Search Results
Multimedia Resource
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Multimedia Resource
Image

7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout
Image

7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout
Image

7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout
Image

7, Intermediate (6-8)
Students incorporate what they have learned about privacy, safety, and parental guidance in the design of a mobile app. The design is to include features to protect the identity and safety of young users under the age of 13.
Student Handout
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Teacher Reference Page
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout
Image

8, Intermediate (6-8)
Students participate in an anonymous survey. They examine a true-life stories; identify online safety issues, and determine factors that contribute to safety risks in screen names, passwords and profiles.
Student Handout
Image

7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, high school students (grades 9-12) will consider the safety, security and social issues that result from accepting friend or follower requests. First, students take a survey to gauge the likelihood of accepting friend/follower requests from certain persons. Then, students engage in group discussion about the criteria they use when deciding to accept or reject friend/follower requests. Finally, students will draw conclusions from the experiences and perspectives expressed by their peers and create a decision tree to illustrate the process.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.