It gives provisions for people to be given credit for
DIGITAL/CYBER LITERACY what they have created. 4. More criminals or bullies can be caught when kids are According to Wikipedia, digital literacy is the set of honest and talk to-adults. competencies required for ‘full participation in society 5. It keeps information private. that includes knowledge, skills, and behaviors involving the effective use of digital devices for purposes of PROPER NETIQUETTE communication, expression, collaboration and advocacy. 1. Make sure you have the.correct address (with proper It is the ability of an individual to engage with the digital spelling), correct link-and you are sending the environment and operate technologies safely by knowing information to the right person when doing it online. what to do and what not to do and how to avoid 2. Check information before sending or posting any unnecessary risks. message and avoid false statements and information on the web or forwarding junk mail or chain letters to family CYBERSECURITY or friends. Cybersecurity is the practice of protecting systems, 3. Re-read what you wrote to make sure it is what you networks, and programs from digital attacks (Cisco, n.d.). want to say and the other person would interpret it the These cyberattacks are usually aimed at accessing, same way. changing, or destroying sensitive information; extorting 4. Keep your comments clean and don't confront others money from users; or interrupting normal business online or say anything that could be hurtful to them. processes. 5. Keep your personal and friends’ information private and don't forward information that was just given to you TIPS ON HOW TO PROTECT YOURSELF AGAINST CYBER without his/her permission. THREATS 6. Watch out for spam and other fraud e-mails and never 1. Monitor behavior on social networks reply to them. 2. Keep devices safe 7. If you are going to write something personal or private, 3. Understand how best to use passwords think twice because messages can get misdelivered. 4. Handle unsafe content 8. Adults should monitor kids' messages, especially when 5. Consider safety for the future they are sending e-mails to others without permission.
CYBER CITIZENSHIP THE TEN COMMANDMENTS OF TEACHER CYBER
Cyber citizenship refers to being responsible when CITIZENSHIP using the Internet. Doing online when no one is looking 1. Thou shall not post any personal matter, -confidential speaks a lot about one's character and morals. The power information and obscene pictures and messages online of this digital world is associated with responsibilities and that can be accessed by students and parents. consequences. Therefore, we can explore and navigate all 2. Thou shall not respond or thread to any personal information available online however, we should observe message created by students online other than those cyber citizenship or manners and etiquette on the Web. school-related. 3. Thou shall not lend or let students access your WAYS ON HOW TO BE A GOOD CYBER CITIZEN cellphone. 4. Thou shall not give your email password to students. 1. Be careful and critical for whatever-you post online 5. Thou shall not use concepts and information from texts that could be visible to the public even if on a “private” and references without the author's citation. page through tagging by a friend. 6. Thou shall not post to any social media account, for 2. If you have a problem with someone, go to that person whatever purposes, the pictures of students without their or an adult to help work it out, instead of posting your or their parents’ consent. expression online. 7. Thou shall not express sentiments, disappointments 3. Use the Internet to help you with your schoolwork, but and disagreements against superiors, colleagues, give credit to the sources you use and critically analyze students and their parents using their social media everything you search online. accounts. 4. Use the Internet purposefully to leam more about 8. Thou shall not use data from Intemet sources in any anything you are interested in, to help you research documents like lesson plans, researches and relevant and needed data or information and to stay requirements without the consent of the author. connected with friends throughout the world. 9. Thou shall not give any personal data or other's 5. Make sure you verify an information before you share information to anyone unless for specific purposes and it or use it in a project and check on accuracy and truth in given the consent. the information you search on the web. 10. Thou shall not post any student data publicly online 6. Give out certain information only. including academic rankings, school records, class outputs 7. Don't answer questions that make you uncomfortable. and record of grades. De Leon (2019) 8. Always make sure you have told a reliable adult if you decide to meet someone you knew through the Internet. INTERNET SAFETY 9. Always be aware of copyright laws and give credit to Internet safety, online safety or cyber safety means trying whom an article or a part of it is due. to be safe on the Internet. It is maximizing the user's 10. Use only the computers that you are allowed to use. personal safety and security risks to private information Avoid hacking. and property associated with using the Internet, including self-protection from computer crime. Information Security. Sensitive information, such as personal IMPORTANCE OF CYBER CITIZENSHIP information, identity and passwords are often associated 1. It keeps the Internet free from hurtful statements. with personal property and privacy and may present 2. It creates a culture of more reliable information. security concems if leaked. Unauthorized access and the bullies to divert their attention and energy into usage of private. information may result in : something worthwhile and engagements that they can be consequences, such as identity and property theft. busy about. Common causes of information security breaches include: CYBERCRIME 1. Phishing Avast defines cybercrime as any criminal activity carried 2. Internet scams out using computers or the Internet. Cybercrime uses 3. Malware tools like phishing, viruses, spyware, ransomware and social engineering to break the law. PERSONAL SAFETY AND THREATS On the other hand, cybercrime is defined by Techopedia The following are common threats to personal safety. as a crime with the computer as the object of the crime 1. Cyberstalking (i.e. hacking, phishing, spamming) or is used as a tool to 2. Cyberbullying commit an offense (i.e. child pornography, hate crimes). 3. Online Predation Cybercriminals may use computer technology to access 4. Obscene/offensive content personal and confidential information or use the Internet 5. Sextortion for exploitative or malicious purposes. Techopedia cites common types of cybercrime that COMPUTER THREATS AND FIXING SOLUTIONS include online bank information theft, identity theft, A threat, in the context of computer security, refers to online predatory crimes, unauthorized computer access, anything that has the potential to cause serious harm to a and the most serious one like cyberterrorism. Cybercrime computer system. It is something that may or may not encompasses a wide range of activities that can be happen, but has the potential to cause serious damage categorized as: and can lead to attacks on computer systems and (1) crimes that target computer networks or devices, networks including viruses and denial-of-service (DoS) attacks; and (2) crimes that use computer networks to advance other WAYS ON HOW TO ENSURE THAT COMPUTER criminal activities, including cyberstalking, phishing and NETWORKS CAN BE PROTECTED fraud or identity theft. 1. Install anti-virus software. 2. Ensure that the anti-virus software is up-to-date. EXPLORING THE INTERNET: RESEARCHING AND 3. Employ a firewall to protect networks. EVALUATING THE WEB 4. Filter all email traffic. The Internet is a global communication network that 5. Educate all users to be careful of suspicious e-mails. allows computers to exchange and share information 6. Scan Intemet downloads. worldwide. It makes possible for people around the world 7. Do not run programs of unknown origin. to connect and share ideas across ‘time zones and 8. Implement a vulnerability management system. geographic locations. However, because cyberspace is 9. Make regular backups of critical data. such a large realm, sometimes it is difficult to find the 10. Develop an Information Security Policy. needed information. So, the most effective way to 11. Monitor logs and systems explore the Internet is to have strategies in place for 12. Develop an Incident Response Plan. doing research on the Web and for evaluating the 13. Restrict end-user access fo the systems websites.
CYBERBULLYING KEY FACTORS IN SURFING THE WEB
Cyberbullying, cyberharassment or online bullying is a 1. Most surfing sessions start with the user-targeted form of bullying or harassment using electronic means keywords ‘about the subject into a search engine. usually among minors in a school setting and has become 2. Good strategies for searching the Web include writing increasingly common, especially among teenagers. research questions; extracting keywords from the The National Crime Prevention Council defines it as a questions and typing them into a search engine using process of using the Internet, cell phones or other devices synonyms if the keywords do not bring up desired results; to send or post texts or images that intend to hurt or keeping track of Keywords and synonyms used; and embarrass another person. It may also include public recording the results of search. actions, such as repeated threats, sexual remarks, 3. Always be cautious about the information shared pejorative labels or defamatory false accusations, ganging online and in visiting websites. up on a victim by making the person the subject of ridicule in-online forums, hacking into or vandalizing sites Assessing credibility. Different websites about a person, and posting false statements to discredit accessible on the Web can make the job of researchers the targeted person. very challenging. Carefully evaluate the information searched online. Consider the credibility, or TYPES OF CYBERBULLYING trustworthiness and reliability of the content before 1. Internet Trolling taking it. 2. Cyberstalking There are two types ‘of websites: Informational websites usually strive to offer Implications of Bullying in school. Schools should credible content to users initiate various anti-bullying programs and campaigns to Commercial websites present inaccurate information protect students from being threatened or victimized by in order to see something. such offense. More so, teachers should be oriented and trained in handling bullying cases and executing teaching CHECKLIST OF CREDIBILITY CRITERIA strategies to address and reduce bullying cases in class. 1. Author Also, schools should conduct student empowerment 2. Date activities that can be engaged in.by students, including 3. Purpose 4. Contact 3. If data, concepts and information are copyrighted, ask 5. Fact vs Opinion for the consent of the author, and wait for his/her 6. URL response. 4. However, if the data and information are for public Common credible URLs. domain, just acknowledging/citing the author or the 1. When encountering a URL, look at the letters that source will do. appear after the “dot” (i.e. www.whitehouse.gov.) and 5. If the author doesn't really want anyone to utilize that is called top-level domain. Thus, the URL's top-level his/her data file or article, learn the value of respect, domain helps in determining a site's credibility. anyway that is his/her property. The author's disapproval 2. Websites ending in .gov are government-related usually manifests through difficulty .in downloading the websites, which generally, can be trusted to provide file, some tricky signs that appear on screen, or direct credible statistical information, articles on many different statement or notice of disapproval contained in the file. topics and govemment news. 3. Websites ending in .edu are the websites of Research and Data Collection Protocols. When educational institutions, such as colleges and universities researching and collecting data from the Web, avoid that usually offer a variety of credible data, especially plagiarism, which is the act of taking someone else's work about the school's operations and research. Since and pressniing it as your own (Turnitin.com). students may create websites with an .edu top-level Plagiarism is unethical, and it can bring you in trouble. domain, but they may contain inaccurate or biased Sometimes, students don’t mean to plagiarize, but they information. end up doing it accidentally because they are unaware or 4. Websites ending in" .org are the websites of unclear about it. organizations. While many organizations, especially nonprofit ones, provide credible information, they may 10 TYPES OF PLAGIARISM THAT TEACHERS, sometimes have advertising intent. ‘Since some RESEARCHERS AND STUDENTS SHOULD KNOW. organizations show bias in their provided information, so 1. Clone plagiarism evaluate .org sites carefully. 2. Remix plagiarism 3. Ctrl+C plagiarism Recognition of Information sources. Similar to 4. Hybrid plagiarism the informationin print sources, the use of online sources 5. Find-Replace Plagiarism must be given credit to the authors. This can be done by 6. Recycle plagiarism applying proper referencing and citation procedures that 7. Mashup plagiarism would get rid of risks, consequences and legal 8. 404 error plagiarism implications because of the copyright issue, which means 9. Aggregator plagiarism that the ideas and words used belong to the author. 10. Re-tweet plagiarism Citation. Each entry in the bibliography is called a citation. Proper citation must be applied or included for TIPS TO AVOID PLAGIARISM every source used, whether it is a website, a newspaper, 1. Read and understand the original document several or a book. Online sources are cited differently because times before start explaining about it. they are different from traditional print sources. There 2. Do not copy any word or sentence from the original are different formats used to cite the sources. document. 3. Give proper citation to all sources (book, joumal, website,video, étc.). 4. In case of citing online sources, include the retrieval date and appropriate URL in the reference. 5. Common phrases and definitions need to be quoted and cited without any modification. 6. Make a practice to include the “references” section whenever you write an academic document. 7. Cross verify all your citations before submitting your document. Data privacy implication. The implementation of 8. Resort to available plagiarism software to ensure the data privacy in the country is becoming stronger and originality of the written document. powerful, especially in utilizing data for research and other forms of report and paper works. This has also corresponding legal implications once not processed HOW TO EVALUATE A WEBSITE immediately and properly. It Involves uploading of Morris (2018) suggests ways on evaluating a website as pictures, designs, graphics, concepts of ideas, reference in research. frameworks, art work, data, and other information that 1. Open the site. are copyrighted without the consent of the author or the 2. Skim read source. These are commonly observed in schools. 3. Look for the answer to your question 4. Consider the credibility of the author or website. TECHNIQUES IN RESPONDING TO DATA PRIVACY ISSUES 5. Consider the purpose of the site. 1. When getting data, put. proper citation and source 6. Look for the date acknowledgment. 2. When using needed pictures downloaded from the INTEGRATING DIGITAL/CYBER LITERACY INTO THE Internet, put acknowledgment (e.g. Photo credits to CURRICULUM PhilPost, 2019). But if possible to have personal pictures The following are suggested activities to integrate digital taken with your original concept. Although, there is still a literacy, higher-order thinking and construction of need to seek the consent of those in the pictures. meaning in the classroom; 1. Use an interactive whiteboard to design and deliver lessons. Use Promethean and Smart Notebook with teacher-created lessons if you are not yet capable of designing your own. 2. Allow students to maintain blogs, wikis, web pages related to their learning. 3. Engage in email/video chat exchanges with students. 4. Utilize storytelling media to allow students to create and publish stories. 5. Set-up a blog site, Facebook page, Yahoo or Google group and post weekly discussion questions for students to respond. 6. Use video cameras to dramatize stories, record scientific experiments and expose students to video editing software to create video production of learning. 7. Engage students in discussions about how and why various media ‘work well to showcase leaming and why others do not. 8. Thinking critically about the medium use to present a message is as important as the message itself. 9. Require E-Portfolio that would compile their outputs, projects, messages and photo-documents of group activities and investigations online. 10. Allow students to use digital tools, such as mobile phones, Ipad and netbooks for Google search, dictionary Apps, Youtube, Podcast and Spotify applications in class to complement their learning, especially during group works - and concept reporting.
Impact of integrating digital literacy in the classroom on
teachers, families and friends. 1. It motivates students in their learning due to their enjoyment and ease of use with various technologicai mediums. 2. It reaches students of various learning styles and multiple intelligences. 3. It allows students to create and design their own unique products reflective of their personalities and learning needs/styles. 4. It encourages students to manipulate media in constructing their own meaning. 5. It enables students to share their, learning with teachers, families and friends. 6. It gives students the chance to explore technological media that inevitably increase the job skills needed in the workforce.
Entrepreneurial Skills and Intention of Grade 12 Senior High School Students in Public Schools in Candelaria Quezon A Comprehensive Guide in Entrepreneurial Readiness
Social Anxiety and Shyness: The definitive guide to learn How to Become Self-Confident with Self-Esteem and Cognitive Behavioral Therapy. Stop Being Dominated by Shyness