You are on page 1of 4

DIGITAL LITERACY REVIEWER Cyber Citizenship

Digital Literacy in Wikipedia, digital literacy is the set of Citizenship is an old value that is now applied to a new
competencies required for full participation in society medium, the Internet.
that includes knowledge, skills, and behaviors involving
Cyber citizenship refers to being responsible when
the effective use of digital devices for purposes of
using the Internet. Doing online when no one is looking
communication, expression, collaboration and advocacy.
speaks a lot about one's character and morals.
Simply, it is the ability of an individual to engage with
Ways on How to be a Good Cyber Citizen
the digital environment and operate technologies safely
by knowing what to do and what not to do and how to 1. Be careful and critical for whatever you post online
avoid unnecessary risks. Digital literacy is an individual's that could be visible to the public even if on a "private"
ability to access both information and methods of page through tagging by a friend.
communication through technological tools, such as
smartphones, tablets, laptops and desktop PCs. 2. If you have a problem with someone, go to that
Cybersecurity person or an adult to help work it out, instead of posting
your expression online.
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks (Cisco, 3. Use the Internet to help you with your schoolwork,
n.d.). These cyberattacks are usually aimed at accessing, but give credit to the sources you use and critically
changing, or destroying sensitive information; extorting analyze everything you search online.
money from users; or interrupting normal business 4. Use the Internet purposefully to learn more about
processes. anything you are interested in, to help you research
WAYS TO PROTECT FROM CYBER THREATS relevant and needed data or information and to stay
connected with friends throughout the world.
1. Monitor behavior on social networks. Before posting
or uploading something online, try to realize: (a) Does 5. Make sure you verify an information before you share
this need to be public?; and (b) Is it worth the risk? it or use it in a project and check on accuracy and truth
Remember, not only what we share online is available to in the information you search on the web.
friends and family, but also to cybercriminals. 6. Give out certain information only.
2. Keep devices safe. Protect your technology tools by 7. Don't answer questions that make you
installing Anti-virus software, a configuration of settings uncomfortable. 8. Always make sure you have told a
on the devices and by completing software updates. reliable adult if you decide to meet someone you knew
3. Understand how best to use passwords. Passwords through the Internet.
need to be complex and hard to guess, but can still be 9. Always be aware of copyright laws and give credit to
remembered. One strategy is "passphrase" or a whom an article or a part of it is due. 10. Use only the
password that comes from the first letter of each word computers that you are allowed to use. Avoid hacking.
in the phrase.
Importance of Cyber Citizenship
4. Handle unsafe content. Know exactly how to respond
or react to unsafe situations online, such as (1) 1. It keeps the Internet free from hurtful statements.
suspicious emails; (2) pop-ups claiming that your 2. It creates a culture of more reliable information.
computer is infected; and (3) BitTorrent sites.
3. It gives provisions for people to be given credit for
5. Consider safety for the future. Take individual what they have created.
responsibility in using devices with an utmost care and
critical thinking when online 4. More criminals or bullies can be caught when kids are
honest and talk to adults.

5. It keeps information private.


Proper Netiquette students and their parents using their social media
accounts.
1. Make sure you have the correct address (with proper
spelling), correct link and you are sending the 8. Thou shall not use data from Internet sources in any
information to the right person when doing it online. documents like lesson plans, researches and
requirements without the consent of the author.
2. Check information before sending or posting any
message and avoid false statements and information on 9. Thou shall not give any personal data or other's
the web or forwarding junk mail or chain letters to information to anyone unless for specific purposes and
family or friends. given the consent. 10. Thou shall not post any student
data publicly online including academic rankings, school
3. Re-read what you wrote to make sure it is what you
records, class outputs and record of grades. De Leon
want to say and the other person would interpret it the
(2019)
same way.
Internet Safety
4. Keep your comments clean and don't confront others
online or say anything that could be hurtful to them. Internet safety, or cyber safety means trying to be safe
on the Internet. It is maximizing the user's personal
5. Keep your personal and friends' information private
safety and security risks to private information and
and don't forward information that was just given to you
property associated with using the Internet, including
without his/her permission.
self-protection from computer crime.
6. Watch out for spam and other fraud e-mails and
Information security. Sensitive information, such as
never reply to them.
personal information, identity and passwords are often
7. If you are going to write something personal or associated with personal property and privacy and may
private, think twice because messages can get present security concerns if leaked. Unauthorized access
misdelivered. and usage of private information may result in
consequences, such as identity and property theft.
8. Adults should monitor kids' messages, especially
when they are sending e-mails to others without Common causes of information security breaches
permission. include:

The Ten Commandments of Teacher Cyber Citizenship 1.Phishing. It is a common type of scam, of which the
scammers disguise as a trustworthy source in an
1. Thou shall not post any personal matter, confidential attempt to obtain private information, such as
information and obscene pictures and messages online passwords, credit card. information, etc. through the
that can be accessed by students and parents. use of fake websites that look identical and legitimate.
2. Thou shall not respond or thread to any personal 2. Internet scams. These are schemes that deceive the
message created by students online other than those users in various ways in an attempt to take advantage of
school-related. them.
3. Thou shall not lend or let students access your 3. Malware. It is a malicious software (particularly
cellphone. 4. Thou shall not give your email password to spyware) disguised to collect and transmit private
students. information, such as password without the user's
5. Thou shall not use concepts and information from consent or knowledge, of which it is impossible to
texts and references without the author's citation. 6. determine whether a file is infected.
Thou shall not post to any social media account, for 4. Personal safety and threats. The growth of the
whatever purposes, the pictures of students without Internet gave rise to many important services accessible
their or their parents' consent. to anyone with a connection, such as digital
7. Thou shall not express sentiments, disappointments communication. While it allows communication with
and disagreements against superiors, colleagues, others, it is also being grabbed by malicious users for
bad intent.
Common threats to personal safety. steal information that they can sell or trade, such as
financial details, credit card information, personal
1. Cyberstalking. It is the use of the Internet or other
details, or any other information using computer
electronic means to stalk or harass an individual, group
networks.
or organization through false accusations, defamation,
slander and libel, intentional monitoring, identity theft, 1. Install anti-virus software. Ensure that reputable anti-
threats, vandalism, solicitation for sex, or gathering virus software is installed on all computers, including all
information that may be used to threaten, embarrass or servers, PCs and laptops.
harass.
2. Ensure that the anti-virus software is up-to-date.
2. Cyberbullying. It is the use of electronic means, such New computer viruses are being released daily and so it
as instant messaging, social media, e-mail and other is essential that computers are protected by keeping the
forms of online communication with the intent to anti-virus software-up- to-date.
abuse, intimidate, or overpower an individual or group.
3. Employ a firewall to protect networks. As computer
3. Online predation. It is the act of engaging an viruses can spread by means other than email, it is
underage minor into inappropriate sexual relationships important that unwanted traffic is blocked from entering
through the Internet. Online predators may attempt to the network by using a firewall.
initiate and seduce minors into relationships through
4. Filter all email traffic. Example of emails with certain
the use of chat rooms or Internet forums. The behavior
file attachments commonly used by computer viruses to
characteristics are categorized into three groups: A)
spread themselves, such as EXE, COM and SCR files.
Manipulative - typically a child molester; B) Opportunist
These should be prevented from entering the network.
- typically a rapist; and C) Coercive - being a mixture of
both rapists and child molesters. 5. Educate all users to be careful of suspicious e-mails.
Ensure that all users know to never open an attachment
4. Obscene/offensive content. Various websites on the
or to click on a link in an email they are not expecting.
Internet contain material that may deem offensive,
distasteful or explicit, which may often not be of the 6. Scan Internet downloads. Ensure that all files
user's liking. Such websites may include the Internet, downloaded from the Internet are scanned against
shock sites, hate speech or otherwise, and inflammatory computer viruses from one central point on the
content. Such content may manifest in many ways, such network.
as pop-up ads and unsuspecting links.
7. Do not run programs of unknown origin. It is
5. Sextortion. It is the use of webcams for flirting and important to use a trusted source for software
cybersex. Often, this involves a cybercriminal posing as requirements to be installed and ensure it can be
someone else, such as an attractive person initiating accounted for.
communication of a sexual nature with the victim. The
video is recorded by the cybercriminal to demand 8 Implement a vulnerability management system. It is
money or other services, threaten to publicly release important to regularly review network and the
the video and send to family members and friends of applications running on it for new vulnerabilities and a
the victim if they do not comply. plan on how to manage them, either by patching or
upgrading them using tools, such as firewalls or
Computer Threats and Fixing Solutions Intrusion Detection Systems that should be put in place.
threat, in the context of computer security, refers to 9. Make regular backups of critical data. There is a need
anything that has the potential to cause serious harm to to keep important files on removable media, such as
a computer system It is something that may or may not portable drives or tape for back-up in the event that the
happen, but has the potential to cause serious damage network is infected with a computer virus.
and can lead to attacks on computer systems and
networks 10. Develop an Information Security Policy. The
creation and publication of an Information Security
Cybercrime is now becoming alarming in the life of Policy is key to ensuring that information security
every individual and the organization as they intend to
receives the profile it requires in order to secure the Digital Scholarship – is being able to link and participate
systems and data. in professional and research practices.

11. Monitor logs and systems. Regular monitoring of The Four C’s of the 21st Century Skills
network and system logs can assist in the early
Critical Thinking is learning how to solve problems. It
identification of a computer virus infecting the network
teaches students not to accept immediately claims
or other attacks by criminals.
without seeking the truth. It is the ability to differentiate
12 Develop an Incident Response Plan. The incident facts or figures but also discover these for the sake of
response plan outlines the roles and responsibilities of knowing what ought to be.
people in the event of a computer virus infecting the
Creativity requires students to think out and be able to
network or any other type of security breach.
look at a problem from multiple perspectives including
13. Restrict end-user access to the systems. Where proposing multiple possibilities and alternatives to
possible, end users are prohibited from access to the address a problem and take the risk. Creativity
system so that the virus will also be restricted. encourages students to think beyond what is expected
of them.
Digital learners are the individual’s capabilities to be
able to effectively and responsibly function and perform Communication makes students express their ideas in
in a digital society. the clearest and organized manner. Through varied
modes – face-to-face, synchronous or asynchronous,
In the teaching and learning context, digital literacy
they need to know how to efficiently and clearly convey
is an important competence. In school, it has
ideas.
become a buzzword which refers to the ability
to access, process, understand, utilize create media Collaboration happens when students know how
content using information technologies and the internet to work well with others to accomplish a given
(Hsieh, 2012) task or solve a problem at hand. When students are
made to work with others in a pair or in a team, they are
Media Literacy – is one’s ability to critically read
given the chance to practice how to relate with others.
information or content and utilize multimedia in
creatively producing communications.

Information Literacy – is locating information


from the web and interpreting while evaluating its
validity in order that it can be shared

ICT Literacy – is knowing how to select and use digital


devices, applications or services to accomplish tasks
requiring the use of the internet

Communications and Collaboration – are one’s


capabilities in being able to participate in the
digital networks in the teaching and learning
context(synchronous/asynchronous)

Identity Management – is being able to understand


how to ensure safety and security in managing online
identity and foster a positive digital reputation.

Learning Skills – are ways of knowing how to study and


learn in a technology-enriched environment; this is
knowing how to utilize technology in addressing the
need to learn efficiently

You might also like