Search Results
Teacher Reference Page
Image

5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Student Handout
Image

5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Teacher Reference Page
Image

5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Student Handout
Image

5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Teacher Reference Page
Image

6, Intermediate (6-8)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication, and piece together personal information of a targeted individual over time. They learn how to identify the grooming process, and take proactive steps to protect themselves online to reduce risk.
Multimedia Resource
Image

6, Intermediate (6-8)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication, and piece together personal information of a targeted individual over time. They learn how to identify the grooming process, and take proactive steps to protect themselves online to reduce risk.
Student Handout
Image

6, Intermediate (6-8)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication, and piece together personal information of a targeted individual over time. They learn how to identify the grooming process, and take proactive steps to protect themselves online to reduce risk.
Teacher Reference Page
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Student Handout
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Teacher Reference Page
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Teacher Reference Page
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Student Handout
Image

7, Intermediate (6-8)
Students learn how to safely and responsibly interact online. They understand that unsafe contacts piece together information in online discussions as part of the grooming process. Students learn to identify key characteristics of suspicious online communication. Through collaborative discussion, students develop strategies to reduce personal safety risks involved with online relationships.
Student Handout
Image

7, 8, Intermediate (6-8)
Students investigate the factors that lead to willing participation in an inappropriate relationship that initiates online. They analyze a true story of a "willing participant"; use reasoning and examples from the text to support their conclusions, and recommend ways to develop and maintain healthy relationships online.
Student Handout
Image

7, 8, Intermediate (6-8)
Students investigate the factors that lead to willing participation in an inappropriate relationship that initiates online. They analyze a true story of a "willing participant"; use reasoning and examples from the text to support their conclusions, and recommend ways to develop and maintain healthy relationships online.
Student Handout
Image

7, 8, Intermediate (6-8)
Students investigate the factors that lead to willing participation in an inappropriate relationship that initiates online. They analyze a true story of a "willing participant"; use reasoning and examples from the text to support their conclusions, and recommend ways to develop and maintain healthy relationships online.
Student Handout
Image

7, 8, Intermediate (6-8)
Students investigate the factors that lead to willing participation in an inappropriate relationship that initiates online. They analyze a true story of a "willing participant"; use reasoning and examples from the text to support their conclusions, and recommend ways to develop and maintain healthy relationships online.
Lesson Plan
Image

7, 8, Intermediate (6-8)
Students investigate the factors that lead to willing participation in an inappropriate relationship that initiates online. They analyze a true story of a "willing participant"; use reasoning and examples from the text to support their conclusions, and recommend ways to develop and maintain healthy relationships online.
Teacher Reference Page
Image

7, 8, Intermediate (6-8)
Students develop an awareness of grooming tactics. They learn that older people use the anonymity of online communication to target minors for nefarious purposes. Students identify grooming tactics in an online chat scenario and draw conclusions based on the information presented to them.
Student Handout
Image

7, 8, Intermediate (6-8)
Students develop an awareness of grooming tactics. They learn that older people use the anonymity of online communication to target minors for nefarious purposes. Students identify grooming tactics in an online chat scenario and draw conclusions based on the information presented to them.
Student Handout
Image

7, 8, Intermediate (6-8)
Students develop an awareness of grooming tactics. They learn that older people use the anonymity of online communication to target minors for nefarious purposes. Students identify grooming tactics in an online chat scenario and draw conclusions based on the information presented to them.