Digital Citizenship

Why Do Our Brains Love Fake News? | Above the Noise

Icon: 
Streaming icon

Ever have an argument with someone, and no matter how many facts you provide, you just can’t get that person to see it your way? One big reason for this is cognitive bias, which is a limitation in our thinking that can cause flaws in our judgement. Confirmation bias is a specific type of cognitive bias that motivates us to seek out information we already believe and ignore or minimize facts that threaten what we believe. Studies show that when people are presented with facts that contradict what they believe, the parts of the brain that control reason and rationality go inactive. But, the parts of the brain that process emotion light up like the Fourth of July. In this video, host Myles Bess dives into the research and offers some tips to combat confirmation bias. This resource is part of the News and Media Literacy Collection.

Who's Snooping on You Online? | Above the Noise

Icon: 
Streaming icon

With recent reports of high profile data breaches, ransomware attacks and the prevalence of online trackers -- it’s hard to know how best to protect your privacy online. In this Above the Noise video we met up with the cybersecurity experts at Electronic Frontier Foundation to learn more about who’s snooping on us online and what we can do to protect ourselves. 

Cybersecurity: Crash Course Computer Science #31

Icon: 
Streaming icon

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible, as possible.

Is Piracy Helping Game of Thrones? | PBS Idea Channel

Icon: 
Streaming icon

If you're like us, you love watching Game of Thrones, but you may not have cable. In this case, how are we watching this amazing show on HBO, which is stuck behind a pay wall? A huge number of viewers are downloading the show illegally. But, despite being the most pirated show of 2012, the Game of Thrones DVDs are top sellers, breaking HBO's own sales records! Could it be that piracy is actually helping the show? 

Citizen Scientists | Idaho Science Journal

Icon: 
Streaming icon

A new smart phone app is helping citizen scientists leave their mark.

Idaho State University researchers have developed an app for community input on the Portneuf River. Reporter Kris Millgate follows one family as they use the app to help stakeholders discover the places people value along the river.

 

Presenting Princess Shaw | Lesson Plan Clips

Icon: 
Streaming icon

“A free culture is one where everyone thinks of themselves as a voice in a huge choir, whose power and beauty comes from its size and diversity—where the many don’t bow to the few and the few aren’t responsible for the many.” 

- A definition embraced by the Free Culture Movement

This lesson will explore creativity and self-expression and the ways online culture has created new forms of artistic expression. Sharing and using online content in creative and new formats raises numerous ethical dilemmas regarding conditions and permissions, making it a ripe topic for classroom conversations. Through the lens of the free culture movement (sometimes identified as the open source movement or remix or hacker culture), students will explore how freely sharing music and other kinds of art on the Internet works with the notion that new art emerges from collaboration and iteration. Specifically, in the example of this film, an original song written and published on YouTube by Samantha “Princess Shaw” Montgomery is built upon by Israeli sound artist Ophir “Kutiman” Kutiel to create something new and different that is then shared and celebrated around the world. 

Hackers & Cyber Attacks: Crash Course Computer Science #32

Icon: 
Streaming icon

Not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats, who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.

E-Business | Web Security

Icon: 
Streaming icon

Learn about the importance of web security which becomes top priority with more information changing hands electronically.

Cyber-bullying

Icon: 
Streaming icon

Cyber-bullying is where one or more children targets another through technology such as the Internet, cell phones, or other devices to threaten, harass, or embarrass another child. Cyber-bullying goes beyond just bullying, because it can follow you home (e.g., through text or e-mail messages, blogs, social networking web site, etc.). You can stop cyber-bullying by not responding to any of it, saving the evidence, and reporting it.

Net Neutrality Rules Ensure Equal Access to the Internet

Icon: 
Streaming icon

Discover the FCC's verdict on free and open Internet with this video and educational resources from PBS NewsHour from February 26, 2015. *Note: please watch the segment of the video from 1:24-1:56, which addresses net neutrality.

Pages