Content from the Level Up site may be freely reused for educational purposes, and has been designed in a modular fashion to help teachers plug-and-play content in their classroom (online and off). See below for more information on how to find instructional support, including ideas for assignments and teaching digital literacy topics.
The following three sample assignments are adapted from Data & Society's Media Manipulation Syllabus.
(1) Evaluating sources
(2) News consumption
(3) Create and critique a meme
(4) Knowledge production and power
(5) Evaluating Social Media
Each of the following Level Up pages includes an introduction to the topic, along with a suggested activity, which instructors are welcome to use or adapt for the classroom.
- How the Web Works
- Algorithms: Help students consider how information is displayed and prioritized on platforms such as Facebook, Yelp, or Buzzfeed.
- Hacking URLs: Help students manipulate URLs to sharer cleaner and more effective links.
- Search Engines vs. Databases: Help students understand differences between databases like JSTOR and popular search engines like Google.
- Platforms: What's a content management system? Web hosting? A server?
- Creating Web Content
- HTML: A basic introduction and activity to learn HTML for websites.
- CSS: A basic introduction and activity to learn Cascading Style Sheets (to style websites).
- Inspect this Page: How to inspect website code.
- Web editors (WYSIWYGs): How to make the most of built-in content editors from sites like Wordpress and Gmail.
- Remixing Online Content
The following guides from the Electronic Frontier Foundation can help you and your students keep their information safe and private online:
- Creating Strong Passwords: Do you use the same password on every website or almost use the same password and change it a little bit for each site? If so, you're vulnerable to getting hacked.
- Cybersecurity Guide for Attending Protests in the United States: Useful tips for you to remember if you find yourself at a protest and are concerned about protecting your electronic devices if or when you’re questioned, detained, or arrested by police. Remember that these tips are general guidelines, so if you have specific concerns, please talk to an attorney.
- Facebook Groups: Reducing Risks: Facebook groups were not designed for secure collaboration, but as the popularity of Facebook grows, they are inevitably used by many to coordinate work that may be vulnerable to sabotage or surveillance by other, malicious Facebook users or governments.
- How to Avoid Phishing Attacks: When an attacker sends an email or link that looks innocent, but is actually malicious, it’s called phishing. Phishing attacks are a common way that users get infected with malware—programs that hide on your computer and can be used to remotely control it, steal information, or spy on you.
- The Problem with Mobile Phones: Mobile phones were not designed for privacy and security. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance risks—especially location tracking.
- Protecting yourself on Social Networks: Social networks are often built to share posts, photographs, and personal information. Yet they have also become forums for organizing and speech—much of which relies on privacy and pseudonymity. The following questions are important to consider when using social networks: How can I interact with these sites while protecting myself? My basic privacy? My identity? My contacts and associations? What information do I want keep private and who do I want to keep it private from?