ALEX Resources

Narrow Results:
Learning Activities (1) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill. Classroom Resources (11)


ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 5 :
R5) Locate and curate information from digital sources to answer research questions.

Subject: Digital Literacy and Computer Science (8)
Title: Sharing Secrets
Description:

Students will research security questions and create an artifact (poster, brochure, web page, video, etc.) highlighting information that should never be shared on social media or other public forums to warn users of tactics used by social engineers to gather personal data.

This activity was created as a result of the DLCS COS Resource Development Summit.




ALEX Learning Activities: 1

Go To Top of page
ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Why More News Sites Are Dumping Their Comment Sections
URL: https://www.pbslearningmedia.org/resource/trolling-comments-kqed/the-lowdown-why-more-news-sites-are-dumping-their-comment-sections-lesson-plan/
Description:

Trolling is not new behavior, but why do people do it? And what effects does it have? Trolls tend to antagonize communities in order to amuse themselves and get attention at the expense of others. Trolling has caused some online publications and news organizations to remove comments from their sites due to the effects the comments had on readers’ perceptions of the content, as well as the costs associated with moderating the comments. In this Lowdown lesson, students will analyze the research presented about why people post mean or negative “trolling” comments, as well as evaluate how trolling has affected online communities and reflect on how it should be addressed. This lesson plan will need to be downloaded. 



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: When Is Your Brain Ready for Social Media?
URL: https://www.pbslearningmedia.org/resource/brain-ready-for-social-media-above-the-noise/brain-ready-for-social-media-above-the-noise/
Description:

Social media is a mixed bag. Being online may increase chances of identity theft and cyberbullying, yet, it’s estimated over 20% of 8 to 12 year-olds have at least one social media account—sometimes without their parents’ knowledge. At times, tweens are taking back charge of their brand, started by their parents since they were born, and sometimes, they are looking to share and connect with a community they have trouble finding face-to-face. So, What’s the right age to start using social media? This resource includes a video and student handout with discussion questions.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Is the Internet Making You Meaner?
URL: https://www.pbslearningmedia.org/resource/internet-making-you-meaner-above-the-noise/internet-making-you-meaner-above-the-noise/
Description:

If the Internet's making you feel meaner, you're not imagining it. People really do act differently online than they do in person. Here’s why. According to a paper published in 2004 by psychologist John Suler, there are about 6 main reasons people act differently online. This could explain the rise of internet trolls or why people open up more online than they would in person. A student viewing guide with discussion questions is available to be used with this video. 



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 23 :
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Who's Snooping on You Online?
URL: https://www.pbslearningmedia.org/resource/online-privacy-tips-kqed/whos-snooping-on-you-online-above-the-noise/
Description:

With recent reports of high profile data breaches, ransomware attacks, and the prevalence of online trackers, it’s hard to know how best to protect your privacy online. In this Above the Noise video, we met up with the cybersecurity experts at Electronic Frontier Foundation to learn more about who’s snooping on us online and what we can do to protect ourselves. This video comes with a student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 23 :
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Can Hackers Be Heroes?
URL: https://aptv.pbslearningmedia.org/resource/8721d2e3-c31a-44fa-acdd-2ef1aa18b6a3/can-hackers-be-heroes-off-book/
Description:

PBS's Off Book asks if hacking is inherently good or bad, or if is it an ethical area we have yet to define. Looking beyond the media hype and scare tactics, it is clear that "hacking" is a term that should be up for debate, and that some hackers could actually be heroes and not villains.



   View Standards     Standard(s): [DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Is Facial Recognition Invading Your Privacy?
URL: https://aptv.pbslearningmedia.org/resource/facial-recognition-software-kqed/is-facial-recognition-invading-your-privacy-above-the-noise/
Description:

Facial recognition is creeping more and more into our daily lives. Facebook and Google use it for auto-tagging photos. Snapchat uses it to create hilarious filters. And Apple’s new iPhone will allow you to use your face to unlock your phone. But this same technology can be used by governments and companies to learn as much as they can about you. Find out how facial recognition technology works in the newest Above the Noise video. This video comes with a student viewing guide.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Can You Trust Influencers on YouTube?
URL: https://www.pbslearningmedia.org/resource/advertising-youtube-kqed/can-you-trust-influencers-on-youtube-above-the-noise/
Description:

YouTube has been around for over a decade now, and it dominates as the top place for video content. Because of that, it’s way more of a business now than anyone could have imagined. The advertising world refers to many of the stars on YouTube, Instagram, and other social media platforms as influencers, because they have their own, home-grown fanbase that they have been interacting with for years. To capitalize on that fanbase, companies pay these influencers to promote their product or service. Watch the latest Above the Noise video to find out whether you can trust what's on YouTube and what are the rules about influencers advertising products in their videos. This video comes with a student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 33 :
27) Analyze assistive technologies and how they improve the quality of life for users.

Example: Research multiple speech to text technologies and write a persuasive essay in favor of one over another.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: How to Come Up With Your Own Mobile App
URL: https://aptv.pbslearningmedia.org/resource/62fd9efe-5be8-488e-90ef-d3a88779bc4b/toolkit-how-to-come-up-with-your-own-mobile-app/
Description:

Students will learn to see smartphone apps as tools to solve real-world problems. This lesson guides students through a design brainstorm process to invent an app idea related to public art. Students will be designing an app idea to tackle a problem related to public art in their community. All you need is the activity worksheet, some pens, markers, and creativity!

WHY APPS? Well, to start with, they’re everywhere. According to the Pew Research Center, 78% of teens now have a cell phone, and almost half (47%) of those own smartphones. Teens don’t have to be limited to the role of the consumer in today’s digital marketplace. All you need is a little know-how and an idea—which is the focus of this curriculum. 



   View Standards     Standard(s): [DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

Subject: Digital Literacy and Computer Science (8)
Title: Social Media and Digital Footprints: Our Responsibilities
URL: https://www.commonsense.org/education/digital-citizenship/lesson/social-media-and-digital-footprints-our-responsibilities
Description:

Social media can be a place to connect, learn, and, most of all, share. But how much do kids know about what they're sharing -- and not just about themselves but each other? Help students think critically about their digital footprints on social media.

Students will be able to:
  • Identify reasons for using social media and the challenges that often come along with it.
  • Reflect on the responsibilities they have that are related to digital footprints -- both their own and others' -- when they're using social media.
  • Identify ways to make the most of social media while still caring for the digital footprints of themselves and others.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (7) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 5 :
R5) Locate and curate information from digital sources to answer research questions.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 24 :
18) Explain the beneficial and harmful effects that intellectual property laws can have on innovation.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Intellectual Property Theft
URL: https://www.uspto.gov/sites/default/files/kids/icreatm_guide_hs.pdf
Description:

The lesson begins on page 43 of the document accessed via the resource link.

Students will:

- identify different types of media as intellectual property: writings, music, videos, computer games, etc.

-understand that intellectual property laws protect online and offline material.

-understand that it is stealing from real people if one copies copyright-protected material or downloads material from the internet without permission.

-understand it is against the law to download copyright-protected videos, music, etc. from the internet without permission.

- investigate famous cases of trade secret theft.

- investigate peer-to-peer networks.



   View Standards     Standard(s): [DLIT] (6) 16 :
10) Describe the causes and effects of illegal use of intellectual property as it relates to print and digital media, considering copyright, fair use, licensing, sharing, and attribution.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Be Legal and Fair
URL: https://www.remc.org/21Things4Students/21/be-legal--fair/
Description:

Technology has brought about a potential crisis. It seems that a lot of artwork, literature, and music by our most creative authors, musicians, and artists have fallen into the hands of pirates. Our artists can no longer support themselves nor feel safe in creating new work. Their work is being shared all over the Internet as we speak. We need to put a stop to this. What would happen if your favorite musicians stopped writing and publishing their music? Do you want to listen to the music of your grandparents? That's where this assignment comes in.

For this activity, you will find out what we can do to make sure creative work remains under proper control. You will investigate the laws of copyright and report your findings back to your teacher. You will also need to find out if there is a way to legitimately use the work done by others so that you are not accused of operating illegally. Your assignment includes spreading the word so that others know the rules. When you have made a creative work of your own you will check it for originality and you will also learn of a way to protect that work so that you will be assured you are given proper credit for a job well done.

LEARNING OBJECTIVES

When you have completed this activity you will:

1. know about copyright and fair use [Digital Citizen]
2. understand the social responsibility of using copyrighted materials [Digital Citizen]
3. know how to recognize and avoid plagiarism [Digital Citizen]
4. know how to use creative commons licenses [Digital Citizen]



ALEX Classroom Resources: 11

Go To Top of page