a community outreach promotional campaign in order to effect real change that matters to them. If the students have completed the Digital Storytelling for Community Engagement lesson and have created their own Digital Story, this digital project can be used as the starting point/product with which to share with others. If not, groups of students can create a hypothetical solution to an existing problem, which then could be disseminated to the larger community using their designed outreach strategy.