Search Results
Visual Display
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Student Handout
Image

5, Elementary (3-5)
In this CCSS model-aligned lesson, students practice narrative writing with purpose. Through collaborative discussion and reflection, students understand that digital citizens are responsible for using etiquette while communicating with others online and through electronic devices. Students write a short story that illustrates a central lesson based on the selected theme. They employ narrative techniques and, with support from their peers and instructor, students plan, revise and edit their drafts. Students may add illustrations / graphics to aid in comprehension. Digital publication optional.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
Students explore the concept of the mainframe computer. They determine the critical role that the 1960s mainframe computer plays in Internet history by comparing mainframes of the past with modern mainframe computers.
Student Handout
Image

5, Elementary (3-5)
In this CCSS model-aligned lesson, students practice narrative writing with purpose. Through collaborative discussion and reflection, students understand that digital citizens are responsible for using etiquette while communicating with others online and through electronic devices. Students write a short story that illustrates a central lesson based on the selected theme. They employ narrative techniques and, with support from their peers and instructor, students plan, revise and edit their drafts. Students may add illustrations / graphics to aid in comprehension. Digital publication optional.
Student Handout
Image

5, Elementary (3-5)
In this CCSS model-aligned lesson, students practice narrative writing with purpose. Through collaborative discussion and reflection, students understand that digital citizens are responsible for using etiquette while communicating with others online and through electronic devices. Students write a short story that illustrates a central lesson based on the selected theme. They employ narrative techniques and, with support from their peers and instructor, students plan, revise and edit their drafts. Students may add illustrations / graphics to aid in comprehension. Digital publication optional.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students closely read informational text about the theme of connection in Hawaiian culture. They discuss ways to connect with others online. Students identify benefits and drawbacks of social networking. They create and display online safety guidelines in the form of a Hawaiian quilt.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students closely read a short story that conveys the theme friendship in Hawaiian culture. They discuss the benefits and drawbacks of making friends online. Students use what they have learned to create guidelines for safe online friendships. They then write a song about online friendship that incorporates an aspect of Hawaiian culture.
Student Handout
Image

5, 6, 7, 8, Elementary (3-5), Intermediate (6-8)
Students closely read a short story that conveys the theme of respect in Hawaiian culture. Students discuss ways to show respect for cultural heritage as well as ways to show respect toward others online. They listen to a song about respect, illustrate a picture of what respect means to them, and write a narrative text that incorporates aspects of Hawaiian culture as well as digital citizenship and e-Safety principles.
Student Handout
Image

8, Intermediate (6-8)
Students understand that a digital citizen knows how to evaluate websites for credibility, safety, and appropriateness. They learn how to identify the domain suffix (e.g. .com, .org, .edu, etc.) as a clue to the purpose of a website. They examine a series of websites and use set of criteria to determine whether the website is a reliable, safe and appropriate for children and teens. Students create posters to inform others how to evaluate websites for reliability of information found online.
Student Handout
Image

8, Intermediate (6-8)
Students understand that a digital citizen knows how to evaluate websites for credibility, safety, and appropriateness. They learn how to identify the domain suffix (e.g. .com, .org, .edu, etc.) as a clue to the purpose of a website. They examine a series of websites and use set of criteria to determine whether the website is a reliable, safe and appropriate for children and teens. Students create posters to inform others how to evaluate websites for reliability of information found online.
Student Handout
Image

8, Intermediate (6-8)
Students understand that a digital citizen knows how to evaluate websites for credibility, safety, and appropriateness. They learn how to identify the domain suffix (e.g. .com, .org, .edu, etc.) as a clue to the purpose of a website. They examine a series of websites and use set of criteria to determine whether the website is a reliable, safe and appropriate for children and teens. Students create posters to inform others how to evaluate websites for reliability of information found online.
Student Handout
Image

1, Primary (K-2)
The ISAFE character “i-Buddy” illustrates the abstract concept of the Internet as a community. The lesson reinforces the idea that students should have adult permission and support when using the Internet. Students understand that: (1) the Internet is made up of online places to visit, just as physical communities are made up of places to visit; (2) Parents make rules to keep their children safe on the Internet just as household rules and guidelines help to keep children safe in the physical community.
Teacher Reference Page
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series of lessons, students sing along with the song, “i-S-A-F-E” and gain an understanding of a key Internet safety principle: Ask an adult for permission and guidance before going online. They participate in a collaborative class discussion, acquire and use vocabulary terms, and practice print concepts.
Student Handout
Image

7, Intermediate (6-8)
In this CCSS model-aligned lesson, students use what they know and understand about cyber bullying to write a story for younger students (grades K-2) featuring the characters Dot & i. They use dialogue to reveal characters' thoughts and feelings while developing a sequence of events. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension, and may elect to publish their story in digital form.
Student Handout
Image

3, 4, 5, Elementary (3-5)
The Sock Puppet Nation comic “Coy and the Cyber Bully Sock Squad” illustrates cyber bullying tactics, impact, and reinforces the importance of standing up for others. Students study the interactions between characters to learn cyber bullying recognition and response. They write the resolution to the Sock Puppet Nation comic to demonstrate their learning. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout
Image

K, 1, 2, Primary (K-2)
Dot helps i to respond to a cyber bullying situation. Young students will learn basic cyber bullying recognition and response skills through this interactive lesson featuring Dot & i. Includes a teacher guide, printable activity pages, and interactive media.
Student Handout
Image

K, 1, 2, Primary (K-2)
Dot helps i to understand what a cyber-bully says and does. Students will learn basic cyber bullying recognition skills through this interactive lesson featuring Dot & i. This lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.