
Break the Fake: Make Your Own Custom Search Engine
To make a custom search engine you will need to be logged in to a Google account. (If you don’t already have one, go to accounts.google.com to sign up.) You don’t have to be logged in to Google to use it. As well, anyone can use a custom search engine once it’s been created, so a whole class can use search engines made with a single account.

The Hero Project: Authenticating Online Information
Students are introduced to Internet search skills through researching a personal hero. By focusing on the early parts of the research process, students learn to select well-defined topics, ask relevant research questions and select effective keywords. Students then present the information they have found to their classmates in the form of a media product.

The Environment Canada hoax: a news story that's full of hot air
If anyone still doubts that youth need to learn how to evaluate online information, those doubts should have been dispelled by a recent hoax perpetrated by the group called the Yes Men. This group, which has a history of staging fake press conferences, decided to draw attention to Canada's position at the Copenhagen conference on climate change by creating a number of fake Web sites purporting to be, among others, the Copenhagen summit site, the Wall Street Journal, and Environment Canada's site. While it didn't take long for Environment Canada to make a statement exposing the hoax, by that time many journalists had reported the story as fact and the story had been widely distributed by wire services.

Information Sorting
This is the second lesson in the Critical Thinking Across the Curriculum series, though it can also be delivered independently. In it, students are introduced to the idea of using information sorting to determine whether sources are worth their attention and then to do critical close readings of those that are. After learning and identifying the differences and similarities between the two steps, they learn the characteristics of a reliable source and make a list of companion texts that can be used to determine if a source has those characteristics. After practicing that process, they learn some examples of critical close reading skills and use a possibility grid to do a close reading of a news article. Finally they plan, carry out, and reflect on an information sorting process to make sure they are getting a full and accurate picture of the news story’s topic.
Authentication Beyond the Classroom
In this lesson, students discuss “viral” photos, videos and news stories that spread via social media. They are shown how challenging it is to authenticate these using only their content and are introduced to tools and techniques for gauging their accuracy based on context, with an eye towards making wise and responsible decisions about whether or not to forward them to their friends and family.