Rules of the Game
In this lesson, students consider the importance of the written and unwritten rules that make it possible to learn and play together, online and offline.
In this lesson, students consider the importance of the written and unwritten rules that make it possible to learn and play together, online and offline.
The Workshop facilitator guide has been developed to support facilitators who are presenting the Break the Fake, and includes background information about the workshop, advice on preparing and presenting the workshop, a supporting script, Frequently Asked Questions and handouts for participants.
That’s why it’s important to talk to kids about casual prejudice which is the use of words or phrases that are negative towards a particular group - and help them learn how to push back in situations where they’re not sure if the person meant to be hurtful.
Here are some tips on how to help your kids respond to casual prejudice online:
The #ForYou discussion guide includes a gameplay overview, instructions on how to run the game as a workshop, a pre-brief and debrief before and after each round of the gameplay to introduce and discuss key ideas about algorithms, rules for quickplay, and a glossary of key terms.
When my kids saw the TikTok app icon on my phone, both of them had the same reaction: “WHAT? Why are you on TikTok?” While I thought it was because they wanted to tell me I was too old for the app, it was more that they really didn’t understand the appeal since they aren’t current users (for now).
Recently, my youngest got a new phone that has data and the ability to text anyone. We’ve been texting with my eldest for some time now too. But after years of communicating this way, it finally happened: We, the parents, were invited into a family group chat.
This lesson is designed to help students determine the validity of information that is presented to them on the internet.
In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.