With your permission, Fitbit’s can use precise geolocation data, including GPS signals, device sensors, Wi-Fi access points, and cell towe..
This was my daughters idea. Play a game where students need to protect themselves online from a White Hacker. Students could set up fake e..
I would challenge students to create a physical network that transfers information from one part of the school to another. Students would ..
This website provides a multitude of resources surrounding Cyber Ethics and other lessons regarding the internet.
They were designed to ..
This resource shows children how to create different sorts of strong passwords.
The poster splits up all of the different letters and num..
‘Digital Footprints’ are data trails that you leave while you’re on the internet.
You leave these footprints through the websites you vis..
This resource explains to children how they can be cyber safe, with a video showing superheroes saving people from being unsafe on the int..
Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
I have used this lesson from code.org before to teach strong passwords. In particular, I have found the password scenarios useful in helpi..
Cyber 5 is a great animation resource that introduces students on the key areas of cyber safety and how to be safe on the internet. The 5 ..