Communicating Safely Online: Tip Sheet for Parents and Trusted Adults
a. Types of Unhealthy Online Relationships
Online exploitation is when someone uses digital media to find teens and get them involved in romantic or sexual relationships.
Online exploitation is when someone uses digital media to find teens and get them involved in romantic or sexual relationships.
Few issues capture our anxiety about young people and digital media so perfectly as sexting. As with technologies at least as far back as the telegraph, much of this anxiety has focused specifically on girls and women.
How can you help pre-teens understand the value of their personal information and empower them to take steps to manage and protect it? Data Defenders, an educational game for children ages 10 to12, lifts the curtain on data collection by showing how apps and games can find out all kinds of things about them and by providing steps they can take to control the collection of personal information online.
This Teacher’s Guide includes background information, learning expectations and points of discussion on the types of personal information and privacy-management strategies that are presented in the game. The guide also includes an overview of the Data Defenders game, and exercises and handouts to help students to develop skills and confidence to manage their privacy online.
The Data Defenders game teaches children and pre-teens about personal information and its value, and introduces them to the different ways they can manage and protect their personal information on the websites and apps they enjoy.
To make students aware of the ways in which male violence is used and promoted in advertising.
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data is valuable and worthy of careful management by analyzing the platforms, applications and websites they use through the lens of the five privacy tools (which address the five principal ways data is collected online) introduced in Data Defenders. Finally, students consider how to apply these tools to their own online activities.