In this lesson students learn how to create well-defined search strings and to use tools and techniques such as bookmarking, browser filters and search engine preferences to avoid unwanted material.

This four-lesson unit on search skills and critical thinking teaches students how to target and specify their online searches to avoid unwanted results, how to judge whether a link, search result or website is legitimate or phony, and how to find legitimate sources online for media works such as music, videos and movies. In this lesson, students apply what they have learned in the first two lessons to find and verify information online.

In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.

Like it or not, if you use the Internet you have an online identity. Some people call this your "brand." What's a brand? Think about a brand of soft drink, or computer, or jeans, or a band or a sports team. You probably have a certain idea about each one – what it's like, who buys it, and so on.

Trend Micro’s "What's Your Story?" Contest Awards $10,000 to a Trio of Ottawa High School Students: Poetry Performance Video Highlights the Internet’s Impact on a Generation

How #Ottawapiskat turned the tables on media coverage of native issues Over the last few months the Idle No More movement has succeeded in bringing Aboriginal issues to national attention. This has been due in no small part due to the movement's use of Twitter, where #IdleNoMore was a Trending Topic in both Canada and worldwide.

Cyberbullying can be addressed under civil law or criminal law, based on the situation.

For the last 3 years, we’ve been asking young people across the US and Canada to tell us in 2 minutes or less their stories about safe, responsible technology use. They’ve responded with enthusiasm and creativity; they’ve entertained and moved us. This year, the What’s Your Story? video contest continues in the same format that’s worked so well so far. But we’ve changed a few things, hopefully for the better.

As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers.

As well as invaluable tools for keeping in touch with our friends, families and our work, mobile devices have become an increasingly big part of how we access the Internet. Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers. As well, the fact that we’re never far from our mobile devices can bring a host of opportunities for us to be distracted and to make poor choices.