Lesson Overview
Students acquire concrete skills for fact-checking AI content and protecting their privacy when using AI tools.
Before you start the lesson, make sure to read through the lesson overview and the lesson preparation. The Facilitator Guide can also help you prepare.
Students acquire concrete skills for fact-checking AI content and protecting their privacy when using AI tools.
Ready?
Begin Lesson
Fact-checking AI content is like being a detective. Use TRACE - it's easy to remember because we're 'tracing' the truth!
TRACE Method Walkthrough (4 minutes):
Let's practice! If you saw an AI-generated news story claiming that your school is getting free iPads for every student, how would you use TRACE to check if it's true?
Have participants walk through each step.
Let's play 'Privacy Checkup'! I'll show you what different AI apps might ask for. You decide if it's safe to share or not.
Permission Scenarios:
After each scenario: Ask students to explain their reasoning
African Context Note (1 minute):
Be extra careful with apps that aren't well-known in your country or across Africa. Some apps might sell your data or use it in ways you don't expect. When possible, use AI tools that don't require accounts or personal information.
Emergency Response Plan
Sometimes AI creates harmful content or you see others misusing AI. Here's what to do:
If you see harmful AI content:
If AI makes you uncomfortable:
African Resources:
In your country, you can report cyberbullying to local cybercrime units - like the Nigeria Police Force Cybercrime Unit, Kenya's National Computer Incident Response Team, or South Africa's Cybercrime Unit or talk to school counselors. Always remember - you're not alone, and asking for help is brave, not weak.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View Page
Students will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page