Search Results
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students explore types of electronic messaging. They come to understand the need for an adult’s help when sending and receiving electronic messages through collaborative class discussion.
Lesson Plan
Image

7, 8, Intermediate (6-8)
Students develop an awareness of grooming tactics. They learn that older people use the anonymity of online communication to target minors for nefarious purposes. Students identify grooming tactics in an online chat scenario and draw conclusions based on the information presented to them.
Lesson Plan
Image

5, Elementary (3-5)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication and piece together personal information of their target over time. Students learn how to identify the grooming process, and they take proactive steps to protect themselves online to reduce risk.
Lesson Plan
Image

6, Intermediate (6-8)
Students investigate ways safely and responsibly interact with others online. They come to understand that Internet predators exhibit a pattern of online communication, and piece together personal information of a targeted individual over time. They learn how to identify the grooming process, and take proactive steps to protect themselves online to reduce risk.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
Students come to better understand the nature of cyber bullying as they closely read a narrative text that depicts a cyber bullying situation. They examine characters' words, actions and feelings to identify the problem, determine the central lesson and identify ways to cope with cyber bullying situations. Students cite textual references during collaborative discussion.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text. They come to understand that a website has an address called a URL. Students identify the basic parts of a URL.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text. They learn that the World Wide Web enables people to navigate the Internet: search for information, click on links and visit websites with words, pictures and videos.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students come to understand that security software protects computers and devices against malware infection. After closely following along with dialogue between characters Dot & i as well as inforamtional text, students learn how computers and devices can become infected. They gain security tips to share with their family and write a reflection on what they have learned.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students come to understand that, just as germs invade a person's body, computers and devices can also become infected. After following along with character dialogue between Dot & i and closely reading the informational text, students learn that infected computers do not work properly.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students learn that a strong secret password is an important part of cyber security. After closely following along with dialogue between characters Dot & i and reading informational text about password protection, students practice creating strong passwords.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students learn that, just as parents lock doors to keep the family and personal belongings safe, cyber security helps keep personal information safe and ensures that computers and other digital devices work properly. After following along with dialogue between characters Dot & i about cyber security, students illustrate what they have learned.
Lesson Plan
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Henny Penny thinks the sky is falling because of what she receives in her e-mail inbox. Students learn about security risks associated with e-mail by determining the central lesson in the story. They acquire and use new vocabulary terms related to digital security in discussion and when answering questions about the events in the story.
Lesson Plan
Image

5, Elementary (3-5)
Students learn how malicious code spreads by participating in a hands-on activity that simulates a computer virus. They then reflect on what they have learned in a class discussion and in writing.
Lesson Plan
Image

6, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Lesson Plan
Image

6, Intermediate (6-8)
Students come to understand that spyware compromises personal information security. Through close reading of informational text, students learn how computers and devices become infected with spyware. They also learn how to protect their computers and devices from infection. Students add to their list of cyber security tips.
Lesson Plan
Image

7, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Lesson Plan
Image

7, Intermediate (6-8)
Students come to understand that spyware compromises personal information security. Through close reading of informational text, students learn how computers and devices become infected with spyware. They also learn how to protect their computers and devices from infection. Students add to their list of cyber security tips.
Lesson Plan
Image

7, 8, Intermediate (6-8)
Students come to understand that routine maintenance is essential to ensure data security and to protect their computers and devices. They identify types of malware, discuss the ways that malware infects computers and devices, and learn how to prevent security issues.
Student Handout
Image
,
Teacher Reference Page
Image


K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Lesson Plan
Image

5, Elementary (3-5)
Students review what they have learned about intellectual property. The correlating slideshow presents the definition of intellectual property, copyright laws and protections, fair use guidelines, plagiarism, source citations, and piracy. Students discuss ways to respect and protect intellectual property found online. They then create a media-based project to educate others and raise awareness of digital ethics.