Search Results
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students closely examine the meaning of willing participant in online grooming situations. They examine a true story of a teen named Katie who develops an unhealthy relationship and identify the factors that contribute to risk-taking behavior. Students draw conclusions based on evidence and research.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students closely examine the meaning of willing participant in online grooming situations. They examine a true story of a teen named Katie who develops an unhealthy relationship and identify the factors that contribute to risk-taking behavior. Students draw conclusions based on evidence and research.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students closely examine the meaning of willing participant in online grooming situations. They examine a true story of a teen named Katie who develops an unhealthy relationship and identify the factors that contribute to risk-taking behavior. Students draw conclusions based on evidence and research.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students closely examine the meaning of willing participant in online grooming situations. They examine a true story of a teen named Katie who develops an unhealthy relationship and identify the factors that contribute to risk-taking behavior. Students draw conclusions based on evidence and research.
Student Handout
Image

8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Lesson Plan
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students come to understand that not all online relationships are safe, nor are people always who they claim to be online. They learn how to distinguish between appropriate and inappropriate online contacts by examining a series of scenarios. A collaborative discussion about the grooming process enables students to recognize the tactics that unsafe online contacts use to draw minors into compromising situations.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students come to understand that media has the power to change perceptions and behavior. They identify ways to effectively use media in order to address issues that matter to them.
Student Handout
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students create i- Buddy puppets and use them to “dance” to the music while singing along. Through class discussion, students learn that good decisions are an important part of digital citizenship.
Student Handout
Image

3, 4, Elementary (3-5)
As part of i-SAFE’s Music and Movement series, students sing along with the song “Chat.” They gain an understanding of a basic Internet safety concept: to be safe and responsible when using online chat. Students learn that being responsible online means knowing how to make safe choices about who to chat with and about what to say. They engage in a collaborative discussion about interacting with others online and draw conclusions supported by reasoning and examples.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students discover that research dispels the concept of multitasking. They learn that the brain cannot truly focus on two tasks at once but rather must switch focus quickly from task to task. They then make applications to safety issues such as texting and driving, and academic issues related to studying while listening to music or watching videos.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students discover that research dispels the concept of multitasking. They learn that the brain cannot truly focus on two tasks at once but rather must switch focus quickly from task to task. They then make applications to safety issues such as texting and driving, and academic issues related to studying while listening to music or watching videos.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students understand that online sources are not always reliable, nor is information found online always valid. They use a set of criteria to evaluate online sources on a given topic and reflect on the selection process. Students then engage in a collaborative project that entails research, expository writing, and source citation.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students understand that online sources are not always reliable, nor is information found online always valid. They use a set of criteria to evaluate online sources on a given topic and reflect on the selection process. Students then engage in a collaborative project that entails research, expository writing, and source citation.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students understand that online sources are not always reliable, nor is information found online always valid. They use a set of criteria to evaluate online sources on a given topic and reflect on the selection process. Students then engage in a collaborative project that entails research, expository writing, and source citation.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that media has the power to change perceptions and behavior. They examine the influence of the media in history and on modern culture. Students identify ways to effectively use media in order to address issues that matter to them.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that media literacy is an integral aspect of digital citizenship. They learn that media literacy enables them to identify propaganda, censorship and bias. Students define media literacy, give examples of media-based propaganda and biased viewpoints, discuss the role of media in the modern world, and conclude the importance of media literacy in today's society.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students come to understand that media literacy is an integral aspect of digital citizenship. They learn that media literacy enables them to identify propaganda, censorship and bias. Students define media literacy, give examples of media-based propaganda and biased viewpoints, discuss the role of media in the modern world, and conclude the importance of media literacy in today's society.
Teacher Reference Page
Image

7, 8, 9, 10, 11, 12, Intermediate (6-8), Secondary (9-12)
Students explore the safe, secure, and responsible use of apps. They learn that an app is a software application that runs on computers, in Web browsers, and on mobile devices. They come to better understand the software applications that they use, and learn to select apps based on a set of criteria. Students support their conclusions with evidence and reason.