Common Outcomes
Students will…
3. Assess textual, numerical, aural, and visual information, as well as the source of the media, to determine context, perspective, bias, and/or motive. (G-3.2)
4. Self-assess ICT representations and go beyond established criteria by enhancing meaning and/or artistry, according to topic, audience, purpose, and occasion. (Pr-3.2)
7. Identify possible health issues associated with using ICT. (Examples: ergonomic factors, inactivity, carpal tunnel syndrome, repetitive stress injury, eye strain, addictive/obsessive behaviour…) (E-1.4)
8. Apply school division’s acceptable-use policy for ICT. (E-2.1)
9. Apply safety guidelines when communicating electronically. (Examples: email, web pages, threaded discussions, videoconferences, chats, instant messages, camera phones, wikis, blogs, podcasts, online whiteboards…) (E-2.2)
10. Explain consequences of unethical behaviour. (Examples: cyberbullying, promotion of prejudice and hatred, copyright violations, plagiarism, willful destruction/manipulation of data, hacking, propagation of viruses, spamming, software piracy, consumer fraud, identity theft…) (E-2.3)
11. Apply guidelines for ethical and responsible use of ICT. (Examples: respect others’ privacy, protect personal information, follow security procedures, respect intellectual property and credit sources, use licensed software, discourage cyberbullying, collect data ethically, analyze information ethically…) (E-2.4)
12. Evaluate effects of personal ICT behaviour on others. (E-3.1)
13. Weigh personal benefits and risks of using ICT. (E-3.2)
14. Analyze various ICT skills and competencies required in personal career choices. (S-2.2)
15. Analyze advantages and disadvantages of ICT use in society. (Examples: lack of access, consequences of unethical use, ease of manipulating data, ease of communicating information, addictive/obsessive behaviour…) (S-2.3)
16. Weigh society’s right to information access against right to individual privacy. (S-3.1)
17. Weigh benefits versus risks to society of creating new ICTs. (Example: outsourcing jobs…) (S-3.2)
20. Synthesize knowledge and information to solve unique ICT problems. (M-3.1)
MediaSmarts Resources
- Authentication Beyond the Classroom
- Cyberbullying and the Law
- Dealing with Digital Stress
- First, Do No Harm: Being an Active Witness to Cyberbullying
- Hate 2.0
- Hate or Debate
- Online Marketing to Kids: Protecting Your Privacy
- Online Relationships: Respect and Consent
- Promoting Ethical Behaviour Online: My Virtual Life
- Secure Comics
- Thinking about Hate
- What Students Need to Know about Freedom of Information and Protection of Privacy
- Who Knows? Your Privacy in the Information Age
Specific Learning Outcomes
3. Assess textual, numerical, aural, and visual information, as well as the sources of the media, to determine context, perspective, bias, and/or motive.
4. Analyze whether information from media sources has been manipulated. (Examples: bogus websites, bogus email, spam, graphs showing selected data…)
5. Analyze whether information collected from media sources is sufficient and/or suitable for purpose and audience. Sources include websites, CD-ROMs, and email.
6. Discuss information, ideas, and/or electronic work using tools for electronic communication. (Examples: email, electronic whiteboards, web pages, threaded discussions, videoconferences, chats, instant messages, camera phones, wikis, blogs, podcasts, online whiteboards…)
MediaSmarts Resources
- Authentication Beyond the Classroom
- Bias in News Sources
- Deconstructing Web Pages
- Finding and Authenticating Online Information on Global Development Issues
- Hate or Debate?
- Hoax? Scholarly Research? Personal Opinion? You Decide!
- I heard it ‘round the Internet: Sexual health education and authenticating online information
- Introduction to Online Civic Engagement
- Online Propaganda and the Proliferation of Hate
- Taming the Wild Wiki
- Thinking About Hate