Search Results
Lesson Plan
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Teacher Reference Page
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Teacher Reference Page
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Student Handout
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Teacher Reference Page
Image
8, Intermediate (6-8)
Students simulate the process that online predators use to target youth. They determine the identity of chatroom participants though close analysis of screen names, and note the screen names that would be of particular interest to an online predator. They review key characteristics of the grooming process and devise techniques to reduce personal safety risks involved with online relationships by incorporating information delivered through the multimedia presentation and discussion.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students come to understand the risks of developing relationships online. They identify types of relationships cultivated online. They discuss the role of communication in the development of online relationships and the implications of developing a relationship with a potentially harmful individual. Students learn that inappropriate situations between an adult an a minor may involve online grooming and willing participation.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students come to understand the risks of developing relationships online. They identify types of relationships cultivated online. They discuss the role of communication in the development of online relationships and the implications of developing a relationship with a potentially harmful individual. Students learn that inappropriate situations between an adult an a minor may involve online grooming and willing participation.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students come to understand the risks of developing relationships online. They identify types of relationships cultivated online. They discuss the role of communication in the development of online relationships and the implications of developing a relationship with a potentially harmful individual. Students learn that inappropriate situations between an adult an a minor may involve online grooming and willing participation.
Student Handout
Image
9, 10, 11, 12, Secondary (9-12)
Students come to understand the risks of developing relationships online. They identify types of relationships cultivated online. They discuss the role of communication in the development of online relationships and the implications of developing a relationship with a potentially harmful individual. Students learn that inappropriate situations between an adult an a minor may involve online grooming and willing participation.
Teacher Reference Page
Image
6, 7, 8, Intermediate (6-8)
Students review information on predator awareness. They apply algebraic terms and concepts to solve equations that relate to e-Safety themes.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students review information on predator awareness. They apply algebraic terms and concepts to solve equations that relate to e-Safety themes.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students review information on predator awareness. They apply algebraic terms and concepts to solve equations that relate to e-Safety themes.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students apply mathematical skills and concepts to collect, analyze and visually represent data sets related to e-Safety topics such as technology access, digital literacy, parental role in students' digital lives, digital security, cyber bullying, intellectual property, and personal safety. Resulting data sets may utilized as students prepare Empowerment projects and presentations that they will deliver on the school campus, in the local community, online and to the iDrive Student Advisory Board.
Student Handout
Image
6, 7, 8, Intermediate (6-8)
Students practice graphic representation of statistics related to e-Safety. They collect responses to statistical questions from a sample of the student population. They use a linear model (line graph), bar graph, and circle graph (pie chart) to represent and interpret data.
,
Privacy
Theme Image
Image
,
Safety
Theme Image
Image
,
Privacy
Theme Image
Image
,
Safety
Theme Image
Image
,
Media & Information Literacy
Theme Image
Image