Professional Documents
Culture Documents
LEARNING OUTCOMES
1. Define digital/cyber literacy and cybersecurity
2. Elaborate on cyber citizenship
3. Determine netiquette and safety use of digital media
4. Identify common computer threats and the corresponding fixing solutions
5. .Elucidate cyberbullying and cybercrimes
6. Examine Internet exploration, source citation, research and data gathering
protocols and website evaluation.
7. Cite how digital/cyberliteracy may be integrated with teaching-learning
8. Draw relevant life lessons and significant values from personal experiences on
digital risks and consequences
9. Analyze research abstract on digital/cyber literacy and its implications to the
teaching-learning process
10. Produce and evaluate a digital tool that may be utilized in the classroom
INTERACTIVE PRESENTATION
Cross Sectional Dilemmatters Jury Trial: This activity is intended for students to analyze
dilemmas. The points of view are supported by provisions, theories and frameworks.
Then, groups present their propositions and analysis subjected to critiquing and
assessment by other groups. It enhances critical thinking. Analysis, objectivity,
communication skills, collaboration and unity.
Procedure:
1. The students form four groups in class.
2. The teacher prepares dilemmas on mal-use, misuse and abuse of technology to
be examined and analyzed by the students as an advanced assassignmen
3. Two groups will be given a dilemma to be resolved. Both Groups will take their
justifications and counter propositions on the issue just like a debate.
4. Members of the groups will share ideas and opinions regarding issues being
raised. The members agree to common propositions and justifications based on
their opinions supported by legal, philosophical and moral bases that they have
researched on in advance.
5. The groups present their analysis and propositions and react to the opposing
group’s justifications in class.
6. Meanwhile, the other (remaining) two groups will serve both as audience and
adjudicators. They will also analyze and assess the given propositions of the
presenting grclass
7. Therefore, the groups of adjudicators will also choose the side that they will
defend and justify against the opposing side.
8. Just like the two presenting groups, the two groups of adjudicators will also
debate on the issue by examining the counter propositions of the opposing group
upon presenting their side. Therefore, two different sets of debating teams are
expected to perform.
9. The teacher clarifies and synthesizes the ideas and the propositions given by
the presenting groups, as well as the defense and the critiquing made by the
adjudicators.
10. The class will find time for a brief reflection on the activity.
The student who unintentionally posted the picture out of glee and the people who
reacted to it?
Dilemma No. 2:
2. After the swimming class, a student, who was given consent by her classmate,
took a video of the latter in the comfort room while changing her swimsuit.
Suddenly, the video came out with the student’s nude body and was viewed by
many, including her family and friends. Being affected by such malicious scandal,
the said student’s family immediately
Confronted the school to hear explanations from those concerned. Upon investigation,
they found out that the one, who took the video, had mistakenly pressed the button of
the cellphone marked “video share” that made it accessible to all accounts registered in
the contacts right away, which caused its immediate spreading.
Who do you think has the main liability on this issue – the girl who allowed someone to
take the video of her nude body or the one who caused its widespread? Justify. How
should this matter be resolved?
CONCEPT EXPLORATION
Technology has been part of everyone’s life, be it at home, in school, or anywhere with
every facet of our undertaking. However, in many instances, we may not be aware that
we have been misusing or abusing it or in another way around, we may find ourselves
being used by other people with their malicious motives using digital tools. Therefore,
we may end up being liable or a victim of such irresponsible kind of technological
processing and utilization. It is in this case that we must gain further understanding and
application of digital/cyber literacy, be it on personal or professional merit.
Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full
participation in society that includes knowledge, skills, and behaviors involving the
effective use of digital devices for purposes of communication, expression, collaboration
and advocacy. Simply, it is the ability of an individual to engage with the digital
environment and operate technologies safely by knowing what to do and what not to do
and how to avoid unnecessary risks. Digital literacy is an individual’s ability to access
both information and methods of communication through technological tools, such as
smartphones, tablets, laptops and desktop PCs. While digital literacy is initially focused
on digital skills and stand-alone computers, its focus has shifted to network devices,
including the Internet and the use of Social media.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks (Cisco, n.d.). These cyberattacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or interrupting normal
business processes.
Implementing effective cybersecurity measures is challenging because there are more
devices than people, and attackers are becoming more innovative. Here are some tips
on how to protect yourself against cyber threats.
2. Keep devices safe. Protect your technology tools by installing Anti-virus software,
a configuration of settings on the devices and by completing software updates.
5. Consider safety for the future. Take individual responsibility in using devices with
an utmost care and critical thinking when online
(https://www.esentire.com).
Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the Internet. Cyber
citizenship refers to being responsible when using the Internet. Doing online when no
one is looking speaks a lot about one’s character and morals. The power of this digital
world is associated with responsibilities and consequences. Therefore, we can explore
and navigate all information available online however, we should observe cyber
citizenship or manners and etiquette on the Web.
Ways on How to be a Good Cyber Citizen
The enlisted ways of becoming a good cyber citizen would guide everyone on his/her
digital operations and information processing and would prevent anyone from further
consequences, distractions, moral damages and risks.
1. Be careful and critical for whatever you post online that could be visible to the
public even if on a “private” page through tagging by a friend.
2. If you have a problem with someone, go to that person of an adult to help work it
out, instead of posting your expression
3. Use the Internet to help you with your schoolwork, but give credit to the sources
you use and critically analyze everything.
4. Use the Internet purposefully to learn more about anything you are interested in,
to help you research relevant and needed data or information and to stay
connected with friends throughout the world.
5. Make sure you verify an information before you share it or use it in a project and
check on accuracy and truth in the information you search on the web.
8. Always make sure you have told a reliable adult if you decide to meet someone
you knew through the Internet.
9. Always be aware of copyright laws and give credit to whom an Article or a part of
it is due.
10. Use only the computers that you are allowed to use. Avoid hacking.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when sending
messages online.
1. Make sure you have the correct address (with proper spelling), correct link and
you are sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false
statements and information on the web or forwarding junk mail or chain letters to
family or friends.
3. Re-read what you wrote to make sure it is what you want to say and the other
person would interpret it the same way.
4. Keep your comments clean and don’t confront others online the say anything that
could be hurtful to them.
5. Keep your personal and friends’ information private and don’t forward
information that was just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because
messages can get misdelivered.
8. Adults should monitor kids’ messages, especially when they are sending e-mails
to others without permission.
(http://www.Cybercitizenship.org/ethics/ethics.html)
1. Thou shall not post any personal matter, confidential information and obscene
pictures and messages online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students online
other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references without the
author's citation.
6. Thou shall not post to any social media account, for whatever purposes, the pictures
of students without their or their parents consent.
7. Thou shall not express sentiments, disappointments and disagreements against
superiors, colleagues, students and their parents using their social media accounts.
8. Thou shall not use data from Internet sources in any documents like lesson plans,
researches and requirements without the consent of the author.
9. Thou shall not give any personal data or other's information to anyone unless for
specific purposes and given the consent.
10. Thou shall not post any student data publicly online including academic rankings,
school records, class outputs and record of grades. De Leon (2019)
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the Internet. It is
maximizing the user's personal safety and security risks to private information and
property associated with using the Internet, including self-protection from computer
crime. As the number of Internet users continues to grow worldwide, issues and
concerns also continuously exist.
Information security. Sensitive information, such as person information, identity and
passwords are often associated with personal property and privacy and may present
security concerns if leaked Unauthorized access and usage of private information may
result in consequences, such as identity and property theft. Common causes of
information security breaches include:
1. Phishing. It is a common type of scam, of which the scammers disguise as a
trustworthy source in an attempt to obtain private information, such as passwords, credit
card information, etc. through the use of fake websites that look identical and legitimate.
Internet scams. These are schemes that deceive the users in various ways in an
attempt to take advantage of them. Malware. It is a malicious software (particularly
spyware) disguised to collect and transmit private information, such as password
without the user's consent or knowledge, of which it is impossible to determine whether
a file is infected.
Personal safety and threats. The growth of the Internet gave rise to many important
services accessible to anyone with a connection, such as digital communication. While
it allows communication with others, it is also being grabbed by malicious users for bad
intent. The following are common threats to personal safety.
Cyberbullying
At Cyberbullying, cyber harassment or online bullying is a form of D- bullying or
harassment using electronic means usually among minors in a school setting and has
become increasingly common, especially among teenagers.
It’ is an aggressive, intentional act or behavior that is carried out by a group or an
individual using electronic forms of contact, repeatedly. Against a victim who cannot
easily defend him or herself. The National Crime Prevention Council defines it as a
process of using the Internet, cell phones or other devices to send or post texts or
images that intend to hurt or embarrass another person. It may also include public
actions, such as repeated threats, sexual remarks, pejorative labels or defamatory false
accusations, ganging up on a victim by making the person the subject of ridicule in
online forums, hacking into or vandalizing sites about a person, and posting false
statements to discredit the targeted person.
Cyberbullying is similar to traditional bullying, It is just that victims may not know
the identity of their bully and the reason for bullying them. Cyberbullies may disclose
victims’ personal data on websites or forums-called doxing, or may use impersonation,
and create fake accounts, comments or sites for the purpose of publishing material in
their names. This can leave the cyberbully anonymous and difficult to be caught or
apprehended for his/her behavior.
Cyberbullying types. There are various types of cyberbullying and research has
revealed serious profound consequences on victims.
1. Internet trolling is a common form of bullying over the Internet in an online
community to elicit a reaction, disruption or intentionally provoke and offend
others.
Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers or
the Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and
social engineering to break the law
(https:// www.avast.com/c-cybercrime).
On the other hand, cybercrime is defined by Techopedia as a crime with the
computer as the object of the crime (i.e. hacking, phishing, spamming) or is used as a
tool to commit an offense (i.e. child pornography, hate crimes). Cybercriminals may use
computer technology to access personal and confidential information or use the Internet
for exploitative or malicious purposes.
There is a wide variety of cybercrimes, which can.broadly be placed into two
categories: one-off crimes, such as installing a virus that steals your personal data; and
ongoing crimes, such as cyberbullying, extortion, distributing child pornography or
organizing terrorist attacks (https://www.avast.com/c-cybercrime).
1. Most surfing sessions start with the user-targeted keywords about the subject
into a search engine.
2. Good strategies for searching the Web include writing research questions;
extracting keywords from the questions and typing them into a search engine
using synonyms if the keywords do not bring up desired results; keeping track of
keywords and synonyms used; and recording the results of search.
3. Always be cautious about the information shared online and in visiting websites.
Assessing credibility. Different websites accessible on the Web can make the job
of researchers very challenging. Carefully evaluate the information searched
online. Consider the credibility, or trustworthiness and reliability of the content
before taking it. There are two types of websites: informational and commercial.
Informational websites usually strive to offer credible content to users, while
commercial websites present inaccurate information in order to see something.
Checklist of credibility criteria. The first step in evaluating the credibility of websites is to
review several important aspects of the site.
1. Author. Check the credentials of the author, the company or the expert and
determine the qualifications to provide information on the subject being
researched. Some websites do not list specific authors, but the credibility of a
company can be explored by reviewing the site’s “About” page, if available.
2. Date. Look for copyright information at the bottom of a website’s home page. If
the site is more than a few years old and it has not been updated regularly, look
for more up-to-date information.
4. Contact. Most credible websites list down contact information, such as telephone
number, email address, or mailing address so that users may get in touch if they
have questions.
5. Fact vs. Opinion. When doing research for a school paper, go to sites that
present factual information provided by experts, rather than opinions. Be on the
lookout for biases, too. If the author is biased, so as the information on the site.
6. URL. The URL may look like ending in .edu (for education),.gov (for
government), .org (for organization), .com (for commercial sites), or .net (for
network sites). Different websites have different URLs. To help determine a site’s
credibility, determine if that is a personal website or blog, a government website,
or other types of website.
Common credible URLS. One way of determining the credibility of a website is
through the URLS. Although a website’s URL gives clues as to credibility, there is still a
need to evaluate it carefully.
1. When encountering a URL, look at the letters that appear after the “dot” (i.e.
www.whitehouse.gov.) and that is called top-level domain. Thus, the URL’s top-
level domain helps in determining a site’s credibility.
Research and data collection protocols. When researching and collecting data
from the Web, avoid plagiarism, which is the act of taking someone else’s work and
presenting it as your own (Turnitin com).
Plagiarism is unethical, and it can bring you in trouble. Sometimes, students
don’t mean to plagiarize, but they end up doing it accidentally because they are
unaware or unclear about it.
The following are 10 types of plagiarism that teachers, researchers and students should
know.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied from any
single source without any alteration in a written document.
4. Plagiarism. Here, perfectly cited source documents are copied and arranged as
a new document without citation. Find-Replace Plagiarism. This is changing the
most common keywords and phrases in the copied content but not making any
changes in the essential document.
6. Mashup Plagiarism. It is when the written document is copied from more than
one source and all are mixed together without proper citation.
7. 404 Error Plagiarism. Here, a person creates a document by copying from
various sources prepared as a single document with the citation but inaccurate or
leads to non-existing resources.
8. Aggregator plagiarism, here, the written documents includes proper citation but it
does not contain original work.
9. Re- Tweet plagiarism, Here, all written documents look perfect with properly cited
mark but still, the document resembles somewhere the original text’ s structure or
wordings.
1. Read and Understand the original documents several times before start
explaining about it.
3. Give proper citation to all source ( book, journal, website, video, etc.)
4. In case of citing online sources, include the retrieval date and appropriate
URL in the reference.
5. Common phrases and definitions need to be quoted and cited without any
modification.
1. Open the Site. When looking through Google search result, open site in
new tabs, leave search results in a tab for easy access later ( e.g. right-
click on the title and click “open link in new tab “).
2. Skim read. Determine whether you can read and understand the text. If it
is too complicated or difficult to understand, find another website that may
provide the information you need.
3. Look for the answer to your question. Find out if the information on the site
actually answers your question. You can use a search box, navigation
menu, or pull up your own search box’ by pressing control/ command F
and type in the keywords you are searching for.
4. Consider the Credibility of the author or website. You need to consider the
Credibility of the author or website by considering the following: (1)
Domain – domains that includes , gov or , edu are trustworthy sources:
(2) Author’s information – look at the authors bio or about page regarding
the qualifications of the author; (3) Design – avoid sites that are cluttered
and difficult to navigate; and (4) sources – trustworthy article usually link to
other sources or site where there facts come from.
5. Consider the purpose of the site. Think about the purpose of the site and
whether it meets your needs.
6. Look the date. Consider whether the information is current enough for
your topic. You can look for the date when the article was written or last
updated. Sometimes, URL, also include dates. (
http://www.kathleenamorris.com/).
The following are suggested activities to integrate digital literacy, higher – order
thinking and construction of meaning in the classroom.
1. Use an interactive whiteboard to design and deliver lessons. Use
Promethean and smart notebook with teacher- created lessons if you are
not yet capable of designing your own.
5. Set- up a blog site, Facebook page, Yahoo or Google group and post
weekly discussion questions for students to respond
7. Engage students in discussions about how and why various media work
well to showcase learning and why others do not.
10. Allow students to use digital tools, such as mobile phones, IPad and
netbooks for Google search, dictionary apps, YouTube, podcast and
Spotify applications in class to complement their learning, specially during
group works and concept reporting. Impact of integrating Digital literacy in
the classroom on teachers, families and friends. Integrating Digital literacy
in the classroom can bring a positive impact on students’ learning as
evidence by the following;
11. It motivates students in their learning due to their enjoyment and ease of
use with various technological mediums.
12. It reaches students of various learning styles and multiple intelligence.
13. It allows students to create and design their own unique products
reflective of their personalities and learning needs/styles.
15. It enables students to share their learning with teachers, families and
friends.
16. It gives the students the chance to explore technological media that
inevitably increase the job skills needed in the workforce.
3. What are netiquette and the process of safety use of digital media ? Give
examples.
4. What are the common computer threats and how can these be fixed?
6. How can you practice the processes of internet exploration, source citation,
research and data – gathering protocols and website evaluation?
7. How can cyber/digital literacy be integrated in the teaching – learning
process?
Direction: analyze the following research abstract and cite each implications on
teaching- learning. You may download the full paper of this research on the
website given below.
Teachers’ belief about integrating about digital literacy into classroom practice;
an investigation practice based on the theory of planned behavior. Sadal and
Johnson ( 2017)
Abstract
This study explored teachers’ behavioral, normative, and control belief related to
digital literacy integration into Their classrooms. Ajzen’s theory of planned
behavioral ( TPB ) was used as a theoretical framework to collect and analyze
data, findings revealed that teachers integration of digital literacy were related to
Their behavioral belief ( attitudes towards outcomes of a behavior) about the
value of digital literacy for developing students’ 21 st century skills, increase
students engagements, and preparation for future careers, normative belief
( social support ) about meeting the expectations of administrators, parents,
colleagues, and students, and control beliefs (perceive behavioral control) about
ease of integrating Digital literacy due to access to technology, professional
development, and curriculum resources.
Implication: how does the result of the study impacts the students’ learning and
the development of the 21st century skills?
SYNTHESIS AND LEARNING REFLECTION
SYNTHESIS
< Digital literacy is the set of competencies on the effective use of digital devices
for purposes of communication, expression, collaboration, and advocacy while
cybersecurity is the practice of protecting systems, networks and programs from
digital attacks.
< Cyber citizenship refers for being responsible when exploring the internet,
including the right manner and etiquette in using the web.
< Internet safety is preventing from online security risk to private information and
property and protecting self from computer threats and cybercrimes.
< A computer threat to anything that has the potential to cause serious harm and
damage to a computer system that must be fixed immediately and effectively with
a solutions.
< In order to avoid digital risk and consequences, proper internet exploration,
source citation, data privacy imposition, research and data- gathering protocols
and websites evaluations are imperative.
< As digital literacy impacts teaching- learning process, its wide dissemination in
schools and integration in the classroom is timely, relevant and necessary.
Direction: choose any type of cyberbullying. Describe it and while it’s purpose,
procedures, principles, and perspective target indicated in the tablets provided
below.
CURRICULUM APPLICATION
Direction: produce and evaluate a digital tool that can be utilized in the
classroom.
Direction: Read and analyze each item carefully. Choose the letter of the best
answer.
1. If you plan to produce a digital tool as a learning material, which of the
following aspect will you consider first?
A. Discuss the provisions of the law and administer a short quiz after
B. Research on how the law was amended and how it would impact both
the victims and the culprits lives
D. Report to the class the status of cybercrime in the country taken from
internet source
4. When you receive a suspicious E- mail asking you to withdraw big amount
from a prestigious bank upon winning a grand prize is an automated raffle
draw, which you know you have not participated in, what would be your first
and immediate mode?
B. Take the E- mail and verify it to the concerned bank and relevant
agencies
C. Contact the owner of the E- mail and ask him to discuss with you the
content of the message
D. Take the E- mail and transact immediately the given message, there’s
no harm in trying, anyway.
5. When researching data from the internet, which of the following reminders
should be taken into account to avoid complications, risk and negative
consequences?
III. Rephrase statement while retaining it’s original concept and meaning
IV. Include pictures and graphics to be downloaded, copied and pasted in the
report
A. I and II only
B. I, II and IV
C. I, UI and III