Worksheet 1: DIGITAL LITERACY For Pupils
Worksheet 1: DIGITAL LITERACY For Pupils
Dev eloping c it izens – Paths to core compet enc ies t hrough a problem-based learning proj ect in civ ic educ at ion
510806-LLP-1-2010-1-DE-COMENIUS-CMP 2010 - 4193 / 001 - 001
1
This project has been funded with support from the European Commission. This communication/publication reflects the views only of the author, and the
Commission cannot be held responsible for any use which may be made of the information contained therein.
VOICE. Dev eloping c it izens – Paths to core compet enc ies t hrough a problem-based learning proj ect in civ ic educ at ion
510806-LLP-1-2010-1-DE-COMENIUS-CMP 2010 - 4193 / 001 - 001
Cyberbullying can assume many faces – exclusion, Do you know? More than a million people a day visit
outing, harassment, damage reputation etc. What steps the Wikipedia site. It has approx. 3,687,299 articles (source:
would you advise to the following targets of cyberbullying? Wikipedia, July 2011). Wiki is a word which means „quick“ in
Discuss with your classmates.(source:http:csriu.org) the language of Hawai.
- Greg was changing in the locker room. Matt took a
picture of him with his cell phone camera. Within seconds, False or true? Evaluate the quality of Internet
the picture was flying around phones at school. based data
- Millie tries hard to fit in with a group of girls at school. Check the information before quoting, processing
She recently got on the“outs” with a leader in this group.
Now Millie has been blocked from the friendship links of all
and forwarding it!
the girls.
● AUTHOR: Who wrote the article and was the author
Webtips for you an expert on the topic (you could use:
Cartoons / game: www.whois.net)? Which institution and which interests
→ Under surveillance (cartoon for youth dealing with are behind the internet source (e.g. commercial
Internet safety, by League of Human Rights, interests, political positions and ideologies)?
France): ● CONTENT: Which genre and which category of text
www.edri.org/comic-book/en/Under-surveillance- is the document (journalism, academic paper, blog,
comic-book.html polemic)? Where does the information come from and
→ Through the Wild Web Woods: A game by the what evidence is used? What is the purpose of the
Council of Europe which aims to get people to know site? When was the site created, updated, or last
and respect Children´s rights. Available in 25 worked on? Are there citations in the piece? Links to
other websites? What is not being discussed? Who is
languages!
the audience for this information?
www.wildwebwoods.org/popup_langSelection.php#
● PURPOSE: Is the information useful for my specific
purpose?
Other useful resources:
→ Glossary of Internet terms (English): Compare information
www.scoilnet.ie/pdf_webwise/10_glossary.pdf If you search information, check at least 3 different
→ Center for Safe and Responsible Internet (USA, Websites and compare the content you find on them.
Oregon). Student guide to Cyberbullying, Download: This is important, because anyone can create and
http://csriu.org/cyberbully/docs/cbstudentguide.pdf publish information on the net. You can save a page
by clicking on the Favourites menu on the top toolbar
and adding the page to the favourites.
Try out: Which tracks do you or people you know
leave in the Internet? Browse names by means of different Quotation rules
searching engines (Yahoo, Google, Altavista). What are You may use quotes from other authors (e.g. for your
the results? Are the results the same when browsing with presentation), but you should refer to the sources. Add
different search engines? all available data, so that the reader can find the
original.
2. Access, critically analyse and process online • Name of author and/or institution
information • Year of publication
• Title and number of pages
What is YOUR way of searching, collecting and
• Type of source (internet source or book)
processing information in the World Wide Web, if
Quotation from Internet: Indicate the complete
you do some work for school?
Internet address (URL) and data of last online entry (in
brackets). Theses quotation rules also apply for
„If there is text on a screen, returned through the first
photos, films, audio contributions, games etc. –
ten Google hits, then it must be correct and
whether you work on something for school or create
relevant“. Do you agree or disagree with this quote?
your contributions for blogs, Wikis and Internet
Are you more tending towards the „copy-paste-style”
platforms.
or do you thoroughly verify sources?
Google, Blogs and Wikis are easily accessible and Laws on intellectual property
helpful tools to approach a subject, but on the other Do you want to publish data from other authors (e.g.
hand they demand capacities to sift, discard and music, fotos, films, texts) for your blog or the school
judge information: what is trash, what is relevant, newspaper? Ask the author for his/her permission to
what is polemic, what is popular, what is quality and do so, otherwise the author could file for injunctive
reflects diverse views to construct an argument, relief in the worst case.
which ones are reliable sources? The Charter of Fundamental Rights of the European
Union protects privacy and personal data.
www.europarl.europa.eu/charter/pdf/text_en.pdf
2
This project has been funded with support from the European Commission. This communication/publication reflects the views only of the author, and the
Commission cannot be held responsible for any use which may be made of the information contained therein.
VOICE. Dev eloping c it izens – Paths to core compet enc ies t hrough a problem-based learning proj ect in civ ic educ at ion
510806-LLP-1-2010-1-DE-COMENIUS-CMP 2010 - 4193 / 001 - 001
Modern technologies like computer, internet or handys are central elements in everyday life of children and youth.
Young people grow up with new social environments and they easily access at a mouse-click a virtual space that
has a remarkable influence on their social relationships and the ways of communicating. As a matter of fact, digital
literacy does not only mean for teachers to add some more literacy tools to the literacy toolbox of learners, but ,in
addition, also to explore new ways of teaching and learning strategies.
As to which skills should youth acquire in order to be able to orient themselves in democratic societies? Some
central points related to digital literacy and Education for Democratic Citizenship in schools:
□ LITERACY AND CRITICAL/ANALYTICAL SKILLS OF LEARNERS: Many young people believe most of what
they look up online. Active citizenship in the light of digital literacy in school context basically means promoting
critical and analytical skills of learners.
□ SAFETY: It has become important to consider issues of child protection. Anonymous, instant and far reaching
communication capabilities of the Internet have brought new dimensions to child protection issues such as
Cyberbullying, group-related and/or racist attacks or even suicide and sexual exploitation.
Other topics related to internet safety: Data protection, privacy and laws on intellectual property.
□ LEARNING STRATEGIES: Enhance your own professional skills as a teacher and explore tools of Internet and
Web 2.0 for teaching. There is a multicoloured variety of options for educators.
Some suggestions how you and your class could use Internet and Web 2.0:
• Make use of expert online communities when dealing with a particular subject.
• Generate a WebQuest, e.g. via 1.2.3. TU WebQuest (http://questgarden.com.author/overview.php)
or the free Internet tool aula21.net (http://www.aula21.net/Wqfacil/intro.html) in various languages
• Use a Wiki to collaboratively present the results of class work (free Wikis for teachers:
www.wikispaces.com/content/for/teachers)
• Collect links by means of Social Bookmarking
• Documentation of research in a Weblog (Weblogs for teachers: http://edublogs.org)
• Make videos/audios available for your students (platforms for photos, videos etc.)
------------------------------------------------------------------------
ACTIVITIES FOR CLASSROOM
2. After 15 minutes the text is electronically forwarded to the members of one of the other groups.
The latter (group 2) completes each paragraph with the respective Internet sources by applying
appropriate quoting techniques. At the end of the activity, group 2 receives the list of all links
which have been used by group 1. Step 2 can also be done as a homework.
1
Source of activity (adapted): www.saferinterrnet.at, Resource Erst denken, dann klicken/Think before you click. Web 2.0 -
Das Mitmach-Internet sicher und verantwortungsvoll nutzen. ÖIAT, 2008 (Austria)
3
This project has been funded with support from the European Commission. This communication/publication reflects the views only of the author, and the
Commission cannot be held responsible for any use which may be made of the information contained therein.
VOICE. Dev eloping c it izens – Paths to core compet enc ies t hrough a problem-based learning proj ect in civ ic educ at ion
510806-LLP-1-2010-1-DE-COMENIUS-CMP 2010 - 4193 / 001 - 001
Cyberbullying/Cybermobbing
Mobile phone and internet use have become common for youth, so has also the misuse of this technology. There is
evidence that Cyberbulling/Cybermobbing is increasingly widespread in schools nowadays and that it has become a
feature of many young people´s lives. Cyberbullying is the use of ICT, particularly mobile phones and the internet,
deliberately to upset someone else. It may consist of threats, harassment, embarrassment, humiliation, defamation
or impersonation. Cyberbullying may take the form of general insults, or prejudice-based bullying, for example
homophobic, sexist, racist or other forms of discrimination (quote from the website of Childnet International,
Download for school staff: http://old.digizen.org/downloads/cyberbullying_teachers.pdf).
Tip for activity in classroom:
► Let´s fight together! A film about cyberbullying. What we can ALL do to prevent cyberbullying (awarded
short-film by www.digizen.org, Childnet International, 2007/UK, English language. A version with German subtitles
is available on the Website). Including teacher´s guide and lesson plans.
2. The situation at the beginning: All role-players come together for clearing conversation to
seek a way out of the situation of Cybermobbing. First, the actors consult with their coaches
and reflect collaboratively how the respective person could act in his/her role. Then the role-
play starts (duration: 10 minutes approx.)
3. Sharing results and feedback: how did the actors feel in their roles, how do the students
evaluate the solution that has been found in the role-play (on a scale between 1 - 10).
Discussion or results and further ideas for alternative solutions.
Source of the activity www.saferinterrnet.at, resource Erst denken, dann klicken/Think before you click. Aktiv
gegen Cyber-Mobbing. Vorbeugen – Erkennen – Handeln, ÖIAT, 2009 (Austria)