You are on page 1of 68

Digital/cyber

literacy
digital literacy sub-topics:

 Cyber Citizenship
 Netiquette and Safety use of Digital Media
 Common computer Threats and the corresponding fixing
solutions
 Cyber bullying and Cyber crimes
digital literacy sub-topics:

 Internet exploration, source citation, research, and data


gathering protocols and website evaluation.
 How digital/cyber literacy may be integrated with
teaching-learning.
Learning objectives:
Students will be able to:
 Define digital/cyber Literacy and Cyber Security
 Elaborate on cyber citizenship
 Determine netiquette and safety use of digital media
 Identify common computer threats and the corresponding
fixing solutions
 Examine Internet exploration, source citation, research and
data gathering protocols and website evaluation
Learning objectives:
Students will be able to:
 Cite how digital/cyber literacy may be integrated with
teaching-learning
 Draw relevant life lessons and significant values from
personal experience on digital risks and consequences
1
✗ According to Wikipedia, Digital Literacy is
the set of competencies required for full
participation in society that includes
knowledge, skills, and behaviors involving
the effective use of digital devices for
purposes of communication, expression,
collaboration and advocacy.
2
✗ Is the practice of protecting systems,
networks, and programs from digital
attacks (Cisco, n.d.). These
cyberattacks are usually aimed at
accessing, changing, or destroying
sensitive information, extorting
money from users.
tips on how to protect yourself
againts cyber threats

1. Monitor behavior on social networks


2. Keep devices safe
3. Understand how best to use passwords
4. Handle unsafe content
5. Consider safe for the future
3

cyber
citizenship
✗ Cyber Citizenship refers to being responsible
when using the Internet.

✗ “The power of this digital world is associated


with responsibilities and consequences”
Ways on how to be a good cyber
citizenship
1. Be careful and critical for whatever you post online
that could be visible to the public event if on a “private”
page through tagging by a friend.

2. If you have a problem with someone, go to that person


or an adult to help work it out, instead of posing your
expression online.
Ways on how to be a good cyber
citizenship
3. Use the Internet to help you with your school work, but
give credit to the sources you use and critically analyze
everything you search online.

4. Use the Internet purposely to learn more about anything


you are interested in to help you research relevants needed
data or information and to stay connected with friends
throughout the world.
Ways on how to be a good cyber
citizenship
5. Make sure you verify an information before you share it
or use it in a project and check on accuracy and truth in the
information you search on the web.

6. Give out certain information only.

7. Don’t answer questions that make you uncomfortable .


Ways on how to be a good cyber
citizenship
8. Always make sure you have told to reliable aldult if you
decided to meet someone you knew through the internet.
9. Always be aware of copyright laws and give credit to
whom an article or a part of it is due.
10. Use only the computers that you are allowed to use. Avoid
hacking.
importance of cyber citizenship
 It keeps the internet free from hurtful statements.
 It creates a culture of more reliable information.
 It gives provisions for people to be given credit for
what they have created.
 More criminals or bullies can be caught when kids
are honest and talk to adults
 It keeps information private.
4
Proper
Follow these simple rules to ensure
that you make wise choices when
sending
Make sure message
you have theonline.
correct address (with proper spelling)
correct link and you are sending the information to the right
person when doing it online.

 Check information before sending or posting any message and


avoid false information on the web or forwarding junk mail or
chain letters to the family and friends.

 Re-read what you wrote to make sure it is what you want to say
and the other person interpret it the same way.
Follow these simple rules to ensure
that you make wise choices when

sending message online.
Keep your comments clean and don’t confront others online or say
anything that could be hurtful to them.

 Keep your personal and friend’s information private and don’t


forward information that was just given to you without his/her
permission.

 Watch out for span and other fraud e-mails and never reply to
them.
Follow these simple rules to ensure
that you make wise choices when
sending message online.
 If you are going to write something personal or private, think
twice because the message can be misdelivered.

 Adults should monitor kid’s messages, especially when they are


sending e-mails to others without permission.
5

Internet
Safety
✗ Internet safety, online safety or cyber safety
means trying to be safe on internet. It is
maximizing the user’s personal safety and
security risks to private information and
property associated with using the internet,
including self-protection from computer
crime.
Copyright: Marina Putilova |
Dreamstime.com

Information
security
✗ - sensitive information, such as
personal information, identity
and passwords are often
associated with personal
property and privacy and may
present security concerns if
leaked.
Common causes of information security
breaches include:
 Phishing- it is common type of scam, of which the scammers
disguise as a trustworthy source in an attempt to obtain private
information, such as passwords, credit, information, etc. through
the use of fake websites that look identical and legitimate.

 Internet scams- these are schemes that deceive the users in


various ways in an attempt to take advantage of them.
Common causes of information security
breaches include:

 Malware- it is a malicious software(particularly spyware)


disguised to collect and transmit private information, such as
password without the user’s consent or knowledge, of which it is
impossible to determine whether a file id infected.
Personal safety
and threats.
✗ The growth of the internet gave
rise to many important services
accessible to anyone with a
connection, such as digital
communication. It is also being
grabbed by malicious users for
bad intent
The following are common threats to
personal safety.
✗ Cyberstalking- it is the use of the internet or other electronic means
to stalk or harass an individual, group or organization through false
accusations, defamation, and intentional monitoring.

✗ Cyber Bullying- it is the use of electronic means, such as instant


messaging, social media, e-mail and other forms of online
communication with intent to abuse, intimidate, or overpower and
individual or group.
The following are common threats to
personal safety.
✗ Online Predation- it is the act of engaging an underage minor into
inappropriate sexual relationships through internet.
The behavior characteristics are categorized into three groups:
• Manipulative- typically child molester.
• Opportunist- typically a rapist.
• Coercive- being a mixture of both rapist and child molesters
The following are common threats to
personal safety.
✗ Obscene/ offensive content- various websites on the internet
contain material that may deem offensive, distasteful or explicit,
which may often not be of the user’s liking.

✗ 5. Sextortion- it is use of webcams for flirting and cybersex. Often,


this involves a cybercriminal posing as someone else, such as an
attractive person initialing communication of sexual nature with the
victim
6
Computer Threats and
Fixing Solution
ways on how to ensure that
computer networks can be
protected.
 Install Anti-virus software.  Implement a vulnerability
 Ensure that the anti-virus management system.
software is up-to-date.  Make regular backups of critical
 Employ a firewall to protect data.
networks.  Develop an information security
policy.
ways on how to ensure that
computer networks can be
protected.
 Filter all email traffic.  Monitor logs and systems.
 Educate all users to be careful  Develop an Incident Response
of suspicious e-mails. Plan.
 Scan Internet downloads.  Restrict end-user access to the
 Do not run programs of systems.
unknown origin.
7

cyber bullying &


cyber crimes
cyberbullying
- It is an aggressive, intentional act or behavior that is carried out
by a group or an individual using electronic forms of contact.

- Cyberbullying is similar to traditional bullying, it is just that


victims may not know the identity of their bully and the reason for
bullying them.
types of cyber bullying
1. Internet trolling 2. Cyberstalking

- is a common form of bullying - is another form of bullying or


over the internet in online harassment that uses electronic
community to elicit a reaction, communication to stalk a victims
disruption or intentionally and pose a credible threat to harass
provoke and offend others. him/her.
Implications of bullying in
schools
• Schools should initiate various anti-bullying and campaigns to
protect students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in
handling bullying cases and executing teaching strategies to
address and reduce bullying cases in class.
cyber crime
• Avast defines cybercrimes as any criminal activity carried out
using computers or the internet. Cybercrime uses tools like
phishing, viruses, spyware, ransomware and social engineering.
cyber crimes
• Techopedia – defined cybercrime as a crime with the computer
as the object of the crime (i.e hacking, phishing, spamming) or is
used as a tool to commit as offense (i.e child pornography, hate
crimes).

• Cyber criminals may use computer technology to access and


confidential information or use internet for exploitative or
malicious purpose.
There is a wide variety of
cybercrimes, which can broadly be
placed into two categories:
1. One-off crimes
such as installing a virus that steals your
personal data.

2. Ongoing crimes
such as cyberbullying, extortion, distributing child pornography or
terrorist attacks.
Cybercrimes encompasses a wide
range of activities that can be
categorized as:
1. Crimes that target computer network or devices, including
viruses and denial-of-service (DoS) attacks.

2. Crimes that use computer networks to advance other


criminal activities, including cyberstalking, phishing and
fraud or identity theft.
8

internet
exploraton
Research and Evaluating the Web
✗ The internet is a global communication network
that allows computers to exchange and share
information worldwide. However, because
cyberspace is such a large realm, sometimes it is
difficult to find the needed information.
The following are the three key
factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords
about the subject into a search engine.

2. Good strategies for searching the web include writing research


questions.

3. Always be cautious about the information shared online and in


visiting websites.
Assessing credibility.
Different websites accessible on the Web can make the job of
researchers very challenging. Carefully evaluate the information
searched online.

Two types of websites:


1. Information websites- usually strive to offer credible
content to users.
2. Commercial websites- inaccurate information in order to see
something.
Checklist of credibility criteria.
 Author. Check the credentials of the author, the company or the
expert and determine the qualifications to provide information on
the subject being searched.

 Date. Look for copyright information at the bottom of a websites


home page.

 Purpose. Analyze the goals of the website to determine if it is


informational or an advertisement sites.
Checklist of credibility criteria.
 Contact. Most credible websites list down contact information,
such as telephone number, email address, or mailing address so
that the users may get in touch if they have questions.

 Fact vs Option. When doing research for school paper, go to sites


that present factual information provided by experts, rather than
opinions.
Checklist of credibility criteria.

 URL. The URL may look like ending in .edu (for education), .gov
(for government), .org (for organization), .com (for commercial
sites), or .net for network sites). Different websites have different
URLs.
citation
• Each entry in the bibliography is called a citation. Proper citation
must be applied or included for every source used, whether it is a
website, a newspaper, or a book.

 Transparency International (2014). Corruption perceptions index


2014: Results. Retrived from
http://www.transparency.org/cpi2014/results, July 17, 2019
9

Research and data


collection protocols
The following are 10 types of
plagiarism that teachers.
researchers and students should
know.
1. Clone Plagiarism. It is also called identical copying or copying
another work (word-for-word) without any change and claim as
his/her own work.

2. Remix Plagiarism. It refers to collecting information from


various sources and moang all together as a single document then,
claiming the work as their own work.
The following are 10 types of
plagiarism that teachers.
researchers and students should
3.know.
Ctrl+C Plagiarism. This is when a significant portion of text
copied from any single source without any alteration in a written
document.
4. Hybrid Plagiarism. Here, perfectly cited source documents
are copied and arranged as a new document without citation.
5. Find-Replace Plagiarism. This is changing the most common
keywords and phrases in the copied content but not making any
changes in the essential document.
The following are 10 types of
plagiarism that teachers.
researchers and students should
6.know.
Recycle Plagiarism. Also called self-plagiarism, it refers to the
act of borrowing from one's own previous document without proper
citation.

7. Mashup Plagiarism. It is when the written document is copied


from more than one source and all are mixed together without proper
citation
The following are 10 types of
plagiarism that teachers.
researchers and students should
8.know.
404 Error Plagiarism. Here, a person creates a document by
copying from various sources prepared as a single document with the
citation but inaccurate or leads to non-existing resources.

9. Aggregator Plagiarism. Here, the written documents includees


proper citation but it does not contain original works.
The following are 10 types of
plagiarism that teachers.
researchers and students should
know.
10. Re-tweet Plagiarism. Here, all written documents look perfect
with properly cited mark but still, the document resembles
somewhere the original text’s structure or wordings.
10

website evaluation
Morris (2018) suggests ways on evaluating a
website as reference in research.
How to Evaluate a Website
• Open the site. When looking through Google search results.
open sites in new tabs, leave search results in a tab for easy
access later (e.g. right-click on the title and click "Open link in
new tab").

• Skim read. Determine whether you can read and understand


the text. If it is too complicated or difficult to understand, find
another website that may provide the information you need
How to Evaluate a Website
• Look for the answer to your question. Find out if the
information on the site actually answers your question.

• Consider the credibility of the author or website. You need


to consider the credibility of the author or website .

• Consider the purpose of the site. Think about the purpose of


the site and whether it meets your needs.
How to Evaluate a Website
• Look for the date. Consider whether the information is current
enough for your topic. You can look for the date when the article
was written or last updated. Sometimes, URLs also include dates.
11

Integrating Digital/Cyber
Literacy into the Curriculum
The following are suggested
activities to integrate digital
literacy in the classroom.
1. Use an interactive whiteboard to design and deliver lessons. Use
Promethean and Smart Notebook with teacher-created lessons if
you are not yet capable of designing your own.
2. Allow students to maintain blogs, wikis, web pages related to
their learning.

3. Engage in email/video chat exchanges with students.


The following are suggested
activities to integrate digital
literacy in the classroom.
4. Utilize storytelling media to allow students to
create and publish stories.

5. Set-up a blog site, Facebook page, Google group and post


weekly discussion questions for students to respond.

6. Use video cameras to dramatize stories, expose students to video


editing software to create video production of learning.
The following are suggested
activities to integrate digital
literacy in the classroom.
7. Engage students in discussions about how and why various
media work well to showcase learning and why others do not.

8. Require E-Portfolio that would compile their outputs, projects,


messages and photo-documents of group activities and
investigations online.
The following are suggested
activities to integrate digital
literacy in the classroom.
9.Thinking critically about the medium use to present a message is as
important as the message itself.

10. Allow students to use digital tools, such as mobile phones, Ipad
and netbooks for Google search, dictionary Apps, Youtube, Podcast
and Spotify applications in class to complement their learning,
especially during group works and concept reporting.
Impact of integrating digital literacy
in the classroom on teachers,
families and friends.
1. It motivates students in their learning due to their enjoyment and
ease of use with various technological mediums.
2. It reaches students of various learning styles and multiple
intelligences.
3. It allows students to create and design their own unique products
reflective of their personalities and learning needs/ styles.
Impact of integrating digital literacy
in the classroom on teachers,
families and friends.
4. It encourages students to manipulate media in constructing their
own meaning.

5. It enables students to share their learning with teachers, families


and friends.

6. It gives students the chance to explore technological media that


inevitably increase the job skills needed in the workforce.
thank you for
listening!
God bless as all
Reporters

Richelyn L. Navales Kassandra Nicole Cherry Bel Angelie Barrios


Facto Toquero

You might also like