Module 8 & 9 Zairah Abila

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

MODULE 8

FINANCIAL LITERACY
LEARNING OUTCOMES
1. Define financial literacy
2. Distinguish among financial plan, budgeting, saving, spending and investing
3. Present ways on how to avoid financial crises and scams
4. Demonstrate understanding of insurance and taxes
5. Describe a financially stable person
6. Determine ways on how to integrate financial literacy in the curriculum
7. Draw relevant life lessons and significant values from personal experiences on financial
crises and scams
8. Analyze research abstract on financial literacy and its implications to the teaching
learning process
9. Make a personal financial plan based on short-term and long-term goals.

INTERACTIVE PRESENTATION
Deal or No Deal. This is an interactive activity adapted from a TV game show segment which
entails a student to pick any of the briefcases containing an amount and he/she then, takes deal or
no deal with the banker’s offer against the amount in the briefcase.
Procedure:
1. The teacher will choose 10 students who will prepare different amounts written in 10
folders that will serve as briefcases.
2. During the game, the class will choose a player.
3. While playing the “Deal or No Deal” with background music downloaded from the
internet, the player will choose the briefcase to be opened to see the amount.
4. The selection of briefcases to be opened shall continue until only the last three remain.
5. Then, the teacher will say, “The banker has an offer”.
6. There will be biding of amount offered by the banker in lieu of opening their remaining
brief cases by player.
7. The last briefcase will be opened and find out if the banker’s offer is higher than the
amount in the chosen last briefcase.
8. There shall be a reflection in the class by asking “What will you do if banker will offer
an amount of money”. The teacher will generate answer from the students.

CONCEPT EXPLORATION
In some instances, teachers are confronted with issues and concerns on financial debt,
being victimized by fraud and other related scams, but personal and electronic ways. More so,
some teachers are drowned by emergent financial need and unexpected debt, especially in
difficult times, sickness and inevitable circumstances and calamities. Others do not prepare for
their retirement that they usually end up highly frustrated. This is the reason why financial
literacy has been a subject in many faculty developments programs, seminars and even becomes
a topic for researches, while many schools have integrated it in the curriculum.
FINANCIAL LITERECY
Financial literacy is a core life skill in an increasingly complex world where people need
to take charge of their own finances, budget, financial choices, managing risks, saving, credit,
and financial transactions.
Poor financial decision can have a long-lasting impact on individuals, their families and
the society caused by lock of financial literacy. Low levels of financial literacy are associated
with lower standards of living, decreased psychological and physical well-being and greater
reliance on government support. However, when put into correct practice, financial literacy can
strengthen savings behavior, eliminate maxed-out credit cards and enhance timely debt.
Financial literacy is the ability to make informed judgement and make effective decisions
regarding the use and management of money. Hence, teaching financial literacy yields better
financial management skills.
The importance of starting financial literacy while still young. National surveys show
that young adults have the lowest level of financial literacy reflected in their inability to choose
the right financial products and lack of interest in undertaking sound financial planning.
Therefore, financial education should begin as early as possible and be taught in schools. Akdag
(2013) stressed that in the recent financial crisis, financial literacy is very crucial and tends to be
advangeous if introduced in the very early years as preschool years. Financial education is a
long-term process and incorporating it into the curricula from an early age allows children to
acquire the knowledge and skills while building responsible financial behavior throughout each
stage of their education (OECD,2005).
Likewise, financial literacy is the capability of a person to handle his/her assets,
especially cash more efficiently while understanding how many works in the real world.
FINANCIAL PLAN
Teachers need to have a deeper understanding and capacity to formulate their own
financial plan. It is wise to consider starting to plan the moment they hand in their first salary,
including the incentives, bonuses and extra remunerations that they receive.
Kagan (2019) defines a financial plan as a comprehensive statement of an individual’s
long-term objectives for security and well-being and detailed savings and investing strategy for
achieving the objectives. It begins with a thorough evaluation of the individual’s current
financial state and future expectations.
The following are steps in creating a financial plan.
1. Calculating net worth. Net worth is the amount by which assets exceed liabilities. In so
doing, consider (1) assets that entail one’s cash, property, investments, savings, jewelry
and wealth; and (2) liabilities that include credit card debt, loans and mortgage. Formula:
total assets-minus total liabilities = current net worth.
2. Determining cash flow. A financial plan is knowing where money goes every month.
Documenting it will help to see how much is needed every month for necessities, and the
amount for savings and investment.
3. Considering the priorities. The core of a financial plan is the person’s clearly defined
goals that may include: (1) Retirement strategy for accumulating retirement income; (2)
comprehensive risk management plan including a review of life a life and disability
insurance, personal liability coverage, property and casualty coverage, and catastrophic
coverage; (3) Long-term investment plan based on specific investment objectives and a
personal based on specific investment objectives and a personal risk tolerance profile;
and (4) Tax reduction strategy for minimizing taxes on personal income allowed by the
tax code.

Five Financial Improvement Strategies


Financial literacy shapes the way people view and handle money.
The following are financially improvements suggested by Investopedia
as a journey to financial literacy.
1. Identify your starting point. Calculating the net worth is the best way
to determine both current financial trouble by spending too much on
wants and nothing enough for the needs

2. Set your priorities. Making a list of rated needs and wants can help set
financial priorities. Needs are things one must have in order to survive
( i.e food, shelter, clothing, healthcare and transportation); while wants
are things one would like to have but are not necessary for survival.
3. Document your spending. One of the best ways to figure out cash flow
or what comes in and what goes out is to create a budget or a personal
spending plan. A budget list down all income and expenses to help meet
financial obligations.
4. Lay down your debt. Leaving with is costly not just because of interest and
fees but it can also prevent people from getting ahead with their financial goals.
5. Secure your financial future. Retirement is an uncontrollable stage in a worker’s
life, of which counterpart are loosing their job, suffering from an illness or injury,
or to be forced to care for a loved one that may lead to an unplanned retirement.
Therefore, knowing more about retirement options is an essential part of securing
financial future.

Financial Goal Planning and Setting


Setting goals is a very important part of life, especially in financial planning.
before investing the money, consider setting personal financial goals. Financial goals
are targets, usually driven by specific future financial needs, such as saving for a
comfortable retirement, sending children to college, enabling a home purchase.
There are three key areas in setting investment goals for consideration.
A. Time horizon. It indicates the time when the money will be needed. To note, the
longer the time horizon, the more risky ( and potentially more lucrative) Investments
can be made.
B. Risk tolerance. Investors may let go of the possibility of a large gain if they knew
there was also a possibility of a large lost ( they are called risk averse); While others
are more willing to take the chance of a large loss if there were also a possibility of a
large gain (they are called risk seekers). The time horizon can affect risk tolerance.
C. Liquidity needs. Liquidity refers to how quickly an investment can be converted into
cash ( or the equivalent of cash) The liquidity needs usually affect the type of chosen
investment to meet the goals.
D. Investment goals: Growth, income and stability. Once determined the financial
goals and how time horizon, risk tolerance, Liquidity needs affect them, it is time to
think about how investments may help achieve those goals. When considering any
investment, think about what it offers in terms of three key investment goals: (1)
Growth ( also known as capital appreciation) is an increase in the value of an
investment; (2) Income, of which some investments make periodic payments of
interest or dividends that represent investment income and can be spent or reinvested;
(3) Stability, or known as capital preservation or protection of principal.

An investment that focuses on stability concentrates less on increasing the


value of investment and more on trying to ensure that it never loses value and can be
taken when needed.

Budget and Budgeting


A budget is an estimation of revenue and expenses over a specified future
period of time and is usually compiled and re-evaluated on a periodic basis. Budgets
can be made for a variety of individual or business needs or just about anything else
that makes and spends money. Budgeting on the other hand is the process of creating
a plan to spend money. Creating this spending plan allows one to determine in
advance whether he/she will have enough money to do things he/she needs are likes
to do.

Thus, budgeting ensures to have enough money for the things needed and those
important ones and will keep one out of debt.

Seven Steps to Good Budgeting


The following are seven steps that may help in attaining good budgeting.

Step 1: Set realistic goals. Goals for the money will help makes smart spending
choices upon deciding on what is important
Step 2: Identify income and expenses. Upon knowing how much is earned each
month and where it all goes, start tracking the expenses by recording every single
cent.

Step 3: Separate needs from wants. Set clear priorities and decisions become easier
to make by identifying wisely those that are not really needed or just wanted.

Step 4: Design your budget. Make sure to avoid spending more that what is earned.
Balance budget accommodate everything needed to be paid for.

Step 5: Put your plan into action. Match spending with income time. Decide ahead
of time what will you use each pay day. Non-reliance to credit for the living expenses
will protect from one debt

Step 6: Plan for seasonal expenses. Set money aside to pay for unplanned expenses
so to avoid going into debt.

Step 7: Look ahead. Having a stable budget can take a month or two so, as for help
if things are not getting well.

Spending
If budget goals serve as a financial wish list, a spending plan is a way to make
those wishes a reality. Turn them into an action plan. The following are practical
strategies in setting and prioritizing budget goals and spending plan

1. Start by listing your goals. Setting budget goals requires forecasting and
discussing future needs and dreams with the family.
2. Divide your goals according to how long it will take to meet each goal.
Classify your budget goals into three categories: Short term goals ( less than a
year), medium term goals ( one to five years ) and long term goals ( more than
five years). Short term goals are usually the immediate needs and wants; Medium
term goals are things that you and your family want to achieve during the next
five years; and long term goals extend well into the future, such as planning for
retirement
3. Estimate the cost of each goal and find out how much it costs. Before
assigning priority to goals, it is important to determine the cost of each goal. The
greater the cost of goal, the more alternative goals must be sacrificed in order to
achieve it
4. Project future cost. For short term goals, inflation is not a big factor, but for
medium and long term goals, it is a big factor to calculate the future cost of the
goals, there is a need to determine the rate of inflation applied to each particular
goal
5. Calculate how much you need to set aside each period. Upon knowing the
future cost of the goals, next is to determine how much to put aside each period to
meet all the goals
6. Prioritize your goals. Upon listing down all the goals and the estimated amount
needed for each goal, prioritize them. This serves as guide in decision making
7. Create a schedule for meeting your goals. It is important to lay down all the
goals according to priority with the corresponding amount of money needed, the
time it will be needed, and the installments needed to meet the goals.

Investment and Investing


As teachers, when you have saved more money than what you expect at a
time of need, consider investing this money to earn more interest than what your
savings account is paying you. There are many ways you can invest your money
but consider four aspects:

1. How long will you invest the money? (Time Horizon)


2. How much money do you expect your investment to earn each year
(Expectation of return)
3.How much of your investment are you willing to lose in the short term in order
to earn more in the long term? (Risk Tolerance)
4. What type of investments interest you? (Investment type)
Savings
In order to get out of debt, it is important to set some money aside and put
it into a savings account on a regular basis. Savings will also help in buying things
that are needed and wanted without borrowing.
Emergency savings fund. Start as early, setting aside little money for emergency
savings fund if you receive a bonus from work, an income tax refund or earnings
from additional or side jobs, use them as an emergency fund.

10 Reasons why save money


With credit so easy to get here are why practical reasons why it is
important to save money that everyone, including teachers must know.

1. To become financially independent. Financial independents is not having to


depend on receiving a certain pay but setting aside an amount to have savings that
can be relied on.
2. To save on everything you buy. With savings, you can buy things when they
are on sale and can make better spending choices without being compromised on
credit card interest charges.
3. To buy a home or a car. Savings can be used in buying a home in full or down
payment, especially in times of promo deals, bids and inevitable sale and at a
reasonable interest rate.
4. To prepare for the future. Through savings, you can be confident to face the
future without worrying on how you will survive
5. To get out of debt. If you want to get out of debt, you have to save money
6. To augment annual expenses. In order to attain a good stress-free financial
life, there is a need to save for annual expenses in advance.
7. To settle unforeseen expenses. Savings can respond to unforeseen expenses in
times of need.
8. To respond to emergencies. Emergencies may happen any time and these can
be expensive so, there is a need to get prepared rather than potentially become
another victim of an emergency.
9. To mitigate losing your job or getting hurt. Bad things can happen to
anyone, such as losing a job, business bankruptcy or crisis being injured or
becoming to sick to work. Therefore, having savings is the key to resolve such a
dilemma
10. To have a good life. Putting aside some money to spend when needed can
bring about quality and worry-free life at all times.

Common Financial Scams to Avoid


Financial Fraud can happen to anyone, including the teachers at any time.
While some forms of financial fraud, such as massive data breaches, are out of
one’s control, there are many ways to proactively get rid of financial scams and
identify theft.
Here are some of the most common financial scams, along with ways to identify
them early and how to protect one’s from being victimized
A. Phishing. Using this common tactic, scammers send an email that appears to
come from a financial institution, such as a bank and asks you to click on a
link to update your account information. If you receive any correspondence
that asks for your information, never click on the links or provide account
details. Instead, visit the company’s website, find official contact information,
and call them to verify the request.
B. Social Media scams. Scammers are adept at using social media to gather
information about the traveling habits of potential victims. They also have
phishing tactics, including posts seeking charity donations with bogus links
that allow them to keep your money. Therefore be conscious of the
information you post online, especially personal details and plans for a
vacation that you would leave your house unoccupied.
C. . Phone Scams. Another prevalent tactic is scamming phone calls. The
scammers pose as a government agency, such as the Bureau of Internal
Revenue or local law enforcement agencies, and use scare tactics to acquire
your personal information and account numbers. Never provide your account
information over the phone. Look for the agency’s contact information, and
call them to verify any request. To note, government agencies will never text
or call you to ask for money.
D. Stolen Credit card numbers. There are numerous ways that scammers can
obtain your credit card information, including hacking, phishing, and the use
of skimming devices, such as small card readers a touch to unmanned credit
card readers (I.e ATMs, gas pumps, and more). These small devices pull data
from your card when you swipe it. Before you use an atm or swipe your card,
look for suspicious devices that maybe attached to the card reader.
E. Identify Theft. Depending on the amount information, a scammer is able to
obtain, identify theft may extend beyond an authorized charges on a debit or
credit card. If a scammers are able to obtain your social security number, date
of birth and other personal information, they maybe able to open new
accounts with your name without your knowledge, be aware of an information
you share and with whom and always shared sensitive information before
disposing it.

By taking preventative measures and being aware of scams, you can minimize
the risks of fraud. Monitoring your online or mobile banking accounts daily
can also help you see fraudulent charges quickly.

10 Tips to Avoid Common Financial Scams


Every year, fraud cases are getting worse, leaving countless victims in
trouble and danger through data breaches, identify theft and online scams
unfortunately new and improve technology only gives fraudsters an edge,
making it easier than ever for scam artists to nab financial data from
unsuspecting consumers (Bell, 2019).

1. Never wire money to a stranger. Although it is one of the oldest internet


scams, there are still consumers to fall for this rip-off or some variations of it.

2. Don’t give out financial information. Never reveal sensitive personal


financial information to a person or business you don’t know, thru phone, text
or email.

3, Never click on hyperlinks in emails. If you receive an email from a


stranger or company asking you to click on a hyperlink or open an attachment
and then, enter your financial information, delete the email immediately
4.Use difficult passwords. Hackers can easily find password that are simple
number combinations. Create passwords that are at least 8 characters long and
that include lower and uppercase letters, numbers and special characters. You
should also use a different password for every website you visit.

5. Never give your social security number. If you receive an email or visit a
website that ask your social security number, ignore it.
6. Install anti-virus and spyware protection. Protect the sensitive
information stored on your computer by installing anti-virus, firewall and
spyware protection. Once you install the program, turn on the auto updating
features to make sure the software is always up to date.
7. Don’t shop with unfamiliar online retailers. When it comes to online
shopping, only do business with familiar companies. When purchasing a
product from an unfamiliar retailer, do some research to ensure the business is
legit and reputable.
8. Don’t download software from pop-up windows. When you are online,
do not trust pop-up windows that appear and claim your computer is unsafe. If
you click on the link in the pop-up to start the “systems scan “or some other
programs, malicious software known as “malware” could damage your
operating system.
9. Make sure the websites you visit are safe. Before you enter your financial
information on any website, double-check the websites privacy rules. Also,
make sure the website uses encryption, which is usually symbolized by a lock
to the left of the web address which means it is safe and protected against
hackers.
10. Donate to known charities only. If you receive a call or an email for
solicitations of charity donations, critically examine it. Some scammers create
bogus charities to steal credit card information.
Financial Scams among Students. Students can also be susceptible to
different financial scams and fraud. Learning how to manage finances and
being aware and financial scams are skills that every student should master.
The following are common financial scams that students should watch out
for, and learn to protect one’s identity and finances.
A. Fake Scholarships While it is beneficial for students to apply for as many
scholarships as they can, it is important that they are aware of the scholarship
related financial scams. Student should thoroughly check scholarship sources
before applying to verify that they are legitimate. Never apply for a
scholarship that asks for money in return.
B. Diploma Mills Diploma or degree mills are colleges that offer fake degrees
and diplomas in exchange for a fee. Check from government education
agencies the prospective school to enroll in if it is government – recognized
legitimate or accredited.
C. Online book scams While college students often search high and low for
the best deals on textbooks, online book sites can be an easy way for
scammers to get students’ credit card information. When buying anything
online, be sure that you are shopping on a credible site before entering your
personal and financial information.
D. Credit card scams Oftentimes credit card companies go to college
campuses to attempt to get students to fill out credit card applications. While
many credit card companies who market to college students are genuine
businesses, others are scammers who utilize applications to steal students’
information. Avoid being scammed by going to your local credit union or
bank to get a credit card. Also, regularly check your credit card statement. If
you see any charges that you do not recognize, contact your banking
institution immediately.

Insurance and Taxes


Insurance is a contract (In the form of a policy between the policy
holder and the insurance company, whereby the company agrees to
compensate for any financial loss from specific ensured events. In exchange
for the financial protection offered, policy holder agrees to pay a certain sum
of money, known as premiums to the insurance company. Insurance is the best
form of risk management against uncertain loss.
There are various types of insurance to choose from, such as life
insurance, health insurance, motor insurance, property insurance, business
insurance and etc. Besides, the financial protections derived from insurance
entails, tax benefit, claim on the paid premiums.
The following are concepts related insurance and taxes but every
teacher should know. However he/she carefully analyze and critically examine
well before pursuing any deal with them.
1. Employer- Sponsored Insurance. If working in a company with 50 or
more full -time employees. The employer is required to provide employee –
only insurance that meets minimum guidelines. Examine the plan offered, but
do not pay over 9.66% of household income in premiums.
2. Marketplace Plans. Marketplace Plans are available based on an area of
residence and income upon meeting minimum coverage requirements.
Marketplace plans come in three tiers: Bronze, silver and gold. Generally
bronze plans offer the least coverage at the lowest premiums while gold plans
provide the most coverage at the highest price.
Life insurance. Life insurance is a type of insurance that compensates
beneficiaries upon the death or the policyholder. The company will guarantee
a payout for the beneficiaries in exchange of premiums. This compensation is
called “death benefit." Depending on the type of insurance one may have.
these events can anything from retirement. to major injuries. to critical illness
or even to death.
The following are common risk categories:
1. Preferred Plus -The policyholder is in excellent health. With normal
weight. no history of smoking. chronic illnesses, or family history of any life-
threatening disease.
2. Preferred - The policyholder is in excellent health but may have minor
issues on cholesterol or blood pressure but under control.
3.Standard Plus - The policyholder is in very good health but some factors,
like high blood pressure or being overweight impede a better rating.
4.Standard- Most policyholders belong to this category, as they are deemed
to be healthy and have a normal life expectancy although. they may have a
family history of life-threatening diseases or few minor health issues.
5.Substandard — Those with serious health issues. like diabetes or heart
disease are placed on a table rating system, ranked from highest to lowest. On
average, the premiums will be similar to Standard with an additional 25%
lower claim on table ratings.
6. Smokers - Due to an added risk of smoking, the policyholders this
category are guaranteed to pay more. Aside from health age is also a critical
factor in determining premiums.
Benefits of Life Insurance
The following are the benefits of life insurance.
1. It pays for medical and funeral costs. Life insurance helps the incurred
expenses for medical and funeral services to I the grief among family and
relatives for being unprepared.
2. For financial support. Life insurance can become a source temporary
income during the difficult period of adjusting coping with the loss of a loved
one, especially if he/she is the breadwinner.
3.For funding various financial goals. Life insurance additional benefits
through the form of fund accumulation for specific future financial goals.
4. Acts as a retirement secured conform. Modern life insurance also serves as
a tool that principal holders can use to get in a better financial position in the
future.
5. It covers costs incurred from taxes and debt. Life insurance can serve as
protection since (he premium can be used to pay for unsettled debts and taxes.
Types of Life Insurance
The table below shows a comparative analysis of different types of life insurance
along characteristics, advantages and disadvantages that may serve as a reference.
Type Characteristic Advantage Disadvantage
1. Endowment It grants a lump sum It allows for saving It requires higher
after a specified up for specific premiums than
amount of time or purposes. other types of life
upon death. The insurance.
policy owner is It guarantees returns
required to pay the upon maturity. It is not the best
premium for a option for those
predetermined It offers some form looking at full life
number of years or of insurance protection
until a specific age is coverage.
reached.
2. Term It is the simplest form It entails low It has no benefit if
of life insurance to premium policyholder
obtain, of which upon requirements. outlives the term
death, the period set.
beneficiaries are paid It is a strong option
with the benefit for policyholders Premium usually
who need insurance gets higher upon
but cannot afford renewal of terms.
whole life or
endowment.

It is easy to
understand
3. Whole Life. It provides coverage It offers permanent It requires higher
for the policyholder's protection for full premium.
entire life or until they life for 100 years.
reach 100 years old. It is difficult to
It is flexible in terms understand due to
It acts both as of payments of complexity.
protection and savings premiums.
mechanisms since a
portion of the It entails fixed
premium is allocated premiums.
to build up cash
values. It usually comes
with additional
features and "living"
benefits.
4. Variable It serves as both fire It takes dual Cash values and
Universe life protection and purpose: Life dividends are not
(VUL) investment vehicle in insurance plus guaranteed.
one package. A investment tool.
portion of the Face amount and
premium is allocated It has no maturity death benefit are
into various age. dependent on
investment vehicles investment
for the purposes of The cash value is performance.
wealth creation. The payable along with
contract's earnings are the assured sum. It includes various
based on the The death investment fees.
performance of component is not
selected investments. limited to face value.

It depicts liquidity,
wherein funds can be
accessed in times of
need and can serve
as emergency funds.

Financial Stability
Like anyone else, teachers also aim to become financially stable if not today, maybe in
the future. Being financially stable means confidence with the financial situation, worriless
paying the bills because of available funds, debt-free, money savings for future goals and enough
emergency funds.
Financial stability is not about being rich but rather more of a mindset. It is living a life
without worrying about how to pay the next bill, and becoming stress-free about money while
focusing energy on other parts of life (Silva, 2019).
10 Strategies in Reaching Financial Stability
Just like any goal, getting the finances stable and becoming financially successful requires the
development of good financial habits. Babauta (2007) suggests 10 habits toward financial
stability and success.
1. Make savings automagical. Savings should be made a top priority, especially as an
emergency fund and a bill payment from the amount are automatically transferred from the
checking account, like an online savings account.
2. Control your impulsive spending. Control yourself from impulsive spending on eating out,
shopping and online purchases that may ruin your finances and budget.
3. Evaluate your expenses and live frugally. Analyze spend your money, see what you can
reduce and determine expenses that are necessary and eliminate the unnecessary
4. Invest in your future. start preparing and investing for your future retirement while still
young in your career field.
5. Keep your family secure. Save for an emergency fund, so you have something to spend if
anything happens with the family
6. Eliminate and avoid debt. Eliminate credit cards, personal loans, or other debt forms as it
will not work on you but even pull you down and make you drowned with obligations that may
even resort to surrendering your properties, jewelry and investments as payment.
7. Use the envelope system. Set aside three amounts in your budget each payday, withdraw
those amounts and put them in three separate envelopes. In that way, you can easily track how
much remains for each of the expenses or if you already run of money.
8. Pay bills immediately. One good habit is to pay bills as soon as they come in and try to get
your bills to be paid through automatic deduction.
9. Read about personal finances. The more you educate yourself, the better your finances will
be. Look to grow your net worth. Do whatever you can to improve your net worth, either by
reducing your debt, increasing your savings, or increasing your income, or all of the above.
Signs of Being Financially Stable
Teachers, like anyone else, often work to the extent to earn more even through additional jobs on
the side just for their desire for financial stability.
Rose (2019) presents some signs of a financially stable person.
1. You never overdraw your checking account.
2. You don't lose sleep over finances.
3. You use credit cards for convenience and rewards but out of necessity.
4. You don't worry about losing your job.
5. You pay your bills ahead of time.
6. People ask your opinion about financial matters and inspire them.
7. You're generally happy with your financial situation.
8. You finance your cars over five years or less if you take loans at all.
9. You contribute more to your retirement.
10. You don't feel guilty when you're out for special occasions.
11. You can afford to buy the things you really want.
12, Recreational spending doesn't appeal to you.
13. You're a natural saver.
14. You're generous with money when it comes to charities or helping others.
15. You're confident about your future.
16. Your net worth grows significantly from year to year.
17. You have substantial equity in your home.
18. You consistently live beneath your means.
19. You could survive for months without a paycheck.
20. You feel in control of your finances and never dominated by them.
Integrating Financial Literacy into the Curriculum
Financial education in schools should be part of a collaborative national strategy to
ensure relevance and long-term sustainability. The education system and profession should be
involved in the development of the strategy.
In support, Barry (2013) underscored that financial literacy has a wide repercussion
outside the family circle and more precisely, the school. Hence, administrators and professors
need to develop a curriculum that would provide students insights on having the value of
financial literacy including the effect it can bring them.
Moreover, there should be a learning framework, which sets out goals, learning
outcomes, content, pedagogical approaches, resources and evaluation plans. The content should
cover knowledge, skills, attitudes and values. A sustainable source of funding should be
identified at the outset.
Financial education should ideally be a core part of the school Curriculum. It can be
integrated into other subjects like mathematics, economics, social studies, technology and home
economics, values education and others. Financial education can give a range of 'real-life'
Contexts across a range of subjects.
Teachers should be adequately trained and resourced, made aware of the importance of
financial literacy and relevant pedagogical methods and they should receive continuous support
to teach it or integrate in their lesson. More so, there should be easily accessible, objective, high
quality and effective learning tools and pedagogical resources available to Schools and teachers
that are appropriate to the level of study. Students' Pt0gress should also be assessed through
various high impact modes.

QUESTIONS FOR DISCUSSION


1.What is financial literacy? Explain.
2. Differentiate budgeting, saving, spending and investing.
3. What are ways of avoiding financial scams?
4. How do you understand insurance and what type do you want to avail of?
5. When can we say that a person is financially stable?
6. How will you integrate financial literacy in the curriculum related disciplines?
(The class may also consider doing a forum discussion by inviting resources persons who can
discuss insurance plans, savings and investments.)
RESEARCH ANALYSIS AND IMPLICATION
Direction: Analyze the following research abstract and cite its implication on teaching-learning.
You may download the full paper of research on the website given below.
Financial literacy and financial planning among teachers of high education: A study on
critical factors of select variables
Surendar and Subramanya Sarma (2018)

Abstract
Teachers are the most influential people in our society. Apart from academics, they have the
ability to positively affect many aspects of people's lives. By having financial literacy and
managing personal finance properly, they can become role models to the students and help to
develop fiscally and socially responsible citizens. An individual with good financial sense may
plan better his/her personal finance' particularly teachers who are key contributors to the
development society. In this background, this study has been conducted to the critical factors
using factors analysis in enhancing the financial literacy levels and study their impact on select
variables of financial planning among teachers of higher education. The study found the level of
financial literacy among higher education teachers is satisfactory. It demonstrates the importance
of contextual variables that may influence financial literacy and personal financial planning. It
also explored the relationships among the select variables of financial literacy and personal
financial planning using a methodology that is free from the influence of the attribute of the
respondents. The study that the majority of higher education teachers have a high level of
financial literacy, are aware of various aspects of personal financial planning and are able to plan
on their own irrespective of their subject. It also revealed that retirement planning, tax planning
and control, financial planning, financial capacity and inflation are critical factors in personal
financial planning among them.

Analysis 1: What are the critical factors in personal financial planning among higher
education teachers? _______________________________________________________
________________________________________________________________________
________________________________________________________________________

Implication: 2. What is the impact of each of the factors on financial literacy and planning
among teachers? __________________________________________________________
________________________________________________________________________
________________________________________________________________________

FINANCIAL LITERACY
 Financial literacy is the ability to make informed judgments and make effective
decisions regarding the use and management of money.
 A financial plan is a comprehensive statement of an individual's long-term Objectives for
security and well-being that details savings and investing strategy for achieving those
objectives based on an individual's current financial state and future expectations.
 A budget is an estimation of revenues and expenses over a specified future period of
time and is usually compiled and re-evaluated on a periodic basis while budgeting is the
process of creating a plan to spend money.
 The saved money will earn more, if it is invested upon understanding the essential
factors, such as time horizon, an expectation of return, risk tolerance, and investment
type.
 It is equally important to have savings on a regular basis in order to get out of debt or buy
things we want, and most of all, to keep an emergency fund in times of need.
 Financial fraud may happen to anyone at any time, such as massive breaches, however,
there are many ways to get rid of financial phishing, social media and phone scams,
stolen credit card numbers identity theft.
 Insurance, regardless of type, is a contract between the policyholder and the insurance
company, whereby the company agrees to compensate for financial loss arising from
specific insured events.
 Being financially stable means confidence with the financial situation, paying of bills
because of available funds, debt-free, money savings for future goals and enough
emergency funds.
 Financial literacy should be made part of the curriculum that should begin at the early age
using a coordinated national strategy.

CURRICULUM APPLICATION
Direction: Make a personal financial plan based on short-term and long-term goals. Use the
template sample provided below.
Short-Term Goal  Target  Target SAVINGS PLAN
Cost 
Value Date Month Month Month Month Month Total 
1 2 3 4 5 Savings

Long-Term Goal Target Target Year1 Year2 Year3 Year4 Year5 Total
Cost Date Savings
Value

BUDGET PLAN
Outstanding Cash Income:
EXPENSES AMOUNT
1

2
3
4
5
6
TOTAL
REMAINING CASH

BUDGET PLAN
Outstanding Cash Income:
RANK BUDGETED ITEMS AMOUNT
General Expenses, Payable and House Share

Allowance

Bank Savings
Emergency Fund (Cash available anytime)
Insurance
Investment (i.e Cooperatives, shares, business, etc.)
Total

LET SAMPLERS: TAKING THE EXAMINATION 

Read and analyze each item carefully, Choose the letter of the best answer. 

1. Surveys reveal that some teachers face their retirement without savings at hand which usually
bring them to worse poverty scenario. What are the reasons behind this? 
I. Culture of extended family dependency 
II. Lack of priority on retirement preparation during earning career years
III. Strong passion and value for the teaching profession 
IV. Lack of value on their career effort and remuneration. 
A. I and II only C. Il and IV only 
B. II and III only D. I, II, Ill and IV 

2. Who among the following would be mostly target victims of financial scammers?
A. The rich and powerful 
B. Tho generous and kind 
C. The passive and submissive 
D. The financially illiterate 

3. Which of the following strategies can teachers LEAST consider in preparing for their
retirement? 
A. Continuing professional development towards promotion and increment
B. Sustain expenses relatively lower than salaries 
C. Avail of life and retirement insurance 
D. Frequent trips with grabbed promo fares and freebies 

4. According to previous researches, teachers go into unreasonable debts and loans which
eventually lead them to payables and unnecessarily leading them to surrender their ATM cards.
Which financial factor is considered the least to affect this practice and its results? 

A. Savings C. Compensation and fringe benefits 


B. Expenses D. Emergency funds 

5. Why are people victimized by financial scams that end up to the loss of properties,
investments and savings, and even to ruining their lives? 
A. They have not learned in school how to avoid being scammed. 
B. They desire for easy and quick money. 
C. It is already their destiny that may happen anytime sketched in the palm of their lives. 
D. It is always part of life and it is just that they are not enough to cope with it.

Module 9: DIGITAL/CYBER LITERACY


LEARNING OUTCOMES  
1. Define digital/cyber literacy and cybersecurity  
2. Elaborate on cyber citizenship  
3. Determine netiquette and safety use of digital media  
4. Identify common computer threats and the corresponding fixing solutions
5. Elucidate cyberbullying and cybercrimes
6. Examine Internet exploration, source citation, research and data gathering
protocols and website evaluation  
7. Cite how digital/cyberliteracy may be integrated
8. Draw relevant life lessons and significant values from personal experiences on digital risks
and consequences
9. Analyze research abstract on digital/cyber literacy and its implications to the teaching
learning process
10. Produce and evaluate a digital tool that may be utilized in the classroom  

INTERACTIVE PRESENTATION  
Cross Sectional Dilemmatters Jury Trial: This activity is intended for students to
analyze dilemmas. The points of view are supported by provisions, theories and frameworks.
Then, groups present their propositions and analysis subjected to critiquing and assessment by
other groups. It enhances critical thinking, analysis, objectivity, communication skills,
collaboration and unity.  
Procedure:  
1. The students form four groups in class.  
2. The teacher prepares dilemmas on mal-use, misuse and abuse of technology to be
examined and analyzed by the students as an advanced assignment.  
3. Two groups will be given a dilemma to be resolved. Both groups will take
their justifications and counter propositions on the issue just like a debate.  
4. Members of the groups will share ideas and opinions regarding issues being raised. The
members agree to common propositions and justifications based on their opinions supported by
legal, philosophical and moral bases that they have researched on in advance.  
5. The groups present their analysis and propositions and react to the opposing group's
justifications in class.
6. Meanwhile, the other (remaining) two groups will serve both as audience and
adjudicators. They will also analyze assess the given propositions of the presenting
groups.
7. Therefore, the groups of adjudicators will also choose the that they will defend and justify
against the opposing side.
8. Just like the two presenting groups, the two groups adjudicators will also debate on the
issue by examining counter propositions of the opposing group upon presenting, their
side. Therefore, two different sets of debating teams expected to perform.
9. The teacher clarifies and synthesizes the ideas and propositions given by the presenting
groups, as Well as the defense and the critiquing made by the adjudicators.
10. The class will find time for a brief reflection on the activity.

Samples of dilemmas to be resolved in class


Dilemma No. 1:
1. The Bridgeton Academy conducted a United Nations activity by performing cultural
presentations done in different including appropriate costumes and props. After students
were fulfilled and they happily celebrated of their presentations through picture taking. A
student, who served as leader of one of the groups, posted their picture online and put a
hashtag (which was the name of the country that they presented) on it. All the while, the
student became unaware of the impact of what he did that the picture online even
reached the country mentioned in the given hashtag. This made the people in the said
country react on the posted picture vehemently, for them, that was an insult and
discriminator to their culture and race. Many citizens put their negative impressions,
comments and ill statements against the pers who posted it while the rest responded in
the thread. Th were searching for the school where the picture came from demanded for
an apology to their nation and the people. How would you defend the sides of two
involved in the issue the student who unintentionally posted the picture out of and the
people who reacted to it?

Dilemma No. 2:
2. After the swimming class, a student, who was given co by her classmate, took a video
of the letter in the cc room while changing her swimsuit. Suddenly, the came out with the
student's nude body and was view many, including her family and friends. Being affect
such malicious scandal, the said student's family immediately confronted the school to
hear explanations from those concerned. Upon investigation, they found out that the one
who took the video, had mistakenly pressed the button of the cellphone marked "video
share" that made it accessible to accounts registered in the contacts right away, which
caused its intermediate spreading.
Who do you think has the main liability on this issue - the who
allowed someone to take the video of her nude body or the one who caused its
widespread? Justify. How should this matter be resolved?
CONCEPT EXPLORATION
Technology has been part of everyone's life, be it at home, in school, or anywhere
with every facet of our undertaking. However, in many instances, we may not be aware
that we have been misusing abusing it or in another way around, we may find ourselves
being used by other people with their malicious motives using digital Therefore, we may
end up being liable or a victim of such responsible kind of technological processing and
utilization. It is in this case that we must gain further understanding and application of
digital/cyber literacy, be it on personal or professional merit.
Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full
participation in society that includes knowledge, skills, and behaviors involving the
effective use of digital devices for purposes of communication, expression, collaboration
and advocacy. Simply, it is the ability of an individual to engage with the digital
environment and operate technologies safely by knowing what to do and what not to do
and how to avoid unnecessary risks. Digital literacy is an individual's ability to access
both information and methods of communication through technological tools, such as
smartphones, tablets, laptops and desktop PCs. While digital literacy is initially focused
on digital skills and stand-alone computers, its focus has shifted to network devices,
including the Internet and the use of social media.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks (Cisco, n.d.). These cyberattacks usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or interrupting normal
business processes.
Implementing effective cybersecurity measures is challenging because there are more devices
than people, and attackers are more innovative. Here are some tips on how to protect
yourself against cyber threats.
1. Monitor behavior on social networks, uploading something fry to (a) to be public and (b) Is
it worth the risk? Remember, not only what we share online is available to friends and
family, but also to cybercriminals.
2. Keep devices safe. Protect your technology by Anti-virus software, a configuration
of settings on the devices and by completing software updates.
3. Understand how best to use passwords. Passwords needs to be complex and hard to guess,
but can still be remembered. One strategy is "passphrase' or a password that comes first
letter of each word in the phrase. There is also a manager app to help keep track of all the
passwords called "KeePass" which is free of charge. Importantly; do not use
same password for all accounts.
4. Handle unsafe content. Know exactly how to respond or read to unsafe situations online,
such as (1) suspicious (2) pop-ups claiming that your computer is infected; and
BitTorrent sites.  
5. Consider safety for the future. Take individual responsibility using devices with
an utmost cave and critical thinking online  
Cyber Citizenship  
Citizenship is an old value that is now applied to a new medium, the Internet. Cyber citizenship
refers to being responsible when using the Internet. Doing online when no one is looking speaks
a lot about one's character and morals. The power of this digital world is associated
with responsibilities and consequences. Therefore, can explore and navigate all information
available online however, we should observe cyber citizenship or manners and etiquette on the
Web. 
Ways on How to be a Good Cyber Citizen 
The enlisted ways of becoming a good cyber citizen would guide everyone on his/her
digital operations and information processing and would prevent anyone from further
consequences, distractions, damages and risks.  
1. Be careful and critical for whatever you post online that cd be visible to the public even if on
a "private" page through tagging by a friend.  
2. If you have a problem with someone, go to that person an adult to help work it
out, instead of posting your expression online.  
3. Use the Internet to help you with your schoolwork, but credit to the sources you use and
critically analyze you search online.
4. Use the Internet purposefully to learn more about anything you are interested in, to help you
research relevant and needed data or information and to stay connected with friends
throughout the world.
5. Make sure you verify an information before you share it or use it in a project and check on
accuracy and truth in the information you search on the web.
6.Give out certain information only.
7. Don’t answer questions that make you uncomfortable.
8. Always make sure you have told a reliable adult if you decide to meet someone you
knew through the Internet.
9. Always be aware of copyright laws and give credit to whom an article or a part of it is
due.
10. Use only the computers that you are allowed to use. Avoid hacking.

Importance of Cyber Citizenship


1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.
4. More criminals or bullies can be caught when kids are honest and talk to adults.
5. It keeps information private.

Paper Netiquette

Follow these simple rules to ensure that you make wise choices when sending messages
online.
1. Make sure you have the correct address (with proper spelling), correct link and you are
sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false statements and
information on the web or forwarding junk mail or chain letters to family or friends.
3. Re-read what you wrote to make sure it is what you want to say and the other person
would interpret it the same way.
4. Keep your comments clean and don't confront others online or say anything that could be
hurtful to them.
5. Keep your personal and friends' information private and don't forward information that
was just given to you without his/her permission.
6.Watch out for spam and other fraud e-mails and never reply to them.
7.If you are going to write something personal or private, think twice because messages can
get misdelivered.
8.Adults should monitor kids' messages, especially when they are sending e-mails to others
without permission.
The Ten Commandments of Teacher Cyber Citizenship
At some point, misuse and abuse of technology may also in schools involving teachers with their
students, colleagues and others. The following are reminders to teachers regarding the media
tools.
1.Thou shall not post any personal matter, information and obscene pictures and messages online
that can be accessed by students and parents.
2.Thou shall not respond or thread to any personal message created by students online other than
those school-related.
3.Thou shall not lend or let students access your cellphone.
4.Thou shall not give your email password to students.
5.Thou shall not use concepts and information from texts and references without the author's
citation.
6.Thou shall not post to any social media account, for whatever purposes, the pictures of students
without their or their parent consent.
7. Thou shall not express sentiments, disappointments and disagreements against superiors,
colleagues, students and their parents using their social media accounts.
8. Thou shall not use data from Internet sources in any documents like lesson plans, researches
and requirements without the consent of the author.
9.Thou shall not give any personal data or other's information to anyone unless for specific
purposes and given the consent.
10.Thou shall not post any student data publicly online including academic rankings, school
records, class outputs and record of grades. De Leon (2019)
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the Internet. It is
maximizing the user's personal safety and security risks to private information and property
associated with using the Internet, including self-protection from computer crime, the number of
Internet users continues to grow worldwide, issues and concerns also continuously exist.
Information security. Sensitive information, such as person information, identity and passwords
are often associated with personal property and privacy and may present security concerns if
leaked Unauthorized access and usage of private information may result consequences, such as
identity and property theft.
Common causes of information security breaches include:
1. Phishing. It is a common type of scam, of which scammers disguise as a trustworthy source
in an attempt to obtain private information, such as passwords, credit card. information, etc.
through the use of fake websites that look identical and legitimate.
2. Internet scams. These are schemes that deceive the users in various ways in an attempt to
take advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect and transmit
private information, such as password without the user's consent or knowledge, of which it is
impossible to determine whether a file is infected.
Personal Safety and threats. The growth of the Internet gave rise to many important services
accessible to anyone with a connection, such as digital communication. While it allows
communication with others, it is also being grabbed by malicious user’s bad intent. The
following are common threats to personal safety.
1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or harass an
individual, group or organization through false accusations, defamation, slander and libel,
intentional monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering
information that may be used to threaten, embarrass or harass.
2. Cyberbullying. It is the use of electronic means, such as instant messaging, social media, e-
mail and other forms of online communication with the intent to abuse, intimidate, or overpower
an individual or group.
3. Online predation. It is the act of engaging an underage minor into inappropriate sexual
relationships through the Internet. Online predators may attempt to initiate and seduce minors
into relationships through the use of chat rooms or Internet forums. The behavior characteristics
are categorized into three groups: A) Manipulative - typically a child molester; B) Opportunist -
typically a rapist; and C) Coercive - being a mixture of both rapists and child molesters
4. Obscene/offensive content. Various websites on the Internet contain material that may deem
offensive, distasteful or explicit, which may often not be of the user's liking. Such websites may
include the Internet, shock sites, hate speech or otherwise, and inflammatory content. Such
content may manifest in many ways, such as pop-up ads and unsuspecting links.
5.Sextortion. It is the use of webcams for flirting and cybersex. Often, this• involves a
cybercriminal posing as someone else, such as an attractive person initiating communication of a
sexual nature with the victim. The video is recorded by the cybercriminal to demand money or
other services, threaten to publicly release the video and send to family members and friends of
the victim if they do not comply.
Computer Threats and Fixing solutions
The realm of Information Technology (IT) security professionals and computer security
has become an issue and concern for many people (Honan 2014)
A threat, in the context of computer security, refers to that has the potential to cause
serious harm to a computer is something that may or may not happen, but has the cause serious
damage and can lead to attacks on computer and networks.
Cybercrime is now becoming alarming in the life of individual and the organization as
they intend to steal information they can sell of trade, such as financial details, credit card
information personal details, or any other information using computer networks.
Likewise, while email has been the main method for the of computer viruses, it can also
enter a network by the USB Internet download, visiting an infected website, instant messaging in
social media platforms, file transfer and file-sharing programs, or by remote users connecting
directly to the corporate network with an infected PC. Once a computer virus gets into network,
it can spread from computer to computer in multiple ways.
Given the numerous ways a computer virus can spread, following are ways on how to
ensure that computer networks can protected.
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all
computers, including all servers, Pc and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released
daily and so it is essential that computers are protected by keeping the anti-virus software up-to-
date.
3. Employ a firewall to protect networks. As computer viruses can spread by means other than
email, it is important the unwanted traffic is blocked from entering the network by using a
firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly used by
computer viruses to spread themselves, such as .EXE, .COM and .SCR files. These should be
prevented from entering the network.
5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to never open
an attachment or to click a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files downloaded the Internet are scanned against
computer viruses from central point on the network.
7. Do not run programs of unknown origin. It is important to a trusted source for software
requirements to be installed ensure it can be accounted for.
8. Implement a Vulnerability management system. It is important to regularly review
network and the applications running on it tor new vulnerabilities and a plan on how to
manage them, either by patching or upgrading them using tools, such as firewalls or Intrusion
Detection Systems that should be put in place.
9.Make regular backups of critical data. There is a need to keep important files on removable
media, such as portable drives or tape for back-up in the event that the network is infected
with a computer virus.
10. Develop an Information Security Policy. The creation and publication of an
Information Security Policy is key to ensuring that information security receives the profile it
requires in order to secure the systems and data.
11.Monitor logs and systems. Regular monitoring of network and system logs can assist in
the early identification of a computer virus infecting the network or other attacks by
criminals.
12. Develop an Incident Response Plan. The incident response plan outlines the roles and
responsibilities of people in the event of a computer virus infecting the network or any other
type of security breach.
13. Restrict end-user access to the systems. Where possible, end users are prohibited from
access to the system so that the virus will also be restricted.  

Cyberbullying  
 Cyberbullying, cyber harassment or online bullying is a form of bullying or harassment
using electronic means usually among minors in a school setting and has become
increasingly common, especially among teenagers.  
 It is an aggressive, intentional act or behavior that is carried out by a group or an
individual using electronic forms of contact, repeatedly against a victim who cannot easily
defend him or herself. The National Crime Prevention Council defines it as a process of using
the Internet, cellphones or other devices to send or post texts or images that intend to hurt or
embarrass another person. It may also include public actions, such as repeated threats, sexual
remarks, pejorative labels or defamatory false accusations, ganging up on a victim by making
the person the subject of ridicule in online forums, hacking into or vandalizing sites about a
person, and posting false Statements to discredit the targeted person.  
 Cyberbullying is similar to traditional bullying. It is just that victims may not know
the identity of their bully and the reason for bullying them. Cyberbullies may disclose victim’s
personal data on websites or forums-called doxing, or may use impersonation, and create fake
accounts, comments or sites for the purpose of publishing material in their names. This can
leave the cyberbully anonymous and difficult be caught or apprehended for his/her behavior.  
Cyberbullying types. There are various types of cyberbullying and research has
revealed serious profound consequences on victims. 
1. Internet trolling is a common form of bullying over the Internet in an online community
to elicit a reaction, disruption intentionally provoke and offend others.  
2. Cyberstalking is another form of bullying or harassment uses electronic communication to
stalk a victim and pose credible threat to harass him/her.  
 Implications of bullying in schools. Schools should initiate various anti-bullying
programs and campaigns to protect students from being threatened or victimized by such
offense. More so teachers should be oriented and trained in handling bullying cases and
executing teaching strategies to address and reduce bullying cases in class. Also, schools should
conduct student empowerment activities that can be engaged in by students, including the
bullies to divert their attention and energy into something worthwhile and engagements that they
can be busy about.  
Cybercrime  
 Avast defines cybercrime as any criminal activity carried out computers or the Internet. 
Cybercrime uses tools like phishing, spyware, ransomware and social engineering to break the
law.  
 On the other hand, cybercrime is defined by Techopedia as a crime with the computer as the
object of the crime (i.e., hacking, phishing, spamming) or is used as a tool to commit an offense
(i.e., child pornography, hate crimes). Cybercriminals may use computer technology to access
personal and confidential information or use the Internet for exploitative or
malicious purposes.  
 There is wide variety of cybercrimes, which can broadly be placed into two categories. one off
crimes, such as installing virus that steals your personal data; and ongoing crimes, such
a cyberbullying, extortion, distributing child pornography or organizing terrorist attacks. 
Cybercrime may also be referred to as computer crime practiced by those who have
technological skills and use the Internet to achieve their bad motive. Cybercriminals
employ their diverse skill to acc bank accounts, steal identities, blackmail, defraud, stalk, and
har or use a compromised computer to attack their victims. Criminals also use computers
for communication and document or data storage and those, who perform these illegal activities
are often referred to hackers.
On the other hand, malware downloaded from the computer may slow it down and prompt it to
give error messages. Likewise, phishing attacks usually involve receiving emails from unknown
sources while trying to trick someone into giving up his/her signs, passwords or personal data.
Keyloggers leave their own telltale sign like strange or icons, or duplicating the messages.  
 Techopedia cites common types of cybercrime that include online bank information
theft, identity theft, online predatory crimes, unauthorized computer access, and the most serious
one like that cyberterrorism. can be categorized Cybercrime as: encompasses (1) crimes that
a target wide computer range of networks activities or devices, including viruses and denial-of
service (DOS) attacks; and (2) crimes that use computer networks to advance other
criminal activities, including cyberstalking, phishing and fraud or identity theft.  
Exploring the Internet: Researching and Evaluating the Web
The Internet is a global communication network that allows computers to exchange and share
information worldwide. It makes possible for people around the world to connect and share
ideas across time zones and geographic locations. However, because cyberspace is such a large
realm, sometimes it is difficult to find the needed information. So, the most effective way to
explore the Internet is to have strategies in place for doing research on the Web and for
evaluating the websites. 
Commonly, this is important among schools in doing researches and other related works. 
Therefore, this aspect needs to be explored by teachers and students in doing their works.
Surfing the Web. The following are the three key factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the subject into a search
engine.
2. Good strategies for searching the Web include writing research questions; extracting keywords
from the questions and typing them into a search engine using synonyms if the keywords do
not bring up desired results; keeping track of keywords and synonyms used; and recording
the results of search.
3. Always be cautious about the information shared online and in visiting websites.

Assessing credibility. Different websites accessible on the Web can make the job of researchers
very challenging. Carefully evaluate the information searched online. Consider the credibility, or
trustworthiness and reliability of the content before taking it. There are two types of websites:
informational and commercial. Informational Websites usually strive to Offer credible content to
users, while commercial websites present inaccurate information in order to something,

Checklist of credibility criteria. The first step in evaluating credibility of websites is to review
several important aspects of the site
1. Author. Check the credentials of the author, the company expert and determine
the qualifications to provide the subject being researched. Some websites do not lists authors,
but the credibility of a company can be explored by reviewing the site's "About” page if
available.
2. Date. Look for copyright information at the bottom of a website. home page. If the site is
more than a few years old and it has been updated regularly, look for more up-to-date
information
3. Purpose. Analyze the goals of the website to determine an informational or an advertisement
site. 
4. Contact. Most credible websites list down contact information such as telephone number,
email address, or mailing so that users may get in touch if they have questions.
5. Fact vs. Opinion. When doing research for a school paper go to sites that present factual
information provided by experts rather than opinions. Be on the lookout for biases, too. author is
biased, so as the information on the site.
6. URL. The URL may look like ending in .edu (for education), .gov (for government), .org (for
organization). .com (for commercial sites), or .net (for network sites).  Different websites have
different URLs. To help determine a site's credibility, determine if that is a personal website or
blog, a government website, other types of website.

Common credible URLS. One way of determining the credibility of a website is through the
URLS. Although a website's URL gives clues as to credibility, there is still a need to evaluate it
carefully.
1.When encountering a URL, look at the letters that appear alter the "dot" and that is called top-
level domain. Thus, the URL's top-level domain helps in determining a site's credibility.

2.Websites ending in .gov are government-related websites which generally, can be trusted to
provide credible statistics information, articles on many different topics and government news.

3.Websites ending in .edu are the websites of educational institutions, such as colleges and
universities that offer a variety of credible data, especially about the operations and research.
Since students may create webs* with an .edu top-level domain, but they may contain inaccurate
or biased information.
4.Websites ending in .org are the websites of organizations. While many organizations,
especially nonprofit ones, provide credible information, they may sometimes have advertising
intent, Since some organizations show bias in their provided information, so evaluate .org sites
carefully.
Recognition Of information sources. Similar to the information in print sources, the use of
online sources must be given credit to the This can be done by applying proper referencing and
citation PCOC0dUfes that would get rid of risks, consequences and legal implications because of
the copyright issue, which means that the ideas and words used belong to the author.

Citation. Each entry in the bibliography is called a citation. Proper citation must be applied or
included for every source used, whether it is a website, a newspaper, or a book. Online sources
are cited differently because they are different from traditional print sources. There are different
formats used to cite the sources.

Author/Source > Year > Article >Website >URL >Retrieval Date

Data privacy implication. The implementation of data privacy in the country is becoming
stronger and powerful, especially in utilizing data for research and other forms of report and
paper works. This has also corresponding legal implications once not processed immediately and
properly. It involves uploading of pictures, designs, graphics, Concepts/ideas, frameworks, art
work, data, and other information that are Copyrighted without the consent of the author or the
source. These are commonly observed in schools.
The following are practical techniques in responding to data Privacy issues.
1. When getting data, put proper citation and source acknowledgment (e.g. Source: National
Statistics Office, 2019).
2. When using needed pictures downloaded from the Internet, put acknowledgment (e.g. Photo
credits to PhilPost, 2019). But if possible to have personal pictures taken with your original
concept. Although, there is still a need to seek consent of those in the pictures. 
3. If data, concepts and information are copyrighted, ask for consent of the author, and wait
for his/her response.
4. However, if the data and information are for public just acknowledging/citing the author or
the source will do.
5. If the author doesn't really want anyone to utilize his/her file or article, learn the value
of respect, anyway that is her property. The author's disapproval usually manifest through
difficulty in downloading the file, some tricky signs that appear on screen, or direct statement or
notice disapproval contained in the file.  
Research and data collection protocols. When researching and collecting data from the
Web, avoid plagiarism, which is the act of taking someone else's work and presenting it as
your own.  
Plagiarism is unethical, and it can bring you in trouble Sometimes, students don't mean to
plagiarize, but they end up doing the accidentally because they are unaware or unclear about
it.  
The following are 10 types of plagiarism that teachers’ researchers and students should know.  
1. Clone Plagiarism. It is also called identical copying or copying another work (word-for
word) without any change and claim as his/her own work.  
2. Remix Plagiarism. It refers to collecting information from various sources and mixing
all together as a single document then, claiming the work as their own work. 
3. Ctrl+C Plagiarism. This is when a significant portion of ten copied from any single source
without any alteration in a written document.  
4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and arranged as a new
document without citation.  
5. Find-Replace Plagiarism. This is changing the most common keywords and phrases in the
copied content but not making any changes in the essential document.
6. Recycle Plagiarism. Also called self-plagiarism, it refers to the act of borrowing from one's
own previous document without proper citation. 
7. Mashup Plagiarism. It is when the written document is copied from more than one
source and all are mixed together without proper citation.  
8. 404 Error Plagiarism. Here, a person creates a document copying from various sources
prepared as a single document with the citation but inaccurate or leads to non-
existing resources.
9. Aggregator Plagiarism. Here, the written document includes proper citation but it does
not contain original work.  
10. Re-Tweet Plagiarism, Here, all written documents look perfect with properly cited mark
but still, the document resembles somewhere the original text's structure or wordings.  
Tips to Avoid Plagiarism  
Turnitin.com suggests some techniques to avoid plagiarism that teachers, researchers and
students should know.  
1. Read and understand the original document several times before start explaining about it.
2. Do not copy any word or sentence from the original document. 
3. Give proper citation to all sources. (book, journal, website,  
4. In case of citing online sources, include the retrieval date and appropriate URL in
the reference.  
5. Common phrases and definitions need to be quoted and cited without any modification. 
6. Make a practice to include the "references" section whenever you write an academic
document.  
7. Cross verify all your citations before submitting your document
8. Resort to available plagiarism software to ensure the originality of the written document.  

How to Evaluate a Website  


Morris (2018) suggests ways oh evaluating a website as reference in research.  
1. Open the site. When looking through Google search results, open sites in new tabs,
leave search results in a tab for easy access later (e.g. right-click on the title and click "Open
link in new tab").  
2. Skim read. Determine whether you can read and understand the text. If it is
too complicated or difficult to understand, find another website that may provide
the information you need.  
3. Look for the answer to your question. Find out if the information on the site
actually answers your question. You can use a search box, navigation menu, or pull up your
own search box by pressing Control/Command F and type in the keywords you are
searching for.  
4. Consider the credibility of the author or website. You need to consider the credibility of
the author — domains or website that by considering the following: (1) Domain include .gov
or .edu are trustworthy sources; (2) Author's information ----- look at the author's bio or About
page regarding the qualification of the author; (3) Design avoid site that are cluttered and
difficult to navigate; and (4) Sources trustworthy articles usually link to other sources or cite
their facts come from.  
5. Consider the purpose of the site. Think about the purpose the site and whether it meets
your needs. 
6. Look for the date. Consider whether the information is enough for your topic. You can
look for the date when the article was written or last updated. Sometimes, URLs include
dates.  
Integrating Digital/Cyber Literacy into the Curriculum 
The following are suggested activities to integrate digital literacy higher-order thinking
and construction of meaning in the classroom  
1. Use an interactive whiteboard to design and deliver lessons. Use Promethean and
Smart Notebook with teacher-created lessons if you are not yet capable of designing your
own. 2. Allow students to maintain blogs, wikis, web pages related to their learning. 3.
Engage in email video chat exchanges with students.  
4. Utilize storytelling media to allow students to publish stories. 
5. Set-up a blog site, Facebook page, Yahoo or group and post weekly discussion questions for
students to respond.  
6. Use video cameras to dramatize stories, record scientific experiments and expose students to
video editing software to create video production of learning.  
7. Engage students in discussions about how and why various media work well to
showcase learning and why others do not.  
8. Thinking critically about the medium use to present a message is as important as
the message itself.  
9. Require E-Portfolio that would compile their outputs' projects, messages and photo
documents of group activities and investigations online.  
10. Allow students to use digital tools, such as mobile phones iPad and netbooks for Google
search, dictionary APPS' YouTube, Podcast and Spotify applications in class
complement their learning, especially during group work! and concept reporting.
Impact Of integrating digital literacy in the classroom on teachers, families and friends.
Integrating digital literacy in the classroom can bring a positive impact on students' learning as
evidenced by the following:  
1. It motivates students in their learning due to their enjoyment and ease of use with
various technological mediums. 
2. It reaches students of various learning styles and multiple  
3. It allows students to create and design their own unique products reflective of
their personalities and learning needs/ styles. 
4. It encourages students to manipulate media in constructing their own meaning.
5. It enables students to share their learning with teachers, families and friends.
6. It gives students the chance to explore technological media that inevitably increase the job
skills needed in the workforce.  
Life and Values Integration 

 Share a personal experience wherein you encountered digital risk and lessons and values
consequence. What life lessons and values have you realized and learned?  
QUESTIONS FOR DISCUSSION 
1. How do you define cyber/digital literacy and cybersecurity?  
2. What do you mean by cyber citizenship? Elaborate.  
3. What are netiquette and the process of safety use of digital media? Give examples.
4. What are the common computer threats and how can these be fixed? 
5. What is meant by cyberbullying and cybercrimes? Discuss. 
6. How can you practice the processes of Internet exploration, source citation, research
and data-gathering protocols and website evaluation?  
7. How can cyber/digital literacy be integrated in the teaching. learning process? 

RESEARCH ANALYSIS AND IMPLICATION 


Direction: Analyze the following research abstract and cite implication on teaching-learning.
You may download the paper of this research on the website given below  
Teachers' beliefs about integrating digital literacy into classroom practice:
An investigation based on the Theory of Planned Behavior  
Sadaf and Johnson (2017)  

Abstract  
This study explored teachers' behavioral, normative, and control beliefs related to digital literacy
integration into their Classrooms. Ajzen's Theory of Planned Behavior (TPB) was used as a
theoretical framework to collect and analyze data. Findings revealed that teachers' integration
of  digital literacy were related to their behavioral beliefs (attitude towards outcomes of a
behavior)  about the value of digital literacy for developing students' 21' century skills, increasing
student  engagement, and preparation for future careers; normative beliefs (social support)
about  meeting the expectations of administrators, parents, colleagues, and students; and
control  beliefs (perceived behavioral control) about ease of integrating digital literacy due to
access to  technology, professional development, and curriculum resources.  
Analysis: How do teachers perceive digital literacy integration into their classrooms,
according to the study?
__________________________________________________________________________
__________________________________________________________________________
_____________________________________________________________________ 
Implication: How does the result of the study impact the students' learning and the
development of 21st century skills?
____________________________________________________________________________
____________________________________________________________________________
_______________________________________________________________________

SYNTHESIS AND LEARNING REFLECTION


DIGITAL/CYBER LITERACY
 Digital literacy is the set of competencies on the effective use of digital devices for
purposes of communication, expression, collaboration and advocacy while cybersecurity
is the practice of protecting system networks and program from digital attacks.
 Cyber citizenship refers to being responsible when exploring the Internet, including the
right manner and etiquette in using the web.
 Internet safety is preventing from online security risk to private information and property
and protecting self from computer threats and cybercrimes.
 Cyberbullying is a form bullying or harassment using electronic means that is punishable
by law while cybercrime is any criminal activity carried out using the computer or
internet.
 A computer threats refers to anything that has the potential to cause serious harm and
damage to a computer system, that must be fixed immediately and effectively with
solutions.
 In order to avoid digital risks and consequences, proper Internet explorations, source
citation, data privacy imposition, research and data gathering protocols and website
evaluation are imperative.
 As digital literacy impacts teaching – learning process. Its wide dissemination in schools
and integration in the classroom is timely, relevant and necessary.
CURRICULUM APPLICATION 
Direction: Produce and evaluate a digital tool that can be utilized in the classroom.
PROJECT PLAN

Digital Tool:

Brief Description:

Purpose:

Topic:

Subject:

Materials:

Estimated Cost:

PROCEDURES

OUTPUT 

(Paste a picture of created digital tool here.) 


PREPARED BY: ______________________________

COURSE/SECTION: __________________________

LET SAMPLERS: TAKING THE EXAMINATION  


Direction: Read and analyze each item carefully. Choose the letter of the best answer.  
1. If you plan to produce a digital tool as a learning material, which of the following aspects will
you consider first?  
A. Validity, relevance and appropriateness  
B. Quality, efficiency and technicality  
C. Economic value, durability and long-term usability  
D. User-friendliness, convenience, accessibility and visual impact 

2. To avoid risks and consequences brought about by technology in the use of social
media, which ethical principle is the most important and which encompasses other principles
A. Choose the social media account that you will keep.  
B. Be careful in responding to the messages while threading to an issue.  
C. Think before you click.  
D. Select the best type of social media to be utilized.  

3. Which of the following instructional strategies can be used effectively in presenting


lessons on cyberbullying and cybercrime?  
A. Discuss the provisions of the law and administer a short quiz after.  
B. Research on how the law was amended and how it would impact both the victim's and
the culprit's lives.  
C. Analyze related cases guided by legal provisions to be presented in class using jury
trial technique.  
D. Report to class the status of cybercrime in the country taken from Internet source.  

4. When you receive a suspicious e-mail asking you to withdraw big amount from
a prestigious bank upon winning the grand prize in an automated raffle draw, which
you know you have not participated in, what would be your first and immediate move? 
A. Ignore the email, do not open and delete it right away.  
B. Take the e-mail and verify it to the concerned bank and relevant agencies.  C.
Contact the owner of the e-mail and ask him to discuss with you the content of the
message.  
D. Take the e-mail and transact immediately the given message, there's no harm in trying,
anyway

5. When researching data from the Internet, which of the following reminders should be
taken into account to avoid com plications risks and negative consequences?  
l. Choose creditable and reputable sources of data that you need.  
ll. Apply proper citation of the source/reference.  
Ill. Rephrase statements while retaining its original concept and meaning IV. Include
pictures and graphics to be downloaded, copied and pasted in the report.
A. I and Il only C. l, Il and Il l  
B. l, Il and IV D. l, II, Ill an IV

You might also like