Search Results
Lesson Plan
Image
9, 10, 11, 12, Secondary (9-12)
Students examine the concept of digital ethics in peer-to-peer (P2P) networking environments. They weigh the risks and benefits of file sharing in a collaborative class discussion and support their conclusions with reasoning and examples.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students explore legal and ethical issues related to music piracy. They discover the economic impact of illegal downloads on the people who work in the entertainment and recording industry, and they determine the personal and legal consequences for unlawfully obtaining or distributing copyrighted music through the Internet. Upon completion of this unit, students create a Public Service Announcement that informs on the risks of piracy and legal alternatives to obtaining music online.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students closely read informational text about digital piracy. They then participate in a survey that gains insight into their knowledge and experiences with online intellectual property. Students engage in a collaborative discussion and determine ways to legally and ethically obtain music online.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students closely read informational text about digital piracy. They then participate in a survey that gains insight into their knowledge and experiences with online intellectual property. Students engage in a collaborative discussion and determine ways to legally and ethically obtain music online.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students closely read informational text to learn about peer-to-peer (P2P) networks. They define P2P technology, examine a court ruling on a case of copyright violation, and discuss the consequences of piracy carried out through P2P networks. Students determine the privacy, safety, security and legal risks of P2P file-sharing. They then use domain-specific terminology in an activity.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students closely read informational text to learn about peer-to-peer (P2P) networks. They define P2P technology, examine a court ruling on a case of copyright violation, and discuss the consequences of piracy carried out through P2P networks. Students determine the privacy, safety, security and legal risks of P2P file-sharing. They then use domain-specific terminology in an activity.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students discover that copyright laws apply to the music industry. They learn about the public domain, fair use, and copyright protections. They then examine a series of scenarios to determine an ethical, legal solution to the situation. As an empowerment project, students design informational brochures about music copyright.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students discover that copyright laws apply to the music industry. They learn about the public domain, fair use, and copyright protections. They then examine a series of scenarios to determine an ethical, legal solution to the situation. As an empowerment project, students design informational brochures about music copyright.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine the issue of intellectual property from various viewpoints through roleplay. They develop empathy for those that are impacted by digital piracy, consider the legalities and consequences, and propose solutions to the problem of digital piracy.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students examine the issue of intellectual property from various viewpoints through roleplay. They develop empathy for those that are impacted by digital piracy, consider the legalities and consequences, and propose solutions to the problem of digital piracy.
Lesson Plan
Image
9, 10, 11, 12, Secondary (9-12)
Students examine the issue of intellectual property from various viewpoints through roleplay. They develop empathy for those that are impacted by digital piracy, consider the legalities and consequences, and propose solutions to the problem of digital piracy.
Multimedia Resource
Image
9, 10, 11, 12, Secondary (9-12)
Students investigate the problem of intellectual property violations that occur through the Internet. Through the video and class discussion, students clarify misconceptions about using information and media found online for personal use and school assignments. They examine the consequences of intellectual property theft both for the owner and the person that violates ownership rights. Students come to understand that digital citizens respect and protect intellectual property rights.
Lesson Plan
Image
K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song “Cyber Germs." They learn that worms, viruses and malicious code infects computers and devices causing them to malfunction. Students acquire and use key terms in collaborative class discussions. They recognize the need for adult permission and guidance when using e-mail and browsing the Web.
Parent & Family Tip Sheet
Image
K, 1, 2, Primary (K-2)
Students come to understand that security software protects computers and devices against malware infection. After closely following along with dialogue between characters Dot & i as well as inforamtional text, students learn how computers and devices can become infected. They gain security tips to share with their family and write a reflection on what they have learned.
Student Handout
Image
K, 1, 2, Primary (K-2)
Students closely follow along with dialogue between characters dot & I as well as informational text to understand that malware infects computers. They learn about different types of malware.
Teacher Reference Page
Image
1, Primary (K-2)
Students learn that a computer virus is type of program that can infect a computer through e-mail. This lesson builds upon prior learning in grade K. Students participate in collaborative class discussion and share their learning with family members.
Parent & Family Tip Sheet
Image
2, Primary (K-2)
This lesson builds upon the key terms and concepts introduced in grade 1. Students deepen their understanding of the ways that computer viruses enter devices. They closely follow the events in a story about i-Buddy and a computer virus. They then discuss ways to prevent viruses from infecting computers.
Lesson Plan
Image
2, Primary (K-2)
This lesson builds upon the key terms and concepts introduced in grade 1. Students deepen their understanding of the ways that computer viruses enter devices. They closely follow the events in a story about i-Buddy and a computer virus. They then discuss ways to prevent viruses from infecting computers.
Lesson Plan
Image
3, Elementary (3-5)
Students understand that a computer virus can spread through e-mail. By building upon Grade 2 concepts, students learn how to prevent computers from being infected with viruses. Students complete a workbook to demonstrate and reinforce their learning.
Parent & Family Tip Sheet
Image
3, 4, Elementary (3-5)
Students build on prior learning. They examine cyber security issues brought about by e-mail attachments. Students identify types of malware. They learn the steps to prevent malicious code from damaging a computer and use vocabulary terms in a class discussion. As evidence of their learning, students select the best response in a given scenario.
,
Citizenship Rights
Theme Image
Image
,
Privacy
Theme Image
Image
,
Security
Theme Image
Image
,
Safety
Theme Image
Image
,
Media & Information Literacy
Theme Image
Image