Hi, what do you want to do?
Curated Video
Knowing who to trust online
Pupil outcome: I can describe different ways to help decide who to trust online. Key learning points: - Many people behave differently online than they do in real life. - People we do not know offline are online strangers. - It is not...
Curated Video
How to be responsible online
Pupil outcome: I can explain how best to be safe and responsible online. Key learning points: - Finding the right balance of activities is important online and offline. - It is important to choose carefully what we play and view online....
Curated Video
Our favourite things online
Pupil outcome: I can describe enjoyable things to do online and explain how to keep personal information safe. Key learning points: - Being online can be both very fun and very risky. - We can put the things we enjoy in different...
Curated Video
Deciding if a question is too personal
Pupil outcome: I can identify online images, questions and comments that are inappropriate. Key learning points: - We should not share personal details online. - Being online should not make us worried or scared. - We should expect...
Curated Video
Spotting fakes
Pupil outcome: I can explain why some things online are not real and explain how to identify when they are fake. Key learning points: - Not everything online is real or true. - It is difficult to identify fake information as sometimes...
Curated Video
Biased questioning
Pupil outcome: I can evaluate various real-world questionnaires and identify bias in questioning. Key learning points: - Questionnaires are used in a variety of jobs. - Questionnaires may have been designed to hide intentional bias. -...
Wonderscape
Exploring the Advantages of Cryptocurrencies
Discover the benefits of cryptocurrencies, including their independence from central authorities, potential for high returns, and user anonymity. Learn how decentralized technology is reshaping financial transactions and enabling...
Curated Video
ChatGPT 101 - Supercharge Your Work and Life with ChatGPT - ChatGPT Restrictions
This video explores the restrictions that apply to the use of ChatGPT. You will learn about the types of content that ChatGPT cannot provide, such as medical or legal advice, and ethical considerations in using an AI language model....
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Curated Video
SkillSprints: Identity Theft
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Curated Video
High Five Facts - Online Safety
This video explores five fun facts about Online Safety.
Curated Video
Digital Citizenship
The video “Digital Citizenship” discusses how to be safe, responsible, and respectful when using technology.
Curated Video
Social Media Security
Social media security is the practice of analyzing data from active social media sites to protect against threats and security breaches.
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
I WONDER - How Can You Stay Safe Online?
This video is answering the question of how can you stay safe online.
Curated Video
iPhone Security Model
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
Healthcare Triage
Suicide Rates and Insights from Medical Sociology - Healthcare Triage
Aaron's guest this month is Dr. Bernice Pescosolido, who is a medical sociologist at Indiana University. Dr. Pescosolido studies the environments, neighborhoods, and connections that contribute to patients' identities, and looks how this...
The Wall Street Journal
"Reasonable Security" Under the California Consumer Privacy Act
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
The Wall Street Journal
Future Of: Data
How should brands, networks and publishers adapt in the age of "always-on" connectivity? As privacy issues, and trust surrounding the platforms, dominate the news cycle, has the way brands develop and disseminate campaigns changed?
National Institute of Standards and Technology
Forum on National Strategy for Trusted Identities in Cyberspace
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace (NSTIC)
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and...
Seven Dimensions
Addressing Privacy Breaches in the Workplace
In this video, a group of employees discuss the importance of privacy and security in the workplace. They address issues such as breaching privacy, collecting personal information, and inappropriate behavior towards clients. The...