At The of The Lesson, The Students Are Able To
At The of The Lesson, The Students Are Able To
Learning Outcomes
What do I know?
INTERACTIVE PRESENTATION:
Dilemmatters Jury Trial: This activity is intended for students to analyze dilemmas; the points
of view are supported by provisions, theories and -frameworks. It enhances critical thinking,
analysis, objectivity, communication skills, collaboration and unity.
Instructions: Try to analyze and solve the given dilemma. You can search in the internet of what
case can be filed against the person who committed the issue/crime.
CONCEPT EXPLORATION:
Technology has been part of everyone’s life, be it at home, in school, or anywhere with
every facet of our undertaking. However, in many instances, we may not be aware that we have
been misusing or abusing it or in another way around, we may find ourselves being used by
other people with their malicious motives using digital tools. Therefore, we may end up being
liable or a victim of such irresponsible kind of technological processing and utilization. It is in this
case that we must gain further understanding and application of digital/cyber literacy, be it on
personal or professional merit.
Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full
participation in society that includes knowledge, skills, and behaviors involving the effective use
of digital devices for purposes of communication, expression, collaboration and advocacy.
Simply, it is the ability of an individual-to engage with the digital environment and operate
technologies safely by knowing what to do and what not to do and how to avoid unnecessary
risks.
Digital literacy is an individual's ability to access both information and methods of
communication through technological tools, such as smartphones, tablets, laptops and desktop
PCs. While digital literacy is initially focused on digital skills and stand-alone computers, its
focus has shifted to network devices, including the Internet and the use of social media.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks (CiscO, n.d.). These cyberattacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or interrupting normal business
processes.
Implementing effective cybersecurity measures is challenging because there are more
devices than People, and attackers are becoming more innovative. Here are same tips on how
to protect yourself against cyber threats.
1. Monitor behavior on social networks. Before posting or uploading something online, try to
realize: (a) Does this need to be public? and (b) Is it worth the risk? Remember, not only what
we share online is available to friends and family, but also to cybercriminals.
2. Keep devices safe. Protect your technology tools by installing Anti-virus software, a
configuration of settings on the devices and by completing software updates.
3. Understand how best to use passwords. Passwords need to be complex and hard to guess,
but can still be remembered. One Strategy is “passphrase” or a password that comes from the
first letter of each word in the phrase. There is also a password manager app to help keep track
of all the passwords called “KeePass” which is free of charge. Importantly, do not use the same
password for all accounts.
4. Handle unsafe content. Know exactly how to respond or react to unsafe situations online,
such as (1) suspicious emails; (2) pop-ups claiming that your computer is infected; and (3)
BitTorrent sites.
5. Consider safety for the future. Take individual responsibility in using devices with an utmost
care and critical thinking when online (https:/www.esentire.com).
Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the Internet. Cyber
citizenship refers to being responsible when using the Internet. Doing online when no one is
looking speaks a lot about one’s character and morals. The power of this digital world |s
associated with responsibilities and consequences. Therefore, we can explore and navigate all
information available online however, we should observe cyber citizenship or manners and
etiquette on the Web.
Ways on How to be a Good Cyber Citizen
The enlisted ways of becoming a. good cyber citizen would guide everyone on his/her
digital operations and information processing and would prevent anyone from further
consequences, distractions, moral damages and risks.
1. Be careful and critical for whatever you post online that could be visible to the public even if
on a “private” page through tagging by a friend.
2. If you have a problem with someone, go to that person or an adult to help work it out, instead
of posting your expression online.
3. Use the Internet to help you with your schoolwork but give credit to the sources you use and
critically analyze everything you search online.
4. Use the Internet purposefully to learn more about anything you are interested in, to help you
research relevant and needed data or information and to stay connected with friends throughout
the world.
5. Make sure you verify an information before you share it or use it in a project and check on
accuracy and truth in the information you search on the web.
6. Give out certain information only.
7. Don't answer questions that make you uncomfortable.
8. Always make sure you have to hold a reliable adult if you decide to meet someone you knew
through the Internet.
9. Always be aware of copyright laws and give credit to whom an article or a part of it is due.
10. Use only the computers that you are allowed to use. Avoid hacking.
Importance of Cyber Citizenship
1. It Keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.
4. More criminals or bullies can be caught when kids are honest and talk to adults.
5. It Keeps information private.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when sending
messages online.
1. Make sure you have the correct address (with proper spelling), correct link and you are
sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false statements and
information on the web or forwarding junk mail or chain letters to family or friends.
3. Re-read what you wrote to make sure it is what you want to say and the other person would
interpret it the same way.
4. Keep your comments clean and don’t confront others online or say anything that could be
hurtful to them.
5. Keep your personal and friends’ information private and don’t forward information that was
just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something’ personal or private, think twice because messages can
get misdelivered.
8. Adults should monitor kids’ messages, especially when they are sending e-mails to others
without permission.
The Ten Commandments of Teacher Cyber Citizenship
At some point, misuse and: abuse of technology may also happen in schools involving
teachers with their students, colleagues and others. The following are reminders to teachers
regarding the use of media tools.
1. Thou shall not post any personal matter, confidential, information and obscene pictures and
messages online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students online other.
than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references without the author’s
citation.
6. Thou shall not post to any social media account, for whatever purposes, the pictures of
students without their or their parents’ consent.
7. Thou shall not express sentiments, disappointments and disagreements against superiors,
colleagues, students and their parents using their social media accounts.
8. Thou shall not use data from Internet sources in any documents like lesson plans, researches
and requirements without the consent of the author.
9. Thou shall not give any personal data or other’s information to anyone unless for specific
purposes and given the consent.
10. Thou shall not post any student data publicly online including academic rankings, school
records, class outputs and record of grades. De Leon (2019).
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the Internet. It is
maximizing the user’s personal safety and security risks to private information and property
associated with using the Internet, including self-protection from computer crime. As the number
of Internet users continues to grow worldwide, issues and concerns also continuously exist.
Information security. Sensitive information, such as personal information, identity and
passwords are often associated with personal property and privacy and may present security
concerns if leaked. Unauthorized access and usage of private information may result in
consequences, such as identity and property theft.
Common causes of information security breaches include:
1. Phishing. It is a common type of scam, of which the scammers disguise as a trustworthy
source in an attempt to - obtain private a“ such as passwords, credit card information, etc.
through the use of fake websites that look identical and legitimate.
2. Internet scams. These are schemes that deceive the users in various ways in an attempt to
take advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect and transmit
private information, such as password without the user's consent or knowledge, of which it is
impossible to determine whether a file is infected.
Personal safety and threats. The growth of the Internet gave rise to many important services
accessible to anyone with a connection, such as digital communication. While it allows
communication with others, it is also being grabbed by malicious users for bad intent. The
following are common threats to personal safety.
1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or harass an
individual, group or organization through false accusations, defamation, slander and _ libel,
intentional monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering
information that may be used to threaten, embarrass or harass.
2. Cyberbullying. It is the use of electronic means, such as instant messaging, social media, e-
mail and other forms of online communication with the intent to abuse, intimidate, or overpower
an individual or group.
3. Online predation. It is the act of engaging an underage minor into inappropriate sexual
relationships through the Internet. Online predators may attempt to initiate and seduce minors
into relationships through the use of chat rooms or Internet forums. The behavior characteristics
are categorized into three groups: A) Manipulative - typically a child molester; B) Opportunist -
typically a rapist; and C) Coercive - being a mixture of both rapists and child molesters.
4. Obscene/offensive content. Various websites on the Internet contain material that may
deem offensive, distasteful or explicit, which may often not be of the user's liking. Such websites
may include the Internet, shock sites, hate speech or otherwise, and inflammatory content. Such
content may manifest in many ways, such as pop-up ads and UNSuspecting links.
5. Sextortion. It is the use of webcams for flirting and cybersex. Often, this involves a
cybercrimnal posing as someone else, such as an attractive person 'itiating communication of a
sexual nature with the victim. The video is recorded by the cybercriminal to demand money ©F
other services, threaten to publicly release the video and 36nd to family members and friends of
the victim if they do N°' Comply, — (nttps./en.wikipedia.org/ wiki/Intemet_safety)
Computer Threats and Fixing Solutions
The realm of Information Technology (IT) security professionals and computer security
has become an issue and concern for many wove (Honan, 2014).
A threat, in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system. It is something that may or may not happen, but has
the potential to cause serious damage and can lead to attacks on computer systems and
networks (https://www.techopedia.com).
Cybercrime is now becoming alarming in the life of every individual and the organization
as they intend to steal information that they can sell or trade, such as financial details, credit
card information, personal details, or any other information using computer networks.
Likewise, while email has been the main method for the spread of computer viruses, it
can also enter a network by the USB device, Internet download, visiting an infected website,
instant messaging or messaging in social media platforms, file transfer and_ file-sharing
programs, or by remote users connecting directly to the corporate network with an infected PC.
Once a computer ‘virus gets into a network, it can spread from computer to computer in multiple
ways.
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all
computers, including all servers, PCs and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released
daily and so it is essential that computers are protected by keeping the anti-virus software-
uptdate.
3. Employ a firewall to protect networks. As computer viruses can spread by means other than
email, it is important that unwanted traffic is blocked from entering the network by using a
firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly used by
computer viruses to spread themselves, such as .EXE, .COM and .SCR files. These should be
prevented from entering the network.
5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to never
open an attachment or to click on a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files downloaded from the Internet are scanned
against computer viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted source for software
requirements to be installed and ensure it can be accounted for.
8. Implement a vulnerability management system. It is important - to regularly review network
and the applications running on it for new vulnerabilities and a plan on how to manage them,
either by patching or upgrading them using tools, such as firewalls or Intrusion Detection
Systems that should be put in place.
9. Make regular backups of critical data. There is a need to keep important files on removable
media, such as portable drives or tape for back-up in the event that the network is infected with
a computer virus.
10. Develop an Information Security Policy. The creation and publication of an Information
Security Policy is key to ensuring that information security receives the profile it requires in order
to secure the systems and data.
11. Monitor logs and systems. Regular monitoring of network and system logs can assist in the
early identification of a computer virus infecting the network or other attacks by criminals.
12. Develop an Incident Response Plan. The incident response plan outlines the roles and
responsibilities of people in the event of a computer virus infecting the network or any other type
of security breach.
13. Restrict end-user access to the systems. Where possible, end users are prohibited from
access to the system so that the virus will also be restricted.
Cyberbullying
Cyberbullying, cyberharassment or online bullying is a form of bullying or harassment using
electronic means usually among minors in a school setting and has become increasingly
common, especially among teenagers.
It is an aggressive, intentional act or behavior that IS carried out by a group or an
individual using electronic forms of contact, repeatedly against a victim who cannot easily
defend him or herself. The National Crime Prevention Council defines it as a process of using
the Internet, cell phones or other devices to send or post texts or images that intend to hurt or
embarrass another person. It may also include public actions, such as repeated threats, sexual
remarks, pejorative labels or defamatory false accusations, ganging up on a victim by making
the person the subject of ridicule in online forums, hacking into or vandalizing sites about a
person, and posting false statements to discredit the targeted person.
Cyberbullying is similar to traditional bullying, It is just that victims may not know the
identity of their bully and the reason for bullying them. Cyberbullies may disclose victims’
personal data on websites or forums—called doxing, or may use impersonation, and create fake
accounts; comments or sites for the purpose of publishing material in their names. This can
leave the cyberbully anonymous and difficult to be caught or apprehended for his/her behavior.
Cyberbullying types. There are various types of cyberbullying and research has
revealed serious profound consequences on victims.
1. Internet trolling is a common form of bullying over the Interne in an online community to elicit
a reaction, disruption o, intentionally provoke and offend others.
2. Cyberstalking is another form of bullying or harassment that uses electronic communication
to stalk a victim and pose g credible threat to harass him/her.
Implications of bullying in schools. Schools should initiate various anti-bullying
programs and campaigns to protect students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in handling bullying cases and
executing teaching strategies to address and reduce bullying cases in: class. Also, schools
should conduct student empowerment activities that can be engaged in by students, including
the bullies to divert their attention and energy into something worthwhile and engagements that
they can be busy about.
Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers or the
Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and social
engineering to break the law (https:// www.avast.com/c-cybercrime).
On the other hand, cybercrime is defined by Techopedia as a crime with the computer as
the object of the crime (i.e. hacking, phishing, spamming) or is used as a tool to commit an
offense (i.e. child pornography, hate crimes). Cybercriminals may use computer technology to
access personal and confidential information or use the Internet for exploitative or malicious
purposes.
There is a wide variety of cybercrimes, which can broadly be placed into two categories:
one-off crimes, such as _ installing a virus that steals your personal data; and ongoing crimes,
such as cyberbullying, extortion, distributing child pornography or organizing terrorist attacks
(https://www.avast.com/c-cybercrime).
Cybercrime may also be referred to as computer crime practiced by those who have
technological skills and use the Internet to achieve their bad motive. Cybercriminals employ
their diverse skill to access bank accounts, steal identities, blackmail, defraud, stalk, and harass
or use a compromised computer to attack their victims. Criminals can also use computers for
communication and document or data storage and those, who perform these illegal activities,
are often referred to aS hackers.
On the other hand, malware downloaded from the computer may slow it down and
prompt it to give error messages. Likewise, phishing attacks usually involve receiving emails
from unknown sources while trying to trick someone into giving up his/her passwords or
personal data. Keyloggers leave their own telltale signs, like strange icons, or duplicating the
messages.
Techopedia cites common types of cybercrime that include online bank information theft,
identity theft, online predatory crimes, unauthorized computer access, and the most serious one
like cyberterrorism. Cybercrime encompasses a wide range of activities that can be categorized
as: (1) crimes that target computer networks or devices, including viruses and denial-of-service
(DoS) attacks; and (2) crimes that use computer networks to advance other criminal activities,
including cyberstalking, phishing and fraud or identity theft.
(https://www.techopedia.com/definition/2387/cybercrime)
Research and data collection protocols. When researching and collecting data from
the Web, avoid plagiarism, which is the act of taking someone else’s work and presenting it as
your own (Turnitin, com).
Plagiarism is unethical, and it can bring you in trouble. Sometimes, students don’t mean
to plagiarize, but they end up doing it accidentally because they are unaware or unclear about it.
The “following are 10 types of plagiarism that teachers, researchers and students should
know.
1. Clone Plagiarism. It is also called identical copying or copying another work (word-for-word)
without any change and claim ‘as his/her own work.
2. Remix Plagiarism. It refers to collecting information from various sources and mixing all
together as a single document then, claiming the work as their own work.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied from any single source
without any alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and arranged as a new
document without citation.
5. Find-Replace Plagiarism. This is changing the most common keywords and phrases in the
copied content but not making any changes in the essential document.
6. Recycle Plagiarism. Also called self-plagiarism, it refers to the act of borrowing from one’s
own previous document without proper citation.
7. Mashup Plagiarism. It is when the written document is copied from more than one source and
all are mixed together without proper citation.
8. 404 Error Plagiarism. Here, a person creates a document by copying from various sources
prepared as a single document with the citation but inaccurate or leads to non-existing
resources.
9. Aggregator Plagiarism. Here, the written document includes proper citation but it does not
contain original work.
10. Re-Tweet Plagiarism. Here, all written documents look perfect with properly cited mark but
still, the document resembles somewhere the original text's structure of wordings.
Tips to Avoid Plagiarism
Turnitin.com suggests some techniques to avoid plagiarism that teachers, researchers
and students should know.
1. Read and understand the original document several times before start explaining about it.
2. Do not copy any word or sentence from the original document.
3. Give proper citation to all sources (book, journal, website, video, etc.).
4. In case of citing online sources, include the retrieval date and appropriate URL in the
reference.
5. Common phrases and definitions need to be quoted and cited without any modification.
6. Make a practice to include the “references” section whenever you write an academic
document.
7. Cross verify all your citations before submitting your document.
8. Resort to available plagiarism software to ensure the originality of the written document.
How to Evaluate a Website
Morris (2018) suggests ways on evaluating a website as reference in research.
1. Open the site. When looking through Google search results, open sites in new tabs, leave
search results in a tab for easy access later (e.g. right-click on the title and click “Open link in
new tab”).
2. Skim read. Determine whether you can read and understand the text. If it is too complicated
or difficult to understand, find another website that may provide the information you need. .
3. Look for the answer to your question. Find out if the information on the site actually
2NSWers your question. You can use a search box, navigation menu, or pull up your own
search box by pressing Control/Command F and type in the keywords you are searching for.
4. Consider the credibility of the author or website. You need to consider the credibility of
the author or website by considering the following: (1) Domain — domains that include .gov
or .edu are. trustworthy sources; (2) Author’s information — look at the author’s bio or About
page regarding the qualification of the author; (3) Design — avoid sites that are cluttered and
difficult to navigate; and (4) Sources — trustworthy articles usually link to other sources or cite
where their facts come from.
5. Consider the purpose of the site. Think about the purpose of the site and whether it meets
your needs.
6. Look for the date. Consider whether the information is current enough for your topic. You
can look for the date when the article was written or last updated. Sometimes, URLs also
include dates. (http:/www.kathleenamorris.com/)
Watch this:
Digital Literacy Skills in the 21st century Education
Task
Instructions. Write at least five (5) issue/s you committed against the guidelines of being a
Good Cyber Citizen. After you write the five issues, make a reflection paragraph (with not more
than ten 10 sentences and not less than five (5) sentences.) (20 points)