Unpacking Privilege
Students are introduced to the idea of “privilege” in relation to diversity and how it applies to media. They then look at a checklist of media related privileges to help them understand the concept.
Students are introduced to the idea of “privilege” in relation to diversity and how it applies to media. They then look at a checklist of media related privileges to help them understand the concept.
This lesson was produced with the support of the Royal Canadian Mounted Police (RCMP).
Objectives:
In this lesson, students explore issues surrounding the marketing of alcoholic beverages on the Internet.
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
In this lesson students learn about the systems used to classify films, TV programs and video games. Students are asked to take a critical look at the criteria applied to classify these media products, and then take into account and discuss the underlying social and political aspects arising from those systems.
To make students aware of the ways in which male violence is used and promoted in advertising.
In this lesson students learn about the history of blackface and other examples of majority-group actors playing minority-group characters such as White actors playing Asian and Aboriginal characters and non-disabled actors playing disabled characters.
In this lesson, students read an interactive online comic that teaches them key concepts and skills relating to three cybersecurity topics: malware, passwords and privacy from geotracking devices. Following this, students research their own cybersecurity topics and learn how non-fiction comics are made in order to create their own Secure Comic.
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data is valuable and worthy of careful management by analyzing the platforms, applications and websites they use through the lens of the five privacy tools (which address the five principal ways data is collected online) introduced in Data Defenders. Finally, students consider how to apply these tools to their own online activities.