0% found this document useful (0 votes)
30 views49 pages

Unit 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views49 pages

Unit 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

BULACAN STATE UNIVERSITY

GENERAL ACADEMIC AND


TEACHER EDUCATION DEPARTMENT
Hagonoy Campus
Iba - Carillo, Hagonoy, Bulacan
A.Y. 2024-2025

A WRITTEN REPORT IN EDUC 302


TECHNOLOGY FOR TEACHING AND LEARNING 1

Unit 6 - Social, Ethical, and Legal Responsibilities in the Use of Technology Tools
and Resources

A. Digital Citizenship - Nine Elements


B. Social, Ethical, and Legal Responsibilities in the Use of Technology Tools
and Resources by Teachers
C. Intellectual Property Rights (IPR) Applicable to the Educational Setting:
Copyright Related Rights Copyright Law

Submitted by:
Aguinaldo, Ana Marie U.
Batalla, Angel Trisha M.
Escartin, Dianne Faith Y.
Francisco, Floren Railey S.
Inocencio, Alice S.
Panganiban, Juliana Valerie A.
Roco, Mavie Joy G.
Santos, John Lloyd R.
Sebastian, Sheind S.
Tolentino, Lara Mikas C.

Bachelor of Elementary Education - 3A

Submitted to:
Dianna S. Regalado, LPT

Date Submitted:
September 21, 2024
I. OBJECTIVES

At the end of the lesson, the students should be able to:

A. identify the key terms connected to social, ethical and legal responsibilities in
technology;
B. encourage the sense of responsibility to promote positivity to the digital community
and advocating for inclusivity and fairness; and
C. apply ethical practice in using technology responsibly, respecting property and
ensuring privacy.

II. ACTIVITY

“Organize the Puzzle”

Instruction: We will form three groups from the class, and each group has three
representatives for the task entitled "organize the puzzle." The three representatives will
take turns organizing the puzzle to its original form. Each group of three will queue up
and solve the puzzle one by one until one group is complete. The team that finishes first
will receive a reward.

III. ANALYSIS

These days, we rely more and more on internet platforms for information seeking,
sharing, and searching. If we understand the proper responsibilities, policy, and laws of
having online platforms in our lives, then utilizing social media is not a problem or an
issue. It is true that technology greatly simplifies our lives, but we still need to
understand how to utilize it wisely for learning, living, and developing ourselves. We will
talk about and provide you with information on Social, Ethical, and Legal
Responsibilities in the Use of Technology Tools and Resources in this study. We will
also elaborate on the meaning of "Digital Netizens" by examining its nine components.
The Legal, Ethical, and Social Duties Associated with the Use of Technology by
Teachers on how using technology can help them impart knowledge to their students.
The last three are copyright law, copyright-related rights, and intellectual property rights
(IPR). This report will demonstrate how online resources and technology improve our
lives.

IV. ABSTRACTION

A. DIGITAL CITIZENSHIP - 9 ELEMENTS OF DIGITAL CITIZENSHIP

What is Digital Citizenship?

It is defined as the responsible use of technology which describes the standards


norms of behaviors when using digital resources. A person who uses technology and
the internet is Digital Citizen. Through the use of technology, digital citizens engage in
all aspects of society, meaning you and I are considered as Digital Citizens.

According to Tibble (2017), there are Nine (9) themes or elements in digital citizenship.
The Nine Elements of Digital Citizenship includes the following.

1. Digital Access (full electronic participation in society) – It is the equal digital


rights and electronic access is the starting point of digital citizens, it means that
this is the equal opportunities for all people regardless of their status, gender,
socio-economic background, geographical locations, etc. Students are given
equal opportunity to access digital electronic resources.

2. Digital Commerce (electronic buying and selling of goods) – Technology


users need to understand that a large market economy is being done
electronically. This refers to purchasing goods and services online. During the
COVID-19 pandemic, for instance, massive buying and selling online can be
observed. There is a need to exercise caution due to financial and safety risks.

3. Digital Communication and Collaboration (electronic exchange of


information) – Digital communication is the electronic exchange of
communication which includes, emailing, texting, chatting, instant messaging
utilizing cell phones, etc. These risks of giving and providing information that can
be used for misinterpretation, extortion, blackmail are possible.
4. Digital Literacy (teaching and learning about technology and its use) – Also
known as Digital Fluency. It is the ability to understand, use and interact with
technology, media and digital resources in real-world situations. Also the ability
to find, evaluate, utilize, share, and create contents using information
technologies and the Internet.

5. Digital Etiquette (electronic standards of conduct or procedure) – This is


often seen as one of the most pressing problems when dealing with Digital
Citizenship. This refers to the responsible digital behavior and appropriate use of
digital platforms and devices. Most of the educational institutions with distance
learning programs provide their students house rules, before, during, and after
online classes.

6. Digital Law (electronic responsibility for actions and deeds) – The digital
world is so huge that there should be order, discipline, and ethical use. This
focuses on the appropriate sharing and downloading of information and data
through digital resources. Examples of are issues on plagiarism, copyright, and
fair use.

7. Digital Rights and Responsibilities (those freedoms extended to everyone


in a digital world) – The privileges of digital access come along with
responsibility. This refers to the individuals’ equal opportunity and freedom to the
digital world with corresponding diligence. To help the students understand the
importance of protecting others online is an essential skill. Just as the Philippine
constitution protects us with rights of being Filipino citizens such as the right to
privacy, we also have the responsibility to be cautious in our online activities such
as posting our photos and videos online.

8. Digital Health and Wellness (physical & psychological well-being in a digital


world) - Also known as Digital Health and Welfare, this provides digital users’
awareness on issues in physical health issues like addiction online, physical
disabilities due to poor posture, and degraded eyesight due to inappropriate
lighting, are some of these.

9. Digital Security (electronic precautions to guarantee safety) – In any society,


there are individuals who steal, deface, or disrupt other people. This refers to the
skills and understanding of being aware of attacks and possible prevention to
guarantee safety from viruses, worms, and other bots of computers and other
electronic gadgets and devices. As responsible citizens, we must know how to
keep our data, our many, and our identity from all hazards in the digital world.
To summarize those elements, we can see in this image that they are organized
into categories. The terms digital etiquette, digital access, and digital law all refer
to respect, both for yourself and for others. So it is stated how respect was
shown when using all three of these elements. While digital communication,
digital literacy, and digital commerce teach you and others how to utilize it
properly and apply it. Lastly, digital rights and responsibility, digital security, and
digital health and wellness are designed to protect us as netizens. Hence, we, as
users of technology, the internet, and other online platforms, should do our best
to practice the nine aspects of digital citizenship.

B. SOCIAL, ETHICAL, AND LEGAL RESPONSIBILITIES IN THE USE OF


TECHNOLOGY TOOLS AND RESOURCES BY TEACHERS

INTERNET AND EDUCATION

The internet and technology has been part of our daily lives especially in this modern
times which all of us help by technology in everyday use and also in professional lives.
For educational purposes, it has been widely used in research, gathering data, and
learning lessons in various subjects.

There is no doubt that in this modern era, the internet plays a crucial role in our
education where everyone prefers searching on the internet on their queries and
problems and finding answers results in just seconds.

The use of the internet in education is crucial because it broadens everyone's


perspective and provides limitless access to information. Students in particular benefit
from this because it makes it simpler for them to learn lessons and conduct research.
Anyone who is proficient in using technology now has an advantage over others.

There are many benefits of the internet in the field of education. Some of these are:

1. Student – Teacher and Peer Interaction


It is important that the teachers and students have constant interaction with each
other, knowing how everyone is doing and raise concerns with academics with
the help of social media. Parents can also interact and communicate to teachers
and school authorities for them to know how their child is doing in school.

2. Effective Teaching and Learning Tool


The internet has been a major tool in education especially for teachers in getting
information for their discussion of lessons and it can also help them prepare
teaching materials. The student and teachers can utilize the internet as their
learning tool as it provides more reliable, updated, and instant data that is
available on the internet.

3. Keeping you updated with Latest Information


One of the biggest advantages of everyone is the access to the internet. There is
a lot of information that you can find and it keeps us updated with the latest
information with every subject or topic

4. Bridging Communication Gaps


Through the internet, communication can be more easier, it will be easier and
convenient for everyone to distribute information. For example the teacher can
have a digital classroom like Google classroom, an app that can be used to post
announcements by teachers and give activities that are also accessible by
students.

The internet has been an advantage to all people over the world. So, it should be used
for a good purpose, especially to students, they have to use it with integrity since it has
had a great impact on imparting education to the children. If everyone uses the internet,
they can benefit and learn from it.

DIGITAL SAFETY RULES

Since almost everyone has access now on the internet, even though the internet has
been a benefit and useful for everyone, we have to remember that it can also give
potential risk, threats, and danger if we use it improperly.

Here are some of the Internet safety rules to follow to help us avoid getting into trouble
online.

1. Keep Personal Information Professional and Limited


It’s crucial to be mindful of what websites and apps we will be putting our personal
information in, so it’s important to limit and be cautious on putting our personal details in
filling up forms and making sure that the sites recognize privacy data.

2. Practice Safe Browsing


To minimize the online risk, we must practice safe browsing by sticking to reputable
websites, avoid clicking ads, and avoid downloading files from unknown sources. You
can also have an anti virus software installed in your mobile device or computer for
better security.

3. Keep Your Privacy Settings On


Set your privacy setting on in your social media apps and social platforms to limit who
can see your personal information and what you do online.

4. Be Careful What You Download


Be cautious when downloading files especially from unknown sources, as they may
contain viruses and malware that could harm your device and potentially compromise
your personal information.

5. Be Careful What You Post


It’s important for us to think before we post online, as what we share can have lasting
consequences. We must avoid posting sensitive personal information or content that
could be used against you or harm your reputation.

6. Backup your Data


Most of our devices have this feature, where this could be a lifesaver if your device got
hacked or infected by a virus, because you will be able to recover the files that are
affected.

7. Use Strong Password


BY using strong passwords, it may protect us from people who want to get our
information online or spy on our accounts. We can also use strong passwords on online
banking apps for more security. Also, it is recommended to change password by month
whenever it is recommended to.

CYBERBULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people can view, participate in, or
share content. Cyber bullying includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else.

Technology can be a lot of fun but there are some risks and threats we should aware of,
cyber bullying is a form of bullying that takes place online it can happen anytime,
anyplace, anywhere and on any platform such as social media sites, messaging apps,
and even computer games it might start directly online or it might be a follow up form
offline bullying such as at school. Examples of cyber bullying include saying hurtful
things, spreading false rumors, leaving you out of things, humiliating your photos or
videos that make you feel bad of yourself or making you feel different and alone.
Someone who is being cyberbullied might start to think badly of themselves, sad,
nervous, lonely and they might lose confidence or have problems at school or with
friends. So, what should you do if you think you're being cyberbullied or if you know who
is? Cyber bullying is wrong, don't be afraid to talk to your parents, teachers or trusted
people, don't be afraid to ask for help.

The most common places where cyber occurs are:

1. Social media, such us facebook, instagram, Snapchat and twitter


2. SMS (Short message service) also know as text message sent through devices
3. Instant message (via devices, email provider services,apps, and social media
messaging features)
4. Email

These are the most common ones that are used to bully; social media is the first,
including Facebook, Instagram, and even Twitter. There are so many media that can be
used to spread information about you that will ruin your image. SMS is also used for
texting something; they can also use it for harassment. They even use email for
threatening or abusive messages. It's really cyberbullying that always happens on social
media, so it's hard for me to avoid it because you don't control people's minds; you don't
know what they can do to you.

With the prevalence of social media and digital forums, comments, photos, posts, and
content shared by individuals can often be viewed by strangers as well as
acquaintances. The content an individual shares online both their personal content as
well as any negative, mean, or hurtful content creates a kind of permanent public record
of their views, activities, and behavior. This public record can be thought of as an online
reputation, which may be accessible to schools, employers, college, clubs, and others
who may be researching an individual now or in the future. Cyberbullying can harm the
online reputations of everyone involved that just the person being bullied, but those
doing the bullying or participating in it. Cyberbullying has unique concerns in that it can
be:

Persistent - Digital devices offer an ability to immediately and continuously


communicate 24 hours a day, so it can be difficult for children experiencing
cyberbullying to find relief.
Social networks and digital devices also make it possible for people to communicate
with one another virtually at all times during the day and at night. For example,
someone being cyberbullied cannot easily gain any relief at all from the bullies since
bullying can be done even outside a school or a home.

Permanent - most information communicated electronically is permanent and public if


not reported and removes a negative online reputation including for those who bully can
impact college admissions employment and other areas of life.

Anything you post on the internet - which could be a comment or a picture, for example
- tends to be permanent. Even if you delete something, it's probably still out there
because other people may have copied or forwarded it. This means that bad stuff put on
the internet may stick around and haunt things like college applications or job searches
later.

Hard to notice - because teachers and parents may not be over here or see
cyberbullying taking place it is harder to recognize.

Actually, cyberbullying often happens through private messaging or online forums that
teachers and parents may not read. Because of this, it's much harder for adults to
detect and assist in the situation since it's not as obvious as bullying occurring within
their presence.

Causes of Cyber bullying

One of the main concerns and problems that is becoming more widespread worldwide
is cyberbullying. Whether you are a kid, a teenager, or an adult, bullying can affect you
at any time, anywhere, or even based on your life status. We'll talk about the causes of
cyberbullying in one's life in this report.

The following are the causes of cyberbullying:

● Lack of Empathy

The inability to comprehend and communicate one's sentiments to others is referred to


as a lack of empathy. It may contribute to cyberbullying because many people utilize
online forums without considering the impact of their remarks on other people. They
may just state things based on what they observe or hear, but they are unaware of the
backstory of people's lives.

● A desire for power and control


It refers to having absolute control or supremacy over the lives of others. Because
individuals can use internet platforms to manipulate and damage others based on what
they know or want, it is the cause of cyberbullying.

● Revenge

It is asking for retribution from someone who has wronged or mistreated you.
Cyberbullying may result from it because, when someone uses social media to exact
revenge, harass, or hurt other people, other users may believe that person is correct
before taking into account or learning about the perspective of the other victim.

● Peer Pressure

It describes how a member of a social group believes and abides by the expectations,
rules, and conduct of that group. When a social group wishes to accept someone into
their group after they have harassed them online in order to gain acceptance from their
peers, it can result in cyberbullying.

● Deficient digital communication skills

It pertains to utilizing internet channels to successfully engage in communication.


Cyberbullying can result from someone using harmful language online and acting
offensively when dealing with others on social media.

● Escapism

It refers to using emotionally charged hobbies as a means of escaping both real life and
personal concerns. Cyberbullying can result from the misuse of social media by
someone who expresses their concerns online and spreads negativity to make others
feel the same as them.

● Seeking entertainment

If someone did make fun of other people's life by insulting, harassing, and embarrassing
them, it might be the root of cyberbullying.

● Inadequate regulation

It pertains to being aware of the applicable laws, norms, and guidelines pertaining to the
internet. Because it creates a climate that encourages disrespect and wrongdoing in
people without additional penalties, it can result in cyberbullying.

Effects of Cyberbullying
● Emotional Distress
Cyberbullying victims deal with stress, worry, and sadness in their daily lives.

● Social withdrawal and isolation


To protect themselves from bullying, the sufferer is kept apart from their friends and
family.

● Changes in behavior
Bullying causes the victims to become frustrated and more irritated.

● Decline in academic or work performance


Bullying victims find it difficult to focus when studying or working.

● Loss of interest
Their previous interests in life begin to diminish. They don't feel motivated to follow their
habits through it.

● Changes in sleep patterns


Cyberbullying victims report insomnia or sleeplessness.

● Obsession with online activity


The victims continuously use social media and rely too much on online gaming.

● Self- esteem issues


Bullying has the impact of making people feel insecure, which can cause them to doubt
who they are and lose motivation to work.

● Suicidal thoughts
Similar to bullying, this effect is one of the most disturbing things that a victim always
considers as a way out of what they are going through.

NETIZENS IN CYBERSPACE

A. Cyber rights

Are rules to protect the people as they use the internet. These include privacy, freedom
of speech, and the right to access information. So, these rights help keep our online
world safe and free for us. We should all know and respect cyber rights. It's through
making these rules that we can build an easier online world for everybody and make it
even safer.
● Living
Cyber rights means being able to live online comfortably, where you can freely
express yourself and not be harassed or harmed. It also includes protecting the
personal information and privacy of individuals from cyber threats and attacks.

● Liberty
Extends to the entire sphere of freedom of expression and information, but it also
includes taking responsibility for how one exercises this liberty. The more time we
spend in the digital realm, it is mandatory for us to realize that our words and
actions have many repercussions on others.

● Pursuit of Happiness
The pursuit of happiness involves freedom to pursue personal interests and
passions without interference, allowing individuals to live a life that brings joy and
satisfaction, ensuring they can pursue happiness in a meaningful way.

Life, liberty, and the pursuit of happiness means to otherwise enjoy the internet free
from fear or discrimination, able to have activities of joy and fulfillment. This means the
ability to connect with others, learn from others and engage in online communities
without prejudice or discrimination against anyone.

B. Cyber Privilege

It is within her powers for the internet and technology to connect with people and
information effortlessly. Today's globalized and digitized society has made
communication easier, sharing of knowledge more effective, teaching faster, and taking
in new concepts less complicated because of this medium.

C. Cyber Responsibilities

The ability to access the internet is a privilege. Having technology that provides us
access to cellular networks and the internet is a privilege. Being able to communicate
freely and allowing everyone to express their views to one another is a privilege.

Being responsible, answerable, or accountable for something that is within one's


authority, control, or management is the state or fact of being responsible.

Responsibility is really at the heart of cyber citizenship. We must educate ourselves


about the online world in order to act responsibly. We also need to understand how to
protect ourselves online and be secure. Obeying the law and being respectful,
responsible citizens are two more areas of our responsibilities.

While it's true that everyone can express themselves freely in the modern world today,
they still have to take responsibility for their own actions and every decision they make.
As the saying goes, "Think before you click." People should understand that they are
accountable for whatever they publish, post, and remark on the internet since it is their
duty as online citizens to take responsibility for their actions when anything bad
happens.

Probably a better way to describe cyber citizenship is as civil behavior. There are
certain ways civilized human beings should behave toward others. They have to know
how to appreciate different points of view on the internet, be courteous in all they do,
and be sensitive to cultural diversity.

D. Laws

The most important area of respect we should demonstrate as a cyber citizen is for the
law. There are several legal issues related to online activity.

The first is intellectual property rights. This includes the written word, ideas and
products like music. The example of this is If you download music without paying for it,
you have violated the property rights of the artist.

Furthermore, according to an article called “Intellectual property rights: An overview and


implications in pharmaceutical industry” the term "intellectual property rights" (IPR)
refers to the legal rights granted to the creator or inventor to protect his work of
invention for a specific period of time. For a predetermined amount of time, these legal
rights grant the inventor/creator or his assignee the only right to make full use of their
innovation. It could be a design (industrial design), a brand name (trademark), an
invention (patent or utility model), or a piece of literature or other creative work
(copyright).

There are 3 Types of Intellectual Property Rights according to “Kiteworks.com”.

● Exclusive Rights: Exclusive rights are granted to the owners of intellectual


property, and they include the exclusive right to use, sell, and license the
property.
● Statutory Rights: Statutory rights are rights conferred by law, such as patents or
copyrights.
● Moral Rights: Moral rights are the non-economic rights that the creator or owner
has over their intellectual property, such as the right to be credited as the author
of a work.

Legal remedies: Legal remedies for infringement include injunctions, monetary


damages, and orders for the destruction of infringing materials.

Damages: Damages for infringement can include compensatory damages, punitive


damages, and attorney's fees.

PHILIPPINE LAWS ON INTELLECTUAL PROPERTY

R.A. 8293

An Act prescribing the Intellectual Property Code and establishing the Intellectual
Property Office, providing for its powers and functions, and for other purposes.

This act shall protect and secure the exclusive rights of scientists, inventors, artists and
other gifted citizens to their intellectual property and creations, particularly when
beneficial to the people, for such periods as provided in this Act.

E. Cyber Stalking

Cyberbullying, cyberstalking, and cyber harassment are other areas with legal
protections. A person's right to be free from harassment is violated when someone uses
electronic methods to threaten, harass, or intimidate them.

These things have been widely publicized in print and digital media alike. As these
things continue to spread, people suffer physically, intellectually, and emotionally.
Degrading others with hurtful remarks, abusing minors for undesirable activities, making
fake accounts or posters using other people's data and images—all of these things
spiral out of control when millions of people use the internet without understanding the
true purpose of it or their own actions.

Pornography also is regulated by law. Most other forms of pornography occupy a grey
area that is in part protected as free speech and in part whether it violates community
standards of decency. This basically indicates that it is unregulated or uncontrolled. A
more recent aspect of pornography is what has been called revenge porn. For people
over 18, a slimy former partner or, as likely, someone who has hacked your kid’s
account, may provide nude images to sites that solicit this kind of material. It can be
done without the consent of the person in the images.
Making a false web site under another person’s name and otherwise using their
personally identifying information is both a state crime that is punishable by law.

F. Cyber Crimes

So, here is a summary of things that are against the law:

• Copyright infringement

Copyright infringement occurs when a copyrighted work is reproduced, distributed,


performed, publicly displayed, or made into a derivative work without the permission of
the copyright owner.

The legal term "copyright," often known as "author's right," refers to the ownership rights
that authors and artists have over their creative works. Books, music, paintings,
sculptures, films, computer programs, databases, ads, maps, and technical drawings
are among the works that fall under the scope of copyright protection.

Republic Act No. 8293

Section 2. Declaration of State Policy. - It shall protect and secure the exclusive rights
of scientists, inventors, artists and other gifted citizens to their intellectual property and
creations, particularly when beneficial to the people, for such periods as provided in this
Act.

• Plagiarism

According to the University of Oxford, it is “Presenting work or ideas from another


source as your own, with or without consent of the original author, by incorporating it
into your work without full acknowledgement. All published and unpublished material,
whether in manuscript, printed or electronic form, is covered under this definition, as is
the use of material generated wholly or in part through use of artificial intelligence.”

This, according to the Department of Justice, means that plagiarism itself is not a crime
but that plagiarism that also amounts to copyright infringement is. Such plagiarism now
carries a penalty of 3-6 years imprisonment and a fine of P50,000 - P150,000 ($1,200 -
$3,600), if prosecuted under the law.

• Downloading songs, you didn’t purchase

This falls under the legislation of copyright infringement, which states that using or
downloading a song without paying for it constitutes a forbidden action and may be
considered a crime.
• Profiting from others’ creative efforts or products

This can also be considered copyright infringement if someone profits from another's
work or products. This can also result in the unauthorized use of someone else's
products and works in order to generate money or profit from it.

• Bullying and harassment

Online harassment according to Durham University is defined as an individual or group


using information and communication technology to repeatedly damage, harm and
destruct another person. This could include threats, embarrassment, or humiliation in an
online setting. This involves the expression of discriminatory attitudes and views, such
as sexism, racism, etc. Online harassment, also known as cyberbullying, happens on
social media platforms such as Facebook, Instagram, Snapchat, TikTok, and Twitter,
SMS, instant messaging (by devices, email provider services, applications, and social
media messaging capabilities), and email.

Bullying and harassment are daily challenges that people experience on social media.
People are becoming increasingly impolite and disrespectful when sharing their ideas
and perspectives online. That is why numerous individuals are suffering psychologically,
socially, physically, and emotionally as a result of what they read, see, and receive
online. Bullying and harassment carry legal consequences that are equivalent for
compensation and imprisonment.

• Child pornography (including sexting)

Child pornography, in criminal law, any visual depiction of a minor (a person who has
not reached the age of consent) engaging in sexually explicit activity according to
Britannica.

This can include depictions across a number of different media, including:

● Photographs
● Videos
● Digital images or videos
● Undeveloped film
● Computer generated images indistinguishable from an actual minor

Child pornography is a severe problem that is only getting worse as the Philippines'
poverty rate rises. This has made the Philippines a global hub for live-streamed sexual
abuse of children. Child pornography is a severe subject that affects the lives of young
children who are incapable of making their own decisions. Some are forced by their
parents, while others do it out of poverty. People also use children's identities, images,
and videos to commit crimes and fulfill their own sexual wants.

The term sexting stands for a combination of sex and texting. Sexting is the act of
sending sexual text messages. It often also involves sending nude, seminude, or
suggestive photos. Sometimes, the messages also include sexual or explicit videos.
Sexting can happen via messaging on cell phones or other messaging services. It also
can happen through apps or direct messaging on social media sites.

Now that we live in the technological world that even minors have access to the internet
can be invasive and abusive as they don’t understand the consequences of their actions
until after they have done it.

• Internet stalking

Cyberstalking is the use of the internet and other technologies to harass or stalk
someone online. This online harassment, which is a kind of cyberbullying and in-person
stalking, can take the shape of e-mails, text messages, social media posts, and more,
and it is frequently methodical, purposeful, and persistent.

Even when the recipient shows displeasure or begs the offender to stop, the encounters
usually continue. The information intended toward the target is frequently unsuitable
and even frightening, leaving the person feeling afraid, distressed, apprehensive, and
worried.

Some indicators of cyberstalking include someone sending you too many messages,
sending you inappropriate messages, like all of your previous social media posts,
tricking you into communicating with them online, or trolling you. Cyberstalking
behaviors include online impersonality, GPS tracking, threatening communications,
catfishing, and doxing.

• Identity theft

Identity theft occurs when someone takes your identity and personal information (such
as your social security number) and uses it without your consent to open new accounts,
access existing accounts, or seek medical services. When an identity thief is
apprehended, he may even provide law enforcement agents with your name and
identity. This is the process of obtaining or using your personal information in order to
defraud others and engage in illicit activities for financial gain. This can happen to
anyone who has given their information to an untrustworthy source or through the
internet.
Identity theft has serious consequences for you and your family. It can harm your credit,
get you sued for debts you don't owe, add inaccurate and even harmful information to
your medical records, and potentially put you in prison. It happens when someone
steals your personal information and uses it without your knowledge to commit fraud or
other crimes. Identity theft can also ruin your reputation as it might create situations that
may endanger persons close to you.

G. Cyber Identity

There are a range of ways we can be identified and recognized online. It starts with
online names we use for various accounts as well as our online addresses (e.g., email,
texting number, social media accounts, etc.).

H. Cyber Foot-printing

Every time we go online to transmit anything over a cellular network, we live a trace of
that activity. This is known as a cyber footprint. Two types of cyber footprint: the first one
intentional; thing they have known posted or entered online. Footprint including things
like:

● Photo
● Video
● Texting
● Emails
● Tagged photos
● Social media account

Then the unintentional footprints we leave in cyberspace. Unintentional footprint such


things as cookies, search engine metrics and social media tracking.

I. Cyber Property

Anything that is posted online automatically becomes the copyright protected product of
the creator. This includes music, photos, videos and written material.

J. Relational Aggression

The internet and cellular networks can be used to express frustration, anger and cruelty
to other people. The most common form of relational aggression is represented by
insensitive comments, crude and awkward remarks or attempts at playful humor.

NETIQUETTE - is a guideline that advises people on how to communicate and treat


others when interacting online. Netiquette is a short term for “Internet etiquette” that
includes a set of rules for polite and respectful behavior online that can apply to multiple
aspects of the internet such as message forums, email, social media, video chats and
other types of communication online.

Here are ten (10) examples of rules to follow for good netiquette;

1. Avoid posting inflammatory or offensive comments online - avoiding this


behavior maintains a respectful and creative environment. Staying positive may
lead to a healthier and welcoming online community.

2. Respect others' privacy but not sharing personal information, photos, or


videos that other people may not want published online - Stop posting other
people's privacy without their proper permission or consent especially if they do
not want to post. By doing that we gain their respect by keeping their privacy and
personal information. In that way we can create a trustworthy community.
3. Never spam others by sending large amounts of unsolicited email - stop
sending unnecessary emails to someone because it can be seen as annoying.
Respect others' digital space and send only the necessary information and
requested messages.

4. Show good sportsmanship when playing online games, whether you win or
lose - showing good sportsmanship builds a good enjoyable experience for both
players, whether they win or lose. We should congratulate the opponent and
accept the defeat wholeheartedly.

5. Don’t troll people in web forums or website comments by repeatedly


nagging or annoying them - avoid trolling people in web forums or in website
comments by repeatedly annoying them because it may cause interruption in
conversation and create a negative and less welcoming atmosphere.

6. Sticks to the topic when posting in online forums or when commenting on


photos or videos such as YouTube or Facebook comments - Sticking to the
topics we share in online forums or commenting on photos is important because
it maintains a clear and relevant conversation that makes everyone understand
the discussion.

7. Don’t swear or use offensive language - It’s important for us not to swear or
use an offensive language when we communicate online that may offend and
distract other people. We should keep respectful and formality to maintain a good
interaction.
8. Avoid replying to negative comments with more negative comments. - We
should stop replying negative comments to other negative comments that may
lead to more conflict and create a toxic environment. Instead, make a positive
reply and promote respectful online communication in that way we can break a
cycle of negativity.

9. If someone asks question and you know the answer, offer to help - It’s
important to offer help when someone has a question or need. Don’t just ignore
and seen their chat. If we know the answer, let them know and offer help. By
doing this we can create a supportive community online and promote learning by
helping each other.

10. Thanks others who help you online - If someone provides you a helping hand,
always thank them, show that we appreciate their effort and time. In that way we
build a positive relationship and maintain good communication.

Knowing this netiquette is very important for the reason that we know how to properly
interact online with respect and effectively and may it also help to avoid
misunderstandings, or conflicts when communicating online. Understanding this
netiquette may lead to a more enjoyable and safe online experience for everyone.

EDUCATIONAL SITES AND PORTALS

Educational site is an online platform that provides users with access to different
resources including articles, instructional videos, quizzes, interactive activities, and
practice to support the learning and educational needs. With the advancement of
technology, educational websites have become popular and accessible, making it easier
for us to learn. Whether you are a student, teacher, or someone. Different websites will
help to expand your knowledge.

Here are some examples of educational websites:

1. EdX: edx.org - edX is a non-profit, massive open online course (MOOC)


provider founded by Harvard and MIT in 2012. The primary purpose of this
website is to make high quality education accessible to everyone, regardless of
location. They provide learners with the skills and knowledge needed for both
professional and personal growth.
2. Academic Earth: academicearth.org - The mission of Academic Earth is to
provide free access to a world-class education for everyone. Whether you are
looking to explore a new topic or advance your knowledge.

3. Internet Archive: archive.org: - It is a digital library that provides free universal


access to a different collection of digital content such as books, movies, music,
and software. The internet archive aims to maintain digital content for future
generations and make it accessible for everyone

4. Big Think: bigthink.com - this website was founded in 2007, it features


interviews, articles, and videos from experts. It encourages viewers to explore,
educate and inspire making complex ideas accessible to a broad audience.
5. Coursera: courser.org - it is an online learning platform that offers a wide range
of courses, specialization and degrees. It was founded in 2012 by Stanford,
Professors Andrew Ng and Daphne Koller. The aim of this website is to provide
universal access to the world's best education.

6. Brightstorm: brigthstorm.com - this platform is designed for high school


students. It offers thousands of study videos that are related to their subjects
such as math, science, and English. It helps students to understand complex
topics easier.

7. CosmoLearning: cosmolearning.com - CosmoLearning is a free educational


website designed to provide high quality education resources for both teachers
and students. The primary objective of this is to improve the quality of
homeschooling, teaching and students excellence by making educational
material accessible to everyone.

8. Futures Channel: thefuturechannel.com - the primary goal of this website is to


connect students with real-world applications of STEM (Science, Technology,
Engineering, and Mathematics) they provide a variety of multimedia content like
micro-documentaries and lesson plans to help educators to engage students and
how STEM is used in various careers.

D. INTELLECTUAL PROPERTY RIGHTS (IPR) APPLICABLE TO THE


EDUCATIONAL SETTING: COPYRIGHT RELATED RIGHTS COPYRIGHT
LAW
INTELLECTUAL PROPERTY RIGHTS (IPR)

Plagiarism.org reported that..

A survey of over 63,700 US undergraduate and 9,250 graduate students over this
course of three years (2002-2005) revealed the following:

1. 36% of undergraduates admit to "plagiarizing/copying fee sentences from Internet


sources without footnoting it".
2. 24% of graduate students self report doing the same.
3. 38% admit to "paraphrasing/copying fee sentences from written source without
footnoting it"
4. 25% of graduate students self report doing the same
5. 14% of students admit to "fabricating/falsifying a bibliography"
6. 7% of graduate students self report doing the same.
7. 7% self report copying materials "almost word for word from a written source without
citation"
8. 4% of graduate students self report doing the same
9. 7% self report "turning in work done by another"
10. 3% of graduate students self report doing the same
11. 3% report "obtaining paper from term paper mill"
12. 2% of graduate students report doing so

Intellectual Property Rights

• According to the World Intellectual Property Organization (WIPO) It refers to creations


of the mind such as inventions; literary and artistic works; design; and symbols, names,
images used in commerce.
• An Intellectual property rights is a right held by a person or by a company to have
exclusive rights over these.

Intellectual Property Office of the Philippines (IPOPHIL)

• Administers and Implements state policies in relation to intellectual property. (RA


8293)
• Government agency attached to the Department of Trade and Industry in charge of
registration of intellectual property and conflict resolution of intellectual property rights in
the Philippines.

Copyright
Copyright is the concept that original works such as writing, photo, and music belong to
the people who create them. It is the legal right given to the owner of the original work
or intellectual property and that you cannot use, copy, modify or publish that work
without permission. This is the example works that protected by copyright:

1. Books, articles, and other written works.


2. Magazines and newspapers.
3. Speeches, lectures, and oral presentations.
4. Letters.
5. Plays, musical dramas, and choreographed performances.
6. Musical compositions.
7. Drawings, paintings, architecture, sculptures, and engravings; artistic designs or
models.
8. Decorative designs or models for manufactured items.
9. Maps, plans, sketches, charts, and 3D works related to geography, architecture,
or science.
10. Scientific or technical drawings or models.
11. Photographs, slides, and similar visual works.
12. Movies, audiovisual works, and recordings.
13. Pictures, and advertisements
14. Computer programs.
15. Literary, academic, and artistic works.

The internet is a very rich source of such material, and we should make proper use of
them. These works are protected by their creation, regardless of their form or mode of
creation as well as their content, quality, and purpose. Now that copy and paste are
highly accessible commands in our computer toolbars, we should try not to violate the
copyright laws otherwise we could be accused of copyright infringement.

Copyright infringement

Copyright infringement occurs when a person or entity uses copyrighted material


without the permission of the copyright holder where the copyright holder has the right
to reduce, distribute, display or perform the protected works, Proper citations should be
used when including them in our output.

These are the guidelines on online use of copyrighted materials by Smaldino, Lowther
and Russel (2012):

1. Contrary to popular opinion, all material on the internet is copyrighted unless stated
otherwise: It is copyrighted even if it does not display the copyright symbol.
- Many will believe it's free if it's on the internet, but that is not true. Almost all
content online is copyrighted, which means that even without a copyright symbol
or warning, it's not true. This means that the person who has made the content
picture, video and article automatically holds the legal rights to whatever is done
with it when made. Unless the creator says their work is to be free-for-all, like
through a public domain notice or a creative commons license, you need
permission from that creator to use it.

2. An email is an original work, fixed in a tangible medium of expression, that is covered


by copyright. Hence it is recommended that you should not forward any email without
permission, in consideration of both copyright and Privacy Act.

- An email is original writing and thus protected automatically, like all other written
work. Being a creation of the individual and in a fixed form, it is covered by
copyright laws. If the sender does not permit forwarding his or her email, this may
be a violation of the rights of the sender. Sending other people's emails without
their permission might also violate privacy since the original content might
include personal or sensitive information. Respect of copyright and private
information requires that people seek permission from others before sending
other's emails or forwarding to other people.

3. Downloading an article from a newspaper’s website, making copies, and distributing


them to your students prior to a class discussion on the topic is permissible following the
current photocopying guidelines which permits making multiple copies for classroom
use. The expectation would be individually bylined, copyrighted articles, or articles from
a source specifically designed for the educational market where such articles cannot be
copied legally for class distribution (adapted from Becker, 2003)

- This means that if you download an article from a newspaper’s website, you are
allowed to make copies and give them to your students for a class discussion, as
long as you follow the current rules about photocopying for educational use.
However, if the article is individually copyrighted, you may not be allowed to
make copies and distribute it to your students without permission. In those cases,
reproducing the material for classroom use would likely violate the copyright
laws. To distribute material of this nature legally you will need to acquire
permission and pay for permission to print.
4. You cannot post students’ essays, poems, or other works on the school websites
unless you have permission of the students and their parents or guardians.

- You cannot publish on the school's website students' essays or poems without
permission from both the students and their parents or guardians. These works
are covered by copyrights, being the student's unique creation, and only the
creator can decide how their work is accessed. Apart from this, posting a
student's work may also raise privacy issues. Request permission: Always seek
permission, both at copyright and privacy level, before uploading any form of
work by students online.

5. Educators should treat copyrighted materials from the internet the same way they do
print formats. The best guideline is to always obtain permission. When in doubt, ask!

- Internet materials must be used under the same copyright rule as printed
materials, books, articles or magazines. The best policy is always to ask
permission to use them. However, if you are not sure if something can be used or
shared, then one must ask permission. This way to avoid copyright issues while
using it legally and responsibly.

Copyright vs. Plagiarism

Another violation of intellectual property is plagiarism. Although plagiarism and copyright


infringement are related ideas, these two are different.

Plagiarism refers to using someone else’s words, ideas, or any work from another
person as your own without proper credit that can be done either on purpose or it can
be accidental. It is a serious academic dishonesty that may lead to serious
consequences.

According to plagiarism.org, is an act of fraud; it involves both stealing someone else’s


work and lying about it afterwards. Plagiarism.org further elaborates the following as
plagiarism:

1. turning in someone else’s work as your own


2. copying words or ideas from someone else without giving credit
3. failing to put a quotation in quotation marks
4. giving incorrect information about sources
5. changing words but copying the sentence structure of a sources without giving
credit
6. copying so many words or ideas from a source that it makes up most of your
work whether you give credit or not.
The following are counted as plagiarism for images, videos, and music:

1. copying media like images from other websites to paste them into your own
papers or websites.
2. Making a video using footage from other videos or using copyrighted music as a
part or soundtrack.
3. Composing a piece of music that borrows heavily from another composition.

In other words, copyright is a right to the original creators of work like books, music, or
art whereby such creative works are protected against unfair use or use without
permission. Copyright ensures that the owner's control over how his or her work will be
shared and used while in plagiarism is taking somebody else's work, ideas, words etc.
without giving the appropriate permission, and publishing them as their own. Plagiarism
is a matter of ethics and honesty in how others' work is used.

V. APPLICATION

Synthesis/Learning insights
This lesson highlights the importance of digital citizenship that focuses on how
responsible and ethical we are to use technology. The integration of technology in
education enhances our communication and accessibility of numerous resources from
the internet while practicing ethical behavior in cyberspace. This connection fosters the
learning environment where learners collaborate with their peers and at same time to
their teachers. Cyberbullying is the most common form of bullying that many people
encounter in digital space. As netizens, we should be vigilant in our actions and words
before we comment on certain posts of others. Understanding the cyber rights, laws,
and responsibilities attains a respectful online environment. Online etiquette and privacy
protection are important factors in the growth of virtual communities and the learning
process has been entirely transformed with the help of educational websites and
portals.

In addition, educational platforms such as EdX and Coursera are being used for our
learning and to access high-quality education for everyone. It highlights also the
leveraging of these digital tools responsibly, particularly in the context of intellectual
property rights (IPR) and copyright laws, which maintain academic integrity, through
this, we will have a respectful digital space. It also discussed how to address plagiarism
and copyright infringement, as well as the importance of proper citation to avoid
unethical behavior. In this way, we could create a digital environment that encourages
creativity and original work, ensuring that everyone benefits from it, without breaking or
violating any rules, but rather to do it with proper use in our future works.
Technology-Integrated Assessment

Quizizz link:
https://quizizz.com/join/quiz/66ec22f995da7a3583886aa6/start?studentShare=true

Or scan this QR code:

Reflection

In today's digital age, teachers are given great social, ethical, and legal responsibilities
as they use technology. These responsibilities are all grounded by the principles of
digital citizenship, which emphasizes respectful, ethical, and legal use of digital tools.
More significant in these elements of digital citizenship are digital rights, law, and
security. Teachers need to model proper online behavior, data privacy, and intellectual
property protection in creating a culture of responsibility.

By understanding and applying Intellectual Property Rights or IPR in academic life is of


great importance. Copyright protects the original works from misappropriation, thereby
for the safety of the rights of creators. Teachers will be a great model before their
students in class, cite sources, and enable them to respect content as well. It even goes
to advising them on what consequences an academic institution and society may face in
terms of copyright infringement.

Teachers, by holding students responsible for appropriate technology use, function as


facilitators of learning and good digital citizenship. By encouraging these values in their
students, teachers ensure that they graduate as ethical, informed digital citizens.
VI. EVALUATION

John Lloyd Santos

1. Christian is planning to buy Christmas decorations for the upcoming Christmas. With
a limited budget and uncertainty about the quality of decorations and their prices, what
key aspect of digital citizenship should Christian focus on to make informed purchasing
decisions?
A. Digital Access
B. Digital Commerce
C. Digital Communication
D. Digital Security

2. Due to the typhoon Gener, Maverick’s school is transitioning to an online learning


platform, but some students do not have reliable internet access at home. What key
aspect of digital citizenship should the school focus on to ensure all students can
participate effectively?
A. Digital Access
B. Digital Communication
C. Digital Literacy
D. Digital Security

3. While Ms. Castro is using her cellphone, she receives an email from an unknown
sender that asks her to click a link and enter her personal information. What key aspect
of digital citizenship should Ms. Castro prioritize to protect herself?
A. Digital Communication
B. Digital Etiquette
C. Digital Health and Wellness
D. Digital Security

4. Marco has been feeling tired and strained after long hours of studying and reviewing
for the upcoming midterm examination. She decided to rest for about an hour. What key
aspect of digital citizenship is he addressing?
A. Digital Etiquette
B. Digital Health and Wellness
C. Digital Rights and Responsibilities
D. Digital Security

5. Class presentation is the final requirement in the 1st semester in the art lesson of
Noah. During a class presentation, Noah’s classmates notice that he used images from
the internet without giving credit to the original creators. What aspect of digital
citizenship is he neglecting?
A. Digital Access
B. Digital Law
C. Digital Literacy
D. Digital Security

6. In an online class, Ms. Reyes encourages students to share their thoughts, ideas,
and insights freely, ensuring that their students’ opinions are respected and valued.
What aspect of digital citizenship is the teacher promoting?
A. Digital Communication
B. Digital Law
C. Digital Literacy
D. Digital Rights and Responsibilities

7. During a group project, Lorenz prefers to communicate with his teammates through
instant messaging rather than email. What key aspect of digital citizenship is she
utilizing to enhance collaboration with their classmates?
A. Digital Communication
B. Digital Etiquette
C. Digital Law
D. Digital Security

8. It is the basic rules of conduct that technology users should adhere to be responsible
online citizens, promoting appropriate behavior and ethical decision-making.
A. Digital Communication
B. Digital Etiquette
C. Digital Literacy
D. Digital Rights and Responsibilities

9. Also known as Digital Fluency, is the understanding, use, and interaction of


technology, media, and digital resources in real-world situations. It involves responsible
use of technology, defining standards and behaviors.
A. Digital Access
B. Digital Health and Wellness
C. Digital Law
D. Digital Literacy
10. It is a responsible use of technology, adhering to standards and behaviors when
using digital resources. This includes individuals who engage in all aspects of society
through technology use.
A. Digital Citizenship
B. Digital Law
C. Digital Rights and Responsibilities
D. Digital Security

Floren Railey S. Francisco

11. What is the importance of keeping on your privacy setting in your social media
accounts?
A. It will make your social media look professional by not posting random
information.
B. To hide from your social life such as friends and relatives
C. For better security and limit the people who can see and access your
personal information
D. To prevent social media friends to see what you post

12. Which of these is the primary benefit of using technology in education?


A. Accessing information to selected websites
B. Restricting learning opportunities
C. Promote traditional teaching and learning
D. Expanding access to knowledge

13. How can the internet bridge communication gaps in education?


A. By forcing the students to attend onsite meeting
B. Use of digital tools with restrictions
C. Limitations i accessibility to online platforms
D. By enabling virtual classrooms and online forums

14. How does the technology facilitate teacher-student interactions?


A. By offering discussions inside the classroom only
B. By making an available time for everyone to meet in school
C. By having a real-time discussion in virtual classes and also in times of
inconvenience
D. Avoiding modern methods of teaching

15. Which of these is the most important rule to protect your personal data online?
A. By making all of your personal details available online
B. Posting pictures and videos of everyday happened
C. Limitations of engagements in social media
D. Limiting and being aware of social media access to your personal details

16. Which of these is NOT the importance of safe browsing?


A. Collecting reliable data of reliable sources
B. Malware and viruses are avoided
C. Downloading multiple files from various and unknown sources
D. Opening links from trusted sources to avoid scammers

17. What should you do to protect your personal data?


A. Use public wifi to save money
B. Providing personal data in all fill-up forms
C. Being aware to whenever you can safely put personal data
D. Engaging in public post and share harmful comments

18. How do you think artificial intelligence (AI) will likely impact education in future?
A. It will replace teachers and other professional workers because of its abilities
B. It will be a powerful tool to help us in many meaningful ways
C. It will be possibly banned in the future because everyone will be scared of the
things it can do
D. It will be just be out of date in the future

19. What do you think is the potential negative consequences of excessive use of
internet in education
A. It will reduced social interaction and physical activity
B. Enhanced academic performance
C. Multiple data can be collected everywhere for free
D. It will foster students critical thinking

20. What is the ethical responsibility of internet users in education?


A. To use online sources with integrity
B. To spread information from unsure sources
C. Disregarding the copyright issues in paper works
D. Avoiding to check plagiarism for works

Ana Marie Aguinaldo

21. What is cyberbullying?


A. A form of traditional bullying done in person
B. Bullying that occurs online or through digital devices
C. A type of physical harassment on the playground
D. Harmless online pranks between friends

22. Which of the following is an example of cyberbullying?


A. Sending positive messages to a classmate
B. Posting someone’s private information without their consent
C. Sharing funny memes with friends
D. Complimenting someone on social media

23. What should you do if you’re being


cyberbullied?
A. Fight back by sending rude messages
B. Ignore the situation and hope it goes away
C. Block the person and report the behavior to an adult
D. Delete your social media accounts

24. Who can be affected by cyberbullying?


A. Only students in middle and high school
B. Only people who use social media
C. Anyone, regardless of age or background
D. Only those who have a large social media following

25. Which of the following actions is a way to prevent cyberbullying?


A. Sharing your passwords with friends
B. Reporting inappropriate online behavior to a trusted adult or authority
C. Ignoring all messages you receive online
D. Reacting emotionally to mean comments

26. Why is cyberbullying sometimes more harmful than traditional bullying?


A. Because it can happen anonymously
B. Because people don’t have to read online messages
C. Because it is always face-to-face
D. Because it only happens at school

27. What role do bystanders play in cyberbullying?


A. They have no effect on the situation
B. They can either contribute to or help stop the bullying
C. They are usually the ones targeted by the bully
D. They should never get involved
28. Which of the following is NOT a sign that someone may be experiencing
cyberbullying?
A. Avoiding their phone or social media
B. Sudden changes in mood or behavior
C. Becoming overly excited when receiving online messages
D. Withdrawing from social activities

29. What is a good way to support someone who is being cyberbullied?


A. Encouraging them to fight back
B. Ignoring the problem and hoping it goes away
C. Listening to them and encouraging them to report the behavior
D. Sharing the story with more people to raise awareness

30. Which of these is the best example of cyberbullying?


A. Posting a meme that everyone finds funny
B. Ignoring someone’s text messages
C. Posting rumors or embarrassing photos about someone without
their consent
D. Complimenting a friend online in a sarcastic way

Mavie Joy Roco

31. These are the causes of cyberbullying, except?


A. Revenge
B. Lack of Empathy
C. Motivated
D. Deficient digital communication skills

32. What is the sign that a victim has been harassed or bullied?
A. The victim is isolated from everyone around them.
B. Want to have engagement with their peers.
C. Have energy to do their homework or tasks.
D. Motivated to participate in the classroom discussion.

33. In the causes of cyberbullying, Escapism refers to?


A. It refers to using emotionally charged hobbies as a means of escaping both
real life and personal concerns.
B. It describes how a member of a social group believes and abides by the
expectations, rules, and conduct of that group.
C. It creates a climate that encourages disrespect and wrongdoing in people without
additional penalties.
D. It pertains to someone who makes fun of someone's life and physical
appearance.

34. What is the effect of cyberbullying?


A. Emotional Distress
B. Mental Health Awareness
C. Gained interest in their hobbies
D. Improves their critical and social skills

35. What do you need to do if you've been harassed or bullied?


A. Keep it to yourself
B. Bully others for your revenge
C. Share it to your parents, friends, and even colleagues for them to be aware
of what you've felt.
D. Make fun if others been bullied

36. What are you going to do for others to be aware in the causes and effects of
cyberbullying?
A. Don't share the information that you have acquired.
B. Share your knowledge about the causes and effects of cyberbullying in the
use of online platforms.
C. Let them know the causes of cyberbullying by themselves.
D. Don't participate in the seminars regarding cyberbullying.

37. The following are the effects of cyberbullying, except?


A. Awareness of cyberbullying
B. Emotional Distress
C. Changes in behavior
D. Loss of interest

38. In the effects of cyberbullying, what are the disturbing things that victims might do?
A. Changes in sleep patterns
B. Self-esteem issues
C. Obsession with online activity
D. Suicidal Thoughts

39. This effect of cyberbullying can refer to insomnia.


A. Changed in sleep patterns
B. Decline in academic and work performance
C. Online gaming obsession
D. Mental health issues

40. The following are the effects of Cyberbullying except?


A. Lack of sleep
B. Feeling motivated in doing work and studying.
C. Feeling regretful and starting to question themselves.
D. Interest in online games and online platforms.

Angel Trisha Batalla

41. What do cyber rights primarily aim to protect?


A. Privacy and security in online interactions
B. Access to unlimited internet bandwidth
C. Intellectual property rights of software developers
D. Government control over online content

42. Which of the following is NOT a part of cyber rights?


A. Right to informational access
B. Protection from cyber threats
C. Freedom of speech
D. Right to own property

43. Cyber rights help ensure that individuals can.


A. Refrain from all kinds of communication
B. Openly express personal details
C. Don't discriminate towards online communities
D. only connect with family

44. What do cyber rights protect?


A. Physical safety
B. Job opportunities
C. Rights to privacy and speech
D. Personal wealth

45. What is liberty within the definition of cyber rights?


A. Avoiding all online interactions
B. Responsibility for one’s online actions
C. Absolute liberty without punishment
D. Giving merely good comments

46. The pursuit of happiness online allows individuals to:


A. Avoid all responsibilities
B. Pursue personal interests without interference
C. Connect only with friends
D. Ignore others

47. Living comfortably online means.


A. Paid content access
B. Not being harassed or hurt
C. Having fast internet
D. Being able to share memes

48. Why is it necessary to respect cyber rights?


A. Not to use technology
B. Restrict access to the internet
C. Ensure a safer online environment for all.
D. It promotes only positive content

49. Which statement best describes cyber privilege?


A. It is a type of internet subscription.
B. It is a legislation that safeguards online users.
C. It refers to the rights of all internet users.
D. It is the ability to connect effortlessly using technology.

50. Which one of the following is a demonstration of exercising cyber rights?


A. Respecting others’ opinions online
B. Ignoring privacy settings
C. Spreading false information
D. Harassing others in comments

Lara Mikas Tolentino

51.This act shall protect and secure the exclusive rights of scientists, inventors, artists
and other gifted citizens to their intellectual property and creations, particularly when
beneficial to the people, for such periods as provided in this Act.
A. Republic Act 10627 The Anti-Bullying Act
B. Republic Act 7877 The Anti – Sexual Harassment Act
C. Republic Act 9775: Anti-Child Pornography Act of 2009
D. Republic Acts 8293 The Philippines law on Intellectual Property

52. Liza takes Cloe’s identity and personal information (such as your social security
number) and uses it without her best friend’s consent to open new accounts, access
existing accounts, or seek medical services. What kind od cyber crime did Liza did on
her best friend?
A. Abuse of Connection
B. Bullying and Harassment
C. Identity theft
D. Internet Stalking

53. According to Durham University it is defined as an individual or group using


information and communication technology to repeatedly damage, harm and destruct
another person.
A. Fake News
B. Online Harassment
C. Online Damages
D. Spreading mean comments online

54. The following are the three (3) Types of Intellectual Property Rights according to
“Kiteworks.com expect,
A. Exclusive Rights
B. Moral Rights
C. Personal Rights
D. Statutory Rights

55. According to the University of Oxford, it is “Presenting work or ideas from another
source as your own, with or without consent of the original author, by incorporating it
into your work without full acknowledgement.
A. Copyright infringement
B. Piracy
C. Plagiarism
D. Stealing

56. ________ can happen via messaging on cell phones or other messaging services. It
also can happen through apps or direct messaging on social media sites.
A. Bullying
B. Harassments
C. Pornography
D. Sexting
57. The legal term "copyright," often known as "_________," refers to the ownership
rights that authors and artists have over their creative works.
A. Author’s Right
B. Person’s Right
C. Individual’s Right
D. Freedom of Rights

58. The most important area of respect we should demonstrate as a cyber citizen is for
the _______.
A. Environment
B. Law
C. People
D. Technology

59. Your daughter Lylia violated a cyber crime against an artist, as a mother would you
tolerate Lylia’s actions even if you would benefit from it.
A. No, because I will kick her out of our house.
B. No, because she benefits from something that she did not work for.
C. Yes, because I will receive money from Lylia’s earnings.
D. Yes, because she is my daughter and I’m supposed to support her.

60. James wrote and created a song for their adviser on Teachers' Day and showed it to
Mathew, who was scheduled to perform during the event. Mathew then copied and
played his best friend's original song without permission from the owner, James. What
Mathew did was?
A. Bullying and harassment
B. Copyright infringement
C. Unforgivable
D. Crime

Alice Inocencio

61. Cyber identity there are a range of ways we can be identified and recognized online.
A. True
B. False

62. Cyber footprinting is for copyright of your works.


A. True
B. False
63. Cyber property posted online automatically becomes the copyright protected
product of the creator.
A. True
B. False

64. The internet and cellular networks can be used to express frustration, anger and
cruelty to other people.
A. True
B. False

65. The Internet doesn't have a negative impact on our lives.


A. True
B. False

66. Cyber footprint examples photo, video and emails.


A. True
B. False

67. Cyber right is to protect people as they use the internet.


A. True
B. False

68. Netizens in cyberspace have a right and privacy to protect their identities.
A. True
B. False

69. Using identities of the person is legal to use without any consent.
A. True
B. False

70. The cyber foot-print can be identified and recognized online. It can start on your
name and to get your addresses
A. True
B. False

Dianne Faith Escartin

71. It is a guideline that advises people on how to communicate and treat others when
interacting online
A. Ethics
B. Netiquette
C. Good communication
D. Online rules

72. Avoiding this kind of behavior online maintains a respectful and can create creative
environment
A. Don’t troll people in web forums or website comments by repeatedly nagging or
annoying them
B. Avoid replying to negative comments with more negative comments.
C. If someone asks question and you know the answer, offer to help
D. Avoid posting inflammatory or offensive comments online

73. Which of the following does the term “netiquette” refer to?
A. The laws about using technology
B. Skills that need to operate internet
C. Behavior and etiquette in online that should follow while communicating
online
D. The rules for correcting grammar

74. When participating in an online discussion forum, what is an appropriate response


or reply if you disagree with someone’s opinion?
A. Just ignore them
B. Leave the conversation
C. Say that their opinions is not a matter
D. Respectfully state your disagreement and provide a valid reason

75. What is the proper way to communicate with a professional online?


A. Maintain a formal tone and clear language
B. Use capital letters
C. Use slang and emojis
D. Using too many abbreviations

76. It is an online platform that provides users with access to different resources
including articles, instructional videos, quizzes, interactive activities, and practice to
support the learning and educational needs.
A. Technology
B. Educational site and portal
C. Website
D. Internet
77. Their mission is to provide free access to a world-class education for everyone.
Whether you are looking to explore a new topic or advance your knowledge.
A. Internet Archive: archive.org
B. Big Think: bigthink.com
C. Futures Channel: thefuturechannel.com
D. Academic Earth: academicearth.org

78. This platform is designed for high school students. It offers thousands of study
videos that are related to their subjects such as math, science, and English. It helps
students to understand complex topics easier.
A. Coursera: courser.org
B. EdX: edx.org
C. Brightstorm: brigthstorm.com
D. Internet Archive: archive.org:

79. The primary goal of this website is to connect students with real-world applications
of STEM (Science, Technology, Engineering, and Mathematics) . They provide a variety
of multimedia content like micro-documentaries and lesson plans to help educators to
engage students and how STEM is used in various careers.
A. Brightstorm: brigthstorm.com
B. Futures Channel: thefuturechannel.com
C. Coursera: courser.org
D. Internet Archive: archive.org

80. Which of the following shows the example of good netiquette?


A. Ignoring others opinions in online discussion
B. Post and share other personal information without their proper consent
C. Use capital letter always when chatting to someone
D. Respond to the question message if we know the answer to their question

Sheind Sebastian

81. An Act prescribing the Intellectual Property Code and establishing the Intellectual
Property.
A. Republic Act 8392
B. Republic Act 9382
C. Republic Act 8293
D. Republic Act 9283
82. What percentage of graduate students reported paraphrasing or copying sentences
from written sources without footnoting?
A. 14%
B. 25%
C. 38%
D. 25%

83. How many undergraduate students admitted to fabricating or falsifying a


bibliography?
A. 3%
B. 7%
C. 14%
D. 24%

84. What percentage of graduate students reported submitting work done by another
person as their own?
A. 3%
B. 7%
C. 2%
D. 4%

85. According to WIPO, intellectual property rights refer to creations of the mind. Which
of the following is NOT included in this definition?
A. Inventions
B. Literary works
C. Financial assets
D. Designs

86. Which organization is responsible for protecting intellectual property rights in the
Philippines?
A. Department of Education
B. Department of Trade and Industry
C. Intellectual Property Office of the Philippines (IPOPHIL)
D. World Intellectual Property Organization (WIPO)

87. WIPO stands for?


A. Work Intellectual Property Organization
B. World Intellectual Protection Organization
C. Word Intellectual Property Organization
D. none of the above
88. Which of the following best describes intellectual property rights?
A. Rights over physical property
B. Rights held by individuals or companies over their mental creations
C. Rights to government-provided resources
D. Rights related to employment contracts

89. What is the primary role of the Intellectual Property Office of the Philippines
(IPOPHIL)?
A. Provide legal counsel to students
B. Administer and implement state policies related to intellectual property
C. Conduct surveys on plagiarism
D. Monitor academic performance of students

90. This is the rights given to persons over the creations of their minds.
A. World Intellectual Property Organization
B. Intellectual Property Rights
C. Exclusive Rights
D. Digital Rights and Responsibilities

Juliana Valerie Panganiban

91. Which of the following statements is true about the use of online content?
A. Which of the following statements is true about the use of online content?
B. Incorporate internet content, but only if the copyright symbol is not present.
C. Most online content is copyrighted, even if there's no copyright symbol.
D. Content from education websites is automatically free to use.

92. Which of the following is plagiarism?


A. Quoting an author and correct citation
B. You are claiming someone else's work as your own
C. Use of own thoughts in a composition
D. Credit is given to the source

93. What is the best solution that will prevent copyrighting?


A. Use the work if no copyright symbol is displayed.
B. All on the internet should be considered free to use.
C. Seek permission from the owner
D. Change the work a little before using it
94. What is the difference between copyright infringement and plagiarism?
A. Copyright infringement involves using someone’s work without
permission, while plagiarism is about using someone’s work without
crediting them.
B. Both plagiarism and copyright infringement are alike.
C. Copyright infringement is legal, but plagiarism is illegal.
D. Copyright infringement is about using someone’s work without crediting them,
while plagiarism involves using someone’s work without permission.

95. Which of the following is a rule regarding forwarding email messages?


A. E-mail messages are freely forwardable
B. You may be violating both copyright and privacy laws if you forward an
email message or use another email address
C. The e-mail messages are not original works
D. Only personal e-mail messages are subject to copyright

96. The teacher wants to show copyrighted materials in class. What should she do?
A. Download and distribute any content online without charge
B. Comply with photocopied materials rules and obtain copyright owner
permission
C. Upload copyrighted materials on the school website
D. Do not use any online resources

97. What is NOT an example of plagiarism?


A. Copying phrases from a source without giving credit
B. Changing the wording but retains the source sentence arrangement without
mentioning the source
C. Using your words and ideas in an original paper
D. A quote without quotation marks

98. You have copyrighted music in a video and do not have the creator's permission.
What is the consequence?
A. Automatically legal if it's personal use
B. It could be considered copyright infringement
C. Just must give credit to the artist in the video description
D. Doesn't count as a violation if it's edited

99. Which of the following is true about posting student work online?
A. Fine so long as posted on a school site. No permission necessary.
B. Posting the children's writing will only be okay if you have permission from
the students and their parents or guardians first.
C. Everything created by the kids falls into the public domain.
D. Fine if work is posted online but anonymously.

100. Which of the following statements is TRUE about copyright and internet materials?
A. All internet content is automatically allowed as long as it's for personal use.
B. You can freely use and share any online material without permission.
C. Internet materials are protected by copyright and require permission to
use.
D. Only materials that indicate copyright symbols are protected by copyright.

VII. SUGGESTED READINGS AND WEBSITES

Book:

Technology for Teaching and Learning 1 by Bilbao et al., n.d.: From this
comprehensive book, a lot of our discussions use this book as our reference.

Website:

Alwin Asuncion, Lesson 7 Social Ethical and Legal Responsibilities in The Use of
Technology Tools and Resources,
https://www.scribd.com/document/501883213/Lesson-7-Social-Ethical-and-Legal-Respo
nsibilities-in-the-Use-of-Technology-Tools-and-Resources
We utilized this website to get information from a certain topic because it covers a lot
from our topic.

ANSWER KEY

Technology-Integrated Assessment (Quizizz)

1. Cyber Rights
2. Plagiarism
3. Educational Sites and Portal
4. Copyright
5. Child pornography
Evaluation 33. A 67. A
34. A 68. A
1. C 35. C 69. B
2. A 36. B 70. A
3. D 37. A 71. B
4. B 38. D 72. D
5. B 39. A 73. C
6. D 40. B 74. D
7. A 41. A 75. A
8. B 42. D 76. B
9. D 43. C 77. D
10. A 44. C 78. C
11. C 45. B 79. B
12. D 46. B 80. D
13. D 47. B 81. C
14. C 48. C 82. D
15. D 49. D 83. C
16. C 50. A 84. A
17. C 51. D 85. C
18. B 52. B 86. C
19. A 53. B 87. C
20. A 54. C 88. B
21. B 55. C 89. B
22. B 56. D 90. C
23. C 57. A 91. C
24. C 58. B 92. B
25. B 59. B 93. C
26. A 60. A 94. A
27. B 61. A 95. B
28. C 62. B 96. B
29. C 63. A 97. C
30. C 64. A 98. B
31. C 65. B 99. B
32. A 66. A 100. C
VIII. REFERENCES

Binar, M. (2024, July 25). Intellectual property: everything you need to know to protect it
from theft or misuse. Kiteworks | Your Private Content Network.
https://www.kiteworks.com/risk-compliance-glossary/intellectualproperty/#:~:text=
Consequences%20of%20Intellectual%20Property%20Infringement,punitive%20d
amages%2C%20and%20attorney's%20fees.

Bhattacharya, S., & Saha, C. (2011). Intellectual property rights: An overview and
implications in pharmaceutical industry. Journal of Advanced Pharmaceutical
Technology Amp Research, 2(2), 88. https://doi.org/10.4103/2231-4040.82952

Definitions (FAQ) | U.S. Copyright Office. (n.d.).


https://www.copyright.gov/help/faq/faq-definitions.html#:~:text=As%20a%20gene
ral%20matter%2C%20copyright,permission%20of%20the%20copyright%20owne
r.

Copyright. (n.d.).
https://www.wipo.int/copyright/en/#:~:text=Copyright%20(or%20author's%20right)
%20is,%2C%20maps%2C%20and%20technical%20drawings.

R.A. 8293. (n.d.).


https://lawphil.net/statutes/repacts/ra1997/ra_8293_1997.html#:~:text=It%20shall
%20protect%20and%20secure,property%20bears%20a%20social%20function.

Plagiarism | University of Oxford. (n.d.).


https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism#:~:text=%E2
%80%9CPresenting%20work%20or%20ideas%20from,your%20work%20without
%20full%20acknowledgement.

Bailey, J. (n.d.). Criminalizing plagiarism in the Philippines.


https://www.ithenticate.com/plagiarism-detection-blog/bid/87800/Criminalizing-Pl
agiarism-in-the-Philippines#:~:text=This%2C%20according%20to%20Departmen
t%20of,if%20prosecuted%20under%20the%20law.

What is online harassment? - Report + Support - Durham University. (n.d.).


https://reportandsupport.durham.ac.uk/support/what-is-online-harassment#:~:text
=Definition,humiliation%20in%20an%20online%20setting.

Morgan, K. K. (2023, December 7). What is sexting? WebMD.


https://www.webmd.com/sex/what-is-sexting
Gordon, S. (2023, March 29). Cyberstalking: Definition, signs, examples, and
prevention. Verywell Mind.
https://www.verywellmind.com/what-is-cyberstalking-5181466

What is Identity Theft? | Office of the Attorney General. (n.d.).


https://www.texasattorneygeneral.gov/consumer-protection/identity-theft/what-ide
ntity-theft#:~:text=Identity%20theft%20happens%20when%20someone,accounts
%2C%20or%20obtain%20medical%20services.

Indeed editorial team, (2024). What Is Netiquette? (With 10 Basic Rules To Follow) |
Indeed.com

Dalian huamei school, (2022). Digital Etiquette - Digital Citizenship - LibGuides at


Dalian American International School

Studyingalpa.com, (2023). What is an Educational Website and How Can It Benefit


You? – Mastering the Art of Learning with Computer Devices
(studyingalpha.com)

Leighton, M. (2021). What Is edX and How Does It Work? We Break Down the FAQs.
(businessinsider.com)

Academic Earth, (2024). Frequently Asked Questions | Academic Earth

Internet Archive, (2014). Internet Archive: Digital Library of Free & Borrowable Books,
Movies, Music & Wayback Machine

Big think, (2007) All Videos - Big Think

Coursera, (2024)
Coursera | Online Courses & Credentials From Top Educators. Join for Free

Brightstorm, (2009). Brightstorm - YouTube

Ferdis Intellectual Property Law (2004 & 2005)


https://www.federislaw.com.ph/faqs-resources/copyright/

Purita B. Bilbao, EdD, Ma. Asuncion Christine V. Dequilla, PhD Technology for Teaching
and Learning 1: Intellectual Property Rights on the Development and Use of
Digital Materials
Zayed, A., MD. (2024, May 1). Cyberbullying and internet addiction: causes, signs, and

prevention - The Diamond Rehab Thailand. The Diamond Rehab Thailand.

https://diamondrehabthailand.com/cyberbullying-and-internet-addiction/

My E-Class in Bytes. (2022, September 24). Digital Citizenship | EDUC 7 [Video].

YouTube.

https://www.youtube.com/watch?v=_QF0VNG6x0s

You might also like