Search Results
Teacher Reference Page
Image

6, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. A scenario illustrates how an unsafe online contact can gather information and interact with individuals to lure them into unsafe situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Lesson Plan
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Teacher Reference Page
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Lesson Plan
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Lesson Plan
Image

6, Intermediate (6-8)
Students engage in dialogue about their experience in various online communities and discuss the role of parental supervision. They compare online communities with public places in the real world; give an example of a site, game, or app used to communicate with other people; describe the activities that take place in an online community, and discuss the importance of adult supervision.
Student Handout
Image

6, Intermediate (6-8)
Students engage in dialogue about their experience in various online communities and discuss the role of parental supervision. They compare online communities with public places in the real world; give an example of a site, game, or app used to communicate with other people; describe the activities that take place in an online community, and discuss the importance of adult supervision.
Lesson Plan
Image

6, Intermediate (6-8)
Empower students through iDrive. This unit is comprised of five lessons. Lesson plans, coordinating PowerPoint presentations, and student resource pages are separated by lesson for use in an online learning environment. Each lesson builds towards the culminating project: students complete one of several iDrive Empowerment Activities. This unit is designed to be taught as a complete unit, but lessons can also be implemented individually.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
This interactive lesson underscores the importance of being mindful while communicating via text messages. Given three scenarios, students analyze the context of the conversation, find key details, draw inferences and draft an appropriate response. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout
Image

7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Teacher Reference Page
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.
Lesson Plan
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the importance of protecting online identity by engaging in class discussion. They list types of information that reveal personal identity; explain the purpose of protecting online identity; discuss the risks of revealing personally identifiable information; evaluate online profiles and behaviors for security and identity protection, and create a sketch of an online registration form and user profile for people under age 13.