Module 9

Download as pdf or txt
Download as pdf or txt
You are on page 1of 58

Module 9: DIGITAL/CYBER

LITERACY
LEARNING OUTCOMES

1. Define digital/cyber literacy and cybersecurity


2. Elaborate on cyber citizenship
3. Determine netiquette and safety use of digital media
4. Identify common computer threats and the
corresponding fixing solutions
5. Elucidate cyberbullying and cybercrimes
6. Examine Internet exploration, source citation, research and data gathering
protocols and website evaluation

7. Cite how digital/cyberliteracy may be integrated with teaching-learning

8. Draw relevant life lessons and significant values from personal experiences on
digital risks and consequences

9. Analyze research abstract on digital/cyber literacy and its implications to the


teaching- learning process

10. Produce and evaluate a digital tool that may be utilized in the classroom
CONCEPT EXPLORATION

 Technology has been part of everyone's life, be it at home, in


school, or anywhere with every facet of our undertaking.
However, in many instances, we may not be aware that we
have been misusing or abusing it or in another way around, we
may find ourselves being used by other people with their
malicious motives using digital tools.
Digital Literacy

 According to Wikipedia, digital literacy is the set of


competencies required for full participation in society
that includes knowledge, skills, and behaviors involving
the effective use of digital devices for purposes of
communication, expression, collaboration and
advocacy
 It is the ability of an individual to engage with the digital
environment and operate technologies safely by
knowing what to do and what not to do and how to
avoid unnecessary risks.

 Digital literacy is an individual's ability to access both


information and methods of communication through
technological tools,
Cybersecurity

 Cybersecurity is the practice of protecting systems,


networks, and programs from digital attacks (Cisco,
n.d.). These cyberattacks are usually aimed at
accessing, changing, or destroying sensitive information;
extorting money from users; or interrupting normal
business processes
Here are some tips on how to protect yourself against
cyber threats.
1. Monitor behavior on social networks.
2. Keep devices safe.
3. Understand how best to use passwords.
4. Handle unsafe content.
5. Consider safety for the future.
Cyber Citizenship

 Citizenship is an old value that is now applied to à new


medium, the Internet. Cyber citizenship refers to being
responsible when using the Internet. Doing online when
no one is looking speaks a lot about one's character and
morals. The power of this digital world is associated with
responsibilities and consequences.
Ways on How to be a Good Cyber
Citizen
1. Be careful and critical for whatever you post online that could be
visible to the public even if on a "private" page through tagging by
a friend.
2. If you have a problem with someone, go to that person of an adult
to help work it out, instead of posting your expression online.
3. Use the Internet to help you with your schoolwork, but give credit to
the sources you use and critically analyze everything you search
online.
4. Use the Internet purposefully to learn more about anything you are
interested in, to help you research relevant and needed data or
information and to stay connected with friends throughout the world.
5. Make sure you verify an information before you share it or use it in a
project and check on accuracy and truth in the information you
search on the web.
6. Give out certain information only.
7. Don't answer questions that make you uncomfortable.
8. Always make sure you have told a reliable adult if you decide to
meet someone you knew through the Internet.
9. Always be aware of copyright laws and give credit to whom an
article or a part of it is due.
10. Use only the computers that you are allowed to use. Avoid hacking.
 Importance of Cyber Citizenship

1. It keeps the Internet free from hurtful statements.


2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have
created.
4. More criminals or bullies can be caught when kids are honest and
talk to adults.
5. It keeps information private.
 Proper Netiquette
1. Make sure you have the correct address (with proper spelling),
correct link and you are sending the information to the right person
when doing it online.
2. Check information before sending or posting any message and
avoid false statements and information on the web or forwarding
junk mail or chain letters to family or friends.
3. Re-read what you wrote to make sure it is what you want to say
and the other person would interpret it the same way.
4. Keep your comments clean and don't confront others online or say
anything that could be hurtful to them.
5. Keep your personal and friends' information private and don't
forward information that was just given to you without his/her
permission.
6. Watch out for spam and other fraud e-mails and never reply to
them.
7. If you are going to write something personal or private, think twice
because messages can get misdelivered.

8. Adults should monitor kids' messages, especially when they are


seriding e-mails to others without permission.
 The Ten Commandments of Teacher Cyber Citizenship

1. Thou shall not post any personal matter, confidential information


and obscene pictures and messages online that can be accessed
by students and parents.
2. Thou shall not respond or thread to any personal message created
by students online other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references
without the author's citation.
6. Thou shall not post to any social media account, for whatever purposes, the
pictures of students without their or their parents' consent.
7. Thou shall not express sentiments, disappointments and disagreements
against superiors, colleagues, students and their parents using their social media
accounts.
8. Thou shall not use data from Internet sources in any documents like
lesson plans, researches and requirements without the consent of the
author.
9. Thou shall not give any personal data or other's information to anyone
unless for specific purposes and given the consent.
10. Thou shall not post any student data publicly online including
academic rankings, school records, class outputs and record of grades.
De Leon (2019)
 Internet safety, online safety or cyber safety means trying to be safe on the
Internet. It is maximizing the user's personal safety and security risks to private
information and property associated with using the Internet, including self-
protection from computer crime.
 Information security. Sensitive information, such as personal information,
identity and passwords are often associated with personal property and
privacy and may present security concerns if leaked. Unauthorized access and
usage of private information may result in consequences, such as identity and
property theft.
 Common causes of information security breaches include:

1. Phishing. It is a common type of scam, of which the scammers


disguise as a trustworthy source in an attempt to obtain private
information, such as passwords, credit card information, etc.
through the use of fake websites that look identical and
legitimate.
2. Internet scams. These are schemes that deceive the users in
various ways in an attempt to take advantage of them.

3. Malware. It is a malicious software (particularly spyware)


disguised to collect and transmit private information, such as
password without the user's consent or knowledge, of which it
is impossible to determine whether a file is infected.
 Personal safety and threats. The growth of the Internet gave
rise to many important services accessible to anyone with a
connection, such as digital communication. While it allows
communication with others, it is also being grabbed by
malicious users for bad intent.
 The following are common threats to personal safety.

1. Cyberstalking. It is the use of the Internet or other electronic


means to stalk or harass an individual, group or organization
through false accusations, defamation, slander and libel, intentional
monitoring, identity theft, threats, vandalism, solicitation for sex, or
gathering information that may be used to threaten, embarrass or
harass.
2. Cyberbullying. It is the use of electronic means, such as instant
messaging, social media, e-mail and other forms of online
communication with the intent to abuse, intimidate, or
overpower an individual or group.

3. Online predation. It is the act of engaging an underage minor


into inappropriate sexual relationships through the Internet.
Online predators may attempt to initiate and seduce minors into
relationships through the use of chat rooms or Internet forums.
4. Obscene/offensive content. Various websites on the
Internet contain material that may deem offensive,
distasteful or explicit, which may often not be of the user's
liking. Such websites may include the Internet, shock sites,
hate speech or otherwise, and inflammatory content.
5. Sextortion. It is the use of webcams for flirting and cybersex.
Often, this involves a cybercriminal posing as someone else, such
as an attractive person initiating communication of a sexual nature
with the victim. The video is recorded by the cybercriminal to
demand money or other services, threaten to publicly release the
video and send to family members and friends of the victim if they
do not comply.
 Computer Threats and Fixing Solutions

The realm of Information Technology (IT) security professionals and


computer security has become an issue and concern for many people
(Honan, 2014).

A threat, in the context of computer security, refers to anything that


has the potential to cause serious harm to a computer system It is
something that may or may not happen, but has the potential to
cause serious damage and can lead to attacks on computer systems
and networks
 Cybercrime is now becoming alarming in the life of
every individual and the organization as they intend to
steal they can sell or trade, such as financial details,
credit card personal details, or any other information
using computer networks. information.
 the following are ways on how to ensure that computer networks
can be protected.
1. Install anti-virus software
2. Ensure that the anti-virus software is up-to-date
3. Employ a firewall to protect networks
4. Filter all email traffic
5. Educate all users to be careful of suspicious e-mails.
6. Scan Internet downloads.
 7. Do not run programs of unknown origin.
 8. Implement a vulnerability management system.
 9. Make regular backups of critical data.
 10. Develop an Information Security Policy.
 11. Monitor logs and systems.
 12. Develop an Incident Response Plan.
 13. Restrict end-user access to the systems.
 Cyberbullying, cyberharassment or online bullying is a form of bullying or
harassment using electronic means usually among minors in a school setting
and has become increasingly common, especially among teenagers.

 It is an aggressive, intentional act or behavior that is carried out by a group


or an individual using electronic forms of contact, repeatedly against a
victim who cannot easily defend him or herself.
 Cyberbullying types

1. Internet trolling is a common form of bullying over the Internet in an


online community to elicit a reaction, disruption or intentionally
provoke and offend others.
2. Cyberstalking is another form of bullying or harassment that uses
electronic communication to stalk a victim and pose a credible
threat to harass him/her.
 Implications of bullying in schools. Schools should initiate
various anti-bullying programs and campaigns to protect
students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in
handling bullying cases and executing teaching strategies
to address and reduce bullying cases in class.
 Cybercrime
 Avast defines cybercrime as any criminal activity carried
out using computers or the Internet. Cybercrime uses
tools like phishing, viruses, spyware, ransomware and
social engineering to break the law
 On the other hand, cybercrime is defined by Techopedia as a crime
with the computer as the object of the crime (i.e. hacking, phishing,
spamming) or is used as a tool to commit an offense (i.e. child
pornography, hate crimes).

 Cybercriminals may use computer technology to access personal


and confidential information or use the Internet for exploitative or
malicious purposes.
 Surfing the Web
The following are the three key factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the
subject into a search engine.
2. Good strategies for searching the Web include writing research
questions; extracting keywords from the questions and typing them into
a search engine using synonyms if the keywords do not bring up
desired results; keeping track of keywords and synonyms used; and
recording the results of search.
3. Always be cautious about the information shared online and in
visiting websites.
 Assessing credibility. Carefully evaluate the information
searched online. Consider the credibility, or trustworthiness
and reliability of the content before taking it.
 There are two types of websites: informational and
commercial. Informational websites usually strive to offer
credible content to users, while commercial websites present
inaccurate information in order to see
 Checklist of credibility criteria

1. Author
2. Date
3. Purpose
4. Contact
5. Fact vs. Opinion
6. URL
Common credible URLS.

 1. When encountering a URL, look at the letters that appear after


the "dot" (i.e. www.whitehouse.gov.) and that is called top-level
domain.

 2. Websites ending in .gov are government-related websites, which


generally, can be trusted to provide credible statistical information,
articles on many different topics and government news.
 3. Websites ending in edu are the websites of educational
institutions, such as colleges and universities that usually offer a
variety of credible data, especially about the school's operations
and research.

 4. Websites ending in org are the websites of organizations. While


many organizations, especially nonprofit ones, provide credible
information, they may sometimes have advertising intent.
 Recognition of information sources. Similar to the information in print
sources, the use of online sources must be given credit to the authors.

 Citation. Each entry in the bibliography is called a citation. Proper citation


must be applied or included for every source used, whether it is a website,
a newspaper, or a book.

 Data privacy implication. The implementation of data privacy in the


country is becoming stronger and powerful, especially in utilizing data for
research and other forms of report and paper works.
 The following are practical techniques in responding to data
privacy issues.
1. When getting data, put proper citation and source
acknowledgment (e.g. Source: National Statistics Office, 2019).
2. When using needed pictures downloaded from the Internet, put
acknowledgment (e.g: Photo credits to PhilPost, 2019). But if
possible to have personal pictures taken with your original
concept.
3. If data, concepts and information are copyrighted, ask for the
consent of the author, and wait for his/her response.
4. However, if the data and information are for public domain, just
acknowledging/citing the author or the source will do.
5. If the author doesn't really want anyone to utilize his/her data
file or article, learn the value of respect, anyway that is his/ her
property.
 Research and data collection protocols. When
researching and collecting data from the Web, avoid
plagiarism, which is the act of taking someone else's
work and presenting it as your own (Turnitin, com).
 Plagiarism is unethical, and it can bring you in trouble.

The following are 10 types of plagiarism that teachers, researchers and


students should know.

1. Clone Plagiarism. It is also called identical copying or copying


another work (word-for-word) without any change and claim as his/her
own work. 2. Remix Plagiarism. It refers to collecting information from
various sources and mixing all together as a single document then,
claiming the work as their own work.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied
from any single source without any alteration in a written document. 4.
Hybrid Plagiarism. Here, perfectly cited source documents are copied
and arranged as a new document without citation.

5. Find-Replace Plagiarism. This is changing the most common


keywords and phrases in the copied content but not making any
changes in the essential document.

6. Recycle Plagiarism. Also called self-plagiarism, it refers to the act of


borrowing from one's own previous document without proper citation.
7. Mashup Plagiarism. It is when the written document is copied from more than
one source and all are mixed together without proper citation.

8. 404 Error Plagiarism. Here, a person creates a document by copying from various
sources prepared as a single document with the citation but inaccurate or leads to
non-existing resources

9. Aggregator Plagiarism. Here, the written document includes proper citation but it
does not contain original work.

10. Re-Tweet Plagiarism. Here, all written documents look perfect with properly
cited mark but still, the document resembles somewhere the original text's structure
or wordings.
Tips to Avoid Plagiarism

1. Read and understand the original document several times before


start explaining about it.
2. Do not copy any word or sentence from the original document.
3. Give proper citation to all sources (book, journal, website, video,
etc.).
4. In case of citing online sources, include the retrieval date and
appropriate URL in the reference.
5. Common phrases and definitions need to be quoted and cited
without any modification.
6. Make a practice to include the "references" section whenever you
write an academic document.
7. Cross verify all your citations before submitting your document.
8. Resort to available plagiarism software to ensure the originality of the
written document.
How to Evaluate a Website

1. Open the site.


2. Skim read.
3. Look for the answer to your question.
4. Consider the credibility of the author or website. (1) Domain domains
that include .gov or edu are trustworthy sources; (2) Author's
information(3) Design and (4) Sources
5. Consider the purpose of the site.
6. Look for the date.
Integrating Digital/Cyber Literacy
into the Curriculum
1. Use an interactive whiteboard to design and deliver lessons.
2. Allow students to maintain blogs, wikis, web pages related to their
learning.
3. Engage in email/video chat exchanges with students.
4. Utilize storytelling media to allow students to create and publish
stories.
5. Set-up a blog site, Facebook page, Yahoo or Google group and
post weekly discussion questions for students to respond.
6. Use video cameras to dramatize stories, record scientific experiments
and expose students to video editing software to create video
production of learning.

7. Engage students in discussions about how and why various media


work well to showcase learning and why others do not.

8. Thinking critically about the medium use to present a message is as


important as the message itself.
9. Require E-Portfolio that would compile their outputs, projects,
messages and photo-documents of group activities and investigations
online.

10. Allow students to use digital tools, such as mobile phones. Ipad and
netbooks for Google search, dictionary Apps. Youtube, Podcast and
Spotify applications in class to complement their learning, especially
during group works
 Impact of integrating digital literacy in the classroom on
Machers, families and friends. Integrating digital literacy
in the wsroom can bring a positive impact on students'
learning as denced by the following:
1. It motivates students in their learning due to their
enjoyment and ease of use with various technological
mediums.
2. It reaches students of various learning styles and multiple
intelligences.
3. It allows students to create and design their own unique
products reflective of their personalities and learning
needs/ styles.
4. It encourages students to manipulate media in constructing
their own meaning.

5. It enables students to share their learning with teachers,


families and friends.

6. It gives students the chance to explore technological media


that inevitably increase the job skills needed in the workforce.
Thank You and
Godbless!

You might also like