Stay on the Path Lesson Four: Scavenger Hunt
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.
CIRA and MediaSmarts have partnered on a series of five tip sheets to educate Canadians about online security issues. The 5th tip sheet in the series, Socializing and Interacting Online, looks at negative issues that can come up when interacting with others through networked technologies including phishing scams and hoaxes, and strategies for dealing with them.
The issue of copyright is one that many of us probably know a little bit about. Copying is stealing – and stealing is bad - but it can still be a grey area in a social media world which is very PRO sharing.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
Our kids are coming of age at a time that things like online shopping, Facetime, and texting are all normal everyday occurrences. Technology is enabling people to do some pretty amazing things, and even communicate in a whole new way using a new language. You may know this as texting.
One of the most noted aspects of the Internet is its anonymity: by and large, people online will treat you as whoever you say you are. In the West, this is often used for mischief or identity play, but in other parts of the world anonymity can have a much more significant and liberating effect.
The last year has been an unusually busy one for watchers of gender representation in the news media, with not one but two high-profile women involved in the U.S. presidential race. The way in which these two politicians were covered provides a view of how gender in politics is portrayed in the media, and how this can help to explain just how unusual those two women are.
It’s ironic that as computers and other communications technology have become more accessible to the general public over the last thirty years, they have actually become less accessible to a segment of the population, one to whom access is everything: people with disabilities. More ironic still is that the history of communications technology is intimately tied to the drive to integrate people with disabilities more fully into society.
The history of the Internet -- and the history of technology in general -- could be described as one big demonstration of the doctrine of unintended consequences: a system designed to help researchers collaborate, and developed to protect military communications in the event of a nuclear war, wound up being used primarily for shopping, socializing and entertainment. The same is true of many of the products and services on the Internet as well. In its early years it was mostly seen as a one-to-many broadcast medium, like TV or radio, but over time it's the more interactive elements that have proven to be most popular, with users producing at least as much online content as professionals.