This four-lesson unit on search skills and critical thinking teaches students how to target and specify their online searches to avoid unwanted results, how to judge whether a link, search result or website is legitimate or phony, and how to find legitimate sources online for media works such as music, videos and movies. In this lesson, students apply what they have learned in the first two lessons to find and verify information online.
English
Teaching your children safe surfing habits
Kids love going online for learning, socializing and having fun, but there are many things in cyberspace that they may not be ready for. The following tips will help keep your kids from running into trouble online.
Building your brand: Establishing a positive presence online
Like it or not, if you use the Internet you have an online identity. Some people call this your “brand.” What’s a brand? Think about a brand of soft drink, or computer, or jeans, or a band or a sports team. You probably have a certain idea about each one – what it’s like, who buys it, and so on.
Trend Micro’s “What’s Your Story?” Contest Awards $10,000 to a Trio of Ottawa High School Students: Poetry Performance Video Highlights the Internet’s Impact on a Generation
How #Ottawapiskat turned the tables on media coverage of native issues Over the last few months the Idle No More movement has succeeded in bringing Aboriginal issues to national attention. This has been due in no small part due to the movement’s use of Twitter, where #IdleNoMore was a Trending Topic in both Canada and worldwide.
For the last 3 years, we’ve been asking young people across the US and Canada to tell us in 2 minutes or less their stories about safe, responsible technology use. They’ve responded with enthusiasm and creativity; they’ve entertained and moved us. This year, the What’s Your Story? video contest continues in the same format that’s worked so well so far. But we’ve changed a few things, hopefully for the better.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.
As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers. As well, the fact that we’re never far from our mobile devices can bring a host of opportunities for us to be distracted and to make poor choices.
Cyber Security Consumer Tip Sheet: Socializing and interacting online
For most of us, the Internet has become an indispensable part of our social lives: we use it to keep up with old friends, keep in touch with our families and meet new people. Unfortunately, not all online interactions are as positive as these. This tip sheet will explain some of the issues we face when we socialize online and provide tips for dealing with them.