Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

CYBER

DIGITAL
LITERACY
Learning Outcomes
1.Define digital/ cyber literacy and cybersecurity
2.Elaborate on cyber citizenship
3.Determine netiquette and safety use of digital media
4.Identify common computer threats and the corresponding
fixing solution
5.Elucidate cyberbullying and cybercrimes
Cross Sectional Dilemmatter
Jury Trial!
  
This
This activity
activity isis intended
intended students
students to
to analyze
analyze dilemmas.
dilemmas. The
The
points
points of
of view
view areare supported
supported by by provisions.
provisions. theories
theories and
and
frameworks.
frameworks. Then.
Then. groups
groups present
present their
their propositions
propositions and
and
analysis
analysis subjected
subjected to to critiquing
critiquing and
and assessment
assessment byby other
other
groups.
groups. ItIt enhances
enhances critical
critical thinking,
thinking, analysis,
analysis, objectivity,
objectivity,
communication
communication skills,
skills, collaboration
collaboration and
and unity.
unity.
Sample of Dilemmas
to be resolved in class
The Bridgeton Academy conducted a United Nations activity by performing cultural
presentations done in different countries, including appropriate costumes and props.
After the show, students were fulfilled and they happily celebrated the success of their
presentations through picture taking. A student, who served as leader of one of the
groups posted their picture online and a hashtag (which was the name of the country
that they presented) on it. All the while, the student became unaware of the impact of
what he did that the Picture online even reached the country mentioned in the given
hashtag. This made the people in the said country react on the posted vehemently, for
them, that was an insult and discriminatory to their culture and race. Many citizens put
their negative impressions, comments and ill statements against the person who posted
it while the rest responded in the thread. They were searching for the school where the
picture came from demanded for an apology to their nation and the people.

How
Howwould
wouldyou
youdefend
defendthe
thesides
sidesof
oftwo
twoinvolved
involvedininthe
theissue
issue----the
theStudent
Studentwho
who
unintentionally
unintentionally posted the picture out of glee and the people who reactedto
posted the picture out of glee and the people who reacted toit?
it?
Sample of Dilemmas
to be resolved in class
After the swimming class, a student who was given consent by her classmate,
took a video of the tatter in the comfort room while changing her Swimsuit.
Suddenly, the video came Out with the student's nude body and was viewed
by many, including her family and friends. Being affected such malicious
scandal, the said Student's family immediately confronted the school to hear
explanations from those concerned. Upon investigation, they found out that
the one, who took the video, had mistakenly pressed the button of the
cellphone marked "video share" that made it accessible to all accounts
registered in the contacts right away, which caused its immediate spreading.

Who
Who do do you
you think
think has
has the
the main
main liability
liability on
on this
this issue
issue -- the
the girl
girl who
who allowed
allowed someone
someone to
to
take
take the
the video
video ofof her
her nude
nude body
body or or the
the ono
ono who
who caused
caused its its widespread?
widespread? Justify.
Justify. How
How
should this matter be resolved?
should this matter be resolved?
01 02
Digital
Digital Cybersecurity
Cybersecurity
Literacy
Literacy

TABLE 03
Cyber
04
CONTENTS
OF
Cyber
Citizenship
Citizenship
Proper
Proper Netiquette
Netiquette

05 06
Internet
Internet Safety
Safety Cyberbullying
Cyberbullying
01
Digital
Literacy
You
You can
can enter
enter aa subtitle
subtitle here
here ifif you
you need
need itit
Digital Literacy
Literacy

ItIt isis the


the set
set of
of competencies
competencies required
required for
for full
full participation
participation in
in society
society that
that
includes
includes knowledge,
knowledge, skills
skills and
and behaviors
behaviors involving
involving thethe effective
effective use
use of
of digital
digital
devices
devices for for purposes
purposes of
of communication,
communication, expression,
expression, collaboration
collaboration and
and
advocacy.
advocacy.

itit isis the


the ability
ability of
of an
an individual
individual to
to engage
engage with
with the
the digital
digital environment
environment andand
operate
operate technologies
technologies safely
safely by
by knowing
knowing what
what to
to do
do and
and what
what not
not to
to do
do and
and
how
how to
to avoid
avoid unnecessary
unnecessary risks.
risks.
Digital Literacy
Literacy

Digital
Digital literacy
literacy is
is an
an individual's
individual's ability
ability to
to access
access both
both information
information
and
and methods
methods of of communication
communication through
through technological
technological tools,
tools, such
such asas
smartphones,
smartphones, tablets,
tablets, laptops
laptops and
and desktop
desktop PCs.
PCs. While
While digital
digital literacy
literacy
is
is initially
initially focused
focused onon digital
digital skills
skills and
and stand-alone
stand-alone computers,
computers, its its
focus
focus hashas shifted
shifted to
to network
network devices,
devices, including
including the
the Internet
Internet and
and thethe
use
use of
of social
social media.
media.
Cybersecurity
⭕ It is the practice of protecting systems, networks and
programs from digital attacks (CISCO, n.d). These
cyberattacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from
users; or interrupting normal business processes.
⭕ Implementing effective cybersecurity measures is
challenging because there are more devices than people,
and attackers are becoming more innovative. Here are
some tips on how to protect yourself against cyber
threats.
Cybersecurity

11.. Monitor
Monitor behavior
behavior onon social
social networks.
networks. Before
Before
posting
posting or
or uploading
uploading something
something online,
online, try
try to
to realize:
realize:
(a)
(a) Does
Does this
this need
need to
to be
be public?
public? ;; and
and (b)
(b) Is
Is itit worth
worth
the
the risk?
risk? Remember,
Remember, notnot only
only what
what we we share
share online
online
is
is available
available toto friends
friends and
and family,
family, butbut also
also toto
cybercriminals.
cybercriminals.
2.
2. Keep
Keep devices
devices safe.
safe. Protect
Protect your
your technology
technology
tools
tools by
by installing
installing Anti-virus
Anti-virus software,
software, aa
configuration
configuration of
of settings
settings on
on the
the devices
devices and
and by
by
completing
completing software
software updates.
updates.
3.
3. Understand
Understand how how best
best toto use
use passwords.
passwords. Passwords
Passwords
need
need toto be
be complex
complex andand hard
hard toto guess,
guess, but
but can
can still
still be
be
remembered.
remembered. One One strategy
strategy isis "passphrase"
"passphrase" or or aa password
password
that
that comes
comes fromfrom first
first letter
letter of
of each
each word
word in in the
the phrase.
phrase.
There
There isis also
also aa password
password manager
manager appapp to
to help
help keep
keep track
track
of
of all
all the
the passwords
passwords "KeePass"
"KeePass" whichwhich isis free
free ofof charge.
charge.
Importantly,
Importantly, do do not
not use
use thethe same
same password
password for for all
all
accounts.
accounts.
4.
4. Handle
Handle unsafe
unsafe content.
content. Know
Know exactly
exactly how
how toto respond
respond oror
react
react to
to unsafe
unsafe situations
situations online,
online, such
such as
as (1)
(1) suspicious
suspicious
emails,
emails, (2)
(2) pop-ups
pop-ups claiming
claiming that
that your
your computer
computer is is infected;
infected;
and
and (3}
(3} BitTorrent
BitTorrent sites.
sites.

5.
5. Consider
Consider safety
safety for
for the
the future.
future. Take
Take individual
individual responsibility
responsibility
in
in using
using devices
devices with
with an
an utmost
utmost care
care and
and critical
critical thinking
thinking when
when
online
online (https%www.esentire.com)
(https%www.esentire.com)
Cyber Citizenship
Citizenship
Citizenship is
is an
an old
old value
value that
that is
is now
now applied
applied to
to aa new
new medium,
medium, the
the
Internet.
Internet. Cyber
Cyber citizenship
citizenship refers
refers toto being
being responsible
responsible when
when using
using the
A Internet.
Internet.
the

Doing
Doing online
online when
when no
no one
one is
is looking
looking speaks
speaks about
about one's
one's character
character and
and
B morals.
morals. The
The power
power of
of this
this digital
digital world
and
world is
is associated
and consequences.
associated with
consequences.
with responsibilities
responsibilities

C Therefore,
Therefore, we
however,
however, we
we can
can explore
we should
explore and
should observe
and navigate
navigate all
observe cyber
all information
cyber citizenship
information available
citizenship or
available Online
or manners
manners and
Online
and etiquette
etiquette on
on
the
the Web.
Web.
Ways on howto be a
Good Cyber Citizen

Be
Be careful
careful and
and critical
critical Talk
Talk and
and Discuss
Discuss
for whatever you post online that If you have a problem with someone.,
could be visible to the public even go to that person or an adult to help
if on a "private" page through by a work it out, instead of posting your
friend. expression online.
Give
Give Credits
Credits

Use the Internet to help you with your school work,


but give credit to the sources you use and critically
analyze everything you search online.

Use
Use itit with
with Purpose
Purpose Verify
Verify
Use the Internet purposefully to learn more about
Make sure you verify an information before you share it or use it
anything you are interested in, to help you research
in a project and check on accuracy and truth in the information
relevant and needed data or information and to stay
you search on the web.
connected with friends throughout the world.
Be
Be selective
selective Don't
Don't answer
answer
Give out certain Don't answer questions that
information only. make you uncomfortable.
Be
Be guided
guided
Always make sure you have told a reliable adult if
you decide to meet someone you knew through the
Internet.

Be
Be aware
aware of
of copyright
copyright laws
laws Avoid
Avoid hacking
hacking
Always be aware of copyright laws and Use only the computers that you are
give credit to whom an article or a part of allowed to use. Avoid hacking
it is due.
Importance ItIt keeps
keeps the
hurtful
the Internet
Internet free
hurtful statements.
statements.
free from
from

of Cyber
ItIt creates
creates aa culture
culture of
of more
more reliable
reliable information.
Citizenship information.

ItIt gives
gives provisions
provisions for
for people
people to
to be
be given
given credit
credit for
for
what
what they
they have
have created.
created.

More
More criminals
criminals oror bullies
bullies can
can be
be caught
caught when
when kids
kids are
are
honest
honest and
and talk
talk to
to adults.
adults.

ItIt keeps
keeps information
information private.
private.
Proper
Netiquette
Follow these simple rules to ensure that you make wise choices when sending messages
online.
1. Make sure you have the correct address (with proper spelling), Correct link and you are
sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false statements and
information on the web or forwarding junk mail or chain letters to family or friends.
3. Re-read what you wrote to make sure it is what you want to say and the other person
would Interpret it the same way.
4. Keep your comments clean and don't confront others Online or say anything that could be
hurtful to them.
5. Keep your personal and friends' information private and don’t forward
information that was just given to you Without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because
messages can get misdelivered.
8. Adults should monitor kids messages, especially when they are sending e-
mails to others without permission.
The
The Ten
Ten Commandments
Commandments of of Teacher
Teacher
Cyber Citizenship
Citizenship
Thou
Thou shall
shall not
not post
post any
any personal
personal matter,
matter, confidential
confidential
information
information and
and obscene
obscene pictures
pictures and
and messages
messages online
online that
that
can
can be
be accessed
accessed by
by students
students and
and parents.
parents.

Thou
Thou shall
shall not
not respond
respond or
or thread
thread to
to any
any personal
personal message
message
created
created by
by students
students online
online other
other than
than those
those school-related.
school-related.

Thou
Thou shall
shall not
not lend
lend or
or let
let students
students access
access your
your cellphone.
cellphone.
The
The Ten
Ten Commandments
Commandments of of Teacher
Teacher
Cyber Citizenship
Citizenship
Thou
Thou shall
shall not
not post
post to
to any
any social
social media
media account.
account. for
for
whatever
whatever purposes.
purposes. the
the pictures
pictures of
of students
students without
without their
their
or
or their
their parents'
parents' consent.
consent.

Thou
Thou shall
shall not
not use
use concepts
concepts and
and information
information from
from texts
texts
and
and references
references without
without the
the author's
author's Citation.
Citation.

Thou
Thou shall
shall not
not give
give your
your email
email password
password to
to students.
students.
The
The Ten
Ten Commandments
Commandments of of Teacher
Teacher
Cyber Citizenship
Citizenship
Thou
Thou shall
shall not
not express
express sentiments,
sentiments, disappointments
disappointments and
and
disagreements
disagreements against
against superiors,
superiors, colleagues,
colleagues, students
students and
and
their
their parents
parents using
using their
their social
social media
media accounts.
accounts.

Thou
Thou shall
shall not
not use
use data
data from
from Internet
Internet sources
sources in
in any
any
documents
documents like
like lesson
lesson plans,
plans, researches
researches and
and requirements
requirements
without
without the
the consent
consent of
of the
the author.
author.

Thou
Thou shall
shall not
not give
give any
any personal
personal data
data or
or other's
other's
information
information to
to anyone
anyone unless
unless for
for specific
specific purposes
purposes and
and
given
given the
the consent.
consent.
The
The Ten
Ten Commandments
Commandments of of Teacher
Teacher
Cyber Citizenship
Citizenship
Thou
Thou shall
shall not
not post
post any
any student
student data
data publicly
publicly online
online
including
including academic
academic rankings,
rankings, school
school records,
records, Class
Class Outputs
Outputs
and
and record
record of
of grades.
grades. De
De Leon
Leon (2019)
(2019)

Thou
Thou shall
shall not
not give
give any
any personal
personal data
data or
or other's
other's
information
information to
to anyone
anyone unless
unless for
for specific
specific purposes
purposes and
and
given
given the
the consent.
consent.
Internet
Safety
Internet Safety
Internet
Internet safety,
safety, online
online safety
safety or
or cyber
cyber safety
safety means
means trying
trying to
to be
be safe
safe on
on the
the
Internet.
Internet. ItIt is
is maximizing
maximizing thethe user's
user's personal
personal safety
safety and
and security
security risks
risks to
to
private
private information
information and and property
property associated
associated with
with using
using the
the Internet,
Internet, including
including
self-protection
self-protection from from computer
computer crime.
crime.As
As the
the number
number of of Internet
Internet users
users
continues
continues to to grow
grow worldwide,
worldwide, issues
issues and
and concerns
concerns also
also continuously
continuously exist
exist
Internet Safety
Information
Information security.
security. Sensitive
Sensitive information,
information, suchsuch as
as personal
personal information,
information,
identity
identity and
and passwords
passwords are
are often
often associated
associated withwith personal
personal property
property and
and
privacy
privacy and
and may
may present
present security
security concerns
concerns ifif leaked
leaked Unauthorized
Unauthorized access
access and
and
usage
usage ofof private
private information
information may
may result
result in
in consequences,
consequences, such
such as
as identity
identity and
and
property
property theft.
theft.
Common Causes of Informtion Security Breaches

Phishing.
Phishing. Internet
Internet scams.
scams. Malware
Malware

is a Common type of scam, of These are schemes that


deceive the users in various It is a malicious software
which the scammers disguise as
ways in an attempt to take (particularly spyware) disguised
a trustworthy source in an
advantage of them. to collect and transmit private
attempt to obtain private
information, such as password
information, such as passwords,
without the user's consent or
credit card information, etc.
knowledge, of which it is
through the use of fake websites
impossible to determine whether
that look identical and
a file is infected.
legitimate.
Personal
Safety and
The growth of the Internet gave rise to
Threatsmany important services accessible to
anyone with a connection, such as
digital communication. While it allows
communication with others, it is also
being grabbed by malicious users for
bad intent.
Cyberstalking.
Cyberstalking.

Cyberbullying.
Cyberbullying. Online
Online predation
predation

The following
are common
threats to
personal
Obscene/
Obscene/ safety. Sextortion
Sextortion
offensive content..
offensivecontent
Cyberbullyin
g
Cyberbullying
ItIt isis aa form
form of
of bullying
bullying or
or harassment
harassment using
using electronic
electronic
means
means usually usually among
among minors
minors in
in aa school
school setting
setting and
and has
has
become
become increasingly
increasingly common
common amongamong teenagers
teenagers

ItIt isis an
an aggressive,
aggressive, intentional
intentional act
act or
or behavior
behavior that
that isis
carried
carried out out by
by aa group
group or
or an
an individual
individual using
using electronic
electronic
forms
forms of of contact,
contact, repeatedly
repeatedly against
against the
the victim
victim who
who
cannot
cannot usually
usually defend
defend himself
himself or
or herself.
herself.
ItIt is
is aa process
process of
of using
using the
the internet
internet ,, cellphones
cellphones oror other
other
devices
devices to to send
send or
or post
post texts
texts or
or images
images that
that intend
intend to
to hurt
hurt
or
or embarrass
embarrass another
another person
person
Cyberbullying types

Internet
Internet trolling
trolling Cyberstalking
Cyberstalking
Implication of
Schools should initiate various anti-
Bullying in bullying programs and campaigns to
protect students from being threatened
School or victimized by such offense.
Teachers should be oriented and
trained in handling bullying cases in
class. School should conduct student
empowerment activities that can be
engaged in by students, including
bullies to divert their attention and
energy into something worthwhile
Integrating Digital/
Cyber Into the Curriculum
Literacy
Use
Use an
an interactive
interactive whiteboard
whiteboard toto design
design andand deliver
deliver lessons.
lessons. Use
Use Promethean
Promethean and
and Smart
Smart
notebook
notebook with
with teacher-created
teacher-created lesson
lesson ifif you
you are
are not
not yet
yet capable
capable of
of designing
designing your
your own
own

Allow
Allow students
students to
to maintain
maintain blogs,
blogs, wikis,
wikis, web
web pages
pages related
related to
to their
their learning.
learning.

Utilize
Utilize storytelling
storytelling media
media to
to allow
allow students
students to
to create
create and
and publish
publish stories.
stories.

Engage
Engage in
in email/
email/ video
video chat
chat exchanges
exchanges with
with students.
students.
Set
Set up
up aa blog
blog site,
site, Facebook
Facebook page,
page, Yahoo
Yahoo or
or Google
Google group
group and
and post
post weekly
weekly discussion
discussion
questions
questions for
for students
students toto respond.
respond.

Use
Use video
video cameras
cameras to
to dramatized
dramatized stories,
stories, record
record scientific
scientific experiments
experiments and
and expose
expose
students
students to
to video
video editing
editing software
software to
to create
create video
video production
production ofof learning
learning

You might also like