Professional Documents
Culture Documents
Digital Literacy in Wikipedia, digital literacy is the set of Citizenship is an old value that is now applied to a new
competencies required for full participation in society medium, the Internet.
that includes knowledge, skills, and behaviors involving
Cyber citizenship refers to being responsible when
the effective use of digital devices for purposes of
using the Internet. Doing online when no one is looking
communication, expression, collaboration and advocacy.
speaks a lot about one's character and morals.
Simply, it is the ability of an individual to engage with
Ways on How to be a Good Cyber Citizen
the digital environment and operate technologies safely
by knowing what to do and what not to do and how to 1. Be careful and critical for whatever you post online
avoid unnecessary risks. Digital literacy is an individual's that could be visible to the public even if on a "private"
ability to access both information and methods of page through tagging by a friend.
communication through technological tools, such as
smartphones, tablets, laptops and desktop PCs. 2. If you have a problem with someone, go to that
Cybersecurity person or an adult to help work it out, instead of posting
your expression online.
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks (Cisco, 3. Use the Internet to help you with your schoolwork,
n.d.). These cyberattacks are usually aimed at accessing, but give credit to the sources you use and critically
changing, or destroying sensitive information; extorting analyze everything you search online.
money from users; or interrupting normal business 4. Use the Internet purposefully to learn more about
processes. anything you are interested in, to help you research
WAYS TO PROTECT FROM CYBER THREATS relevant and needed data or information and to stay
connected with friends throughout the world.
1. Monitor behavior on social networks. Before posting
or uploading something online, try to realize: (a) Does 5. Make sure you verify an information before you share
this need to be public?; and (b) Is it worth the risk? it or use it in a project and check on accuracy and truth
Remember, not only what we share online is available to in the information you search on the web.
friends and family, but also to cybercriminals. 6. Give out certain information only.
2. Keep devices safe. Protect your technology tools by 7. Don't answer questions that make you
installing Anti-virus software, a configuration of settings uncomfortable. 8. Always make sure you have told a
on the devices and by completing software updates. reliable adult if you decide to meet someone you knew
3. Understand how best to use passwords. Passwords through the Internet.
need to be complex and hard to guess, but can still be 9. Always be aware of copyright laws and give credit to
remembered. One strategy is "passphrase" or a whom an article or a part of it is due. 10. Use only the
password that comes from the first letter of each word computers that you are allowed to use. Avoid hacking.
in the phrase.
Importance of Cyber Citizenship
4. Handle unsafe content. Know exactly how to respond
or react to unsafe situations online, such as (1) 1. It keeps the Internet free from hurtful statements.
suspicious emails; (2) pop-ups claiming that your 2. It creates a culture of more reliable information.
computer is infected; and (3) BitTorrent sites.
3. It gives provisions for people to be given credit for
5. Consider safety for the future. Take individual what they have created.
responsibility in using devices with an utmost care and
critical thinking when online 4. More criminals or bullies can be caught when kids are
honest and talk to adults.
The Ten Commandments of Teacher Cyber Citizenship 1.Phishing. It is a common type of scam, of which the
scammers disguise as a trustworthy source in an
1. Thou shall not post any personal matter, confidential attempt to obtain private information, such as
information and obscene pictures and messages online passwords, credit card. information, etc. through the
that can be accessed by students and parents. use of fake websites that look identical and legitimate.
2. Thou shall not respond or thread to any personal 2. Internet scams. These are schemes that deceive the
message created by students online other than those users in various ways in an attempt to take advantage of
school-related. them.
3. Thou shall not lend or let students access your 3. Malware. It is a malicious software (particularly
cellphone. 4. Thou shall not give your email password to spyware) disguised to collect and transmit private
students. information, such as password without the user's
5. Thou shall not use concepts and information from consent or knowledge, of which it is impossible to
texts and references without the author's citation. 6. determine whether a file is infected.
Thou shall not post to any social media account, for 4. Personal safety and threats. The growth of the
whatever purposes, the pictures of students without Internet gave rise to many important services accessible
their or their parents' consent. to anyone with a connection, such as digital
7. Thou shall not express sentiments, disappointments communication. While it allows communication with
and disagreements against superiors, colleagues, others, it is also being grabbed by malicious users for
bad intent.
Common threats to personal safety. steal information that they can sell or trade, such as
financial details, credit card information, personal
1. Cyberstalking. It is the use of the Internet or other
details, or any other information using computer
electronic means to stalk or harass an individual, group
networks.
or organization through false accusations, defamation,
slander and libel, intentional monitoring, identity theft, 1. Install anti-virus software. Ensure that reputable anti-
threats, vandalism, solicitation for sex, or gathering virus software is installed on all computers, including all
information that may be used to threaten, embarrass or servers, PCs and laptops.
harass.
2. Ensure that the anti-virus software is up-to-date.
2. Cyberbullying. It is the use of electronic means, such New computer viruses are being released daily and so it
as instant messaging, social media, e-mail and other is essential that computers are protected by keeping the
forms of online communication with the intent to anti-virus software-up- to-date.
abuse, intimidate, or overpower an individual or group.
3. Employ a firewall to protect networks. As computer
3. Online predation. It is the act of engaging an viruses can spread by means other than email, it is
underage minor into inappropriate sexual relationships important that unwanted traffic is blocked from entering
through the Internet. Online predators may attempt to the network by using a firewall.
initiate and seduce minors into relationships through
4. Filter all email traffic. Example of emails with certain
the use of chat rooms or Internet forums. The behavior
file attachments commonly used by computer viruses to
characteristics are categorized into three groups: A)
spread themselves, such as EXE, COM and SCR files.
Manipulative - typically a child molester; B) Opportunist
These should be prevented from entering the network.
- typically a rapist; and C) Coercive - being a mixture of
both rapists and child molesters. 5. Educate all users to be careful of suspicious e-mails.
Ensure that all users know to never open an attachment
4. Obscene/offensive content. Various websites on the
or to click on a link in an email they are not expecting.
Internet contain material that may deem offensive,
distasteful or explicit, which may often not be of the 6. Scan Internet downloads. Ensure that all files
user's liking. Such websites may include the Internet, downloaded from the Internet are scanned against
shock sites, hate speech or otherwise, and inflammatory computer viruses from one central point on the
content. Such content may manifest in many ways, such network.
as pop-up ads and unsuspecting links.
7. Do not run programs of unknown origin. It is
5. Sextortion. It is the use of webcams for flirting and important to use a trusted source for software
cybersex. Often, this involves a cybercriminal posing as requirements to be installed and ensure it can be
someone else, such as an attractive person initiating accounted for.
communication of a sexual nature with the victim. The
video is recorded by the cybercriminal to demand 8 Implement a vulnerability management system. It is
money or other services, threaten to publicly release important to regularly review network and the
the video and send to family members and friends of applications running on it for new vulnerabilities and a
the victim if they do not comply. plan on how to manage them, either by patching or
upgrading them using tools, such as firewalls or
Computer Threats and Fixing Solutions Intrusion Detection Systems that should be put in place.
threat, in the context of computer security, refers to 9. Make regular backups of critical data. There is a need
anything that has the potential to cause serious harm to to keep important files on removable media, such as
a computer system It is something that may or may not portable drives or tape for back-up in the event that the
happen, but has the potential to cause serious damage network is infected with a computer virus.
and can lead to attacks on computer systems and
networks 10. Develop an Information Security Policy. The
creation and publication of an Information Security
Cybercrime is now becoming alarming in the life of Policy is key to ensuring that information security
every individual and the organization as they intend to
receives the profile it requires in order to secure the Digital Scholarship – is being able to link and participate
systems and data. in professional and research practices.
11. Monitor logs and systems. Regular monitoring of The Four C’s of the 21st Century Skills
network and system logs can assist in the early
Critical Thinking is learning how to solve problems. It
identification of a computer virus infecting the network
teaches students not to accept immediately claims
or other attacks by criminals.
without seeking the truth. It is the ability to differentiate
12 Develop an Incident Response Plan. The incident facts or figures but also discover these for the sake of
response plan outlines the roles and responsibilities of knowing what ought to be.
people in the event of a computer virus infecting the
Creativity requires students to think out and be able to
network or any other type of security breach.
look at a problem from multiple perspectives including
13. Restrict end-user access to the systems. Where proposing multiple possibilities and alternatives to
possible, end users are prohibited from access to the address a problem and take the risk. Creativity
system so that the virus will also be restricted. encourages students to think beyond what is expected
of them.
Digital learners are the individual’s capabilities to be
able to effectively and responsibly function and perform Communication makes students express their ideas in
in a digital society. the clearest and organized manner. Through varied
modes – face-to-face, synchronous or asynchronous,
In the teaching and learning context, digital literacy
they need to know how to efficiently and clearly convey
is an important competence. In school, it has
ideas.
become a buzzword which refers to the ability
to access, process, understand, utilize create media Collaboration happens when students know how
content using information technologies and the internet to work well with others to accomplish a given
(Hsieh, 2012) task or solve a problem at hand. When students are
made to work with others in a pair or in a team, they are
Media Literacy – is one’s ability to critically read
given the chance to practice how to relate with others.
information or content and utilize multimedia in
creatively producing communications.