0% found this document useful (0 votes)
8 views19 pages

Module 9

The document discusses digital and cyber literacy topics including defining digital literacy, cybersecurity, cyber citizenship, and providing examples of digital dilemmas. It provides learning outcomes and procedures for an interactive classroom activity called a cross sectional dilemmatters jury trial to analyze digital dilemmas. Concepts of digital literacy, cybersecurity, and examples of cybersecurity tips are also explored.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views19 pages

Module 9

The document discusses digital and cyber literacy topics including defining digital literacy, cybersecurity, cyber citizenship, and providing examples of digital dilemmas. It provides learning outcomes and procedures for an interactive classroom activity called a cross sectional dilemmatters jury trial to analyze digital dilemmas. Concepts of digital literacy, cybersecurity, and examples of cybersecurity tips are also explored.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

PIMSAT COLLEGES (DAGUPAN CAMPUS)

Mc. Arthur Highway, Bolosan District, Dagupan City


COLLEGE OF EDUCATION

Names: Quidam, Mark Job Q., Claveria, Angeline A., Ramos, Leana, Appare, Jessa G.
Subject: Building Enhancing New Literacies Across the Curriculum (BENLAC)
Course and Year: BSED-Mathematics III

MODULE 9
DIGITAL/ CYBER LITERACY

LEARNING OUTCOMES:
1. Define digital/cyber literacy and cybersecurity
2. Elaborate on cyber citizenship
3. Determine netiquette and safety use of digital media
4. Identify common computer threats and the corresponding fixing solutions
5. Elucidate cyberbullying and cybercrimes
6. Examine internet exploration, source citation, research and data gathering
protocols and website evaluation
7. Cite how digital/cyberliteracy may be integrated with teaching-learning
8. Draw relevant life lessons and significant values from personal experiences on
digital risk and consequences
9. Analyze research abstract on digital/cyber literacy and its implications to the
teaching-learning processes
10. Produce and evaluate a digital tool that may be utilized in the classroom

INTERACTIVE PRESENTATION

Cross Sectional Dilemmatters Jury Trial: This activity is intended for students to analyze
dilemmas. The points of view are supported by provisions, theories, and frameworks. Then,
groups present their propositions and analysis subjected to critiquing and assessment by their
groups. It enhances critical thinking, analysis, objectivity, communication skills, collaboration, ad
unity.
Procedure:
1. The students form four groups in class.
2. The teacher prepares dilemmas on mal-use, misuse, and abuse of technology to be
examined and analyzed by the students as an advanced assignment.
3. Two groups will be given the dilemma to be resolved. Both groups will take their
justifications and counter propositions on the issue just like a debate.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
4. Members of the groups will share ideas and opinions regarding issues being raised. The
members agree to common propositions and justifications based on their opinions
supported by legal, philosophical, and moral bases that they have researched on in
advance.
5. The groups present their analysis and propositions and react to the opposing group’s
justification in class
6. Meanwhile, the other (remaining) two groups will serve both as audience adjudicators.
They will also analyze and asses the given propositions and presenting groups.
7. Therefore, the groups of adjudicators will also choose the side that they will defend and
justify against the opposing side.
8. Just like the two presenting groups, the two groups of adjudicators will also debate on
the issue by examining the counter propositions of the opposing group upon presenting
their side. Therefore, two different sets of debating teams are expected to perform.
9. The teacher clarifies the synthesizes the ideas and the propositions given by the
presenting groups, as well as the defense and the critiquing made by the adjudicators.
10. The class will find time for a brief reflection on the activity.

Samples of dilemmas to be resolved in class


Dilemma No. 1:
1. The Bridgeton Academy conducted a United Nations activity by performing cultural
presentations done in different countries, including appropriate costumes and props.
After the show, students were fulfilled and they happily celebrated the success of their
presentations through picture taking. A student, who served as leader of one of the
groups, posted their picture online and put a hashtag (which was the name of the
country that they presented) on it. All the while, the student became unaware of the
impact of what he did that the picture online even reached the country mentioned in
the given hashtag . This made the people in the said country react on the posted picture
vehemently, for them, that was an insult and discriminatory to their culture and race.
Many citizens put their negative impressions, comments and ill statements against the
person who posted it while the rest responded in the thread. They were searching for
the school where the picture came from and demanded for an apology to their nation
and the people.
How would you defend the sides of two involved in the issue? – the student who
unintentionally posted the picture out of glee and the people who reacted to it?

Dilemma No. 2:
2. After the swimming class, a student who was given consent by her classmates, took a
video of the latter in the comfort room while changing her swimsuit. Suddenly, the video
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
came out with the student’s nude body and was viewed by many, including her family
and friends. Being affected by such malicious scandal, the said student’s family
immediately confronted the school to hear their explanations from those concerned.
Upon investigation, they found out that the one who took the video, had mistakenly
pressed the button of the cellphone marked “video share” that made it accessible to all
accounts registered in the contacts right away, which caused it’s immediate spreading
Who do you think has the main liability on this issue? – the girl who allowed
someone to take the video of her nude body or the one who caused its
widespread? Justify. How should this matter be resolved?

CONCEPT EXPLORATON

Technology has been part of everyone’s life, be it at home, in school, or anywhere with
every facet of our undertaking. However, in many instances, we may not be aware that we have
been misusing or abusing it or in another way around, we may find ourselves being used by
other people with their malicious motives using digital tools. Therefore, we may not end up
being liable or a victim of such irresponsible kind of technological processing and utilization. It
is in this case that we must gain further understanding and application of digital/cyber literacy,
be it on personal or professional merit.

Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full
participation in society that includes knowledge, skills, and behaviors involving the effective use
of digital devices for purposes of communication, expression, collaboration, and advocacy.
Simply, it is the ability of an individual to engage with the digital environment and
operate technologies safely by knowing what to do and what not to do and how to avoid
unnecessary risks,
Digital literacy is an individual’s ability to access both information and methods of
communication through technological tools, such as smartphones, tablets, laptops and desktops
PC’s. While digital literacy is initially focused on digital skills and stand-alone computers, its
focus has shifted to network devices, including the internet and the use of social media.

Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks (Cisco, n.d.). These cyberattacks are usually aimed at accessing, changing, or destroying
sensitive information; extorting money from users; or interrupting normal business processes.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
Implementing effective cybersecurity measures is challenging because there are more
devices than people, and attackers are becoming more innovative. Here are some tips on how
to protect yourself against cyber threats.
1. Monitor behavior on social networks. Before posting or uploading something online try
to realize: (a) Does this need to be public?; and (b) Is it worth the risk? Remember not
only what we share online is available too friends and family, but also to cybercriminals.
2. Keep devices safe. Protect your technology tools by installing Anti-virus software, a
configuration of settings, on the devices and by completing software update.
3. Understand how the best to use passwords. Passwords need to be complex and hard to
guess, but can still be remembered. One strategy is “passphrases” or a password that
comes from the first letter of each word in the phrase. There is also a password manager
app to help keep track of all the passwords called “KeePass” which is free of charge.
Importantly, do not use the same password for all accounts.
4. Handle unsafe content. Know exactly how to respond or react to unsafe situations
online, such as (1) suspicious emails, (2) pop-ups claiming that your computer is
infected; and (3) BitTorrent sites.
5. Consider safety for the future. Take individual responsibility in using devices with and
utmost care and critical thinking where online (https://www.ensentire.com).

Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the Internet. Cyber
citizenship refers to being responsible when using the Internet. Doing online when no
one is looking speaks a lot about one’s character and morals. The power of this digital
world is associated with responsibilities and consequences. Therefore, we can explore
and navigate all information available online however, we should observe cyber
citizenship or manners and etiquette on the Web.

Ways on How to be a Good Cyber Citizen


The enlisted of becoming a good cyber citizen would guide everyone on his/her digital
operations and information processing and would prevent anyone from further consequences,
distractions, moral damages, and risks.
1. Be careful and critical for whatever you post online that could be visible to the public
even if on a “private” page through tagging by a friend.
2. If you have problem with someone, go to that person or an adult to help work it out,
instead of posting your expression online.
3. Use the internet to help you with your schoolwork, but give credit to the sources you
use and critically analyze everything you search online.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
4. Use the internet purposefully to learn more about anything you are interested in, to
help you research relevant and needed data or information and to stay connected
with friends throughout the world.
5. Make sure you verify an information before you share it or use it in a project and
check on accuracy and truth in the information you search on the web.
6. Give out certain information only.
7. Don’t answer questions that make you uncomfortable.
8. Always make sure you have told a reliable adult if you decide to meet someone you
knew throughout the Internet.
9. Always be aware of copyright laws and give credit to whom an article or and a part of
it is due.
10. Use only the computers that you are allowed to use. Avoid hacking.

Importance of Cyber Citizenship


1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.
4. More criminals or bullies can be caught when kids are honest and talk to adults.
5. It keeps information private.

Proper Netiquette
Follow these simple rules to ensure that you make wise choices when sending messages
onlne.
1. Make sure you have the correct address (with proper spelling), correct link and you are
sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false statements
and informations on the web or forwarding junk mail or chain letters to the family or
friends.
3. Re-read what you wrote to make sure it is what you want to say, and the other person
would interpret it the same way.
4. Keep your comments clean and don’t confront others online or say anything that could
be hurtful to them.
5. Keep personal and friend’s information private and don’t forward information that was
just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because messages
can get misdelivered.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
8. Adults should monitor kid’s messages, especially when they are sending e-mails to
others without permission. (http://www.cybercitizenship.org/ethics/ethics.html)

The Ten Commandments of Teacher Cyber Citizenship


At some point, misuse and abuse of technology may also happen in schools involving
teachers with their students, colleagues, and others. The following reminders to teachers
regarding the use of media tools.

1. Thou shall not post any personal matter, confidential information and obscene pictures
and messages online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students online
other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references without the
author’s citation.
6. Thou shall not post any to social media account, for whatever purposes, the pictures of
students without their or their parent’s consent.
7. Thou shall not express sentiments, disappointments, and disagreements against
superiors, colleagues, students, and their parents using their social media accounts.
8. Thou shall not use data from Internet sources in any documents like lesson plans,
researches, and requirements without the consent of the author.
9. Thou shall not give any personal data or other’s information to anyone unless for specific
purposes and given the consent.
10. Thou shall not post any student data publicly online including academic rankings, school
records, class records, class outputs and record of grades. De Leon (2019)

Internet Safety
Internet Safety, online or cyber safety means trying to be safe on the Internet. It is
maximizing the user’s personal safety and security risks to private information and property
associated with using the Internet, including self-protection from computer crime. As the
number of Internet users continues to grow worldwide, issues and concerns also continuously
exist.
Information security. Sensitive information, such as personal information, identity and
passwords are often associated with personal property and privacy and may present security
concerns if leaked . Unauthorized access and usage of private information may result in
consequences, such as identity and property theft.
Common causes of information security breaches include:
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
1. Phishing. It is a common type of scam, of which the scammers disguised as a
trustworthy source in an attempt to observe private information, such as passwords,
credit card information, through the use of fake websites look identical and
legitimate.
2. Internet Scams. These are the schemes that deceive the users in various ways to
attempt to take advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect and
transmit private information, such as password without the user’s consent or
knowledge, of which it is impossible to deremine whether a file is infected.

Personal safety and threats. The growth of the Internet gave rise to many important
services accessible to anyone with a connection, such as digital communication. While it
allows communication with others, it is also being grabbed by malicious users for bad
intent. The following are common threats to personal safety.
1. Cyberstalking. It is the use of the Internet or other electronic means to stalk
or harass an individual, group or organization through false accusations,
deformation, slander and libel, solicitation for sex, gathering information that
may be used to threaten, embarrass, or harass.
2. Cyberbullying. It is the use of electronic means, such as instant messaging,
social media, e-mail and other forms of online communication with the intent
to abuse, intimidate or overpower an individual or group.
3. Online predation. It is the act of engaging and underage minor into
inappropriate sexual relationships through the Internet. Online predators
may attempt to initiate and seduce minors into relationships through the use
of chat rooms or Internet forums.
The behavior characteristics are categorized into three groups:
A) Manipulative – typically a child molester; B) Opportunist – typically a
rapist; and C) Coercive – being a mixture of both rapist and child
molesters.
4. Obscene/offensive content. Various websites on the Internet contain
material that may deem offensive, distasteful or explicit which may often not
be of the user’s liking. Such websites may include the Internet, shock sites,
hate speech or otherwise, and inflammatory content. Such content may
manifest in many ways, such as pop-up ads and unsuspecting links.
5. Sextortion. It is the use of webcam for flirting and cybersex. Often, this
involves a cybercriminal posing as someone else, such as an attractive person
initiating communication of a sexual nature with the victim. The video is
recorded by the cybercriminal to demand money or other services, threaten
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
to publicly release the video, and send money to the family members and
friends of the victim if they do not comply.
(https://en.wikipedia.org/wiki/Internet_safety)

Computer Threats and Fixing Solutions


The realm of Information Technology (IT) security professionals and computer security
has become an issue and concern for many people (Honan, 2014)
A threat in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system. It is something that may or not may happen, but has
the potential to cause serious damage and can lead to attacks on computer systems and
networks. (https://www.technopedia.com).
Cybercrime is now becoming alarming in the life of every individual and the organization
as they intend to steal information that they can sell or trade, such as financial details, credit
card information, personal details or any other information using computer networks.
Likewise, while email has been the main method for the spread of computer viruses, it
can also enter a network by the USB device, Internet download, visiting an infected website,
instant messaging or messaging in social media platforms, file transfer and file-sharing
programs, or by remote users connecting directly to the corporate network, it can spread from
computer to computer in multiple ways
Given in the numerous ways a computer virus can spread, the following are ways on
how to ensure that computer networks can be protected.
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all
computers, including all servers, PC’s, and laptops.
2. Ensure that the anti-virus software is up to date. New computer viruses are being
released daily and so it is essential that computers are protected by keeping the anti-
virus software up to date.
3. Employ a firewall to protect networks. A computer viruses can spread by means
other than email, It is important that unwanted traffic is blocked from entering the
network by using a firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly
used by computer viruses to spread themselves. Such as .EXE, .COM and . SCR files.
These should be prevented from entering the network.
5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to
never open an attachment or to click on a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files download from the Internet are
scanned against computer viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted source for
software requirements to be installed and ensure it can be accounted for.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
8. Implement a vulnerability management system. It is impotant to regularly review
network and the applications running on it for new vulnerabilities and a plan on how
to manage them, either by patching or upgrading the using tools, such as firewalls or
Intrusion Detection Systems that should be put in place.
9. Make regular backups of critical data. There is a need to keep important files on
removable media, such as portable drives or tape for back-up in the event that the
network is infected with a computer virus.
10. Develop an Information Security Policy. The creation and publication of an
Information Security Policy is the key to ensuring that information security receives
the profile it requires in order to secure the systems and data.
11. Monitor logs and systems. Regular monitoring of network and system logs can assist
in the early identification of a computer virus infecting the network or other attacks
by criminals.
12. Develop and Incident Response Plan. The incident response plan outlines the roles
and responsibilities of people in the event of a computer virus infecting the network
or any other type of security breach.
13. Restrict end-user access to the systems. When possible, and users are prohibited
from access to the system so that the virus will also be restricted.
(https://bhconsulting.ie/computer-security-threats-solutions/)

Cyberbullying
Cyberbullying, cyberharassment or online bullying is a form of bullying or harassment
using electronic means usually among minors in a school setting and has become increasingly
common, especially among teenagers.
It is an aggressive, intentional act or behavior that is carried out by a group or an
individual using electronic forms of contract, repeatedly against a victim who cannot easily
defend him or herself.
The National Crime Prevention Council defines it as a process of using the Internet,
cellphones, or other devices to send or post text or images that intend to hurt or embarrass
another person. It may also include public actions, such as repeated threats, sexual remarks,
pejorative labels, or defamatory false accusations ganging up on a victim by making the person
the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and
posting false statements to discredit the targeted person.
Cyberbullying is similar to traditional bullying; it is just victims may not know the identity
of their bully and the reason for bullying them. Cyberbullies may disclose victims’ personal data
on websites or forums – called doxing, or may use impersonation, and create fake accounts,
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
comments, or sites for the purpose of publishing material in their names. This can leave the
cyberbully anonymous and difficult to be caught or apprehended for his/ her behavior.

Cyberbullying types. There are various types of cyberbullying and research has revealed
serious profound consequences on victims.
1. Internet trolling is a common form of bullying over the Internet in an online
community to elicit a reaction, disruption or intentionally provoke and offend
others.
2. Cyberstalking is another form of bullying or harassment that uses electric
communication to stalk a victim and pose a credible threat to harass him/her.

Implications of bullying in schools. Schools should initiate various anti bullying


programs and campaigns to protect students from being threatened or victimized by
such offense. More so, teachers should be oriented and trained in handling bullying
cases and executing teaching strategies to address and reduce bullying cases in class.
Also, school should conduct student empowerment activities that can be engaged in by
students, including the bullies to divert their attention and energy into something
worthwhile and engagement that they can be busy about

Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers on the
Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware, and social
engineering to break the law. (https://www.avast.com/c-cybercrime).
On the other hand, cybercrime is defined by Technopedia as a crime with the computer
as the object of the crime (i.e. hacking, phishing spamming) or is used as a tool to commit an
offense (i.e. child pornography, hate crimes). Cybercriminals may use computer technology to
access personal and confidential information or use the Internet for exploitative or malicious
purposes.
There is a wide variety of cybercrimes, which can broadly be placed into two categories:
one-off crimes, such as installing a virus that steals your personal data; and ongoing crimes such
as cyberbullying, extortion, distributing child pornography or organizing terrorist attacks
(https://www.avast.com/c-cybercrime).
Cybercrime may also be referred to as computer crime practiced by those who have
technological skills and use the Internet to achieve their bad motive. Cybercriminals employ
their diverse skill to access bank accounts, steal identities, blackmail, defraud, stalk and harass
or use compromised computer to attack their victims. Criminals can also use computers for
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
communication and document or data storage and those, who perform these illegal activities
are often referred to as hackers.
On the other hand, malware downloaded from the computer ma slow it down and
prompt it to give error messages. Likewise, phishing attacks usually involve receiving emails
from unknown sources while trying to trick someone into giving up his/her passwords or
personal data. Keyloggers leave their own telltale signs, like strange icons or duplicating the
messages.
Technopedia cites common types of cybercrime that include online bank information
theft, identity theft, online predatory crimes, unauthorized computer access and the most
serious one like cyberterrorism, Cybercrime encompasses a wide range of activities that can be
categorized as: (1) crimes that target computer networks or devices, including viruses and
denial-of-service (DoS) attacks; and (2) crimes that use computer networks to advance other
criminal activities, including cyberstalking, phishing and fraud or identity theft.
(https://technopedia.com/definition/2387/cybercrime)

Exploring the Internet: Researching and Evaluating the Web


The Internet is a global communication network that allows computers to exchange and
share information worldwide. It makes possible for people around the world to connect and
share ideas across time zones and geographic locations. However, because cyberspace is such a
large realm, sometimes it is difficult to find the needed information. So, the most effective way
to explore the Internet is to have strategies in place for doing research on the Web and for
evaluating the websites.
Commonly, this is important among schools in doing researches and other related
works. Therefore, this aspect needs to be explored by teachers and students in doing their
works.
Surfing the Web. The following are the key factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the subject into a
search engine.
2. Good strategies for searching the Web include writing research questions; extracting
keywords from the questions and typing them into a search engine using synonyms if
the keywords do not bring up desired results; keeping track of keywords and
synonyms used; and recording the results of search.
3. Always be cautious about the information shared online and in visiting websites.
Accessing Credibility. Different websites can make the job of researchers very
challenging. Carefully evaluate the information searched online. Consider the credibility,
or trustworthiness and reliability of the content before taking it. There are two types of
websites: informational and commercial. Informational websites usually strive to offer
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
credible content to users, while Commercial websites present inaccurate information in
order to see something.
Checklist if credibility criteria. The first step in evaluating the credibility of websites is to
review several important aspects of the site.
1. Author. Check the credentials of the author, the company or the expert and
determine the qualifications to provide information on the subject being researched.
Some websites do not list specific authors. But the credibility of a company can be
explored by reviewing the site’s “About” page, if available.
2. Date. Look for copyright information at the bottom of a websites homepage. If the
site is more than a few years old and it has not been updated regularly, look for more
up-to-date information.
3. Purpose. Analyze the goal of the website to determine if it is an informational or an
advertisement site.
4. Contact. Most credible websites list down contact information, such as telephone
number, email address, or mailing address so that users may get in touch if they have
questions.
5. Facts vs. Opinion. When doing research for a school paper go to sites that present
factual information provided by experts rather than opinions. Be on the lookout for
biases, too. If the author is biased, so as the information on the site.
6. URL. The URL may look like ending in . edu (for education), .com (for commercial
sites), or .net (for network sites). Different websites have different URL’s. To
determine a site’s credibility, determine if that is a personal website or blog, a
government website, or other types of websites

Common credible URLS. One way of determining the credibility of a website is through
the URLS. Although a website’s URL gives clues as to credibility, there is still a need to
evaluate it carefully.
1. When encountering a URL, look at the letters that appear after the “dot” (i.e
www.whitehouse.gov.) that is called top-level domain. Thus, the URL’s top-level
domain helps in determining a site’s credibility.
2. Websites ending in .gov are government-related websites, which generally, can be
trusted to provide credible statistical information, articles on many different topics
and government news.
3. Websites ending in . gov are the websites of educational institutions, such as
colleges and universities that usually offer a variety of credible data, especially about
the school’s operations and research. Since students may create websites with an .
edu top-level domain but they may contain inaccurate or biased information.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
4. Websites ending in . org are the websites of organizations. While many organizations,
especially non-profit ones, provide credible information, they may sometimes have
advertising intent. Since some organizations show bias in their provided information,
so evaluate . org sites carefully.
Recognition of Information sources. Similar to the information in print sources, the use
of online sources must be given credit to the authors. This can be done by applying
proper referencing and citation procedures that would get rid of risks, consequences,
and legal implications because of the copyright issue, which means that the ideas and
words used belong to the author.
Citation. Every entry in the bibliography is called a citation. Proper citation must be
applied or included for every source used, whether it is a website, a newspaper, or a
book. Online sources are cited differently because they are different from traditional
print sources.
Author /Source Year Article Title

Transparency International (2014). Corruption perceptions index 2014: Results.


Retrieved from http://www.transparency.org/cip2014/reults, July 17,2019

Website URL Retrieval Date

(To note: The easiest way to create citation of sources is to go to www.citationmachine.net This website generates
citations that can be copied and pasted into the Works Cited page.)

Data privacy implications. The implementation of data privacy in the country is


becoming stronger and powerful, especially in utilizing data for research and other forms of
report and paper works. Thiis has also corresponding legal implications once not processed
immediately concepts/ideas, frameworks, artwork, data and other information that are
copyrighted without the consent of the author or the source. These are commonly observed in
schools.

The following are practical techniques in responding to data privacy issues.


PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
1. When getting data, put proper citation source acknowledgement (e.g. Source:
National Statistics Office, 2019)
2. When using needed pictures downloaded from the Internet, put acknowledgement
(e.g. Photo credits to PhilPost, 2019). But, if possible, to have personal taken with
your original concept, Although, there is still a need to seek the consent of those in
the picture.
3. If data concepts and information are for public domain, just
acknowledging/critiquing the author or the source will do.
4. If the author doesn’t really want anyone to utilize his/her data file or article, learn
the value of respect. Anyway, that is his/her property. The author’s disapproval
usually manifests through difficulty in downloading the file, some tricky signs that
appear on screen, or direct statement or notice of disapproval contained in the file.

Research and data collection protocols. When researching and collecting data from the
Web, avoid plagiarism, which is the act of taking someone else's work and presenting it
as your own (Turnitin.com).

Plagiarism is unethical and it can bring you in trouble. Sometimes, the students
don’t mean to plagiarize, but they end up doing it accidentally because they are
unaware or unclear about it.

The following are the 10 types of plagiarism that teachers, researchers, and
students should know,

1. Clone Plagiarism. It is also called identical copying or copying another work (word-
for-word) without any change and claim as his/her own work.
2. Remix Plagiarism. It refers to collecting information from various sources and mixing
all together as a single document, then claiming the work as their own work.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied from any single
source without any alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and arranged
as a new document without citation.
5. Find-Replace Plagiarism. This is changing most common keywords and phrases in
the copied content but not making any changes in the essential document.
6. Recycle Plagiarism. Also called self-plagiarism. It refers to the act of borrowing from
one’s own previous document without proper citation.
7. Mashup Plagiarism. It is when the written document is copied from more than one
source and all are mixed together without proper citation.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
8. 404 Error Plagiarism. Here, a person creates a document by copying from various
sources prepared as a single document with the citation but inaccurate or leads to
non-existing resources.
9. Aggregator Plagiarism. Here, the written document includes proper citation but it
does not contain original work.
10. Re-Tweet Plagiarism. Here, all written documents look perfect with properly cited
mark but still the document resembles somewhere the original text’s structure and
wordings.
Tips on Avoid Plagiarism
Turnitin.com suggests some techniques to avoid plagiarism that teachers,
researchers, and students should know.
1. Read and understand the original document several times before start explaining
about it.
2. Do not copy any word or sentence from the original document.
3. Give proper citation to all sources (book, journal, website, video, etc.)
4. In case of citing online sources, include the retrieval date and appropriate URL in the
reference.
5. Common phrases and definitions need to be quoted and cited without any
modification.
6. Make a practice to include the “references” section whenever you write and
academic document.
7. Cross verify all your citations before submitting your document.
8. Restore to available plagiarism software to ensure the originality of the written
document.

How to evaluate a Website

Morris (2018) suggests ways on evaluating a website as reference in research.

1. Open the site. When looking through Google search results, open sites in new tabs,
leave search results in a tab for easy access later (e.g. right-click on the title and click
“Open link in new tab”).
2. Skim read. Determine whether you can read and understand the text. If it is too
complicated or difficult to understand, find another website that may provide the
information you need.
3. Look for the answer to your question. Find out if the information on the site
actually answers your question. You can use a search box, navigation menu, or pull
up your own search box by pressing Control/Command F and type in the keywords
you are searching for.
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
4. Consider the credibility of the author or website. You need to consider the
credibility of the author or website by considering the following: (1) Domain ---
domains that include .gov or .edu are trustworthy sources; (2) Author’s information
--- look at the author’s bio or About page regarding the qualification of the author;
(3) Design --- avoid sites that are cluttered and difficult to navigate; and (4) Sources
--- trustworthy articles usually link to other sources or cite where their facts came
from.
5. Consider the purpose of the site. Think about the purpose of the site and whether
it mees your needs.
6. Look for the date. Consider whether the information is current enough for your
topic. You can look for the date when the article was written or last updated.
Sometimes, URLs also include dates. (http://www.kathleenamorris.com/)

Integrating Digital/Cyber Literacy into the Curriculum

The following are suggested activities to integrate digital literacy, high-order thinking and
construction of meaning in the classroom.

1. Use an interactive whiteboard to design and deliver lessons. Use Promethean and
Smart Notebook with teacher-created lessons if you are not capable of designing
your own.
2. Allow students to maintain blogs, wikis, web pages related to their learning.
3. Engage in email/video chat exchanges with students.
4. Utilize storytelling media to allow students to create and publish stories.
5. Set-up a blog site, Facebook page, Yahoo or Google group and post weekly discussion
questions for students to respond.
6. Use video cameras to dramatize stories, record specific experiments and expose
students to video editing software to create video production of learning.
7. Engage students in discussions about how and why others do not.
8. Thinking critically about the medium use to present a message is as important as the
message itself.
9. Require E-Portfolio that would compile their outputs, projects, messages and photo-
documents of group activities and investigation online.
10. Allow students to use digital tools, such as mobile phones, iPad and netbooks for
Google search, dictionary Apps, Youtube, Podcast and Spotify applications in class to
complement their learning, especially during group works and concept reporting.

Impact of integrating digital literacy in the classroom on teachers, families, and friends.
Integrating classroom can bring a positive impact on student’s learning as evidenced by the
following:
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
1. It motivates students in their learning due to their enjoyment and ease of use with
various technological mediums.
2. It reaches students of various learning styles and multiple intelligences.
3. It allows students to create and design their own unique products reflective of their
personalities and learning needs/styles.
4. It encourages students to manipulate media in constructing their own meaning.
5. It enables students to share their learning with teachers, families and friends.
6. It gives students the chance to explore technological media that inevitably increase the
job skills needed in the workforce.
(http://purposefultechnology.weebly.com/how-can-we-embed-digital-literacy-in-the-classroom.html

Life and Values Integration


Share a personal experience wherein you encountered digital risk and consequence.
What life lesson and values have you realized and learned?

QUESTIONS FOR DISCUSSION

1. How do you define cyber/digital literacy and cybersecurity?


2. What do you mean by cyber citizenship? Elaborate.
3. What are the netiquette and the process of safety use of digital media? Give
examples.
4. What are the common computer threats and how can these be fixed?
5. What is meant by cyberbullying and cybercrimes? Discuss.
6. How can you practice the processes of Internet exploration, source citation, research
and data-gathering protocols and website evaluation?
7. How can cyber/digital literacy can be integrated in the teaching-learning process?

RESEARCH ANALYSIS AND IMPLICATION

Direction: Analyze the following research abstract and cite its implication on teaching-
learning. You may download the full paper of this research on the website given below.

Teachers’ beliefs about integrating digital literacy into classroom practice: An investigation
based on the Theory of Planned Behavior
Sadaf and Johnson (2017)

Abstract:
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
This study explored teachers behavioral, normative and control beliefs related to digital
literacy integration into their classrooms. Ajzen’s Theory of Planned Behavior (TPB) was used as
a theoretical framework to collect and analyze data. Findings revealed that teachers’ integration
of digital literacy was related to their behavioral beliefs (attitude towards outcome of a
behavior) about the value of digital literacy for developing students’ 21st century skills,
increasing student engagement, and preparation for future careers; normative beliefs (social
support about meeting the expectations of administrators, parents, colleagues, and students;
and control beliefs (perceived behavioral control) about ease of integrating digital literacy due
to access to technology, professional development and curriculum resources.
(Source: Sadaf, A. and Johnson, B. (2017). Teachers’ beliefs about integrating digital literacy into
classroom practice: An investigation based on the Theory of Planned Behavior doi:
10.1080/21532974.2017.1347534)

Analysis: How do teachers perceive digital literacy integration into their classrooms,
according to the study?

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Implication: How does the result of the study impact the students’ learning and the
development of 21st century skills?

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
PIMSAT COLLEGES (DAGUPAN CAMPUS)
Mc. Arthur Highway, Bolosan District, Dagupan City
COLLEGE OF EDUCATION
SYNTHESIS AND LEARNING REFLECTION

DIGITAL/CYBER LITERACY
 Digital literact is the set of competencies on the effective use of digital
SYNTHESIS
devices for purposes of communication, expression, collaboration and
advocacy while cybersecurity is the practice of protecting systems, networks
and programs from digital attacks.

 Cyber citizenship refers to being responsible when exploring the Internet,


including the right manner and etiquette in using the web

 Internet safety is preventing from online security risks to private information


and property and protecting self from computer threats and cybercrimes.

 Cyberbullying is a form of bullying or harassment using electronic means that


is punishable by law while cybercrime is any criminal activity carried out using
the computer or the Internet.

 A computer threats refers to anything that has the potential to cause serious
harm and damage to a computer system, that must be fixed immediately and
effectively with solutions.

 In order to avoid digital risks and consequences, proper Internet exploration,


source citation, data privacy imposition, research and data-gathering
protocols and website evaluation are imperative.

 As digital literacy impacts teaching-learning process, its wide dissemination in


schools and integration in the classroom is timely, relevant and necessary.

Direction: Choose any type of cyberbullying. Describe it and write its purpose, procedures,
principles, and prospective target indicated in the tablets provided below.

PERSPECTIVE/TARGET PRNCIPLES PROCEDURE PURPOSE CYBERBULLYING


TYPE

You might also like