Lesson Overview
Students acquire concrete skills for fact-checking AI content and protecting their privacy when using AI tools.
Before you start the lesson, make sure to read through the lesson overview and the lesson preparation. The Facilitator Guide can also help you prepare.
Students acquire concrete skills for fact-checking AI content and protecting their privacy when using AI tools.
Ready?
Begin Lesson
Fact-checking AI content is like being a detective. Use TRACE - it's easy to remember because we're 'tracing' the truth!
Let's practice! If you saw an AI-generated news story claiming that your school is getting free iPads for every student, how would you use TRACE to check if it's true?
Let's play 'Privacy Checkup'! I'll show you what different AI apps might ask for. You decide if it's safe to share or not.
Permission Scenarios:
After each scenario: Ask students to explain their reasoning
Be extra careful with apps that aren't well-known in the Middle East. Some apps might sell your data or use it in ways you don't expect. When possible, use AI tools that don't require accounts or personal information.
Sometimes AI creates harmful content or you see others misusing AI. Here's what to do:
If you see harmful AI content:
If AI makes you uncomfortable:
In your country, you can report cyberbullying to local authorities, such as the Telecommunications and Digital Government Regulatory Authority (TDRA) in the UAE, the Communications, Space and Technology Commission (CST) in Saudi Arabia, the Cybercrime Unit at the Ministry of Interior in Qatar, or similar bodies in your country. You can also reach out to school counselors or community leaders. Always remember — you are not alone, and asking for help is a sign of wisdom, not weakness.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View Page
Students will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View Page
Students will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page