Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 85

Module 9:

Digital/Cyber
Literacy
1. Define digital/cyber
literacy and cyber
security
Learning 2. Elaborate on cyber
Outcomes citizenship
3. Determine netiquette
and safety use of
digital media
4. Identify common
computer threats and
the corresponding
fixing solutions
5. Elucidate cyber bullying
and cybercrimes
Learning 6. Examine internet
exploration, source
Outcomes citation, research and
data gathering protocol
and website evaluation
7. Cite how digital/cyber
literacy may be
integrated with teaching-
learning
8. Draw relevant life lessons
and significant values
from personal experiences
Learning Outcomes
on digital risks and
consequences
9. Analyze research abstract
on digital/cyber literacy
and its implications to the
teaching/learning process
10. Produce and evaluate a
digital tool that may be
utilized in the classroom.
Dilemma to be resolved:
After swimming class, a student, who was
given consent by her classmate, took a video
of the latter in the comfort room while
changing her swimsuit. Suddenly, the video
came out with the student’s nude body and
was viewed by many, including her family and
friends. Being affected by such malicious
scandal, the said student’s family immediately
confronted the school to hear explanations
from those concerned.
Upon investigation, they found out that the
one, who took the video, had mistakenly
passed the button of the cellphone marked
“video share” that made it accessible to all
accounts registered in the contacts right
away, which caused its immediate
spreading.
Who do you think has the main liable on
this issue- the girl who allowed someone to
take the video of her nude body or the one
who caused its widespread? Justify. How
should this matter be resolved?
Digital Literacy
According to Wikipedia, digital literacy is
the set of competencies required for full
participation in society that includes
knowledge, skills, and behaviors involving
the effective use of digital devices for
purposes of communication, expression,
collaboration and advocacy.
Digital literacy is an individual’s ability to
access both information and methods of
communication through technological tools,
such as smartphones, tablets, laptops,
desktop PC’s. While digital literacy is
initially focused on digital skills and stand-
alone computers, its focus has shifted to
network devices, including the internet and
the use of social media.
Cybersecurity
Cybersecurity is the practice of protecting
systems, networks and programs from
digital attacks. These cyberattacks are
usually aimed at accessing, changing or
destroying sensitive information; extorting
money from users; or interrupting normal
business processes.
Tips on how to protect yourself against
cyber threats:
1. Monitor behavior on social networks.
2. Keep devices safe
3. Understand how best to use passwords.
4. Handle unsafe content.
5. Consider safety for the future.
Cyber Citizenship
Citizenship is an old value that is now applied to
a new medium, the internet. Cyber citizenship
refers to being responsible when using the
internet. Doing online when no one is looking
speaks a lot about one’s character and morals.
The power of this digital world is associated with
responsibilities and consequences. Therefore, we
can explore and navigate all information
available online however; we should observe
cyber citizenship or manners and etiquette on the
Web.
Ways on
How
to be a
Good
Cyber
Citizen
1. Be careful and critical for whatever
you post online that could be visible
to the public even if on a “private”
page through tagging by a friend.
2. If you have a problem with
someone, go to that person or an
adult to help work it our, instead of
posting your expression online.
3. Use the internet to help you with your
schoolwork, but give credit to the
sources you use and critically analyze
everything you search online.
4. Use the internet purposefully to learn
more about anything you are
interested in, to help you research
relevant and needed data or
information and to stay connected
with friends throughout the world.
5. Make sure you verify information
before you share it or use it in a
project and check on accuracy and
truth in the information you search on
the web.
6. Give out certain information only.
7. Don’t answer questions that make you
uncomfortable.
8. Always make sure you have told a
reliable adult if you decide to meet
someone you knew through the
internet.
9. Always be aware of copyright laws
and give credit to whom an article or a
part of it is due.
10. Use only the computers that you are
allowed to use. Avoid hacking.
Importanc
e of Cyber
Citizenship
1. It keeps the internet free from hurtful
statements
2. It creates a culture of more reliable
information.
3. It gives provisions for people to be
given credit for what they have
created.
4. More criminals or bullies can be
caught when kids are honest and talk
to adults.
5. It keeps information private
Proper
Netiquette
Follow these simple rules to ensure that
you make wise choices when sending
messages online.

1. Make sure you have the correct


address (with proper spelling), correct
link and you are sending the
information to the right person when
doing it online.
2. Check information before sending or
posting any message and avoid false
statements and information on the web
or forwarding junk mail or chain
letters to family or friends.
3. Re-read what you wrote to make sure
it is what you want to say and the
other person would interpret it the
same way.
4. Keep your comments clean and don’t
confront others online or say anything
that could be hurtful to them.
5. Keep your personal and friends’
information private and don’t forward
information that was just given to you
without his/her permission.
6. Watch out for spam and other fraud e-
mails and never reply to them.
7. If you are going to write something
personal or private, think twice
because messages can get
misdelivered.
8. Adults should monitor kids’ messages,
especially when they are sending e-
mails to others without permission.
The 10
Commandm
ents of
Teacher
Cyber
Citizenship
1. Thou shall not post any personal
matter, confidential information and
obscene pictures and messages online
that can be accessed by students and
parents.
2. Thou shall not respond or thread to
any personal message created by
students online other than those
school-related.
3. Thou shall not lend or let students
access your cellphone.
4. Thou shall not give your email
password to students.
5. Thou shall not use concepts and
information from texts and references
without the author’s citation.
6. Thou shall not post to any social
media account, for whatever purposes,
the pictures of students without their
or their parents’ consent.
7. Thou shall not express sentiments,
disappointments and disagreements
against superiors, colleagues, students
and their parents using their social
media accounts.
8. Thou shall not use data from internet
sources in any documents like lesson
plans, researches and requirements
without the consent of the author.
9. Thou shall not give any personal data
or other’s information to anyone
unless for specific purposes and given
the consent.
10. Thou shall not post any student data
publicly online including academic
rankings, school records, class outputs
and record of grades.
Internet safety
Internet safety, online safety or cyber
safety means trying to be safe on the
internet. It is maximizing the user’s
personal safety and security risks to
private information and property
associated with using the internet,
including self-protection from computer
crime. As the number of internet users
continues to grow worldwide, issues and
concerns also continuously exist.
Information Security- Sensitive
information, such as personal
information, identity and passwords
are often associated with personal
property and privacy and may
present security concerns if leaked.
Common
causes of
informatio
n security
breaches:
•Phishing. It is common type of
scam, or which the scammers
disguise as a trustworthy source in an
attempt to obtain private information,
such as passwords, credit card
information, etc. through the use of
fake websites that look identical and
legitimate.
•Internet scams. These are schemes that
deceive the users in various ways in an
attempt to take advantage of them.
•Malware. It is a malicious software
(particularly spyware) disguised to
collect and transmit private information,
such as password without the user’s
consent or knowledge, of which it is
impossible to determine whether a file is
infected.
•Personal safety and threats. The
growth of the internet gave rise to
many important services accessible
to anyone with a connection, such as
digital communication.
1. Cyberstalking- it is the use of the
internet or other electronic means to
stalk or harass an individual, group
or organization through false
accusations, defamation, slander and
libel, intentional monitoring, identity
theft, threats, vandalism, solicitation
for sex, or gathering information that
may be used to threaten, embarrass
or harass.
2. Cyberbullying- It is the use of
electronic means, such as instant
messaging, social media, e-mail and
other forms of online communication
with the intent to abuse, intimidate or
overpower an individual or group.
3. Online predation- It is the act of
engaging an underage minor into
inappropriate sexual relationships
through the internet.
The behavior characteristics are
categorized into three groups:
a. Manipulative- typically a child
molester b. Opportunist- typically a
rapist; and c. Coercive- being a
mixture of both rapists and child
molesters.
4. Obscene/ offensive content- Various
websites on the internet contain material
that may deem offensive, distasteful or
explicit, which may often not be of the
user’s liking.
5. Sextortion- It is the use of webcams
for flirting and cybersex. Often, this
involves a cybercriminal posing as
someone else, such as an attractive
person initiating communication of a
sexual nature with the victim.
Computer
threats and
Fixing
Solutions
A threat, in the context of computer
security, refers to anything that has
the potential to cause serious harm to
a computer system. It is something
that may or may not happen but has
the potential to cause serious damage
and can lead to attacks on computer
systems and networks.
Ways on how to ensure that computer
networks can be protected:

•Install anti-virus software.


•Ensure that the anti-virus software is up-
to-date.
•Employ a firewall to protect networks.
•Filter all email traffic.
•Educate all users to be careful of
suspicious e-mails.
•Scan internet downloads.
•Do not run programs of unknown origin.
•Implement a vulnerability management
system.
•Make regular backups of critical data.
•Develop an Information Security Policy.
•Monitor logs and systems.
•Develop an incident response plan.
•Restrict end-user access to the systems.
Cyberbullying
Cyberbullying, cyberharassment or
online bullying is a form of bullying or
harassment using electronic means
usually among minors in a school
setting and has become increasingly
common, especially among teenagers.
Cyberbullying is similar to traditional
bullying, it is just that victims may not
know the identity of their bully and the
reason for bullying them. Cyberbullies may
disclose victims’ personal data on websites
or forums- called doxing, or may use
impersonation, and create fake accounts,
comments or sites for the purpose of
publishing material in their names. This
can leave the cyberbully anonymous and
difficult to be caught or apprehended for
his/her behavior.
Cyberbullying Types
•Internet trolling is a common form of
bullying over the internet in an online
community to elicit a reaction, disruption
or intentionally provoke and offend others.
•Cyberstalking is another form of bullying
or harassment that uses electronic
communication to stalk a victim and pose a
credible threat to harass him/her.
Cybercrime
Avast defines cybercrime as any criminal activity
carried out using computers or the internet.
Cybercrime uses tools like phishing, viruses,
spyware, ransomware and social engineering to
break the law.
Cybercrime is defined by Techopeida as a crime
with the computer as the object of the crime or is
used as a tool to commit an offense.
Cybercriminals may use computer technology to
access personal and confidential information or use
the internet for exploitative or malicious purposes.
Exploring
the
Internet:
Researchin
g and
Evaluating
the Web
The internet is a global
communication network that allows
computers to exchange and share
information worldwide. It makes
possible for people around the world
to connect and share ideas across time
zones and geographic locations.
Surfing the
web
3 key factors in surfing the web:
1. Most surfing sessions start with the user-
targeted keywords about the subject into a
search engine.
2. Good strategies for searching the web include
writing research questions; extracting keywords
from the questions and typing them into a search
engine using synonyms if the keywords do not
bring up desired results; keeping track of
keywords and synonyms used; and recording the
results of search.
3. Always be cautious about the information
shared online and in visiting websites.
Assessing credibility- Different websites
accessible on the web can make the job of
researchers very challenging. Carefully evaluate
the information searched online. Consider the
credibility or trustworthiness and reliability of
the content before taking it. There are two types
of websites: informational and commercial.
Informational websites usually strive to offer
credible content to users, while commercial
websites present inaccurate information in order
to see something.
Checklist or credibility criteria:
1. Author
2. Date
3. Purpose
4. Contact
5. Fact vs Opinion
6. URL get meaning or url
Common credible URLS.
•When encountering a URL, look at the
letters that appear after the “dot” (
www.whitehouse.gov.) and that is called
top-level domain.
•Websites ending in .gov are government-
related websites, which generally can be
trusted to provide credible statistical
information, articles on many different
topics and government news.
•Websites ending in .edu are the websites of
educational institutions such as colleges and
universities that usually offer as variety of
credible data, especially about the school’s
operation and research.
•Websites ending on .org are the websites of
organizations. While many organizations,
especially nonprofit ones, provide credible
information, they may sometimes have
advertising intent. Since some organizations
show bias in their provided information, so
evaluate .org sites carefully.
Recognition of information
sources
This can be done by applying proper
referencing and citations procedures
that would get rid of risks,
consequences and legal implications
because of the copyright issue,
which means that the ideas and
words used belong to the author.
Citation
Each entry in the bibliography is
called a citation. Proper citation
must be applied or included for
every source used, whether it is a
website, a newspaper, or a book.
Online sources are cited differently
because they are different from
traditional print sources.
Data privacy implication
It involves uploading of pictures,
designs, graphics, concepts/ideas,
frameworks, art work, and other
information that are copyrighted
without the consent of the author or
the source. These are commonly
observed in schools.
Practical Techniques in responding to data
privacy issues:
 When getting data, put proper citation
and source acknowledgement
 When using needed pictures
downloaded from the internet, put
acknowledgment. But if possible to
have personal pictures taken with your
original concept. Although, there is still
a need to seek the consent of those in
the pictures.
If data, concepts and information are
copyrighted, ask for the consent of the
author, and wait for his/her response.
However, if the data and information are
for public domain, just
acknowledging/citing the author or the
source will do.
If the author doesn’t really want to utilize
his/her data file or article, learn the value of
respect, anyway that is hi/her property.
(read)
Research and data collection
protocols
When researching and collecting
data from the Web, avoid plagiarism,
which is the act of taking someone
else’s work and presenting it as your
own.
Plagiarism is unethical, and it can
bring you in trouble. Sometimes,
students don’t mean to plagiarize,
but they end up doing it accidentally
because they are unaware or unclear
about it.
10 Types of Plagiarism that teacher,
researchers and student should
know:
1. Clone Plagiarism. It is also called
identical copying or copying
another work without any change
and claim as his/her own work.
2. Remix Plagiarism. It refers to
collecting information from various
sources and mixing all together as a
single document then, claiming the
work as their own work.
3. Ctrl+C Plagiarism. This is a
significant portion of text copied
from any single source without any
alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly
cited source documents are copied
and arranged as a new document
without citation.
5. Find-Replace Plagiarism. This is
changing the most common
keywords and phrases in the copied
content but not making any changes
is the essential document.
6. Recycle Plagiarism. Also called
self-plagiarism, it refers to the act of
borrowing from one’s own previous
document without proper citation.
7. Mashup Plagiarism. It is when the
written document is copied from
more than one source and all are
mixed together without proper
citation.
8. 404 Error Plagiarism. Here, a
person creates a document by
copying from various sources
prepared as a single docuemtn with
the citation but inaccurate or leads to
non-existing resources.
9. Aggregator Plagiarism. Here, the
written document includes proper
citation but it does not contain
original work.
10. Re-Tweet Plagiarism. Here, all
written documents look perfect with
properly cited mark but still, the
document resembles somewhere the
original text’s structure or wordings.
Tips to Avoid Plagiarism
Turnitin.com suggests some
techniques to avoid plagiarism that
teachers, researchers and students
should know.
Read and understand the original
document several times before start
explaining about it.
Do not copy any word or sentence
from the original document.
Give proper citation to all sources
(book, journal, website, video, etc.)
In case of citing online sources,
include the retrieval date and
appropriate URL in the reference.
Common phrases and definitions
need to be quoted and cited without
any modifications.
Make a practice to include the
“references” section whenever you
write an academic document.
Cross verify all your citations
before submitting your document.
Resort to available plagiarism
software to ensure the originality of
the written document
How to
Evaluate a
Website
Morris (2008) suggests ways on evaluating
a website as reference in research.
Open the site. When looking through
Google search results, open sites in new
tabs, leave search results in a tab for easy
access later.
Skim read. Determine whether you can
read and understand the text. If it is too
complicated or difficult to understand, find
another website that may provide the
information you need.
Look for the answer to your question.
Find out if the information on the site
actually answers the question. You can use
a search box, navigation menu, or pull up
your own search box by pressing
Control/Command F and type in the
keywords you are searching for.
Consider the credibility of the author or
website. You need to consider the credibility of
the author or website by considering the
following: (1) Domain- domains that
include .gov or .edu are trustworthy sources. (2)
Author’s information- look at the author’s bio or
about page regarding the qualification of the
author; (3) Design- avoid sites that are cluttered
and difficult to navigate; and (4) Sources-
trustworthy articles usually link to other sources
or cite where their facts come from.
Consider the purpose of the site. Think
about the purpose of the site and whether it
meets your needs.
Look for the date. Consider whether the
information is current enough for your
topic. You can look for the date when the
article was written or last updated.
Sometimes, URLs also include dates.
Integrating Digital/Cyber Literacy into the
Curriculum
Suggested Activities to integrate digital
literacy, higher-order thinking and
construction of meaning in the classroom.
Use an interactive whiteboard to design
and deliver lessons, Use Promethean and
Smart notebook with teacher-created
lessons if you are not capable of designing
your own.
Allow students to maintain blogs, wikis,
web pages related to their learning.
Engage in email/video chat exchanges
with students.
Utilize storytelling media to allow
students to create and publish stories.
Set up a blog site, Facebook page, Yahoo
or Google group and post weekly
discussion questions for students to
respond.
Use video cameras to dramatize stories,
record scientific experiments and expose
students to video editing software to create
video production of learning.
Engage students in discussions about how
and why various media work well to
showcase learning and why others do not.
Thinking critically about the medium use
to present a message is as important as the
message itself.
Require E-portfolio that would compile
their outputs, project, messages and photo-
documents of group activities and
investigations online.
Allow students to use digital tools, such
as mobile phones, Ipad and netbooks for
Google search, dictionary Apps, Youtube,
Podcast and Spotify application in class to
complement their learning, especially
during group works and concept reporting.
Impact of Integrating digital literacy in the
classroom in teachers, families and friends.
It motivates students in their learning due
to their enjoyment and ease of use with
various technological mediums.
It reaches students of various learning
styles and multiple intelligences.
It allows students to create and design
their own unique products reflective of
their personalities and learning
needs/styles.
It encourages students to manipulate
media in constructing their own meaning.
It enables students to share their learning
with teachers, families and friends.
It gives students the chance to explore
technological media that inevitably increase
the job skills needed in the workplace.
If you wouldn’t
shout it out loud
at the mall, you
shouldn’t post it

You might also like