You are on page 1of 4

3.

It gives provisions for people to be given credit for


DIGITAL/CYBER LITERACY what they have created.
4. More criminals or bullies can be caught when kids are
According to Wikipedia, digital literacy is the set of honest and talk to-adults.
competencies required for ‘full participation in society 5. It keeps information private.
that includes knowledge, skills, and behaviors involving
the effective use of digital devices for purposes of PROPER NETIQUETTE
communication, expression, collaboration and advocacy. 1. Make sure you have the.correct address (with proper
It is the ability of an individual to engage with the digital spelling), correct link-and you are sending the
environment and operate technologies safely by knowing information to the right person when doing it online.
what to do and what not to do and how to avoid 2. Check information before sending or posting any
unnecessary risks. message and avoid false statements and information on
the web or forwarding junk mail or chain letters to family
CYBERSECURITY or friends.
Cybersecurity is the practice of protecting systems, 3. Re-read what you wrote to make sure it is what you
networks, and programs from digital attacks (Cisco, n.d.). want to say and the other person would interpret it the
These cyberattacks are usually aimed at accessing, same way.
changing, or destroying sensitive information; extorting 4. Keep your comments clean and don't confront others
money from users; or interrupting normal business online or say anything that could be hurtful to them.
processes. 5. Keep your personal and friends’ information private
and don't forward information that was just given to you
TIPS ON HOW TO PROTECT YOURSELF AGAINST CYBER without his/her permission.
THREATS 6. Watch out for spam and other fraud e-mails and never
1. Monitor behavior on social networks reply to them.
2. Keep devices safe 7. If you are going to write something personal or private,
3. Understand how best to use passwords think twice because messages can get misdelivered.
4. Handle unsafe content 8. Adults should monitor kids' messages, especially when
5. Consider safety for the future they are sending e-mails to others without permission.

CYBER CITIZENSHIP THE TEN COMMANDMENTS OF TEACHER CYBER


Cyber citizenship refers to being responsible when CITIZENSHIP
using the Internet. Doing online when no one is looking 1. Thou shall not post any personal matter, -confidential
speaks a lot about one's character and morals. The power information and obscene pictures and messages online
of this digital world is associated with responsibilities and that can be accessed by students and parents.
consequences. Therefore, we can explore and navigate all 2. Thou shall not respond or thread to any personal
information available online however, we should observe message created by students online other than those
cyber citizenship or manners and etiquette on the Web. school-related.
3. Thou shall not lend or let students access your
WAYS ON HOW TO BE A GOOD CYBER CITIZEN cellphone.
4. Thou shall not give your email password to students.
1. Be careful and critical for whatever-you post online 5. Thou shall not use concepts and information from texts
that could be visible to the public even if on a “private” and references without the author's citation.
page through tagging by a friend. 6. Thou shall not post to any social media account, for
2. If you have a problem with someone, go to that person whatever purposes, the pictures of students without their
or an adult to help work it out, instead of posting your or their parents’ consent.
expression online. 7. Thou shall not express sentiments, disappointments
3. Use the Internet to help you with your schoolwork, but and disagreements against superiors, colleagues,
give credit to the sources you use and critically analyze students and their parents using their social media
everything you search online. accounts.
4. Use the Internet purposefully to leam more about 8. Thou shall not use data from Intemet sources in any
anything you are interested in, to help you research documents like lesson plans, researches and
relevant and needed data or information and to stay requirements without the consent of the author.
connected with friends throughout the world. 9. Thou shall not give any personal data or other's
5. Make sure you verify an information before you share information to anyone unless for specific purposes and
it or use it in a project and check on accuracy and truth in given the consent.
the information you search on the web. 10. Thou shall not post any student data publicly online
6. Give out certain information only. including academic rankings, school records, class outputs
7. Don't answer questions that make you uncomfortable. and record of grades. De Leon (2019)
8. Always make sure you have told a reliable adult if you
decide to meet someone you knew through the Internet. INTERNET SAFETY
9. Always be aware of copyright laws and give credit to Internet safety, online safety or cyber safety means trying
whom an article or a part of it is due. to be safe on the Internet. It is maximizing the user's
10. Use only the computers that you are allowed to use. personal safety and security risks to private information
Avoid hacking. and property associated with using the Internet, including
self-protection from computer crime. Information
Security. Sensitive information, such as personal
IMPORTANCE OF CYBER CITIZENSHIP information, identity and passwords are often associated
1. It keeps the Internet free from hurtful statements. with personal property and privacy and may present
2. It creates a culture of more reliable information.
security concems if leaked. Unauthorized access and the bullies to divert their attention and energy into
usage of private. information may result in : something worthwhile and engagements that they can be
consequences, such as identity and property theft. busy about.
Common causes of information security breaches
include: CYBERCRIME
1. Phishing Avast defines cybercrime as any criminal activity carried
2. Internet scams out using computers or the Internet. Cybercrime uses
3. Malware tools like phishing, viruses, spyware, ransomware and
social engineering to break the law.
PERSONAL SAFETY AND THREATS On the other hand, cybercrime is defined by Techopedia
The following are common threats to personal safety. as a crime with the computer as the object of the crime
1. Cyberstalking (i.e. hacking, phishing, spamming) or is used as a tool to
2. Cyberbullying commit an offense (i.e. child pornography, hate crimes).
3. Online Predation Cybercriminals may use computer technology to access
4. Obscene/offensive content personal and confidential information or use the Internet
5. Sextortion for exploitative or malicious purposes.
Techopedia cites common types of cybercrime that
COMPUTER THREATS AND FIXING SOLUTIONS include online bank information theft, identity theft,
A threat, in the context of computer security, refers to online predatory crimes, unauthorized computer access,
anything that has the potential to cause serious harm to a and the most serious one like cyberterrorism. Cybercrime
computer system. It is something that may or may not encompasses a wide range of activities that can be
happen, but has the potential to cause serious damage categorized as:
and can lead to attacks on computer systems and (1) crimes that target computer networks or devices,
networks including viruses and denial-of-service (DoS) attacks; and
(2) crimes that use computer networks to advance other
WAYS ON HOW TO ENSURE THAT COMPUTER criminal activities, including cyberstalking, phishing and
NETWORKS CAN BE PROTECTED fraud or identity theft.
1. Install anti-virus software.
2. Ensure that the anti-virus software is up-to-date. EXPLORING THE INTERNET: RESEARCHING AND
3. Employ a firewall to protect networks. EVALUATING THE WEB
4. Filter all email traffic. The Internet is a global communication network that
5. Educate all users to be careful of suspicious e-mails. allows computers to exchange and share information
6. Scan Intemet downloads. worldwide. It makes possible for people around the world
7. Do not run programs of unknown origin. to connect and share ideas across ‘time zones and
8. Implement a vulnerability management system. geographic locations. However, because cyberspace is
9. Make regular backups of critical data. such a large realm, sometimes it is difficult to find the
10. Develop an Information Security Policy. needed information. So, the most effective way to
11. Monitor logs and systems explore the Internet is to have strategies in place for
12. Develop an Incident Response Plan. doing research on the Web and for evaluating the
13. Restrict end-user access fo the systems websites.

CYBERBULLYING KEY FACTORS IN SURFING THE WEB


Cyberbullying, cyberharassment or online bullying is a 1. Most surfing sessions start with the user-targeted
form of bullying or harassment using electronic means keywords ‘about the subject into a search engine.
usually among minors in a school setting and has become 2. Good strategies for searching the Web include writing
increasingly common, especially among teenagers. research questions; extracting keywords from the
The National Crime Prevention Council defines it as a questions and typing them into a search engine using
process of using the Internet, cell phones or other devices synonyms if the keywords do not bring up desired results;
to send or post texts or images that intend to hurt or keeping track of Keywords and synonyms used; and
embarrass another person. It may also include public recording the results of search.
actions, such as repeated threats, sexual remarks, 3. Always be cautious about the information shared
pejorative labels or defamatory false accusations, ganging online and in visiting websites.
up on a victim by making the person the subject of
ridicule in-online forums, hacking into or vandalizing sites Assessing credibility. Different websites
about a person, and posting false statements to discredit accessible on the Web can make the job of researchers
the targeted person. very challenging. Carefully evaluate the information
searched online. Consider the credibility, or
TYPES OF CYBERBULLYING trustworthiness and reliability of the content before
1. Internet Trolling taking it.
2. Cyberstalking There are two types ‘of websites:
 Informational websites usually strive to offer
Implications of Bullying in school. Schools should credible content to users
initiate various anti-bullying programs and campaigns to  Commercial websites present inaccurate information
protect students from being threatened or victimized by in order to see something.
such offense. More so, teachers should be oriented and
trained in handling bullying cases and executing teaching CHECKLIST OF CREDIBILITY CRITERIA
strategies to address and reduce bullying cases in class. 1. Author
Also, schools should conduct student empowerment 2. Date
activities that can be engaged in.by students, including 3. Purpose
4. Contact 3. If data, concepts and information are copyrighted, ask
5. Fact vs Opinion for the consent of the author, and wait for his/her
6. URL response.
4. However, if the data and information are for public
Common credible URLs. domain, just acknowledging/citing the author or the
1. When encountering a URL, look at the letters that source will do.
appear after the “dot” (i.e. www.whitehouse.gov.) and 5. If the author doesn't really want anyone to utilize
that is called top-level domain. Thus, the URL's top-level his/her data file or article, learn the value of respect,
domain helps in determining a site's credibility. anyway that is his/her property. The author's disapproval
2. Websites ending in .gov are government-related usually manifests through difficulty .in downloading the
websites, which generally, can be trusted to provide file, some tricky signs that appear on screen, or direct
credible statistical information, articles on many different statement or notice of disapproval contained in the file.
topics and govemment news.
3. Websites ending in .edu are the websites of Research and Data Collection Protocols. When
educational institutions, such as colleges and universities researching and collecting data from the Web, avoid
that usually offer a variety of credible data, especially plagiarism, which is the act of taking someone else's work
about the school's operations and research. Since and pressniing it as your own (Turnitin.com).
students may create websites with an .edu top-level Plagiarism is unethical, and it can bring you in trouble.
domain, but they may contain inaccurate or biased Sometimes, students don’t mean to plagiarize, but they
information. end up doing it accidentally because they are unaware or
4. Websites ending in" .org are the websites of unclear about it.
organizations. While many organizations, especially
nonprofit ones, provide credible information, they may 10 TYPES OF PLAGIARISM THAT TEACHERS,
sometimes have advertising intent. ‘Since some RESEARCHERS AND STUDENTS SHOULD KNOW.
organizations show bias in their provided information, so 1. Clone plagiarism
evaluate .org sites carefully. 2. Remix plagiarism
3. Ctrl+C plagiarism
Recognition of Information sources. Similar to 4. Hybrid plagiarism
the informationin print sources, the use of online sources 5. Find-Replace Plagiarism
must be given credit to the authors. This can be done by 6. Recycle plagiarism
applying proper referencing and citation procedures that 7. Mashup plagiarism
would get rid of risks, consequences and legal 8. 404 error plagiarism
implications because of the copyright issue, which means 9. Aggregator plagiarism
that the ideas and words used belong to the author. 10. Re-tweet plagiarism
Citation. Each entry in the bibliography is called a
citation. Proper citation must be applied or included for TIPS TO AVOID PLAGIARISM
every source used, whether it is a website, a newspaper, 1. Read and understand the original document several
or a book. Online sources are cited differently because times before start explaining about it.
they are different from traditional print sources. There 2. Do not copy any word or sentence from the original
are different formats used to cite the sources. document.
3. Give proper citation to all sources (book, joumal,
website,video, étc.).
4. In case of citing online sources, include the retrieval
date and appropriate URL in the reference.
5. Common phrases and definitions need to be quoted
and cited without any modification.
6. Make a practice to include the “references” section
whenever you write an academic document.
7. Cross verify all your citations before submitting your
document.
Data privacy implication. The implementation of 8. Resort to available plagiarism software to ensure the
data privacy in the country is becoming stronger and originality of the written document.
powerful, especially in utilizing data for research and
other forms of report and paper works. This has also
corresponding legal implications once not processed HOW TO EVALUATE A WEBSITE
immediately and properly. It Involves uploading of Morris (2018) suggests ways on evaluating a website as
pictures, designs, graphics, concepts of ideas, reference in research.
frameworks, art work, data, and other information that 1. Open the site.
are copyrighted without the consent of the author or the 2. Skim read
source. These are commonly observed in schools. 3. Look for the answer to your question
4. Consider the credibility of the author or website.
TECHNIQUES IN RESPONDING TO DATA PRIVACY ISSUES 5. Consider the purpose of the site.
1. When getting data, put. proper citation and source 6. Look for the date
acknowledgment.
2. When using needed pictures downloaded from the INTEGRATING DIGITAL/CYBER LITERACY INTO THE
Internet, put acknowledgment (e.g. Photo credits to CURRICULUM
PhilPost, 2019). But if possible to have personal pictures The following are suggested activities to integrate digital
taken with your original concept. Although, there is still a literacy, higher-order thinking and construction of
need to seek the consent of those in the pictures. meaning in the classroom;
1. Use an interactive whiteboard to design and deliver
lessons. Use Promethean and Smart Notebook with
teacher-created lessons if you are not yet capable of
designing your own.
2. Allow students to maintain blogs, wikis, web pages
related to their learning.
3. Engage in email/video chat exchanges with students.
4. Utilize storytelling media to allow students to create
and publish stories.
5. Set-up a blog site, Facebook page, Yahoo or Google
group and post weekly discussion questions for students
to respond.
6. Use video cameras to dramatize stories, record
scientific experiments and expose students to video
editing software to create video production of learning.
7. Engage students in discussions about how and why
various media ‘work well to showcase leaming and why
others do not.
8. Thinking critically about the medium use to present a
message is as important as the message itself.
9. Require E-Portfolio that would compile their outputs,
projects, messages and photo-documents of group
activities and investigations online.
10. Allow students to use digital tools, such as mobile
phones, Ipad and netbooks for Google search, dictionary
Apps, Youtube, Podcast and Spotify applications in class
to complement their learning, especially during group
works - and concept reporting.

Impact of integrating digital literacy in the classroom on


teachers, families and friends.
1. It motivates students in their learning due to their
enjoyment and ease of use with various technologicai
mediums.
2. It reaches students of various learning styles and
multiple intelligences.
3. It allows students to create and design their own
unique products reflective of their personalities and
learning needs/styles.
4. It encourages students to manipulate media in
constructing their own meaning.
5. It enables students to share their, learning with
teachers, families and friends.
6. It gives students the chance to explore technological
media that inevitably increase the job skills needed in the
workforce.

You might also like