Professional Documents
Culture Documents
Educ108 - Group 4 Report
Educ108 - Group 4 Report
Module 9:
CYBER
LITERACY
Technology has been part of everyone's life, be it at home, in school, or
anywhere with every facet of our undertaking. However, in many instances,
we may not be aware that we have been misusing or abusing it or in
another way around, we may find ourselves being used by other people
with their malicious motives using digital tools.
3. Use the Internet to help you with your schoolwork and give credit to the
sources and check critically everything on the internet.
5. Make sure you verify information before you share it or use it in a project
and check on accuracy and truth in the information you search on the
Web.
6. Give out certain information only.
8. Always make sure you have told a reliable adult if you decide to
meet someone you knew through the Internet.
10. Use only the computers that you are allowed to use and avoid
hacking.
IMPORTANCE
OF CYBER
CITIZENSHIP
1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provision for people to be given credit for what
they have created.
4. More criminals or bullies can be caught when kids are
honest and talk to adults.
5. It keeps information private.
PROPER
NETIQUETTE
Follow these simple rules to ensure that you make wise
choices when sending messages online:
1. Make sure you have the correct address (with proper spelling), correct
link and you are sending the information to the right person when doing
it online.
3. Re-read what you wrote to make sure it is what you want to say and the
other person would interpret it the same way.
Follow these simple rules to ensure that you make wise
choices when sending messages online:
4. Keep your comments clean and don’t confront others online or say
anything that could be hurtful to them.
5. Keep your personal and friends’ information private and don’t forward
information that was just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
8. Adults should monitor kids’ messages, especially when there are sending
e-mails to others without permission.
(http://www.cybercitizenship.org/ethics/ethics.html).
RE
The Ten
SP
DI ONS
CI GIT IBL
TI AL E
ZE
Commandments N!
of Teacher Cyber
Citizenship
Ten Commandments of Teacher Cyber Citizenship
6. Thou shall not post to any social media account, for whatever purposes,
the picture of students without their or their parent’s consent.
7. Thou shall not express sentiments, disappointments, and disagreements
against superiors, colleagues, students and their parents using their
social media accounts.
8. Thou shall not use data from internet sources in any documents like
lesson plans, researches and requirements without the consent of the
author.
9. Thou shall not give any personal data or other’s information to anyone
unless for specific purposes and given the consent.
Ten Commandments of Teacher Cyber Citizenship
10. Thou shall not post any students data publicly online including
academic rankings, school records, class outputs and record of
grades. De Leon (2019)
Internet Safety
Internet safety, online safety or cyber
safety means trying to be safe on the
internet. It is maximizing the user’s
personality and security risks to private
information and property associated
using the internet, including self-
protection from computer crime.
Information Security
Sensitive information such as
personal information, identity and
passwords are often associated
with personal property and privacy
and may present security concerns
if leaked.
Common causes of information security
breaches include:
• PHISHING
• INTERNET SCAMS
• MALWARE
Personal Safety and
Threats
The following are common threats to personal safety:
• CYBERSTALKING
• CYBERBULLYING
• ONLINE PREDATION
• OBSCENE/OFFENSIVE CONTENT
• SEXTORTION
COMPUTER THREATS and FIXING
SOLUTIONS
•The realm of Information Technology (IT) security professionals and computer security
has become an issue and concern for many people. (Honan,2014).
•A threat, in the context of computer security,refers to anything that has the potential to
cause serious harm to a computer system. It is something that may or may not happen,
but has the potential to cause serious damage and can lead to attacks on computer
systems and networks (https://www.techopedia.com).
•While email has been the main method for the spread of computer viruses, it can also
enter a network by the USB device, Internet download, visiting an infected website,
instant messaging on social media platforms,file transfer,and file sharing programs.
These are the following ways on how to ensure that
computer networks can be protected:
• The crime prevention council defines it as a process of using the internet, cell
phones, or other devices to send or post texts or images that intend to hurt or
embarrass another person, repeated threats, sexual remarks, pejorative labels
or defamatory false accusations, ganging up on a victim by making the person
the subject of ridicule in online forums, hacking into vandalizing sites about a
person, and posting false statements to discredit the targeted person.
CYBERBULL
YING
• Cyberbullies may disclose victims’ personal data on
websites or forums- called doxing, or may use
impersonation, and create fake accounts, comments, or
sites, for the purpose of publishing material in their names.
This can leave the cyberbully anonymous and difficult to be
caught or apprehended for his/her behavior.
TYPES OF
CYBERBULLYING
1. Internet trolling- is a common form of bullying over the
internet in an online community to elicit a reaction,
disruption, or intentionally provoke and offend others
01 02 03
Most surfing sessions Good strategies for Always be cautious
start with user-targeted searching the web about the
keywords about the include writing information shared
subject into a search research questions
online and in visiting
engine.
websites
Assessing Credibility- different websites accessible on the web can
make the job of the researchers very challenging. Carefully evaluate
the information searched online. Consider the credibility, or
trustworthiness and reliability of the content before taking it.
1. When encountering a URL, look at the letters that appear in after the "dot"
(i.e. www.whitehouse.gov) and that is called top-level domain that helps in
determining a site's credibility.
1. When getting data, put proper citation and source acknowledgement (e.g.
Source: National Statistics Office, 2019).
2. When using needed pictures downloaded from the internet, put
acknowledgement (e.g. Photo credits to PhilPost, 2019).
3. If data, concepts and information are copyrighted, ask for the consent of
the author, and wait for his/her response.
Data Privacy Implication
5. If the author doesn't really want anyone to utilize his/her data file or
article, learn the value of respect, anyway that is his/her property.
Research and Data Collection
Protocols
When researching and collecting data from the Web, we
should avoid PLAGIARISM or the act of taking someone else’s
work. It is unethical and can bring you trouble.
2003).
SUSTAINABILITY
Principles of
4. Everything changes.
5. Everything must go
somewhere.
Nature
6. Ours is a finite earth.
7. Nature is beautiful and we are
stewards of God’s creation.
SLIDESMANIA
Towards a Green School and Education
for Sustainable Development
• Schools play a great role in the development of academics but also
environment ethics and care for nature among students.
• The school environment should encourage, support and nurture
students’ capacities on green environment as integrated in the
curriculum and instruction.
• Environmental issues and concerns can be effectively addressed
when staffs and students execute in school functioning as apart of
SLIDESMANIA
• The concept was introduced in Europe in 1990s while the Rio Earth Summit
of 1992 took cognizance of the need to take action in every are in which human
impacts on the environment.
• The World Summit on Sustainable Development (WSSD) in Johannesburg in
2002 catalyzed the efforts to bring about a shift in 'educating the environment'
to 'educating for sustainability’.
• A continuous misuse and abuse of natural resources in quest for development
SLIDESMANIA
practices.
UNDERSTANDING GREEN
CURRICULUM
For a curriculum to be ‘Green’, it must include the following aspects:
It improves equity.
SLIDESMANIA
DARK GREEN SCHOOL
PROGRAM:
- A Dark Green School (DGS) Philippine
is a school Environmental
that delivers environmental Education through
assimilation of the environmental philosophy by the students in formal lessons, as well as
Perspective
activities inside the classroom. Accordingly, schools must:
ARTS and
CREATIVE
LITERACY
Creativity is the process of having original ideas
that have value. Moreover, creativity is the ability
to see the world in new ways. Therefore, creative
individuals exhibit the ability to switch between
different modes of thinking and shift their mental
focus that suggests a connection between creativity
and dynamic interactions of brain networks (Sun,
et.al, 2019)
• It is characterized by the ability to perceive the
world in new ways, find hidden patterns, make
connections between unrelated phenomena, and
generate solutions. (Naiman, 2011)
1.In Writing
2.Typing on a Keyboard
3.When Driving
4.In Sports
Problems and Disorder related to poor
eye-hand coordination
- Hand-eye coordination can also work poorly even if the person’s eyes and
vision are not affected and if their motor control skills work properly.
- Any alteration to the visual or motor systems can significantly affected hand-
eye coordination like visual or muscular problems, such as STRABISMUS
(crossed eyes), AMBLOPIA, MUSCLE HYPOTONIA, BALANCE PROBLEMS
or Crossed laterality.
1.Fluency
2.Flexibility
3.Originality
4.Elaboration
AESTHETICS
- Britanica defines aesthetics, also spelled esthetics, as
the philosophical study of beauty and taste.
● PHYSICAL ENVIRONMENT
● EMOTIONAL ENVIRONMENT ● SCHEDULING
● PROJECT-BASED LEARNING ● STUDENT-CENTERED and
(PBL) PERSONALIZED LEARNING
● TEACH CREATIVE THINKING ● INCORPORATE ARTS
SKILLS ● INTEGRATION of
● ALTERNATIVE ASSESSMENTS TECHNOLOGIES
● PREPARING THE BODY and BR
AIN FOR CREATIVITY
END
Credits to:
Slidesmania
SlidesGo
Google