Teacher Resources | 369 Results
![](/themes/mediasmarts_2021/img/lg/lesson_plan.png)
In this lesson, students learn about and discuss the legal aspects of cyberbullying. They review a variety of hypothetical scenarios and a case study, and they consider the seriousness of the
![](/themes/mediasmarts_2021/img/lg/lesson_plan.png)
In this lesson, students learn about and discuss the legal aspects of cyberbullying.
![](/themes/mediasmarts_2021/img/lg/game.png)
Data Defenders is an interactive game that teaches children and pre-teens the concept of personal information and its economic value, and introduces them to ways to manage and protect their personal
![](/themes/mediasmarts_2021/img/lg/guide.png)
The Data Defenders game teaches children and pre-teens about personal information and its value, and introduces them to the different ways they can manage and protect their personal information on
![](/themes/mediasmarts_2021/img/lg/guide.png)
This Teacher’s Guide includes background information, learning expectations and points of discussion on the types of personal information and privacy-management strategies that are presented in the
![](/themes/mediasmarts_2021/img/lg/lesson_plan.png)
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data
![](/themes/mediasmarts_2021/img/lg/lesson_plan.png)
In this lesson, students reflect on the ways in which digital media can cause stress. Through a series of role-playing exercises, they consider how social media can cause stress by making us compare
![](/themes/mediasmarts_2021/img/lg/tip_sheet.png)
Time Management
![](/themes/mediasmarts_2021/img/lg/tip_sheet.png)
Research has found that these things are most likely to be scary to children:
![](/themes/mediasmarts_2021/img/lg/lesson_plan.png)
In this lesson, students apply the "5Ws of Cyberspace" to sources of information they find online. Assuming the role of a student researching a science project, students must authenticate the