Search Results
Student Handout
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “Cyber Bully.” Through class discussion, they gain an understanding of the concept of bullying. They colloaborate in a brainstorm to come up with basic tips for showing kindness online.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “Cyber Bully.” Through class discussion, they gain an understanding of the concept of bullying. They colloaborate in a brainstorm to come up with basic tips for showing kindness online.
Student Handout
Image

K, 1, 2, Primary (K-2)
Dot helps i to respond to a cyber bullying situation. Young students will learn basic cyber bullying recognition and response skills through this interactive lesson featuring Dot & i. Includes a teacher guide, printable activity pages, and interactive media.
Student Handout
Image

K, 1, 2, Primary (K-2)
When i is teased at school due to a text message shared by his friend Dash, Dot helps him to understand that even buddies make mistakes. Students learn basic conflict resolution skills to prevent bullying. Includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout
Image

K, 1, 2, Primary (K-2)
When i is teased at school due to a text message shared by his friend Dash, Dot helps him to understand that even buddies make mistakes. Students learn basic conflict resolution skills to prevent bullying. Includes a teacher guide, printable activity pages, and interactive multimedia resources.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this comprehensive unit, students learn that social media is a powerful shaping force in the development of identity and self-concept. They apply the theories of psychologists Carl Rogers and C.H. Cooper to the formation of identity and self-concept. They then determine the safety and security issues that arise from revealing degrees of personal information online.
Interactive Lesson
Image

6, 7, 8, Intermediate (6-8)
This interactive lesson underscores the importance of being mindful while communicating via text messages. Given three scenarios, students analyze the context of the conversation, find key details, draw inferences and draft an appropriate response. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Interactive Lesson
Image

K, 1, 2, Primary (K-2)
Students closely follow the story and interactive lesson about text message etiquette featuring Dot & i. Students practice digital etiquette through follow-up activities and discussion. This lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Interactive Lesson
Image

K, 1, 2, Primary (K-2)
Students closely follow the story and interactive lesson about text message etiquette featuring Dot & i. Students practice digital etiquette through follow-up activities and discussion. This lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Interactive Lesson
Image

3, 4, 5, Elementary (3-5)
Skooter joins a social network for the first time. Through this interactive comic, students learn to make responsible choices related to parent permission, community guidelines, privacy, information security and digital drama. Students explain how the actions of the characters contribute to the sequences of events. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.