About Digital Citizenship Safety Ethics Community Campaigns Glossary
Erasmus+ · KA1 Mobility of Youth Workers · 2026

Netiquette:
Ethics & Citizenship
Online

A practical guide for youth workers and young people navigating the digital world

Eight days of learning across five countries, distilled into one practical guide. Every chapter covers a topic that matters for anyone working with young people in digital spaces — or navigating those spaces themselves.

MaltaSpainLatviaTürkiyeRomania
Contents
00
About This ToolkitProject background, objectives, and how to use this guide
01
What Is Digital Citizenship?Rights, responsibilities, and what it means to participate online
02
Staying Safe OnlineThreats, protection strategies, cyberbullying, and the upstander choice
03
Ethics in the Digital WorldEthical communication, misinformation, digital footprints
04
Building a Positive Online SpaceInclusivity, conflict resolution, communication that builds
05
Creating Change OnlineCampaign strategy, content creation, measurement, impact
Glossary & ResourcesKey terms defined and curated tools for further learning

Introduction

About This Toolkit

5Partner Countries
8Days of Learning
5Core Topic Chapters
KA1Erasmus+ Mobility of Youth Workers · 2026

In today's rapidly evolving digital landscape, youth workers are increasingly required to guide and support young people as they navigate the complexities of online spaces. Social media platforms, online forums, and digital communities are not just venues for interaction — they are critical spaces where young people's identities, beliefs, and behaviours are formed.

Yet these spaces also present significant challenges. Cyberbullying, misinformation, and unethical online practices can have profound effects on young people's wellbeing. Many youth workers currently lack the skills and strategic understanding needed to moderate these spaces and foster positive digital environments.

This toolkit emerged from an Erasmus+ KA1 mobility project that brought together youth workers and young people from five countries — Malta, Spain, Latvia, Türkiye, and Romania — for eight days of intensive work in Puerto de la Cruz, Spain. The focus was practical: how to navigate digital spaces more responsibly, how to protect young people online, how to build communities that are genuinely inclusive, and how to create digital campaigns that actually change things.

What follows is not a record of those eight days. It is a standalone educational resource — structured so that anyone, whether connected to this project or not, can pick it up and apply it directly in their youth work, their organisation, or their own digital life.

Objective 01

Enhancing Digital Citizenship

Teaching the rights and responsibilities of online participation, promoting ethical communication, and guiding young people toward safe and responsible digital behaviour.

Objective 02

Promoting Ethical Online Behaviour

Developing the capacity to model and teach ethical online conduct — addressing cyberbullying, misinformation, and what it takes to maintain positive digital spaces.

Objective 03

Empowering with Digital Tools

Practical training in social media management, digital campaign development, and the responsible use of AI and digital platforms.

Objective 04

Fostering Positive Communities

Strategies for conflict resolution, positive communication, and designing online spaces where every participant feels safe, included, and heard.

Objective 05

Preparing for Future Challenges

Forward-looking training on AI, algorithmic influence, and the ethical implications of emerging technologies — so youth workers remain effective guides in a fast-changing landscape.


Chapter
I
01

What Does It Mean to Be a Digital Citizen?

"You have rights offline. But what about online — and do you know how to use them?"

Citizenship is one of the oldest ideas in political thought. To be a citizen is to belong to a community, to hold rights within it, and to carry responsibilities toward its other members. For most of history, that community was defined by geography. Today, most of us are also citizens of an enormous, borderless community: the internet.

Digital citizenship is the framework for understanding what it means to participate in that community well — with rights, responsibilities, and an awareness of how our behaviour affects others. It is not simply about following rules. It is about developing a conscious, active relationship with the digital world.

The Core Pillars

Rights and Responsibilities: The Inseparable Pair

A common error is to think about digital rights without their corresponding responsibilities. For every right you hold online, there is a mirror-image responsibility.

Right

Freedom of Expression — You have the right to express your views and contribute to public conversations.

↔ Responsibility: Not to use that freedom to spread hate speech, deliberate misinformation, or content designed to harm.

Right

Privacy — You have the right to control information about yourself and limit who can access your personal data.

↔ Responsibility: To respect others' privacy equally — not sharing their information or images without consent.

Right

Access and Participation — You have the right to access information and participate in online communities without discrimination.

↔ Responsibility: To make those communities welcoming for others, not create barriers through exclusion or gatekeeping.

Right

Security — You have the right to be protected from online harm, fraud, and exploitation.

↔ Responsibility: Not to engage in behaviours that create those harms for others — phishing, harassment, impersonation.

Real Scenarios: Good and Poor Digital Citizenship

These four scenarios illustrate the patterns that define good and poor digital citizenship in practice:

✓ Positive Example

A young person sees a peer being mocked in a group chat. Instead of staying silent, they send a private message to the target offering support, then report the behaviour to a moderator.

Upstander behaviour: it costs relatively little but reduces real harm and signals community standards.

✗ Negative Example

Someone shares a viral post with a fabricated quote because it confirms what they already believe — without verifying the source first.

Even without malicious intent, this spreads disinformation. Impact matters as much as intention.

✓ Positive Example

A youth worker running a Facebook group enforces the code of conduct consistently and transparently when a member posts exclusionary comments — for all members, not selectively.

Consistent, transparent moderation creates trust and sets clear expectations for the whole community.

✗ Negative Example

A teenager uses an anonymous account to post abusive comments, reasoning that anonymity means no consequences.

Anonymity does not remove real harm — and does not always protect identity. It also normalises harmful behaviour for everyone watching.

Active Digital Citizenship in Practice

What active citizenship looks like
  • Using your platforms to amplify underrepresented voices, not just your own views.
  • Engaging with digital tools critically — questioning their design, incentives, and how they shape your behaviour.
  • Modelling ethical behaviour consistently, including when no one is watching.
  • Educating others — especially young people — not just about safety, but about their digital rights and how to assert them.
  • Participating in digital democracy: petitions, civic consultations, and public conversations that shape policy and public life.

A responsible digital citizen is not just someone who follows rules — they actively shape a better online environment. Every click, share, comment, and silence is a choice. Make it count.

Chapter Takeaway

Digital citizenship is not a checklist. It is an ongoing practice of conscious, responsible participation — and it starts with recognising that the internet is a shared space we all have the power, and the responsibility, to make better.

Self-Reflection: What Kind of Digital Citizen Are You?

Read each statement honestly. This is not a test — it is a starting point for reflection.

  • I verify information before sharing it, even when it aligns with what I already believe.
  • I treat people I interact with online with the same respect I would show in person.
  • I speak up — or find another way to act — when I see someone being treated harmfully online.
  • I am aware of my privacy settings and review them regularly.
  • I consider how my posts might affect others before publishing them.
  • I know my digital rights, and how to report violations of them.
  • I actively try to make the online spaces I inhabit more welcoming and inclusive.
  • I recognise that my digital actions have real-world consequences for real people.

Chapter
II
02

Staying Safe Online

"Every time you go online, you leave a door open. The question is — who has the key, and are you sure it's you?"

Online safety is often taught as a list of prohibitions: don't share your password, don't talk to strangers, don't click suspicious links. These rules are not wrong — but they miss the deeper point. Real safety online comes from understanding the environment you operate in, knowing what threats exist, how they work, and how to respond confidently when you encounter them.

Understanding the Threat Landscape

Your Personal Security Framework

Strong, Unique Passwords

Use a different, strong password for every account that matters — at minimum, email, banking, and primary social media. A password manager (Bitwarden, 1Password, or built-in browser managers) generates and stores these securely. A strong password is long (15+ characters), random, and varied in character types.

Two-Factor Authentication (2FA)

2FA adds a second verification step after your password — usually a code from an app or SMS. Enable it on every account that offers it. Even if an attacker has your password, they cannot access the account without the second factor. This single step blocks the vast majority of automated account takeovers.

Privacy Settings Audit

Platforms default to sharing more than most users want. Audit yours at least every three months — platforms update their defaults frequently. Key questions: Who can see my profile and posts? Who can find me by email or phone? What am I sharing with third-party apps? What is the platform doing with my location?

Recognising Manipulation

Train yourself to pause when a message creates urgency, fear, or excitement before asking you to click or provide information. Legitimate organisations do not ask for passwords. Unexpected prizes are almost always scams. If something feels wrong, verify through official channels before acting.

Cyberbullying: What It Is, How It Harms, What to Do

Cyberbullying is any repeated, intentional harm inflicted through digital devices. What makes it uniquely damaging: it follows the target home, operates 24 hours a day, can spread to thousands instantly, and leaves a permanent record. The psychological impact — anxiety, social withdrawal, depression — is well documented and serious.

Form

Harassment: Repeated hostile messages, comments, or posts targeting a specific person.

Form

Public Humiliation: Sharing embarrassing images, videos, or information about someone without their consent.

Form

Exclusion: Deliberately and repeatedly leaving someone out of online groups or conversations.

Form

Impersonation: Creating fake profiles to pretend to be someone else and damage their reputation.

If you are being cyberbullied
  • Document it. Take screenshots with timestamps before anything is deleted.
  • Do not retaliate. Responding often escalates the situation and provides more material.
  • Block and report. Use the platform's reporting tools — they exist for exactly this situation.
  • Tell someone you trust. A parent, youth worker, teacher, or counsellor. You do not have to manage this alone.
  • Know this is not your fault. Someone else's decision to harm you is their responsibility.

The Bystander vs. Upstander Question

Most people who witness harmful online behaviour do nothing — not because they approve, but because they don't know what to do, or fear becoming a target. Online, where audiences are large and content spreads fast, silence reads as approval. An upstander chooses to act: messaging the target privately to offer support; reporting the content; adding a supportive comment; or involving a trusted adult when the situation is serious.

When we look out for each other online, we make the whole environment safer. The upstander choice costs relatively little — and means everything to the person on the receiving end of harm.

Chapter Takeaway

Online safety is not just a personal responsibility — it is a collective one. Technical tools protect your accounts; awareness protects your judgment; and the choice to be an upstander protects your community.

Your Online Security Checklist

  • I use a unique, strong password for every important account (email, banking, social media).
  • I have enabled two-factor authentication on my primary email and social media accounts.
  • I have reviewed my privacy settings on my main platforms within the last three months.
  • I know how to report harmful content on each platform I use regularly.
  • My devices and apps are set to update automatically.
  • I know what steps to take if I or someone I know experiences cyberbullying.
  • I pause and verify before clicking links in messages, even from people I know.
  • I recognise social engineering tactics and their emotional triggers.

Chapter
III
03

Ethics in the Digital World

"Just because you can say it online, doesn't mean you should. And just because everyone is saying it, doesn't mean it's true."

Ethics is not confined to philosophy seminars. In digital spaces, ethical questions arise dozens of times a day — every time you decide whether to share something, how to respond to someone, or what to do with information you have encountered. The digital world amplifies everything: the reach of truth and the reach of lies alike.

The Principles of Ethical Online Communication

Misinformation and Disinformation: How They Work

Misinformation is false information spread without intent to deceive — shared in good faith but still harmful. Disinformation is false information spread deliberately to mislead. Both cause damage, but they require different responses. Why does false content spread so effectively? Research consistently shows that emotionally engaging content — content that makes us angry, frightened, surprised, or amused — spreads faster than accurate but neutral information. Algorithms optimise for engagement, and outrage is enormously engaging. Understanding this mechanism is the first step toward resisting it.

Common misinformation formats to recognise
  • The decontextualised image or video: A real image stripped of context to imply something entirely different. Always trace the original source.
  • The misleading headline: A headline that contradicts or overstates the actual article beneath it. Read past the headline before sharing.
  • The false attribution: A quote attributed to someone who never said it. Look for primary sources, not secondary reports of quotes.
  • The false statistic: A number presented without source, methodology, or context. Ask: where does this come from, and what does it actually measure?
  • Satire mistaken for fact: Parody content shared as if real. Check whether the source is a satire publication.

How to Fact-Check in Four Steps

1
Stop before you share.

Ask yourself: do I actually know this is true, or does it just feel true? Emotional resonance is not the same as accuracy. Slow down before acting on the impulse to share.

2
Trace it back to the original source.

Most misinformation is shared many steps removed from its origin. Is the source a credible organisation, a named journalist, a peer-reviewed study — or an anonymous account or a screenshot of a screenshot?

3
Check it against independent sources.

If something significant is true, multiple credible, independent outlets will be reporting it. Use dedicated fact-checkers: Snopes, Full Fact, AFP Fact Check, or your national fact-checker.

4
Consider the full context.

Real images, quotes, and statistics are frequently stripped of context to mean something different. Is this the full picture, or a carefully chosen fragment designed to create a specific impression?

Your Digital Footprint

Everything you do online leaves a trace. Every search, like, comment, purchase, and location check-in contributes to your digital footprint — a comprehensive profile of who you are, what you believe, and what you do. This is collected by platforms, sold to advertisers, analysed by algorithms, and in some contexts accessed by employers or institutions.

Your footprint has two parts. Your active footprint is what you deliberately create and share: posts, comments, profile information. Your passive footprint is everything platforms record without you noticing: what you linger on, what you search for, where you are. The passive footprint is often far more detailed — and almost entirely invisible to most users. Long-term consequences are real: offensive comments made at 17 can affect job applications at 27. Screenshots persist long after posts are deleted.

Ethical Debates to Sit With

Ethical debate

Should social media platforms have the power to remove content and ban users? Who holds those platforms accountable for their decisions?

Ethical debate

Is it ethical for algorithms to personalise your information environment, effectively deciding what version of reality you see? Who benefits from this?

Ethical debate

If you share misinformation without knowing it is false, are you still ethically responsible for the harm it causes? Does intent change the impact?

Ethical debate

Where is the line between a public figure's public role and their right to a private life? Does choosing a public role reduce your claim to privacy?

Chapter Takeaway

Ethical digital behaviour is not about perfection — it is about intention, consistency, and accountability. The commitment is not to never make mistakes, but to keep asking hard questions and to correct course honestly when you cause harm.


Chapter
IV
04

Building a Positive Online Space

"The internet is not just something that happens to you — you are part of what it becomes."

Positive online communities do not happen by accident. They are built deliberately, consistently, by the people who inhabit them. Whether you are moderating a youth group chat, running an NGO's social media, or simply showing up as a member of an online space, your choices shape the culture of that space.

What Inclusion Actually Requires

Inclusion is frequently described as a value. It is more useful to think of it as a practice — something you do, not just something you believe in. Research and practice in online community management consistently point to the same persistent barriers:

Barriers to inclusive online communities
  • Language and cultural assumptions: Using idioms or references that only make sense to a specific in-group excludes others — often invisibly.
  • Amplification imbalance: Dominant voices get amplified while marginalised voices go unheard. This is partly algorithmic, partly social — and something moderators and members can address actively.
  • Undefined norms: Communities without explicit guidelines leave behaviour undefined, which typically favours those who already feel at home.
  • Performative moderation: Rules that exist on paper but are enforced inconsistently — especially only against less powerful members — erode trust quickly.
  • High cost of entry: Some communities require expertise or social connection that functionally excludes newcomers by default.

The most effective remedies: co-creating community guidelines with members rather than imposing them; regularly checking in with quieter voices; actively elevating underrepresented perspectives; and responding consistently and transparently to violations.

Communicating Well in Digital Spaces

Managing Conflict Online

1
Move to a private channel.

Conflict resolved in public turns into performance. Comment sections have audiences, and audiences change behaviour. Take the conversation into a direct message where both parties can engage without performing for others.

2
Separate the person from the position.

You can disagree strongly with what someone is saying while still treating them with basic dignity. Conflating disagreement with an idea and an attack on the person holding it is one of the most common drivers of online conflict escalation.

3
Find the shared concern underneath.

Even in heated disagreements, there is usually a shared value underneath. Finding and naming it explicitly changes the dynamic: from two people fighting each other, to two people who care about the same thing and disagree on how to address it.

4
Know when to disengage.

Not every online argument is worth pursuing. Sometimes the most constructive choice is to withdraw, let things cool, and return — or not. Disengaging is not losing; it is a valid conflict management strategy.

5
As a moderator: intervene early, consistently, transparently.

Address problematic behaviour early. Apply rules consistently to all members, and explain your decisions. Arbitrary moderation destroys community trust faster than almost anything else.

You don't need to be an admin or a moderator to improve an online space. Every interaction is an opportunity to model the culture you want to see. Small, consistent choices add up into community norms.

Chapter Takeaway

Positive online communities are built through consistent, deliberate practice — not good intentions alone. Inclusion is something you do. Communication is a skill you develop. Conflict is something you can learn to navigate rather than avoid or inflame.

The Positive Communication Pledge

Five commitments to bring into every digital space you inhabit.

  • 01I will check my tone before I send — and re-read my messages from the perspective of the person receiving them.
  • 02I will not share content I have not verified, even when it confirms what I already believe.
  • 03I will speak up — or find another way to act — when I see someone being treated harmfully online.
  • 04I will engage with ideas I disagree with, rather than dismissing or attacking the people who hold them.
  • 05I will actively make space for voices that are not usually heard in the conversations I am part of.

Chapter
V
05

Creating Change Online: Your Campaign Guide

"You don't need a big budget or a famous face. You need a message, a plan, and the discipline to see it through."

Online campaigns are among the most accessible advocacy tools available to youth workers and young people today. A well-designed campaign can shift public opinion, build communities around a cause, and hold power to account — without significant financial resources. What it requires is clarity of purpose, strategic thinking, and consistent execution.

Step 1: Define Your Objective with Precision

"Raise awareness" is where campaigns start — but it is not an objective. Awareness is an intermediate goal. The real question: awareness leading to what? What specific change do you want to see in the world?

From vague to precise: examples
  • Vague: "Raise awareness about cyberbullying." → Precise: "Increase the number of young people in our network who know how to report cyberbullying on Instagram by 40% within 8 weeks."
  • Vague: "Promote digital citizenship." → Precise: "Get 200 young people to take our digital citizenship pledge and share it with their networks."
  • Vague: "Campaign against misinformation." → Precise: "Publish a 4-part video fact-checking series, each reaching at least 1,000 views, aimed at 16–24 year olds."

Step 2: Know Your Audience — Deeply

"Young people" is not an audience. "16–19 year olds in secondary school who primarily use TikTok and are comfortable in both their national language and English" is an audience — you can design content, choose platforms, and craft messages specifically for them. For each audience segment, think about: Where do they spend time online? What do they already believe about your topic? What barriers might prevent them from taking the action you're asking for?

Step 3: Choose Your Platform Strategically

Platform

Instagram / TikTok: Visual storytelling, short video, strong among 13–25. High organic reach for compelling content. Best for: awareness, emotional connection, campaigns with strong visual assets.

Platform

Facebook / Groups: Strongest among 25+ and community contexts. Good for: community building, event promotion, reaching parents, professionals, and NGO networks.

Platform

LinkedIn: Professional audiences. Good for: campaigns aimed at institutions, employers, or policy audiences. Less suited for youth-facing content.

Platform

YouTube: Long-form video. Strong for educational content and campaigns that benefit from depth. Good for reaching people already searching for information on your topic.

Step 4: Create Content That Works

Content creation principles
  • Lead with emotion, back with facts. People engage first with how something makes them feel. Your hook should create emotional connection before delivering the information.
  • Show, don't tell. "Cyberbullying is harmful" tells. A real story of how someone was affected shows. Specific, human content almost always outperforms abstract statements.
  • Visual consistency. Consistent colours, fonts, and style make your campaign recognisable. Tools like Canva make this accessible to anyone.
  • One clear call to action per piece. What do you want people to do after seeing this? One CTA — not five.
  • Brevity is power. A post that does one thing well travels further than one that tries to cover everything.

Step 5: Measure What Matters

The most effective campaigns come from people who are genuinely close to the issue they are addressing. You already have that. Pair it with a clear strategy and you have everything you need to make real impact.

Chapter Takeaway

A campaign is a strategy, not just a post. Objective, audience, message, platform, content, and measurement — six elements that work together. Get them right, and your budget becomes far less important than the clarity of your purpose.

Campaign Planning Template

Complete this before creating a single piece of content. Each field is a decision that shapes everything else.

Specific, measurable, time-bound

Age, platform, existing attitudes

One sentence. Ruthlessly edit.

One clear action per post

Where your audience already is

Video, graphic, story, text, live…

Launch date, key moments, end

Must connect directly to your goal


Reference

Glossary

Key terms from this toolkit, defined simply.

Netiquette
A blend of "network" and "etiquette" — the code of acceptable and respectful behaviour in online communication.
Digital Citizenship
The responsible, ethical, and informed participation in online communities — encompassing rights, responsibilities, and digital literacy.
Digital Literacy
The ability to find, evaluate, create, and communicate information using digital technologies — understanding how they work and who benefits from them.
Cyberbullying
Repeated, intentional harm inflicted through digital devices — including harassment, exclusion, impersonation, and public humiliation.
Phishing
A deceptive attempt to obtain sensitive information by impersonating a trustworthy source via email, text, or direct message.
Social Engineering
Manipulation tactics exploiting human psychology — trust, urgency, fear, authority — rather than technical vulnerabilities.
Two-Factor Authentication
A security process requiring two separate verification steps before granting access to an account.
Digital Footprint
The cumulative trail of data you leave online — both what you actively share and what platforms passively record about your behaviour.
Misinformation
False information spread without deliberate intent to deceive — shared in good faith but still capable of causing harm.
Disinformation
False information created and spread deliberately with intent to deceive, manipulate, or cause harm.
Algorithm
A set of rules used by platforms to decide what content to show each user, based on engagement patterns. Algorithms optimise for attention.
Upstander
A person who witnesses harmful behaviour and chooses to act — by supporting the target, reporting content, or challenging the behaviour.
Bystander Effect
The tendency to be less likely to intervene in harmful situations when others are present — amplified online by large passive audiences.
KPI
Key Performance Indicator — a measurable value used to evaluate whether a campaign is achieving its specific objectives.
Call to Action (CTA)
A clear instruction in campaign content telling the audience what specific action to take: share, sign, attend, follow, donate.
Inclusive Community
An online space intentionally designed so people of all backgrounds feel genuinely welcome, heard, and able to participate on equal terms.
De-escalation
Techniques used to reduce the intensity of a conflict — through calm communication, finding shared ground, or strategic withdrawal.
Credential Stuffing
An attack where stolen username/password combinations from one breach are tested against other services, exploiting password reuse.
Further Learning

Resources & Tools

A curated directory of free tools, platforms, and organisations to support your work in digital youth spaces — organised by topic.

🔐 Personal Safety Audit
Have I Been Pwnedhaveibeenpwned.com

The go-to free tool for checking whether your email or password has appeared in a known data breach. Instantly shows which breaches exposed your data and what type of information was leaked — results feel personal and immediate.

Mozilla Monitormonitor.firefox.com

Mozilla's free breach monitoring service that alerts you when your personal information appears in new data leaks, and scans for your data on broker sites that sell personal information without your consent.

Google Password Checkuppasswords.google.com/checkup

Scans your saved Google passwords against known breach databases and flags weak, reused, or compromised ones. Takes under a minute — a practical starting point for anyone who uses Google to manage passwords.

Privacy Checkup (Google)myaccount.google.com/privacycheckup

A guided walkthrough of your Google account's privacy and security settings — location history, ad personalisation, data sharing, and app access. Takes about 10 minutes and often surfaces settings people didn't know existed.

Bitwardenbitwarden.com

A free, open-source password manager that generates and securely stores strong unique passwords across all devices. Its code is publicly auditable, making it a more trustworthy recommendation than closed commercial alternatives.

Meta Security Checkupfacebook.com/settings/security

Reviews your Facebook and Instagram login activity, two-factor authentication status, and connected third-party apps. Often reveals forgotten app permissions granted years ago — a useful exercise in awareness.

👣 Digital Footprint Awareness
Google Yourselfgoogle.com

The simplest and most impactful exercise: search your own name, username, and email address and see what is publicly visible. Try image search too. Often more revealing than expected, and sparks strong discussion about self-presentation and data exposure.

Deseat.medeseat.me

Connects to your Gmail and scans for every service you have ever signed up to, then helps you delete old accounts systematically. Reducing your account footprint directly reduces exposure in future breaches — most people discover accounts they completely forgot existed.

Mozilla Privacy Not Includedfoundation.mozilla.org/privacynotincluded

Mozilla's research-backed guide that rates the privacy practices of popular apps, platforms, and devices — from dating apps to smart speakers. Each product is assessed on data collection, encryption, and potential for misuse.

JustDeleteMejustdeleteme.xyz

A directory that rates how easy or hard it is to delete your account from hundreds of websites, colour-coded from easy to impossible. Highlights how many platforms deliberately make it difficult to leave — a great conversation starter about digital rights and GDPR.

✅ Fact-Checking & Misinformation
InVID / WeVerifyinvid-project.eu

A free browser extension for verifying online videos and images — checks metadata, reverse-searches frames, and detects manipulation. Developed as part of an EU-funded research project and widely used by journalists across Europe.

Google Reverse Image Searchimages.google.com

Drag any image into Google Images to instantly find its original source, earlier versions, and where else it appears online. One of the most transferable verification skills you can pass on — takes seconds and can debunk misleading posts on the spot.

Snopessnopes.com

One of the oldest and most reliable fact-checking sites, covering viral claims, urban legends, and political misinformation with clearly sourced verdicts. A solid reference for showing what rigorous, transparent fact-checking looks like.

Full Factfullfact.org

An independent European fact-checking organisation that also publishes practical guides on how to verify claims yourself. More relevant to European political and media contexts than most US-focused alternatives. Free resources translate well into workshop activities.

🤖 AI Tools for Youth Workers
Claude (Anthropic)claude.ai

A capable AI assistant well suited for creating workshop materials, discussion scenarios, netiquette case studies, and facilitation guides. Handles nuanced and sensitive topics around online ethics thoughtfully — a strong first AI tool to introduce to youth workers new to AI.

ChatGPTchatgpt.com

The most widely known AI assistant, useful for drafting session plans, quiz questions, icebreakers, and role-play scenarios. Its widespread adoption among young adults makes it a natural tool to explore critically — participants are very likely already using it.

Perplexityperplexity.ai

An AI-powered research assistant that answers questions with cited, linked sources rather than generating unverifiable content. Particularly valuable for demonstrating the difference between AI that references real information and AI that fabricates it.

Diffitdiffit.me

An AI tool that adapts any topic or article to a chosen reading level or language — extremely useful for making complex cybersecurity and privacy content accessible to diverse groups. A practical tool for youth workers dealing with multilingual or mixed-background participants.

Canva AIcanva.com

Combines AI writing assistance with Canva's design tools to quickly produce posters, infographics, and presentations on netiquette and online safety topics. The free tier is generous and the interface is fast to learn.

🌐 Education & Awareness
Better Internet for Kids (EU)better-internet-for-kids.europa.eu

The EU's official hub for online safety, co-funded by the European Commission and available in all EU languages — directly Erasmus-aligned. Contains substantial resources for educators, youth workers, and professionals working with young adults.

Safer Internet Centres Networkbetter-internet-for-kids.europa.eu/en/sic

A network of national centres across Europe providing local helplines, hotlines, and country-specific resources on online safety. Each centre operates independently and offers support contacts relevant to its national context.

Stay Safe Online (NCA)staysafeonline.org

Run by the National Cybersecurity Alliance, this site offers plain-language guides, tip sheets, and infographics on a wide range of online safety topics. Materials are free to download and share — particularly useful for creating handouts from workshops.

PrivacyTools.ioprivacytools.io

A community-maintained directory of privacy-respecting alternatives to mainstream tools — browsers, email, VPNs, messaging apps, and more. Useful when participants ask what they should actually switch to after becoming aware of privacy issues. Honest about trade-offs.

Electronic Frontier Foundationeff.org

A leading digital rights organisation that publishes accessible guides on surveillance, privacy, encryption, and online freedoms. Their Surveillance Self-Defense guide (ssd.eff.org) is particularly strong — adds a rights dimension that pairs well with practical safety tools.

CISA — Cybersecurity Awarenesscisa.gov/cybersecurity

The US Cybersecurity and Infrastructure Security Agency publishes a large bank of free awareness materials, videos, and tip cards on phishing, ransomware, and account security. While US-focused in places, most content is universally applicable.

🎓 Erasmus+ & Youth Work
Youthpassyouthpass.eu

The Erasmus+ tool for documenting, reflecting on, and formally recognising non-formal and informal learning in youth projects. Essential for participants completing this programme.

SALTO-YOUTHsalto-youth.net

European resource centre for youth work and youth workers. Toolkits, training calendars, and networking opportunities for Erasmus+ professionals across Europe.

SUPPORTED BY
Co-funded by the European Union
Erasmus+
Government of Malta
FONDI.eu