You are on page 1of 13

Second Semester SY 2022-2023

EDUC16b – Building and Enhancing New Literacies


across the Curriculum

Module 9
DIGITAL/CYBER LITERACY

Competencies:
At the end of this module, the learners should be able to:
1. Define digital/cyber literacy and cyber security;
2. Elaborate on cyber citizenship;
3. Identify common computer threats and the corresponding fixing solutions;
4. Elucidate cyberbullying and cybercrimes;
5. Examine internet exploration, source citation, research and data gathering
protocols and website evaluation;
6. Cite how digital/cyber literacy may be integrated in the classroom towards student
learning; and
7. Draw relevant life lessons and significant values from personal experiences on
digital risks and consequences.

Learning Content:

Introduction
Technology has been part of everyone's life, be it at home, in school, or
anywhere with every facet of our undertaking. However, in many instances, we may
not be aware that we have been misusing or abusing it or in another way around, we
may find ourselves being used by other people with their malicious motives using
digital tools. Therefore, we may end up being liable or a victim of such irresponsible
kind of technological processing and utilization. It is in this case that we must gain
further understanding and application of digital/cyber literacy, be it on personal or
professional merit.

DIGITAL LITERACY
According to Wikipedia, digital literacy is the set of competencies required for
full participation in society that includes knowledge skills, and behaviors involving the
effective use of digital devices for purposes of communication, expression,
collaboration and advocacy.
Simply, it is the ability of an individual to engage with the digital environment
and operate technologies safely by knowing what to do and what not to do and how to
avoid unnecessary risks.
Digital literacy is an individual's ability to access both information and methods
of communication through technological tools, such as smartphones, tablets, laptops
and desktop PCs. While digital literacy is initially focused on digital skills and stand-
alone computers, its focus has shifted to network devices, including the Internet and
the use of social media.

1|Page
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks (Cisco, n.d.). These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users, or
interrupting normal business processes.
Implementing effective cybersecurity measures is challenging because there are
more devices than people, and attackers are becoming more innovative. Here are some
tips on how to protect yourself against cyber threats.
1. Monitor behavior on social networks. Before posting or uploading something
online, try to realize: (a) Does this need to be public?, and (b) Is it worth the
risk? Remember, not only what we share online is available to friends and
family, but also to cybercriminals.
2. Keep devices safe. Protect your technology tools by installing Anti-virus
software, a configuration of settings on the devices and by completing software
updates.
3. Understand how best to use passwords. Passwords need to be complex and
hard to guess, but can still be remembered. One strategy is "passphrase" or a
password that comes from the first letter of each word in the phrase. There is
also a password manager app to help keep track of all the passwords called
"KeePass" which is free of charge. Importantly, do not use the same password
for all accounts.
4. Handle unsafe content. Know exactly how to respond or react to unsafe
situations online, such as (1) suspicious emails, (2) pop-ups claiming that your
computer is ifected, and (3) BitTorrent sites.
5. Consider safety for the future. Take individual responsibility in using devices
with an utmost care and critical thinking when online.

Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the Internet.
Cyber citizenship refers to being responsible when using the Internet. Doing online
when no one is looking speaks a lot about one's character and morals. The power of
this digital world is associated with responsibilities and consequences. Therefore, we
can explore and navigate all information available online however, we should observe
cyber citizenship or manners and etiquette on the Web.

Importance of Cyber Citizenship


1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.
4. More criminals or bullies can be caught when kids are honest and talk to
adults.
5. It keeps information private.

The Ten Commandments of Teacher Cyber Citizenship


At some point, misuse and abuse of technology may also happen in schools
involving teachers with their students, colleagues and others. The following are
reminders too teachers regarding the use of media tools:

2|Page
1. Thou shall not post any personal matter, confidential information and obscene
pictures and messages online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students
online other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references without
the author's citation.
6. Thou shall not post to any social media account, for whatever purposes, the
pictures of students without their or their parents’ consent.
7. Thou shall not express sentiments, disappointments and disagreements against
superiors, colleagues, students and their parents using their social media
accounts.
8. Thou shall not use data from Internet sources in any documents like lesson
plans, researches and requirements without the consent of the author.
9. Thou shall not give any personal data or other's information to anyone unless
for specific purposes and given the consent.
10.Thou shall not post any student data publicly online including academic
rankings, school records, class outputs and record of grades. De Leon (2019)

3|Page
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the
Internet. It is maximizing the user's personal safety and security risks to private
information and property associated with using the Internet, including self-protection
from computer crime. As the number of Internet users continues to grow worldwide,
issues and concerns also continuously exist.
Information security. Sensitive information, such as personal information,
identity and passwords are often associated with personal property and privacy and
may present security concerns if leaked. Unauthorized access and usage of private
information may result in consequences, such as identity and property theft.
Common causes of information security breaches include:
1. Phishing. It is a common type of scam, of which the Scammers disguise as a
trustworthy source in an attempt to obtain private information, such as
passwords, credit card information, etc. through the use of fake websites that
look identical and legitimate
2. Internet scams. These are schemes that deceive the users in various ways in
an attempt to take advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect
and transmit private information, such as password without the user's consent
or knowledge, of which it is impossible to determine whether a file is infected.
Personal safety and threats. The growth of the Internet gave rise to many
important services accessible to anyone with a connection, Such as digital
communication. While it allows communication with others, it is also being grabbed by
malicious users for bad intent. The following are common threats to personal safety:
1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or
harass an individual, group or organization through false accusations,
defamation, slander and libel, intentional monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information that may be used to
threaten, embarrass or harass.
2. Cyberbullying It is the use of electronic means, such as instant messaging.
social media, e-mail and other forms of online communication with the intent to
abuse, intimidate, or overpower an individual or group.
3. Online predation. It is the act of engaging an underage minor into
inappropriate sexual relationships through the Internet. Online predators may
attempt to initiate and seduce minors into relationships through the use of chat
rooms or Internet forums. The behavior characteristics are categorized into
three groups: (1) Manipulative - typically a child molester; (2) Opportunist -
typically a rapist, and (3) Coercive - being a mixture of both rapists and child
molesters.
4. Obscene/offensive content. Various websites on the Internet contain material
that may deem offensive, distasteful or explicit, which may often not be of the
user's liking. Such websites may include the Internet, shock sites, hate speech
or otherwise and inflammatory content. Such content may manifest in many
ways, such as pop-up ads and unsuspecting links.
5. Sextortion. It is the use of webcams for flirting and cybersex. Often, this
involves a cybercriminal posing as' someone else, such as an attractive person
initiating communication of a sexual nature with the victim. The video is
recorded by the cybercriminal to demand money or other services, threaten to

4|Page
publicly release the video and send to family members and friends of the victim
if they do not comply.

Computer Threats and Fixing Solutions


The realm of Information Technology 0) security professionals and computer
security has become an issue and concern for man people (Honan, 2014).
A threat, in the context of Computer security, refers to thing that has the
potential to cause serious harm to a computer system. It is something that may or
may not happen, but has the potential to cause serious damage and can lead to
attacks on computer systems and networks.
Cybercrime is now becoming alarming in the life of every individual and the
organization as they intend to steal information that they can sell or trade, such as
financial details, credit card information, personal details, or any other information
using computer networks. Likewise, while email has been the main method for the
spread of computer viruses, it can also enter a network by the USB device, Internet
download, visiting an infected website, instant messaging or messaging in social media
platforms, file transfer and file-sharing programs, or by remote users connecting
directly to the corporate network with an infected PC once a computer virus gets into
network, it can spread from computer to computer in multiple ways
Given the numerous ways a computer virus can spread, the following are ways
on how to ensure that computer networks can be protected:
1. Install anti-virus software.
2. Ensure that the anti-virus software is up-to-date.
3. Employ a firewall to protect networks.
4. Filter all email traffic.
5. Educate all users to be careful of suspicious e-mails.
6. Scan Internet downloads.
7. Do not run programs of unknown origin.
8. Implement vulnerability management system.
9. Make regular backups of critical data.
10.Develop an Information Security Policy.
11.Monitor logs and systems.
12.Develop an Incident Response Plan.
13.Restrict end-user access to the systems.

Cyberbullying
Cyberbullying, cyberharassment or online bullying is a form of bullying or
harassment using electronic means usually among minors in a school setting and has
become increasingly common, especially among teenagers.
It is an aggressive, intentional act or behavior that is carried out by a group or
an individual using electronic forms of contact, repeatedly against a victim who cannot
easily defend him or herself. The National Crime Prevention Council defines it as a
process of using the Internet, cell phones or other devices to send or post texts or
images that intend to hurt or embarrass another person. It may also include public
actions, such as repeated threats, sexual remarks, pejorative labels or defamatory
false accusations, ganging up on a victim by making the person the subject of ridicule

5|Page
in online forums, hacking into or vandalizing sites about a person, and posting false
statements to discredit the targeted person.
Cyberbullying is similar to traditional bullying. It is just that victims may not
know the identity of their bully and the reason for bullying them. Cyberbullies may
disclose victim’s personal data on websites or forums called doxing, or may use
impersonation, and create fake accounts, comments or sites for the purpose of
publishing material in their names This can leave the cyberbully anonymous and
difficult to be caught or apprehended for his/her behavior.

Cyberbullying Types
There are various types of cyberbullying and research has revealed serious
profound consequences on victims.
1. Internet trolling is a common form of bullying over the Internet in an online
community to elicit a reaction, disruption or intentionally provoke and offend
others.
2. Cyberstalking is another form of bullying or harassment that uses electronic
communication to stalk a victim and pose a credible threat to harass him/her
Implications of Bullying in Schools
Schools should initiate various anti-bullying programs and campaigns to
protect students from being threatened or victimized by such offense. More so,
teachers should be oriented and trained in handling bullying cases and executing
teaching strategies to address and reduce bullying cases in class. Also, schools should
conduct student empowerment activities that can be engaged in by students,
including the bullies to divert their attention and energy into something worthwhile
and engagements that they can be busy about.

Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers
or the Internet. Cybercrime uses tools like phishing, viruses spyware, ransomware and
social engineering to break the law.
On the other hand, cybercrime is defined by Techopedia as a crime with the
computer as the object of the crime (i.e. hacking, phishing. spamming) or is used as a
tool to commit an offense (i.e. child pornography, hate crimes). Cybercriminals may
use computer technology to access personal and confidential information or use the
Internet for exploitative or malicious purposes.
There is a wide variety of cybercrimes, which can broadly be placed into two
categories. one-off crimes, such as installing a virus that steals your personal data;
and ongoing crimes, such as cyberbullying, extortion, distributing child pornography
or organizing terrorist attacks.
Cybercrime may also be referred to as computer crime practiced by those who
have technological skills and use the Internet to achieve their bad motive.
Cybercriminals employ their diverse skill to access bank accounts, steal identities,
blackmalil, defraud, stalk, and harass or use a compromised computer to attack their
victims. Criminals can also use computers for communication and document or data
storage and those, who perform these illegal activities, are often referred to as hackers.

6|Page
On the other hand, malware downloaded from the computer may slow it down
and prompt it to give error messages. Likewise, phishing attacks usually involve
receiving emails from unknown sources while trying to ck Someone into giving up
his/her passwords or personal data Keyloggers leave their own telltale signs, like
strange icons, or duplicating the messages
Techopedia cites common types of cybercrime that include online bank
Information theft, identity theft, online predatory crimes unauthorized computer
access, and the most serious one like cyberterrorism. Cybercrime encompasses a wide
range of activities that can be categorized as (1) crimes that target computer networks
or devices, including viruses and denial-of-service (DoS) attacks, and (2) crimes that
use computer networks to advance other criminal activities, including cyberstalking,
phishing and fraud or identity theft.

EXPLORING THE INTERNET: RESEARCHING AND EVALUATING THE WEB


The Internet is a global communication network that allows computers to
exchange and share information worldwide. It makes possible for people around the
world to connect and share ideas across time zones and geographic locations.
However, because cyberspace is such a large realm, sometimes it is difficult to find the
needed information. So, the most effective way to explore the Internet is to have
strategies in place for doing research on the Web and for evaluating the websites.
Commonly, this is important among schools in doing researches and other
related works. Therefore, this aspect needs to be explored by teachers and students in
doing their works.

7|Page
Surfing the Web
The following are the three key factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the subject
into a search engine.
2. Good strategies for searching the Web include writing research questions,
extracting keywords from the questions and typing them into a search engine
using synonyms if the keywords do not bring up desired results, keeping track
of keywords and synonyms used, and recording the results of search.
3. Always be cautious about the information shared online and in visiting
websites.

Assessing Credibility
Different websites accessible on the web can make the job of researchers very
challenging. Carefully evaluate the information searched online. Consider the
credibility, or trustworthiness and reliability of the content before taking it. There are
two types of websites informational and commercial. Informational websites usually
strive to offer credible content to users, while commercial websites present inaccurate
information in order to see something.

Checklist of Credibility Criteria


The first step in evaluating the credibility of websites is to review several
important aspects of the site.
1. Author. Check the credentials of the author, the company or the expert and
determine the qualifications to provide information on the subject being
researched. Some websites do not list specific authors, but the credibility of a
company can be explored by reviewing the site's "About' page, if available.
2. Date. Look for copyright information at the bottom of a website's home page If
the site is more than a few years old and it has not been updated regularly, look
for more up-to-date information.
3. Purpose. Analyze the goals of the website to determine if it is an informational
or an advertisement site.
4. Contact. Most credible websites list down contact information such as
telephone number, email address, or mailing address so that users may get in
touch if they have questions.
5. Fact vs. Opinion. When doing research for a school paper go to sites that
present factual information provided by experts, rather than opinions. Be on
the lookout for biases, too. If the author is biased, so as the information on the
site
6. URL. The URL may look like ending in edu (for education), gov (for government),
org (for organization), com (for commercial sites), or net (for network sites)
Different websites have different URLs. To help determine a site's credibility,
determine if that is a personal website or blog, a government website, or other
types of website

Common Credible URLS

8|Page
One way of determining the credibility of a website is through the URLS.
Although a website's URL gives clues as to credibility, there is still a need to evaluate it
carefully.
1. When encountering a URL, look at the letters that appear after the "dot" (1.e.
www.whitehouse.gov.) and that is called top-level domain. Thus, the URLS top-
level domain helps in determining a site's credibility.
2. Websites ending in gov are government-related websites, which generally, can
be trusted to provide credible statistical information, articles on many different
topics and government news.
3. Websites ending in .edu are the websites of educational institutions, such as
colleges and universities that usually offer a variety of credible data, especially
about the schools’ operations and research. Since students may create websites
with an .edu top-level domain, but they may contain inaccurate or biased
information.
4. Websites ending in org are the websites of organizations. While many
organizations, especially nonprofit ones, provide credible information, they may
sometimes have advertising intent. Since some organizations show bias in their
provided information, so evaluate org sites carefully.

Recognition of Information Sources


Similar to the information in print sources, the use of online sources must be
given credit to the authors. This can be done by applying proper referencing and
citation procedures that would get rid of risks, consequences and legal implications
because of the copyright issue, which means that the ideas and words used belong to
the author.

Citation
Each entry in the bibliography is called a citation. Proper citation must be
applied or included for every source used, whether it is a website, a newspaper, or a
book. Online sources are cited differently because they are different from traditional
print sources. There are different formats used to cite the sources.

Data Privacy Implication.


The implementation of data privacy in the country is becoming stronger and
powerful, especially in utilizing data for research and other forms of report and paper
works. This has also corresponding legal implications once not processed immediately
and properly. It involves uploading of pictures, designs, graphics, concepts/ideas,
frameworks, art work, data, and other information that are copyrighted without the
consent of the author or the source. These are commonly observed in schools.
The following are practical techniques in responding to data privacy issues.
1. When getting data, put proper Citation and source acknowledgment (e.g.
Source: National Statistics Office, 2019).
2. When using needed pictures downloaded from the Internet, put
acknowledgment (e.g. Photo credits to PhilPost, 2019). But if possible to have
personal pictures taken with your original concept. Although, there is still a
need to seek the consent of those in the pictures.

9|Page
3. If data, concepts and information are copyrighted, ask for the consent of the
author, and wait for his/her response.
4. However, if the data and information are for public domain just
acknowledging/citing the author or the source will do.
5. If the author doesn't really want anyone to utilize his/her data file or article,
learn the value of respect, anyway that is his/her property The author's
disapproval usually manifests through difficulty in downloading the file, some
tricky signs that appear on Screen, or direct statement or notice of disapproval
contained in the file

Research and Data Collection Protocols


When researching and collecting data from the Web, avoid plagiarism, which is
the act of taking someone else's work and presenting it as your own (Turnitin.com)
Plagiarism is unethical, and it can bring you in trouble. Sometimes, students
don't mean to plagiarize, but they end up doing it accidentally because they are
unaware or unclear about it.
The following are 10 types of plagiarism that teachers, researchers and students
should know:
1. Clone Plagiarism. It is also called identical copying or copying another work
(word-for-word) without any change and claim as his/her own work.
2. Remix Plagiarism. It refers to collecting information from various sources and
mixing all together as a single document then, claiming the work as their own
work.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied from any
Single source without any alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and
arranged as a new document without citation.
5. Find-Replace Plagiarism. This is changing the most common keywords and
phrases in the copied content but not making any changes in the essential
document.
6. Recycle Plagiarism. Also called self-plagiarism, it refers to the act of borrowing
from one's own previous document without proper citation.
7. Mashup Plagiarism. It is when the written document is copied from more than
one source and all are mixed together without proper citation.
8. 404 Error Plagiarism. Here, a person creates a document by copying from
various sources prepared as a single document with the citation but inaccurate
or leads to non-existing resources.
9. Aggregator Plagiarism. Here, the written document includes proper citation
but it does not contain original work.
10.Re-Tweet Plagiarism. Here, all written documents look perfect with properly
cited mark but still, the document resembles somewhere the original text's
structure or wordings.

Tips to Avoid Plagiarism


Turnitin.com suggests some techniques to avoid plagiarism that teachers,
researchers and students should know.
1. Read and understand the original document several times before start
explaining about it.

10 | P a g e
2. Do not copy any word or sentence from the original document.
3. Give proper citation to all sources (book, journal, website, video, etc.).
4. In case of citing online sources, include the retrieval date and appropriate URL
in the reference.
5. Common phrases and definitions need to be quoted and cited without any
modification.
6. Make a practice to include the "references section whenever you write an
academic document.
7. Cross verify all your citations before submitting your document.
8. Resort to available plagiarism software to ensure the originality of the written
document.

How to Evaluate a Website


Morris (2018) suggests ways on evaluating a website as reference in research.
1. Open the site. When looking through Google search results, open sites in new
tabs, leave search results in a tab for easy access later (e.g. right-click on the
title and click "Open link in new tab)
2. Skim read. Determine whether you can read and understand the text. If it is
too complicated or difficult to understand, find another website that may
provide the information you need.
3. Look for the answer to your question. Find out if the information on the site
actually answers your question. You can use a search box, navigation menu, or
pull up your own search box by pressing Control/command F and type in the
keywords you are searching for.
4. Consider the credibility of the author or website. You need to consider the
credibility of the author or website by considering the following: (1) Domain –
domains that include gov or.edu are trustworthy sources; (2) Author's
information – look at the author's bio or About page regarding the qualification
of the author; (3) Design – avoid sites that are cluttered and difficult to navigate;
and (4) Sources – trustworthy articles usually link to other sources or cite
where their facts come from.
5. Consider the purpose of the site. Think about the purpose of the site and
whether it meets your needs.
6. Look for the date. Consider whether the information is current enough for
your topic. You can look for the date when the article was written or last
updated. Sometimes, URLs also include dates.
Integrating Digital/Cyber Literacy into the Curriculum
The following are suggested activities to integrate digital literacy higher-order
thinking and construction of meaning in the classroom.
1. Use an interactive whiteboard to design and deliver lessons. Use Promethean
and Smart Notebook with teacher-created lessons if you are not yet capable of
designing your own.
2. Allow students to maintain blogs, wikis, web pages related to their learning.
3. Engage in email/video chat exchanges with students.
4. Utilize storytelling media to allow students to create and publish stories.
5. Set-up a blog site, Facebook page, Yahoo or Google group and post weekly
discussion questions for students to respond.
6. Use video cameras to dramatize stories, record scientific experiments and
expose students to video editing software to create video production of learning

11 | P a g e
7. Engage students in discussions about how and why various media work will to
showcase learning and why others do not.
8. Thinking critically about the medium use to present a message is as important
as the message itself.
9. Require E-Portfolio that would compile their outputs, projects, messages and
photo-documents of group activities and investigations online.
10.Allow students to use digital tools, such as mobile phones, Ipad and netbooks
for Google search, dictionary Apps, Youtube, Podcast and Spotify applications
in class to complement their learning, especially during group works and
concept reporting.

Impact of Integrating Digital Literacy in the Classroom on Teachers, Families


and Friends
Integrating digital literacy in the classroom can bring a positive impact on
students learning as evidenced by the following:
1. It motivates students in their learning due to their enjoyment and ease of use
with various technological mediums.
2. It reaches students of various learning styles and multiple intelligences.
3. It allows students to create and design their own unique products reflective of
their personalities and learning needs/styles.
4. It encourages students to manipulate media in constructing their own meaning.
5. It enables students to share their learning with teachers, families and friends.

SYNTHESIS

Digital/Cyber Literacy
 Digital literacy is the set of competencies on the effective use of digital devices for
purposes of communication, expression, collaboration and advocacy while cybersecurity
is the practice of protecting systems, networks and programs from digital attacks.
 Cyber citizenship refers to being responsible when exploring the Internet including the
right manner and etiquette in using the Web.
 Internet safety is preventing from online security risks to private information and
property and protecting self from computer threats and cybercrimes.
 Cyberbullying is a form of bullying or harassment using electronic means that is
punishable by law while cybercrime is any criminal activity carried out using the
computer or the Internet.
 A computer threat refers to anything that has the potential to cause serious harm and
damage to a computer system, that must be fixed immediately and effectively with
solutions.
 In order to avoid digital risks and consequences, proper Internet exploration, source
citation, data privacy imposition, research and data-gathering protocols and website
evaluation are imperative.
 As digital literacy impacts teaching-learning process, its wide dissemination in Schools
and integration in the classroom is timely, relevant and necessary.

6. It gives students the chance to explore technological media that inevitably


increase the job skills needed in the workforce.

12 | P a g e
Prepared by:

CHARMAINE RUTH G. ABELLA, MAEd


Instructor I

13 | P a g e

You might also like