Search Results
Multimedia Resource
Image

5, Elementary (3-5)
Students recognize the risks of having a weak password. Class discussion and practice activities enable students to create strong passwords to protect themselves from cyber bullying, identity theft and online predators. Student will be able to state the attributes of a strong password, explain the importance of protecting online accounts, and create strong and secure passwords.
Multimedia Resource
Image

5, Elementary (3-5)
Students recognize the importance of protecting online identity by engaging in class discussion about personal information. They list types of information that reveals personal identity, evaluate screen names for safety, and practice creating safe screen names.
Lesson Plan
Image

3, 4, 5, Elementary (3-5)
Students understand that predators are adults that form inappropriate relationships with children. They learn how to identify the steps in the grooming process and take the appropriate actions in order to protect their safety and well-being.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students closely examine the meaning of willing participant in online grooming situations. They examine a true story of a teen named Katie who develops an unhealthy relationship and identify the factors that contribute to risk-taking behavior. Students draw conclusions based on evidence and research.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song “Safe as Can Be.” They listen closely to the lyrics and illustrate the Internet safety concepts identified in the song.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Lesson Plan
Image
,
Multimedia Resource
Image


K, 1, 2, Elementary (3-5)
As part of i-SAFE’s Music and Movement series of lessons, students will have fun moving to the song, “Ask an Adult (When You Login),” and will gain an understanding of a basic Internet safety concept: ask an adult to help while online. Through collaborative class discussion, they learn about challenges to safety online, through the use of computers, smartphones and other Internet-ready devices.
Multimedia Resource
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students closely read a short story that conveys the theme of respect in Hawaiian culture. Students discuss ways to show respect for cultural heritage as well as ways to show respect toward others online. They listen to a song about respect, illustrate a picture of what respect means to them, and write a narrative text that incorporates aspects of Hawaiian culture as well as digital citizenship and e-Safety principles.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students learn how an identity forms online. They compare and contrast online and offline identities, examine how online actions and interactions form an online identity, and determine the safety and security issues that result form revealing degrees of identifying information online.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students learn how an identity forms online. They compare and contrast online and offline identities, examine how online actions and interactions form an online identity, and determine the safety and security issues that result form revealing degrees of identifying information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that human trafficking affects students in their age group. Students discover that human trafficking does not only occur abroad; cases occur in urban, suburban and rural neighborhoods of the United States. They examine the role the Internet plays in the recruitment, grooming, and commercial exploitation of trafficking victims. Students research, define, and investigate the issue of human trafficking in their region, and prepare to take action through a student-driven empowerment project. A student workbook and teacher guide is included.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that human trafficking affects students in their age group. Students discover that human trafficking does not only occur abroad; cases occur in urban, suburban and rural neighborhoods of the United States. They examine the role the Internet plays in the recruitment, grooming, and commercial exploitation of trafficking victims. Students research, define, and investigate the issue of human trafficking in their region, and prepare to take action through a student-driven empowerment project. A student workbook and teacher guide is included.
Lesson Plan
Image

7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students select an e-Safety topic and view the associated Webcast. They determine what parents need to know and understand about the selected e-Safety issue. They then define the problem, gather background information from relevant and credible sources, and identify solutions. Students host a presentation at their school or in the community to educate parents and guardians on the selected issue affecting their generation.
Lesson Plan
Image

7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students select an e-Safety topic and view the associated Webcast. They may develop empathy by examining true stories of those affected by the selected e-Safety issue. They then define the problem, gather background information from relevant and credible sources, and identify solutions. Students then create and distribute informational brochures on the selected issue with the goal of educating their target audience and providing the appropriate prevention and response information.
Lesson Plan
Image

7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students select an e-Safety topic and view the associated Webcast. They may develop empathy by examining true stories of those affected by the selected e-Safety issue. They then define the problem, gather background information from relevant and credible sources, and identify solutions. Students produce a Public Service Announcement (PSA) to expose the issue, inform others, and inspire action.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students review information on predator awareness. They apply algebraic terms and concepts to solve equations that relate to e-Safety themes.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students investigate patterns of association in bi-variated data. They graph and analyze responses to statistical questions related to online risks (specifically cyber bullying). They acquire and use key terms including mode, median, mean, outliers, and range.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students practice graphic representation of statistics related to e-Safety. They collect responses to statistical questions from a sample of the student population. They use a linear model (line graph), bar graph, and circle graph (pie chart) to represent and interpret data.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students understand that statistics can be used to gain information about a population. They gather responses to statistical questions and represent the data as a bar graph.