Instructional Video24:18
Curated Video

Knowing who to trust online

Pre-K - Higher Ed
Pupil outcome: I can describe different ways to help decide who to trust online. Key learning points: - Many people behave differently online than they do in real life. - People we do not know offline are online strangers. - It is not...
Instructional Video25:03
Curated Video

How to be responsible online

Pre-K - Higher Ed
Pupil outcome: I can explain how best to be safe and responsible online. Key learning points: - Finding the right balance of activities is important online and offline. - It is important to choose carefully what we play and view online....
Instructional Video24:11
Curated Video

Our favourite things online

Pre-K - Higher Ed
Pupil outcome: I can describe enjoyable things to do online and explain how to keep personal information safe. Key learning points: - Being online can be both very fun and very risky. - We can put the things we enjoy in different...
Instructional Video18:01
Curated Video

Deciding if a question is too personal

Pre-K - Higher Ed
Pupil outcome: I can identify online images, questions and comments that are inappropriate. Key learning points: - We should not share personal details online. - Being online should not make us worried or scared. - We should expect...
Instructional Video18:35
Curated Video

Spotting fakes

Pre-K - Higher Ed
Pupil outcome: I can explain why some things online are not real and explain how to identify when they are fake. Key learning points: - Not everything online is real or true. - It is difficult to identify fake information as sometimes...
Instructional Video29:38
Curated Video

Biased questioning

Pre-K - Higher Ed
Pupil outcome: I can evaluate various real-world questionnaires and identify bias in questioning. Key learning points: - Questionnaires are used in a variety of jobs. - Questionnaires may have been designed to hide intentional bias. -...
Instructional Video5:35
The Business Professor

Consumer Protection (Intro)

Higher Ed
Consumer Protection (Intro)
Instructional Video3:49
Wonderscape

Exploring the Advantages of Cryptocurrencies

K - 5th
Discover the benefits of cryptocurrencies, including their independence from central authorities, potential for high returns, and user anonymity. Learn how decentralized technology is reshaping financial transactions and enabling...
Instructional Video5:37
Curated Video

ChatGPT 101 - Supercharge Your Work and Life with ChatGPT - ChatGPT Restrictions

Higher Ed
This video explores the restrictions that apply to the use of ChatGPT. You will learn about the types of content that ChatGPT cannot provide, such as medical or legal advice, and ethical considerations in using an AI language model....
Instructional Video3:51
Curated Video

SkillSprints: Understanding and Preventing Phishing Emails

Pre-K - Higher Ed
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Instructional Video4:18
Curated Video

SkillSprints: Identity Theft

Pre-K - Higher Ed
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Instructional Video6:13
Curated Video

High Five Facts - Online Safety

Pre-K - 5th
This video explores five fun facts about Online Safety.
Instructional Video4:55
Curated Video

Digital Citizenship

3rd - 8th
The video “Digital Citizenship” discusses how to be safe, responsible, and respectful when using technology.
Instructional Video0:51
Curated Video

Social Media Security

Higher Ed
Social media security is the practice of analyzing data from active social media sites to protect against threats and security breaches.
Instructional Video9:47
Curated Video

Types of Data

Higher Ed
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Instructional Video1:42
Curated Video

I WONDER - How Can You Stay Safe Online?

Pre-K - 5th
This video is answering the question of how can you stay safe online.
Instructional Video8:19
Curated Video

iPhone Security Model

Higher Ed
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
Instructional Video35:42
Healthcare Triage

Suicide Rates and Insights from Medical Sociology - Healthcare Triage

Higher Ed
Aaron's guest this month is Dr. Bernice Pescosolido, who is a medical sociologist at Indiana University. Dr. Pescosolido studies the environments, neighborhoods, and connections that contribute to patients' identities, and looks how this...
Instructional Video27:12
The Wall Street Journal

"Reasonable Security" Under the California Consumer Privacy Act

Higher Ed
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
Instructional Video31:26
The Wall Street Journal

Which Regulations to Worry About

Higher Ed
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
Instructional Video35:57
The Wall Street Journal

Future Of: Data

Higher Ed
How should brands, networks and publishers adapt in the age of "always-on" connectivity? As privacy issues, and trust surrounding the platforms, dominate the news cycle, has the way brands develop and disseminate campaigns changed?
Instructional Video1:26:43
National Institute of Standards and Technology

Forum on National Strategy for Trusted Identities in Cyberspace

9th - 12th
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
Instructional Video2:00
National Institute of Standards and Technology

National Strategy for Trusted Identities in Cyberspace (NSTIC)

9th - 12th
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and...
Instructional Video9:04
Seven Dimensions

Addressing Privacy Breaches in the Workplace

Higher Ed
In this video, a group of employees discuss the importance of privacy and security in the workplace. They address issues such as breaching privacy, collecting personal information, and inappropriate behavior towards clients. The...