Surveillance techniques
Thanks to the networked nature of the internet, in which information is always flowing both ways, there's no shortage of ways for apps, devices and websites to collect information about us.
Thanks to the networked nature of the internet, in which information is always flowing both ways, there's no shortage of ways for apps, devices and websites to collect information about us.
Think you know how to read and understand privacy policies and terms of use? Learn how to make sense of legal documents for websites and apps with this interactive game.
This tutorial introduces children, ages 7-9, to the concept of online privacy and teaches them to distinguish between information that is appropriate to give out and information better kept private – and to recognize how this may change in different contexts.
If you are a parent and you’ve been thinking of starting a blog, writing for parenting magazines, or becoming a social media influencer in the parent sphere, keep reading.
Data Defenders is an interactive game that teaches children and pre-teens the concept of personal information and its economic value, and introduces them to ways to manage and protect their personal information on the websites and apps they enjoy
#ForYou is a card-based pattern-matching game that helps youth aged 13 to 18 understand the role that algorithms play in their online and offline lives, and the value of their personal information to companies that use those algorithms. The game is designed to be delivered either in school or in community spaces such as homework or coding clubs.
This interactive unit is designed to help kids between the ages of 5 and 8 recognize the marketing techniques used on commercial websites that target children.
Cyber Choices is an interactive game designed to help students in grades 3 to 5 develop the skills and habits they need to make safe and responsible choices online. Cyber Choices lets students explore four different stories that cover key issues such as making good choices about their own and others’ personal information, dealing with cyberbullying (as both a target and a witness) and managing online conflict.