ALEX Learning Activity Resources

Back
ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 5 :
R5) Locate and curate information from digital sources to answer research questions.

Subject: Digital Literacy and Computer Science (8)
Title: Sharing Secrets
Description:

Students will research security questions and create an artifact (poster, brochure, web page, video, etc.) highlighting information that should never be shared on social media or other public forums to warn users of tactics used by social engineers to gather personal data.

This activity was created as a result of the DLCS COS Resource Development Summit.




   View Standards     Standard(s): [DLIT] (6) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (7) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

[DLIT] (9-12) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Social Media Responsibility
Description:


ALEX Learning Activities: 2

Go To Top of page