How cyber-savvy are you? Cyber security quiz
Developed in partnership with CIRA, this interactive quiz is designed to increase students’ knowledge of the cyber security risks they face every day.
Developed in partnership with CIRA, this interactive quiz is designed to increase students’ knowledge of the cyber security risks they face every day.
This interactive unit is designed to help kids between the ages of 5 and 8 recognize the marketing techniques used on commercial websites that target children.
In this lesson students learn the ways that the apps they use are designed to encourage them to share more information—both with other users and with the apps themselves. They are then introduced to the idea of persuasive design or “dark patterns” and investigate whether these are used to make it more difficult to opt out of data collection on popular apps. Finally, the class creates a “rogues’ gallery” to help them identify dark patterns when they encounter them.
To make students aware of the ways in which male violence is used and promoted in advertising.
This lesson introduces students to the online marketing techniques that are used to target children on the Internet. It begins with a guided discussion about the similarities and differences between traditional marketing methods and online advertising and why the Internet is such a desirable medium for advertisers to reach young people. Student activities include a survey of the marketing techniques used on several commercial websites for children; the creation of a commercial website for kids that incorporates common marketing strategies; and an analysis of case studies about online marketing to young people.
Think you know how to read and understand privacy policies and terms of use? Learn how to make sense of legal documents for websites and apps with this interactive game.
In this lesson, students read an interactive online comic that teaches them key concepts and skills relating to three cybersecurity topics: malware, passwords and privacy from geotracking devices. Following this, students research their own cybersecurity topics and learn how non-fiction comics are made in order to create their own Secure Comic.
On the Loose: A Guide to Online Life for Post-Secondary Students supports young adults who are experiencing both new freedoms and challenges in their post- secondary life.
This year, it may not just be Santa Claus who sees your kids when they're sleeping and knows when they're awake: one of the hottest trends this season is so-called "smart toys", which use the Internet to hold artificially intelligent conversations with kids while they play. Last year's Hello Barbie, one of the first to use this technology, was found to have a number of major security flaws -- including automatically connecting the mobile device to which it was tethered to any Wi-Fi network with "Barbie" in its name. Now two more toys, a doll called My Friend Cayla and the i-Que Intelligent Robot, have been found to collect data in ways that are far more worrying.
This lesson was produced with the support of the Royal Canadian Mounted Police (RCMP).
Objectives: