Stay on the Path Lesson Four: Scavenger Hunt
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson students learn how to create well-defined search strings and to use tools and techniques such as bookmarking, browser filters and search engine preferences to avoid unwanted material.
In this lesson students learn how to authenticate online information by comparing “facts” from the website www.allaboutexplorers.com with more authoritative sources.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.
CIRA and MediaSmarts have partnered on a series of five tip sheets to educate Canadians about online security issues. The 5th tip sheet in the series, Socializing and Interacting Online, looks at negative issues that can come up when interacting with others through networked technologies including phishing scams and hoaxes, and strategies for dealing with them.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
One of the most noted aspects of the Internet is its anonymity: by and large, people online will treat you as whoever you say you are. In the West, this is often used for mischief or identity play, but in other parts of the world anonymity can have a much more significant and liberating effect.
The last year has been an unusually busy one for watchers of gender representation in the news media, with not one but two high-profile women involved in the U.S. presidential race. The way in which these two politicians were covered provides a view of how gender in politics is portrayed in the media, and how this can help to explain just how unusual those two women are.
The history of the Internet -- and the history of technology in general -- could be described as one big demonstration of the doctrine of unintended consequences: a system designed to help researchers collaborate, and developed to protect military communications in the event of a nuclear war, wound up being used primarily for shopping, socializing and entertainment. The same is true of many of the products and services on the Internet as well. In its early years it was mostly seen as a one-to-many broadcast medium, like TV or radio, but over time it's the more interactive elements that have proven to be most popular, with users producing at least as much online content as professionals.
In the first part of this blog we looked at some of the challenges and barriers facing people with disabilities when it comes to the Internet and other new media. In this final part we turn to possible strategies for making the virtual world fully accessible to all.