Media & Information Literacy

Students gain the ability to access, analyze, evaluate, create and use various media-based communication formats. Students interpret messages transmitted through Information and Communications Technology (ICT) including Internet publications, infographics, charts, images, videos, audio recordings and multimedia presentations. They learn to effectively locate, evaluate and use information for research and writing. They determine whether an online source is valid and reliable. They distinguish between fact and opinion; bias and objectivity.  Students exercise communication etiquette as a 21st century skill.

Search Results

Displaying 1581 - 1600 of 1708
Multimedia Resource Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image
7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Multimedia Resource Image
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image
7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image
7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Teacher Reference Page Image
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image
7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Security Theme Image Image , Safety Theme Image Image
9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students participate in an anonymous survey. They examine a true-life stories; identify online safety issues, and determine factors that contribute to safety risks in screen names, passwords and profiles.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image , Technology Literacy Theme Image Image
7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Security Theme Image Image , Safety Theme Image Image
9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Security Theme Image Image , Safety Theme Image Image
9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout Image Student
Digital Citizenship Theme Image Image , Privacy Theme Image Image , Safety Theme Image Image , Media & Information Literacy Theme Image Image
8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Student Handout Image Student
Digital Citizenship Theme Image Image , Citizenship Rights Theme Image Image , Privacy Theme Image Image , Identity Management Theme Image Image , Security Theme Image Image , Safety Theme Image Image
6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.

Search By Filter