Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Basics of digital literacy

1. What is Digital Literacy?

Digital literacy means having the skills to effectively use technology, and the knowledge and skills to do
so safely and responsibly. “Digital” refers to technology, ranging from computers and the internet to
technological objects and programs such as cellphones, smart home systems, and more. Literacy refers
to the ability to use this technology and to use it well.

 Why is digital literacy important in the modern world?

With digital literacy, students can learn to be safe online and engage with others safely, safeguarding
their personal information and keeping themselves and others safe from online threats, crime, and
scam.

 The digital divide and its implications

The digital divide refers to the gap that exists between individuals or communities who have access to
digital technologies and the internet and those who do not. This divide can manifest in various ways,
including differences in access to hardware (such as computers and smartphones), access to high-speed
internet, and differences in digital literacy and technology skills. The implications of the digital divide are
significant and wide-ranging:

 Education Divide: Students without access to digital tools and the internet may struggle to
complete online assignments, access educational resources, or participate in virtual classrooms.
This can lead to disparities in educational outcomes and hinder their long-term prospects.
 Economic Disparities: The digital divide can perpetuate economic inequalities. Job opportunities
increasingly require digital skills, and those without access to technology and the internet may
be excluded from higher-paying jobs and career advancement.
 Healthcare Disparities: Access to telemedicine and digital health resources has become crucial,
especially during health crises like the COVID-19 pandemic. Those without access to digital tools
may face challenges in receiving medical care and health information.
 Information Divide: Access to information is a fundamental right in the digital age. The digital
divide limits individuals' ability to access news, government services, and critical information,
which can affect civic engagement and participation.
 Social Isolation: In an increasingly connected world, the digital divide can lead to social isolation.
Individuals without internet access may miss out on social interactions, communication with
loved ones, and participation in online communities.
 Inequality in Innovation: The digital divide limits the ability of marginalized communities to
participate in technological innovation. This can perpetuate biases and inequalities in the
development of digital products and services.
 Political Participation: The digital divide can affect political participation and engagement. Those
without access to online information and tools may not be able to engage in political
discussions, access government services, or participate in online advocacy.
 Rural-Urban Disparities: In many cases, rural areas have less access to high-speed internet
compared to urban areas, creating disparities in economic opportunities, education, and
healthcare between these regions.
 Generational Divide: The digital divide can also exist along generational lines. Older individuals
who are not familiar with technology may face challenges in accessing services and information
that are increasingly digital.
 Cultural and Language Barriers: Minority and immigrant communities may face additional
challenges due to language and cultural barriers in navigating the digital world.

2. Digital literacy's 8 elements

Cultural: how to behave

Understanding the culture (history, language, customs and values etc) of the internet and digital
environments by:

 Knowing how to behave online; from netiquette to protection and privacy.


 Recognising the difference between personal and professional use.
 Understanding how internet culture is expressed and transmitted through phenomena such
as memes, emojis and animated gifs.
 Being able to seamlessly adjust to the different social environments of various applications.
 Understanding how online environments have changed the meaning of words such as expertise,
publishing and sharing.

Cognitive: how to do

The Cognitive element incorporates what we know of as computer literacy or IT skills with an
understanding of the key concepts.

 Having the ability to use a range of devices, software platforms and interfaces.
 Recognising common features across digital tools such as navigation menus, settings, and
profiles.
 Understanding concepts such as tagging, hashtags, and sharing.

Constructive: how to use

The Constructive element involves knowing what it means to ‘construct’ something in a digital
environment; how content can be appropriated, reused and remixed.

 Knowing how to responsibly use and build upon someone else’s work.
 Respecting copyright and understanding the concepts of remix and reuse.
 Being familiar with the various Creative Commons’ licences.

Communicative: how to communicate

The Communicative element is about as the name suggests, how to communicate in digital
environments. For example:
 Knowing the purpose of various online tools and how they are different or similar to each other.
 Being familiar with the communication norms and expectations of various online tools.
 Understanding what identity, sharing, influence and trust mean in digital spaces.

Confident: how to belong

In order participate confidently online we need to feel as if we belong. This involves:

 Understanding and capitalising upon the ways in which the online world differs from the offline
world.
 Reflecting on one’s learning in digital spaces.
 Being part of an online community.

Creative: how to make

The Creative element refers to creating new things which add value where the focus is more on
the value created than the act of creating something new. For example:

 Learning how to do things in new ways using online tools and environments.
 Imaginatively and critically thinking about how we create and share knowledge using digital
technologies.
 Knowing how to curate digital content to create value for readers.

Critical: how to evaluate

The Critical element is probably the element that is most familiar to those of us working in the library
and information profession as it most closely relates to both information literacy and the research
process.

 Using reasoning skills to question, analyse, scrutinise and evaluate digital content, tools and
applications.
 Knowing how to search effectively.
 Being able to distinguish credible sources from less credible ones.

Civic: how to participate

The Civic element refers to individuals having the knowledge and ability to use digital environments to
self-organise; to be part of a movement bigger than themselves. For example:

 Understanding one’s digital rights and responsibilities.


 Participating in social movements or the democratic process online.
 Preparing both ourselves and others to participate fully in society.

3. Basic Skills for Safe and Effective Internet Use

Safe and effective internet use involves a combination of technical skills and responsible online
behavior.

 Password Management:
Create strong, unique passwords for each online account.

Use a mix of uppercase letters, lowercase letters, numbers, and special characters.

Avoid using easily guessable information like birthdays, names, or common words.

Consider using a reputable password manager to generate and store your passwords securely.

 Online Privacy:

Be cautious about sharing personal information online. Only share it with trusted sources.

Adjust privacy settings on social media platforms to control who can see your posts and information.

Be aware of the data collection practices of websites and online services you use.

 Email Safety:

Be wary of email attachments and links, especially if they come from unknown senders.

Verify the legitimacy of email requests for sensitive information.

Use email filtering and antivirus software to detect and block phishing attempts.

 Browsing Security:

Keep your web browser, operating system, and antivirus software up to date.

Use a secure, updated browser with built-in security features.

Enable pop-up blockers and use ad-blockers to reduce exposure to potentially harmful content.

 Recognize Phishing:

Be cautious of emails and websites that ask for personal information, login credentials, or financial
details.

Verify the authenticity of email senders and URLs before clicking on links or providing information.

Look for signs of phishing, such as misspelled domain names or poor grammar in emails.

 Secure Wi-Fi Usage:

Use secure, password-protected Wi-Fi networks whenever possible.

Avoid public Wi-Fi networks for sensitive activities like online banking, and use a virtual private
network (VPN) for added security.

 Regular Software Updates:

Keep your computer, smartphone, and apps updated with the latest security patches and updates.

Configure your devices to automatically install updates when available.

 Safe Downloads:
Only download software and files from reputable sources.

Be cautious when downloading from unfamiliar websites or clicking on pop-up ads.

 Social Media Etiquette:

Be mindful of what you post on social media, as it can have real-world consequences.

Think before sharing personal information, photos, or sensitive opinions.

Be respectful and considerate in online interactions.

 Cybersecurity Awareness:

Stay informed about common online threats and cybersecurity best practices.

Educate yourself about the risks associated with online activities and how to mitigate them.

 Data Backup:

Regularly back up important files and data to an external device or secure cloud storage.

In case of data loss or ransomware, you'll have a backup copy of your important information.

 Online Shopping Safety:

Shop only from reputable websites with secure (https://) connections.

Be cautious about entering personal and financial information on websites you don't trust.

4. Recognizing Common Online Threats

Recognizing common online threats is essential for staying safe while using the internet. Here are some
of the most prevalent(common) online threats and how to recognize them:

Phishing Attacks:

Recognition: Phishing emails often appear to come from legitimate sources like banks, government
agencies, or reputable companies. They typically ask you to click on a link and provide sensitive
information.

Must do: Be cautious of unsolicited emails, especially those requesting personal information. Hover your
mouse over links to see the actual URL before clicking, and verify the sender's email address.

Malware (Malicious Software):

Recognition: Malware can be hidden in seemingly harmless files or software downloads. It may come
from suspicious websites or email attachments.

Must do: Only download software from reputable sources, keep your antivirus software updated, and be
cautious when opening email attachments, especially from unknown senders.
Ransomware:

Recognition: Ransomware encrypts your files and demands a ransom for decryption. It often comes
from malicious email attachments or compromised websites.

Must do: Regularly back up your important files, and avoid downloading files or clicking links from
untrusted sources.

Identity Theft:

Recognition: Identity theft can occur when personal information is stolen, often through phishing attacks
or data breaches.

Must do: Protect personal information, use strong and unique passwords for online accounts, and
monitor your financial statements for unauthorized transactions.

Social Engineering:

Recognition: Social engineering involves manipulation to gain access to your personal information or
accounts. Attackers may pose as trusted individuals or organizations.

Must do: Verify the identity of anyone requesting sensitive information or financial assistance, especially
if it's an unsolicited request.

Fake Websites and Scams:

Recognition: Scammers create fake websites that mimic legitimate ones to trick you into providing
personal or financial information.

Must do: Always check the website's URL for accuracy, look for secure (https://) connections, and be
cautious of websites that ask for excessive personal information.

Online Harassment and Cyberbullying:

Recognition: Online harassment and cyberbullying involve repeated, hurtful, or threatening behavior
directed toward an individual online.

Must do: Block and report offenders, document instances of harassment, and consider adjusting your
privacy settings on social media.

Fake News and Misinformation:

Recognition: Misinformation can be presented as factual news or information that is false or misleading.

Must do: Be critical of information sources, fact-check information before sharing, and consult multiple
sources for verification.

Unsecured Wi-Fi Networks:

Recognition: Unsecured public Wi-Fi networks lack password protection and encryption, making your
data vulnerable to interception.
Must do: Avoid connecting to unsecured public Wi-Fi networks for sensitive activities like online
banking. Use a virtual private network (VPN) when necessary to encrypt your internet connection.

Online Investment Scams:

Recognition: Scammers may promote fake investment opportunities promising high returns or
guaranteed profits.

Must do: Research investment opportunities thoroughly, verify the legitimacy of the investment firm,
and be wary of "get rich quick" schemes.

You might also like