Digital and Cyber Literacy - 103431

Download as pdf or txt
Download as pdf or txt
You are on page 1of 66

Module 9:

Digital/
Cyber
Literacy
Reporters: Alarcon John Carlo
Sanglay, Aica
Villete, Marissa
Learning Objectives
Define digital/cyber literacy and cyber
security
Elaborate on cyber citizenship
Determine netiquette and safety use of
digital media
Identify common computer threats and
the corresponding fixing solutions
Elucidate cyber bullying and cybercrimes
Learning Objectives
Examine internet exploration, source citation, research and
data gathering protocol and website evaluation
Cite how digital/cyber literacy may be integrated with
teaching-learning
Draw relevant life lessons and significant values from
personal experiences on digital risks and consequences
Analyze research abstract on digital/cyber literacy and its
implications to the teaching/learning process
Produce and evaluate a digital tool that may be utilized in the
classroom.
Activity
Dilemma to be resolved:
After swimming class, a student, who was given consent by her classmate,
took a video of the latter in the comfort room while changing her swimsuit.
Suddenly, the video came out with the student’s nude body and was viewed
by many, including her family and friends. Being affected by such malicious
scandal, the said student’s family immediately confronted the school to
hear explanations from those concerned. Upon investigation, they found
out that the one, who took the video, had mistakenly passed the button of
the cellphone marked “video share” that made it accessible to all accounts
registered in the contacts right away, which caused its immediate
spreading.
Who do you think has the
main liable on this issue- the
Ask girl who allowed someone to
take the video of her nude
Yourself body or the one who caused its
widespread? Justify. How
should this matter be
resolved?
What Is Digital
Literacy?
According to Wikipedia, digital
literacy is the set of competencies
required for full participation in
society that includes knowledge,
skills, and behaviors involving the
effective use of digital devices for
purposes of communication,
expression, collaboration and
advocacy.
Digital literacy is an individual’s ability to access both information
and methods of communication through technological tools, such as
smartphones, tablets, laptops, desktop PC’s. While digital literacy is
initially focused on digital skills and stand-alone computers, its focus
has shifted to network devices, including the internet and the use of
social media.

Cybersecurity is the practice of protecting systems, networks and


programs from digital attacks. These cyberattacks are usually aimed
at accessing, changing or destroying sensitive information; extorting
money from users; or interrupting normal business processes.
Tips on how to protect yourself against
cyber threats:
1. Monitor behavior on social networks.
2. Keep devices safe
3. Understand how best to use passwords.
4. Handle unsafe content.
5. Consider safety for the future.
Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the
internet. Cyber citizenship refers to being responsible when using
the internet. Doing online when no one is looking speaks a lot
about one’s character and morals. The power of this digital world is
associated with responsibilities and consequences. Therefore, we
can explore and navigate all information available online however;
we should observe cyber citizenship or manners and etiquette on
the Web.
Ways on How to be a Good Cyber
Citizen
1. Be careful and critical for whatever you post online that
could be visible to the public even if on a “private” page
through tagging by a friend.
2. If you have a problem with someone, go to that person or
an adult to help work it our, instead of posting your
expression online.
Ways on How to be a Good Cyber
Citizen
3. Use the internet to help you with your schoolwork, but give
credit to the sources you use and critically analyze everything
you search online.
4. Use the internet purposefully to learn more about anything
you are interested in, to help you research relevant and needed
data or information and to stay connected with friends
throughout the world.
Ways on How to be a Good Cyber
Citizen
5. Make sure you verify information before you share it or use
it in a project and check on accuracy and truth in the
information you search on the web.
6. Give out certain information only.
7. Don’t answer questions that make you uncomfortable.
Ways on How to be a Good Cyber
Citizen
8. Always make sure you have told a reliable adult if you
decide to meet someone you knew through the internet.

9. Always be aware of copyright laws and give credit to whom


an article or a part of it is due.
10. Use only the computers that you are allowed to use. Avoid
hacking.
Importance of Cyber Citizenship
1. It keeps the internet free from hurtful
statements
2. It creates a culture of more reliable
information.
3. It gives provisions for people to be given
credit for what they have created.
4. More criminals or bullies can be caught
when kids are honest and talk to adults.
5. It keeps information private
Proper Netiquette
Follow these simple rules to ensure that you make
wise choices when sending messages online.
1. Make sure you have the correct address (with
proper spelling), correct link and you are sending the
information to the right person when doing it online.
2. Check information before sending or posting any
message and avoid false statements and information
on the web or forwarding junk mail or chain letters to
family or friends.
Proper Netiquette
3. Re-read what you wrote to make sure it is what
you want to say and the other person would interpret
it the same way.
4. Keep your comments clean and don’t confront
others online or say anything that could be hurtful to
them.
5. Keep your personal and friends’ information
private and don’t forward information that was just
given to you without his/her permission.
Proper Netiquette
6. Watch out for spam and other fraud e-mails
and never reply to them.
7. If you are going to write something personal
or private, think twice because messages can
get misdelivered.
8. Adults should monitor kids’ messages,
especially when they are sending e-mails to
others without permission.
The 10 Commandments of Teacher Cyber
Citizenship
1. Thou shall not post any personal matter, confidential information and
obscene pictures and messages online that can be accessed by students
and parents.
2. Thou shall not respond or thread to any personal message created by
students online other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and
references without the author’s citation.
The 10 Commandments of Teacher Cyber
Citizenship
6. Thou shall not post to any social media account, for whatever
purposes, the pictures of students without their or their parents’
consent.
7. Thou shall not express sentiments, disappointments and
disagreements against superiors, colleagues, students and their
parents using their social media accounts.
8. Thou shall not use data from internet sources in any documents
like lesson plans, researches and requirements without the consent of
the author.
The 10 Commandments of Teacher Cyber
Citizenship

9. Thou shall not give any personal data or other’s information to


anyone unless for specific purposes and given the consent.
10. Thou shall not post any student data publicly online including
academic rankings, school records, class outputs and record of grades.
Internet Safety
Internet safety, online safety or cyber safety means trying to
be safe on the internet. It is maximizing the user’s personal
safety and security risks to private information and property
associated with using the internet, including self-protection
from computer crime. As the number of internet users
continues to grow worldwide, issues and concerns also
continuously exist.
Information Security- Sensitive information, such as personal
information, identity and passwords are often associated with
personal property and privacy and may present security
concerns if leaked.
Common causes of information
security breaches:

Phishing. It is common type of scam, or which the scammers


disguise as a trustworthy source in an attempt to obtain
private information, such as passwords, credit card
information, etc. through the use of fake websites that look
identical and legitimate.
Internet scams. These are schemes that deceive the users in
various ways in an attempt to take advantage of them.
Common causes of information
security breaches:

Malware. It is a malicious software (particularly spyware)


disguised to collect and transmit private information, such as
password without the user’s consent or knowledge, of which
it is impossible to determine whether a file is infected.
Personal safety and threats. The growth of the internet gave
rise to many important services accessible to anyone with a
connection, such as digital communication.
1. Cyberstalking- it is the use of the internet or other
electronic means to stalk or harass an individual, group or
organization through false accusations, defamation, slander
and libel, intentional monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information that
may be used to threaten, embarrass or harass.
2. Cyberbullying- It is the use of electronic means, such as
instant messaging, social media, e-mail and other forms of
online communication with the intent to abuse, intimidate or
overpower an individual or group.
3. Online predation- It is the act of engaging an underage
minor into inappropriate sexual relationships through the
internet.
The behavior characteristics are categorized into three groups:
a. Manipulative- typically a child molester
b. Opportunist- typically a rapist; and
c. Coercive- being a mixture of both rapists and child
molesters.
4. Obscene/ offensive content- Various websites on the
internet contain material that may deem offensive, distasteful
or explicit, which may often not be of the user’s liking.
5. Sextortion- It is the use of webcams for flirting and
cybersex. Often, this involves a cybercriminal posing as
someone else, such as an attractive person initiating
communication of a sexual nature with the victim.
Computer threats and Fixing Solutions
A threat, in the context of computer security, refers to
anything that has the potential to cause serious harm
to a computer system. It is something that may or may
not happen but has the potential to cause serious
damage and can lead to attacks on computer systems
and networks.
Ways on how to ensure that computer networks
can be protected:
Install anti-virus software.
Ensure that the anti-virus software is up-to-date.
Employ a firewall to protect networks.
Filter all email traffic.
Educate all users to be careful of suspicious e-
mails.
Scan internet downloads.
Ways on how to ensure that computer networks
can be protected:
Do not run programs of unknown origin.
Implement a vulnerability management system.
Make regular backups of critical data.
Develop an Information Security Policy.
Monitor logs and systems.
Develop an incident response plan.
Restrict end-user access to the systems.
What Is Cyberbullying?
Cyberbullying, cyberharassment or online bullying is a
form of bullying or harassment using electronic means
usually among minors in a school setting and has become
increasingly common, especially among teenagers.

-It is similar to traditional bullying, it is just that victims


may not know the identity of their bully and the reason
for bullying them.
What Is Cyberbullying?
Cyberbullies may disclose victims’ personal data on
websites or forums- called doxing, or may use
impersonation, and create fake accounts, comments or
sites for the purpose of publishing material in their
names. This can leave the cyberbully anonymous and
difficult to be caught or apprehended for his/her behavior.
Cyberbullying Types
•Internet trolling is a common form of bullying over the
internet in an online community to elicit a reaction,
disruption or intentionally provoke and offend others.
•Cyberstalking is another form of bullying or harassment
that uses electronic communication to stalk a victim and
pose a credible threat to harass him/her.
Cybercrime

Avast defines cybercrime as any criminal activity carried out using


computers or the internet. Cybercrime uses tools like phishing,
viruses, spyware, ransomware and social engineering to break the
law.
Cybercrime is defined by Techopeida as a crime with the computer
as the object of the crime or is used as a tool to commit an
offense. Cybercriminals may use computer technology to access
personal and confidential information or use the internet for
exploitative or malicious purposes.
Exploring the Internet: Researching
and Evaluating
the Web

The internet is a global communication network that


allows computers to exchange and share information
worldwide. It makes possible for people around the
world to connect and share ideas across time zones and
geographic locations.
Surfing the web

3 key factors in surfing the web:

1.Most surfing sessions start with the user-


targeted keywords about the subject into a search
engine.
Surfing the web

2. Good strategies for searching the web include writing research


questions; extracting keywords from the questions and typing
them into a search engine using synonyms if the keywords do not
bring up desired results; keeping track of keywords and
synonyms used; and recording the results of search.

3. Always be cautious about the information shared online and in


visiting websites.
Assessing credibility- Different websites accessible
on the web can make the job of researchers very
challenging. Carefully evaluate the information
searched online. Consider the credibility or
trustworthiness and reliability of the content before
taking it. There are two types of websites:
informational and commercial.
Informational websites usually strive to offer
credible content to users, while commercial websites
present inaccurate information in order to see
something.
Checklist or credibility criteria:
1. Author
2. Date
3. Purpose
4. Contact
5. Fact vs Opinion
6. URL get meaning or url
Common credible URLS.
•When encountering a URL, look at the letters
that appear after the “dot”
(www.whitehouse.gov.) and that is called top-level
domain.
•Websites ending in .gov are government-related
websites, which generally can be trusted to
provide credible statistical information, articles on
many different topics and government news.
•Websites ending in .edu are the websites of
educational institutions such as colleges and universities
that usually offer as variety of credible data, especially
about the school’s operation and research.

•Websites ending on .org are the websites of


organizations. While many organizations, especially
nonprofit ones, provide credible information, they may
sometimes have advertising intent. Since some
organizations show bias in their provided information,
so evaluate .org sites carefully.
Recognition of information sources

This can be done by applying proper


referencing and citations procedures that
would get rid of risks, consequences and legal
implications because of the copyright issue,
which means that the ideas and words used
belong to the author.
Citation
Each entry in the bibliography is called a
citation. Proper citation must be applied or
included for every source used, whether it is a
website, a newspaper, or a book.
Online sources are cited differently because
they are different from traditional print
sources.
Citation
Data privacy implication

It involves uploading of pictures, designs, graphics,


concepts/ideas, frameworks, art work, and other
information that are copyrighted without the consent
of the author or the source. These are commonly
observed in schools.
Practical Techniques in responding to data
privacy issues:

When getting data, put proper citation and


source acknowledgement.
When using needed pictures downloaded
from the internet, put acknowledgment.
But if possible to have personal pictures
taken with your original concept. Although,
there is still a need to seek the consent of
those in the pictures.
Practical Techniques in responding to data privacy
issues:

If data, concepts and information are


copyrighted, ask for the consent of the author,
and wait for his/her response.
However, if the data and information are for
public domain, just acknowledging/citing the
author or the source will do.
If the author doesn’t really want to utilize
his/her data file or article, learn the value of
respect, anyway that is hi/her property. (read)
Research and data collection protocols

When researching and collecting data from the


Web, avoid plagiarism, which is the act of taking
someone else’s work and presenting it as your own.
Plagiarism

It is unethical, and it can bring you in trouble.


Sometimes, students don’t mean to plagiarize, but
they end up doing it accidentally because they are
unaware or unclear about it.
10 Types of Plagiarism that teacher,
researchers and student should know:
1. Clone Plagiarism. It is also called identical
copying or copying another work without any
change and claim as his/her own work.
2. Remix Plagiarism. It refers to collecting
information from various sources and mixing
all together as a single document then,
claiming the work as their own work
10 Types of Plagiarism that teacher,
researchers and student should know:
3. Ctrl+C Plagiarism. This is a significant portion
of text copied from any single source without any
alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly cited
source documents are copied and arranged as
a new document without citation.
10 Types of Plagiarism that teacher,
researchers and student should know:
5. Find-Replace Plagiarism. This is changing the
most common keywords and phrases in the copied
content but not making any changes is the
essential document.

6. Recycle Plagiarism. Also called self-plagiarism, it


refers to the act of borrowing from one’s own
previous document without proper citation.
10 Types of Plagiarism that teacher,
researchers and student should know:
7. Mashup Plagiarism. It is when the written
document is copied from more than one source and
all are mixed together without proper citation.

8. 404 Error Plagiarism. Here, a person creates a


document by copying from various sources prepared
as a single docuemtn with the citation but inaccurate
or leads to non-existing resources.
10 Types of Plagiarism that teacher,
researchers and student should know:
9. Aggregator Plagiarism. Here, the written
document includes proper citation but it does not
contain original work.

10. Re-Tweet Plagiarism. Here, all written


documents look perfect with properly cited mark but
still, the document resembles somewhere the original
text’s structure or wordings.
Tips to Avoid Plagiarism

Turnitin.com suggests some techniques to avoid plagiarism


that teachers, researchers and students should know.
Read and understand the original document several times
before start explaining about it.
Do not copy any word or sentence from the original
document.
Give proper citation to all sources (book, journal, website,
video, etc.)
In case of citing online sources, include the retrieval date
and appropriate URL in the reference.
Tips to Avoid Plagiarism

Turnitin.com suggests some techniques to avoid plagiarism that


teachers, researchers and students should know.
Common phrases and definitions need to be quoted and
cited without any modifications.
Make a practice to include the “references” section
whenever you write an academic document.
Cross verify all your citations before submitting your
document.
Resort to available plagiarism software to ensure the
originality of the written document
How to Evaluate a Website

Morris (2008) suggests ways on evaluating a website as


reference in research.
Open the site. When looking through Google search results,
open sites in new tabs, leave search results in a tab for easy
access later.
Skim read. Determine whether you can read and understand
the text. If it is too complicated or difficult to understand,
find another website that may provide the information you
need.
How to Evaluate a Website

Morris (2008) suggests ways on evaluating a website as


reference in research.
Look for the answer to your question. Find out if the
information on the site actually answers the question. You
can use a search box, navigation menu, or pull up your own
search box by pressing Control/Command F and type in the
keywords you are searching for.
How to Evaluate a Website

Morris (2008) suggests ways on evaluating a website as reference in


research.
Consider the credibility of the author or website. You need to
consider the credibility of the author or website by considering
the following: (1) Domain- domains that include .gov or .edu are
trustworthy sources. (2) Author’s information- look at the
author’s bio or about page regarding the qualification of the
author; (3) Design- avoid sites that are cluttered and difficult to
navigate; and (4) Sources- trustworthy articles usually link to
other sources or cite where their facts come from.
How to Evaluate a Website

Morris (2008) suggests ways on evaluating a website as


reference in research.
Consider the purpose of the site. Think about the purpose of
the site and whether it meets your needs.
Look for the date. Consider whether the information is
current enough for your topic. You can look for the date
when the article was written or last updated. Sometimes,
URLs also include dates.
Integrating Digital/Cyber Literacy into the Curriculum

Suggested Activities to integrate digital literacy, higher-order


thinking and construction of meaning in the classroom.
Use an interactive whiteboard to design and deliver lessons,
Use Promethean and Smart notebook with teacher-created
lessons if you are not capable of designing your own.
Allow students to maintain blogs, wikis, web pages related
to their learning.
Engage in email/video chat exchanges with students
Integrating Digital/Cyber Literacy into the Curriculum

Suggested Activities to integrate digital literacy, higher-order


thinking and construction of meaning in the classroom.
Utilize storytelling media to allow students to create and
publish stories.
Set up a blog site, Facebook page, Yahoo or Google group
and post weekly discussion questions for students to
respond.
Use video cameras to dramatize stories, record scientific
experiments and expose students to video editing software
to create video production of learning.
Integrating Digital/Cyber Literacy into the Curriculum

Suggested Activities to integrate digital literacy, higher-order


thinking and construction of meaning in the classroom.
Engage students in discussions about how and why various
media work well to showcase learning and why others do
not.
Thinking critically about the medium use to present a
message is as important as the message itself.
Require E-portfolio that would compile their outputs,
project, messages and photo-documents of group activities
and investigations online.
Integrating Digital/Cyber Literacy into the Curriculum

Suggested Activities to integrate digital literacy, higher-order


thinking and construction of meaning in the classroom.

Allow students to use digital tools, such as mobile phones,


Ipad and netbooks for Google search, dictionary Apps,
Youtube, Podcast and Spotify application in class to
complement their learning, especially during group works
and concept reporting.
Impact of Integrating digital literacy in the classroom in teachers,
families and friends.

It motivates students in their learning due to their enjoyment


and ease of use with various technological mediums.
It reaches students of various learning styles and multiple
intelligences.
It allows students to create and design their own unique
products reflective of their personalities and learning
needs/styles.
Impact of Integrating digital literacy in the classroom in teachers,
families and friends.

It encourages students to manipulate media in constructing


their own meaning.
It enables students to share their learning with teachers,
families and friends.
It gives students the chance to explore technological media
that inevitably increase the job skills needed in the workplace.
“If you wouldn’t shout it out loud at
the mall, you shouldn’t post it
online”.

THINK BEFORE YOU CLICK!


THANK YOU!!!

You might also like