0% found this document useful (0 votes)
20 views37 pages

Module 7 Social Ethical and Legal Responsibilities

Module 7 focuses on the social, ethical, and legal responsibilities associated with the use of technology tools and resources, aiming to develop globally competent digital teachers. It emphasizes the importance of digital citizenship and the nine elements of digital citizenship, including digital access, commerce, communication, literacy, and etiquette. The module encourages engagement through activities like creating a photo essay and exploring rights and responsibilities as both Filipino citizens and internet users.

Uploaded by

aeronibea8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views37 pages

Module 7 Social Ethical and Legal Responsibilities

Module 7 focuses on the social, ethical, and legal responsibilities associated with the use of technology tools and resources, aiming to develop globally competent digital teachers. It emphasizes the importance of digital citizenship and the nine elements of digital citizenship, including digital access, commerce, communication, literacy, and etiquette. The module encourages engagement through activities like creating a photo essay and exploring rights and responsibilities as both Filipino citizens and internet users.

Uploaded by

aeronibea8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

DR. JEAN RACHEL A.

BARROGA

MODULE 7
Social, Ethical and Legal Responsibilities
in the Use of Technology Tools and
Resources

Desired Learning Outcome

At the end of this module 7, make a photo essay on Globally Effective and Globally Competent
Digital Teacher.

ENGAGEMENT

This is the first phase of your module you engage yourself with activity that clarifies about social,
ethical use of technology tools and resources. So, I want you to focus so that you can accomplish the
given learning activity below.

Write your prior knowledge about Social, Ethical and Legal Responsibilities in
the Use of Technology Tools and Resources.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

EXPLORE

Are you a Filipino citizen? As a member of a smaller Filipino community such as a


barangay or a subdivision, what are your rights and responsibilities? Do you use the internet? Are
you a member of a cyberspace community? What are your rights and responsibilities as a user of
the internet?

Fill out the Venn Diagram below for your answers.

My Rights and Responsibilities

As Internet User
As Filipino Citizen

Look at your answers. Did you have similar answers in both figures? If yes, write them in the center
of the Venn diagram. Explain your answer.

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

EXPLAIN

In this phase of your module you are going to clarify and filter the Information that you have
gathered in your learning activities about social, ethical use of technology tools and resources.

Smile and relax! And enjoy reading the content of this module.

LESSON 1: DIGITAL CITIZENSHIP VS GLOBAL CITIZENSHIP

Since we are considered citizens of the community we live in, then as users of the internet we
can also call ourselves as citizens of the digital world where we live learn, and work in an
interconnected manner. Digital citizenship is an idea that all persons using the internet have civic
rights and responsibilities. It centers around safe, savvy/ know how and ethical use of technology.

The Citizenship in the Digital Age


Characteristics of a Good Citizen Characteristics of a Good Digital Citizen
A good citizen: A good digital citizen:
1. Advocates for equal human rights for all. 1. Advocates for equal digital rights and access for all.
2. Treats others courteously and never bullies. 2. Treats others with respect in online spaces and
never cyberbullies.
3. Does not steal or damage others’ property or 3. Does not steal or damage others’ digital work,
persons. identity or property.
4. Communicates clearly, respectfully and with 4. Makes appropriate decisions when communicating
empathy. through a variety of digital channels.
5. Actively pursues an education and develops 5. Uses digital tools to advance their learning and
habits for lifelong learning. keeps up with changing technologies.
6. Spends and manages money responsibly. 6. Makes responsible online purchasing decisions and
protects their payment information.
7. Upholds basic human rights of privacy, 7. Upholds basic human rights in all digital forums.
freedom of speech, etc.
8. Protects self and others from harm. 8. Protects personal information from outside forces
that might cause harm.

9. Proactively promotes their own physical and 9. Proactively limits health risks of technology, from
mental health. physical to psychological
A digital citizen is a person using information technology in
Source: https://elearninginfographics.com/citizenship-digital-age-infographic/
order to engage in society, politics, and government.
As defined by Karen Mossberger, one of the authors of
PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1 Digital Citizenship: The Internet, Society, and Participation,
digital citizens are "those who use the internet regularly
and effectively." Wikipedia
DR. JEAN RACHEL A. BARROGA

Summing up, a global citizen sees the world as a community in which all people live and
prosper together. He/she understands that his/her actions contribute to the values of the entire planet
and he/she is concerned on how he/she participates in and contributes to the entire world. A digital
citizen, on the other hand, adheres to guidelines that govern the ethical and responsible use of
technology and acts responsibly in all relationships and interactions in the digital world.

When we mix these two together, it's the perfect recipe for the Global Digital Citizen. A
global digital citizen is a responsible, ethical citizen leveraging technology to foster community on a
global scale through connection and compassion. The Global Digital Citizen understands that we can
govern technology for the benefit of both ourselves and others. It is a citizen that views the world as
an interconnected community. Additionally, the digital citizen realizes that we simultaneously share
technological and human experiences regardless of culture, status, or political religious beliefs
(Watanabe-Crockett, 2017).

Nine Elements of Digital Citizenship according to Ribble and Bailey

1. Digital Access: Full electronic participation in society

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Technology users need to be aware of and support electronic access for all to create a
foundation for Digital Citizenship.
 Digital exclusion of any kind does not enhance the growth of users in an electronic
society.
 All people should have fair access to technology no matter who they are.
 Places or organizations with limited connectivity need to be addressed as well.
 To become productive citizens, we need to be committed to equal digital access.

Scenario
Scenario

The students in a fifth-grade science class have been given the task of watching a 20-
minute Discovery Education streaming movie for homework. They have one week in
which they are to watch the on-line movie and take the on-line quiz.
Inappropriate Appropriate

The students have been told that they will The teacher gives the assignment that all
receive a “zero” if they do not watch the students are to view the movie and take
movie and take the quiz at home, even the quiz. For students who do not have the
though some students do not have Internet appropriate Internet connections at home,
he offers the opportunity for them to come
access, and some students who do have
to his classroom 30 minutes before school
Internet access, have a dial-up connection. starts, or come to his classroom after
school, or take home a CD with the movie
and a printed quiz so they may complete
the assignment.
What could make a Difference

When giving on-line assignments for students to complete outside of school, it is


important to remember that they may not have access to the Internet. For some this
may be an on-going situation and for others it may be a temporary non-access issue.
Since the Internet is a valuable resource, teachers need to provide alternative ways
for the students to access the information in order to complete assignments.

2. Digital Commerce: The buying and selling of goods online.

 Technology users need to understand that a large share of market economy is being done
electronically.
 Legitimate and legal exchanges are occurring, but the buyer or seller need to be aware of the
issues associated with it.
 The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has
become commonplace to many users.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 At the same time, an equal amount of illegal/immoral goods and services are surfacing such as
pornography and gambling. Users need to learn about how to be effective consumers in a new
digital economy.

Scenario
Melissa, who recently celebrated her 15 th birthday, received an $1000 check from her
rich grandmother. She deposited the check in her bank account for which she has a debit
card. Melissa’s home internet connection is temporarily down, so she rides with her older
sister to the local public library to use the computer there. While on the eBay site, she sees
that they have just what she wants – a brand new Wii for only $10.00!

Inappropriate Appropriate

Excitedly, Melissa takes her debit card Melissa realizes that a new Wii could
and bids on the item. She has watched her not possibly sell for $10.00. She looks
father do this before and knows just what at other Wii’s that are listed on eBay
to do. She wants to make sure she is the and sees that the winning bids have
highest bidder so she quickly enters her averaged around $275. She really wants
debit card information and selects $300 as the Wii but is uncomfortable putting her
her maximum bid. She doesn’t log off as debit card information online to
she leaves the library computer. purchase something for which she is
unsure of the final price. She logs off
the library computer and goes home.

What could make a Difference

Melissa would do well to go to a store that sells retail Nintendo products such as the Wii. She
will know the exact price of the new product she is purchasing plus she will have a receipt in
order to return it if it does not work properly. Her parents and teachers would do well to advise
her to be careful where she uses her debit card as that card is the “key” to her checking
account funds.

3. Digital Communication: The electronic exchange of information

 One of the significant changes within the digital revolution is a person’s ability to
communicate with other people.
 In the 19th century, forms of communication were limited.
 In the 21st century, communication options have exploded to offer a wide variety of choices
(e.g., e-mail, cellular phones, instant messaging).

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 The expanding digital communication options have changed everything because people are
able to keep in constant communication with anyone else.
 Now everyone has the opportunity to communicate and collaborate with anyone from
anywhere and anytime.
 Unfortunately, many users have not been taught how to make appropriate decisions when
faced with so many different digital communication options.

Scenario

Parents of students in Ms. Parker’s sixth grade class were terrified earlier in the school year
when they learned there was an armed intruder at the middle school. Since that incident,
almost all of the students in the sixth grade, at the direction of their parents, now bring cell
phones to school in order to be able to contact parents in case of any future emergency.

Inappropriate Appropriate

The students are delighted to finally have Mrs. Parker discusses with the students the
their own cell phones. They set their cell phone issue. While she understands their
“interesting” ring tones on loud rather than parents’ wishes that they have a phone, she
setting the phone to vibrate or turning it off. reminds them that they are only to be used
Whenever possible, they take the phones out for emergency purposes and that they will be
and use them to text messages to their confiscated if they are out of backpacks or if
classmates in and out of Mrs. Parker’s class. the ring tone is audible. She also tells them
They also take unflattering photos of Mrs. that her principal has requested that all
Parker behind her back and send them to teachers follow the same rules with their own
classmates as well. cell phones.

What could make a Difference

All of these students actually have a mini-computer in their possession. Imagine how things would
change if Mrs. Parker started using the cell phones as classroom technology tools. Students could
text their grammar sentences to her. Students could use the video options to record each other
rehearsing speeches and then review the videos to critique themselves. Students could use the
calculator functions during the math period. Students could make photo documentation of science
experiments.
4. Digital Literacy: Process of teaching and learning about technology and the use of technology.

The capability to use digital technology and knowing when and how to use it

 While schools have made great progress in the area of technology infusion, much remains to be
done.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 A renewed focus must be made on what technologies must be taught as well as how it should be
used. New technologies are finding their way into the work place that are not being used in schools
(e.g., videoconferencing, online sharing spaces such as wikis).
 This process requires sophisticated searching and processing skills (i.e., information literacy).
Learners must be taught how to learn in a digital society.
 As new technologies emerge, learners need to learn how to use that technology quickly and
appropriately.
 Digital Citizenship involves educating people in a new way— these individuals need a high degree
of information literacy skills.

Scenario

The students in Ms. Rubin’s class have been assigned to do a report on an endangered species.
Ellen does a Google search for endangered species and comes across an article on the “Pacific
Northwest Tree Octopus.” She has never heard of this animal and is excited to learn about it.
Based on this one website, she chooses her research topic

Inappropriate Appropriate

Ellen takes notes about the Pacific Ms. Rubin would do well to instruct her
Northwest Tree Octopus from this one students as to the fact that everything on the
website. She does not look for any other Internet is not true. Students should learn to
sources to confirm the information that consult various sources to determine the
she has found. She is so excited about this
validity of information they obtain on the
endangered animal, that she starts her
own campaign to educate others about Internet. Students could use a checklist with
this animal and to raise funds to save the things to look for to prove the authenticity
Pacific Northwest Tree Octopus. of a site’s information

What could make a difference

Before beginning a research unit, the teacher should actually lead a lesson where students are
sent to bogus web sites and asked to report back on their findings. This would then lead to the
discussion as to how one knows whether or not a digital source is reliable. The Pacific
Northwest Tree Octopus, Save the Mountain Walrus, Geno Choice, and The Sellafield Zoo can
help students develop their critical thinking abilities to discriminate between real and bogus on-
5.
line Digital Etiquette : Electornic Standards of Conduct or Procedure
information.

The standards of conduct expected by other digital technology users.


 Technology users often see this area as one of the most pressing problems when dealing with
Digital Citizenship.
 We recognize inappropriate behavior when we see it, but before people use technology they
do not learn digital etiquette (i.e., appropriate conduct).

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Many people feel uncomfortable talking to others about their digital etiquette.
 Often rules and regulations are created or the technology is simply banned to stop
inappropriate use.
 It is not enough to create rules and policy; we must teach everyone to become responsible
digital citizens in this new society.

Scenario

A disgruntled/ resentful parent whose child did not qualify for the gifted program sends an
e-mail to the gifted teacher with questions as to the ineligibility decision. After several e-
mails back and forth between the teacher and the parent, the parent expresses her anger
about the fact that, despite her protestations, her very bright child is not eligible by sending a
final e-mail to the teacher. This final e-mail has many words in all caps and ends with
“WTF.”

Inappropriate Appropriate

After the teacher finds out what the initials When the second round of e-mails started,
“WTF” stand for, she responds immediately the teacher called the parent. The teacher
with an angry e-mail. Her e-mail also has calmly listened to the parent and tried to
many words in all caps and ends with “don’t respond to her questions without emotion.
send me any more e-mails or I will have you When the parent continued, after the
charged with harassment.” phone call, to send angry e-mails, the
teacher notified the principal and asked
her to speak with the parent about this
situation

What could make a difference

The discussion about digital etiquette needs to occur at faculty meetings or in staff development
trainings. Teachers cannot control what a parent sends in an e-mail, but they can control how
they should respond. A few things to keep in mind are: 1) never respond in haste, 2) never put
anything in writing that you wouldn’t say face to face, and 3) remember that anything that is
put in an e-mail can be retrieved at a later date.
6. Digital Law : Electronic responsibility for actions and deeds

The standards of conduct expected by other digital technology users


 Digital law deals with the ethics of technology within a society.
 Unethical use manifests itself in form of theft and/or crime.
 Ethical use manifests itself in the form of abiding by the laws of society.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Users need to understand that stealing or causing damage to other people’s work, identity, or
property online is a crime.
 There are certain rules of society that users need to be aware in a ethical society. These laws
apply to anyone who works or plays online.
 Hacking into others information, downloading illegal music, plagiarizing, creating destructive
worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or
property is unethical.

Scenario

Mr. Gilbert, a 5th grade teacher, is compiling a collection of student photos and converting
them to a movie using Animoto on-line software. Although the Animoto site offers non-
copyrighted music, the teacher wants the background music for the movie to be something
the students will recognize. The students will not recognize any of the songs this site offers.

Inappropriate Appropriate

Mr. Gilbert’s son has a Chris Brown C.D. Animoto is a free website for compiling
He decides to borrow it and download the photos into a movie format. Mr. Gilbert is
song, “With You”, as the background lucky that he knows about this site. There is
music for the movie. He knows this song a disclaimer on the website that advises the
is very popular with the students, and users to choose either the copyright-free
knows they will enjoy the movie so much music on their site or any other music for
more if they can sing along with the which they have secured written permission
background music. He finishes creating to use. Mr. Gilbert heeds that advice and
his movie and then uploads the movie he uses music on the Animoto site.
has made to his teacher website.

What could make a difference

Perhaps there are students who play an instrument and have composed original music or can play
music that is in the public domain as the background music for the movie. It is important that
teachers understand that copyright rules apply to them, even if they are doing things for
7. Digital Rights
educational andThere
purposes. Responsibilities : those
is a misconception freedoms
among extended
many to everyone
educators in acan
that they digital world.
do anything
with digital media as long as it is for educational purposes.
The privileges and freedoms extended to all digital technology users and the behavioral
expectations that come with them

 Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights
extended to every digital citizen.
 Digital citizens have the right to privacy, free speech, etc.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Basic digital rights must be addressed, discussed, and understood in the digital world. With these
rights also come responsibilities as well.
 Users must help define how the technology is to be used in an appropriate manner. In a digital
society these two areas must work together for everyone to be productive.

Scenario

Mrs. Walker is a fourth grade teacher who is introducing a new unit on the American
Revolution to her students. She creates a beautiful PowerPoint presentation in which she has
photos of famous people and places from that time period. She obtained these photos by doing
a Google image search.

Inappropriate Appropriate

Mrs. Walker’s PowerPoint presentation, Mrs. Walker’s “beautiful” PowerPoint


while “beautiful”, gives no credit to the presentation is made possible by the images
source of her photos. She does have a slide she has gained from many different web
that says “photos obtained from Google”, but sources. She acknowledges the source at the
she has not cited the individual sources of bottom of each photo that she inserts into
each photo because she doesn’t realize there the PowerPoint. She also makes it a point to
is an individual source. She assumes that explain this to her students
Google posts all of these images.

What could make a difference

Students will do the things their teachers model. If a teacher expects that her
students will cite sources, it is imperative that she do the same thing with any and
all media (print, digital, audio) that she uses in her classroom. Teachers need to
be educated about search engines and how to locate images that are intended for
educational use.
8. Digital Health and Wellness: Physical and psychological well- being in a digital world.

The privileges and freedoms extended to all digital technology users and the behavioral
expectations that come with them

 Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to
be addressed in a new technological world.
 Beyond the physical issues are those of the psychological issues that are becoming more
prevalent such as Internet addiction.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Users need to be taught that there is an inherent danger of technology.


 Digital Citizenship includes a culture where technology users are taught how to protect
themselves through education and training.

Scenario

The four computers in Mrs. Anderson’s room are placed on four different tables in an
“Inspired Classroom” arrangement. She teaches students in the first grade. She doesn’t
have desks, but rather tables and adult-sized chairs in her classroom.

Inappropriate Appropriate

The young students are anxious to work on The tables in the classroom have been
the computers. If they sit in the chairs, they lowered so that the students can look at the
have to strain their neck to look up to the computer screen without neck strain.
computer screen. Some of the students have Remote keyboards enable the students to
taken to actually sitting or kneeling on top of put the keyboards in their lap while they
the table when they work on the computer. are typing.
They do this so they can both see the screen
and work on the keyboard and use the mouse
more comfortably.

What could make a difference

It is difficult at times to get “child-size” furniture. Not only are computers


themselves designed for adult hands, but tables and chairs that can accommodate
computer equipment are often adult-sized as well. Wouldn’t it be great if
someone developed some computer furniture designed for a young student so that
there were no negative posture issues associated with computer use.

9. Digital Security (Self- protection): Electronic precaution to guarantee safety.

The precautions that all technology users must take to guarantee their personal safety and
the security of their network
 In any society, there are individuals who steal, deface, or disrupt other people.
 The same is true for the digital community. It is not enough to trust other members in the
community for our own safety.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 In our own homes, we put locks on our doors and fire alarms in our houses to provide some
level of protection. The same must be true for the digital security. We need to have virus
protection, backups of data, and surge control of our equipment.
 As responsible citizens, we must protect our information from outside forces that might cause
disruption or harm.

Scenario

Ms. Perlman gets an e-mail message from someone she does not know. She opens the e-mail
message which has an attachment with it. The attachment is entitled “dancing pigs.” She has
had a stressful day and feels that she could use a good laugh. The attachment “dancing pigs”
might be funny.

Inappropriate Appropriate

Ms. Perlman opens the e-mail. When she Ms. Perlman opens the e-mail and realizes
does, her computer starts doing crazy things that she does not know the sender. She
and within a period of five minutes, the remembers that she has been advised to not
computer has crashed. Ms. Perlman open e-mail attachments from a stranger.
immediately runs to the school technology Even though the attachment title sounds
coordinator to tell her that something is wrong interesting, she deletes the message without
with her computer. opening the attachment. She continues
checking e-mail.

What could make a difference

Teachers need to be reminded often of digital security issues, including something as simple as
opening attachments from unknown sources. Educators must be reminded that, although there are
many virus detection devices and firewalls on school computers, they must still use common sense
and good judgment.

The 5 TENETS OF THE GLOBAL DIGITAL CITIZEN

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

https://globaldigitalcitizen.org/21st-century-fluencies/global-digital-citizenship?__hstc=71880012

As a future global digital teacher these tenets holds very crucial roles in the modern innovative
classroom. They include things like:

a) an understanding of technology and its benefits/dangers to students.


b) knowledge and appreciation of the diverse cultures of our globe.
c) an awareness of local, community, and global environments.
d) moral and ethical modelling that helps students achieve success and safety in online and
offline environments.
e) experience with many mediums of technology and communication.
f) adaptability and creativity.
g) life-long learning capability.

PERSONAL RESPONSIBILITY

This is about shifting responsibility for learning the


student and developing a sense of accountability for
lifelong learning.
It Includes demonstrating how we manage
ourselves in matters such as personal finance,
ethical and moral boundaries, personal health and
wellness, and relationships of every kind, both
online or offline.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

In order for a teacher to practice personal responsibility one must move around the classroom
directing and facilitating learning. In doing so, they are modelling ethical practice. They’re shaping
the moral and ethical mindsets of students by what they do and what they don’t do. Our learners’
time in school is formative and developmental. They are discovering and learning about
themselves by asking questions, making choices, and breaking mental and physical boundaries.
Students are exploring, taking risks and experimenting.

“Teaching is about building relationships. In such a culturally abundant world,


global citizenship is the business of every teacher.”
We can’t expect students will simply become global digital citizens on their own. They
need observation, encouragement, and supervision. This is the personal responsibility we practice
and that they experience firsthand. What about responding to questionable behavior? This isn’t
something we can approach from emotion. We must be fair, even- handed and understanding. Also
we must be able to turn such situations into learning and growth opportunities, both for ourselves and
our students. The global digital teacher values tolerance and mindful action and demonstrates this
in their own classroom practices.

GLOBAL CITIZENSHIP

We are all global citizens.


Global Citizenship involves recognizing and
respecting how 21st – century technology and
digital media have eliminated boundaries
between citizens of the world by enabling
communication, collaboration, dialogue, and
debate across all levels of society.
Teaching is about building relationships. In such a culturally abundant world, global
citizenship is the business of every teacher. Fostering productive connections with colleagues and
students is part of any educator’s success. Schools are home to different personalities, cultures, and
beliefs. Sometimes these conflict with each other, and unfortunately this is inevitable.

The role of the global digital teacher is to bring understanding and harmony into such
situations. Such strategies include those that work to resolve conflict, mediate disputes, and show
understanding. Over time, this responsibility shifts to the students. They learn, through their
teachers, to be tolerant of difference while standing up for their own beliefs. They respect their rights
and the rights of others to feel safe to be who they are. They celebrate the colors of culture, and the
interconnectedness of everyone. But it’s the global digital teacher who leads the way in this.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

DIGITAL CITIZENSHIP

This means engaging in appropriate and


exemplary behavior in an online environment.
The essence of Digital Citizenship is about a
shifting of accountability for appropriate
behavior to our students, which fosters
independence and personal responsibility.

Technology is at the forefront of many aspects of teaching and learning. It’s refreshing to
see more and more teachers getting on board with its applications. The potential for positive use,
though, is still matched by the potential for misuse. Our learners often emulate those they admire,
and that includes teachers.

“Kids today are more aware and concerned about the world
and about others than ever. “

If teachers don’t cite sources or respect copyright and intellectual property, we oppose
the example we want to set for students. It works the same way if we act inappropriately in any online
environments—it’s like giving our students a green light to do the exact same thing.

Alongside parents, we are the guides young digital learners have for an exciting and perilous
online world. If we’re going to enforce guidelines for ethical behavior, we must do first by example.
ALTRUISTIC SERVICE

Altruism is defined as “having a selfless concern for the


well – being of others”
This aspect focuses on a healthy concern for the well –
being of the people with whom we share our world.
It includes embracing the opportunity to exercise charity
and goodwill for the benefit of others.
This creates relevance and meaningful connections to the
real world for our students.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

Many educators believe that teaching compassion and service are the key to higher student
engagement. But the hectic nature of the educational field can make compassion and altruism a
challenge sometimes. In the article Nothing is More Important Than Teaching Compassion, Vinciane
Rycroft wrote:
“With the ups and downs of every day circumstances, it is not easy to stay inspired and be true to
our initial motivation as educators. It is tempting to look for professional satisfaction in outside
praise, instead of tapping into the genuine well-being that comes from being fully present to those
around us and to ourselves.”

The global digital teacher must indeed remain present. This is true not only of the needs of
students, but to the needs of the school and the community. Thanks to technology, our connections
and communications have linked to us to a world in need. So the innovative classroom becomes the
perfect learning environment for fostering altruistic thoughts and actions. It begins with caring for
each other, and then expands outward.

It’s comforting to know that connection has brought awareness. Kids today are more aware
and concerned about the world and about others than ever. The charitable nature of our digital kids
comes through in school projects like the ones in our own case studies.

ENVIRONMENTAL STEWARDSHIP

This is a demonstration of common – sense


values, and an appreciation for the beauty
and majesty that surrounds us every day.
It encourages us to explore how to make
use of earth’s resources – taking
responsibility and action on personal, local,
regional, national, and international levels.

We stress in this tenet that we only have “one world to live in.” How we regard its welfare is
congruent with what kind of surroundings we want for ourselves and our students. That’s why the
global digital teacher demonstrates a healthy respect for the personal, communal, and global
environments they and their students are part of.

The educational initiatives being taken for environmental awareness are many. Here are some
examples of the work being done in regards to Environmental Stewardship:

Green Teacher
 a non-profit organization helping educators promote environmental awareness among young
people aged 6-19.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

SEEDS Schools
 allows participants to track and report their projects online and to learn what others are doing
for environmental projects.

Maple Ridge Environmental School Project


 a comprehensive environmental education project taking place in Maple Ridge, BC.

Green Schools Initiative


 founded in 2004 by parent-environmentalists to improve the environmental health and
ecological sustainability of schools across the U.S.
(Source: Mary Claire Caresosa, (2019) — Module 7: Social, Ethical and Legal Responsibilities in the Use of
Technology Tools https://livingthoughtfulinsights.wordpress.com › module)

LESSON 2: NETIZENSHIP and NETIQUETTE in ONLINE

Study the case below and analyze the side of both parties
The case involved two minor students from a certain school whose photos were posted on
Facebook. The photos, which were uploaded by one of their friends, showed the students drinking
and smoking in a bar, and wearing just undergarments on a street. The photos were shown by one
of the Facebook friends of the girls to the school officials prompting them to ban the students from
marching in their graduation rites. According to the school, the students violated the school code of
conduct.

The parents of the students in defense filed a petition for the issuance of a writ of habeas
data and asked the court to order the school to surrender and deposit all soft and printed copies of
the photographs, and to declare they have been illegally obtained in violation of the children's right
to privacy.

Discussion:

1. After weighing all the information, with whom will you side to the parents or to the school? Why?

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

2. What are your reasons for siding with the parents? the school?

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
The court dismissed the parent's petition and ruled that, "The school did not violate the
________________________________________________________________________________
minors' privacy rights. According to the court, the school cannot be faulted for being "steadfast
in its duty of teaching its students to be responsible in their dealings and activities in cyberspace,
________________________________________________________________________________
particularly in [social networks], when it enforced the disciplinary actions specified in the
________________________________________________________________________________
Student Handbook, absent a showing that, in the process, it violated the students' rights."
________________________________________________________________________________
The decision of the court stated that the students cannot invoke the protection attached to
________________________________________________________________________________
the right to informational privacy because the photos were seen by other student of the school,
________________________________________________________________________________
who in turn showed them to the computer teacher who reported the incident to the school
________________________________________________________________________________
authorities. In the language of the court. "The photos, having been uploaded on Facebook
without restrictions as to who may view them, lost their privacy in some way." The court further
________________________________________________________________________________
added in its ruling that setting their post privacy to Friends Only' is not an assurance that it can
Check if your arguments are in consonance with the decision of the Supreme Court. Read the
no longer be viewed by another user who is not Facebook friends with the source of the content.
Supreme Court's
The decision readdecision on the next
that, "Without page.
proof that they placed the photographs subject of this case
within the ambit of their protected zone of privacy, they cannot now insist that they have an
expectation of privacy with respect to the photographs in question.

The decision of the court puts the burden of ensuring safeguarding privacy online users
and expects them to exercise due diligence in their online dealings and activities. According to
the court, not discounting the role of schools and parents in disciplining and educating their
children to be good digital citizens, self-regulation is the "best means of avoiding privacy rights
violations." It further issued a ruling saying that nothing is ever private on Facebook, even those
tagged as private never really escape public viewing, including unintended audiences.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

The Philippines, being considered as social media capital of the world, has a need to stress
social media education and etiquette among online users. The interview conducted with parents and
teachers of high school students in the above example underscored the need to use social media
responsibly. All agreed for the inclusion of social media etiquette in the education curriculum either
as a separate subject or integrated in good manners and right conduct, Social media can attain many
things in terms of social good (Brutas, 2015). How can social media be used to affect positive
change?

In the previous lesson, we have understood our roles and responsibilities as global digital
citizens. Our membership in the virtual community requires that we behave appropriately and act
responsibly.

While working online we all create a digital tattoo and we leave digital footprints. We have to
remember that our digital world is permanent, and with each post, we leave a digital footprint. By
doing self-reflecting before we self-reveal, we are able to consider how what we share online can
impact ourselves and others (www.commonsensemedia.org).

Scrutinizing the term again, a netizen, according to the Merriam-Webster Dictionary (26
April 2018) is an active participant in the online community of the internet. The medical dictionary
refers to it as an internet citizen who uses networked resources, which connotes civic responsibility
and participation. Thus, netizenship means citizenship in the internet or in the virtual world.

Netiquette

Rules of Behavior on the Internet.


PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1
It is an etiquette guideline that govern behavior when
communicating on the Internet.
Netiquette covers not only rules of behavior during
DR. JEAN RACHEL A. BARROGA

Rules of Netiquette

Rule # 1: Remember the human


 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.?

Rule # 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be doing online
just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see them.

Rule # 3: Know where you are in cyberspace


 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.

Rule # 4: Respect other people’s time and bandwidth


 Remember people have other things to do besides read your email. You are not the center of
their world.
 Keep your post and emails to a minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

Rule # 5: Make yourself look good online


 Remember to always check your spelling and grammar before posting.
 Always know what you are talking about and make saying it.
 Be polite and pleasant to everyone.

Rule # 6: Share expert knowledge


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have the same question you
do.

Rule # 7 Help keep flame wars under control

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 Netiquette does not forbid flaming.


 Netiquette does however forbid people who are flaming to hurt discussion groups by putting
the group down.

Rule # 8: Respect other people’s privacy


 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or things or you could even go
to jail.
 Not respecting other people’s privacy is bad Netiquette.

Rule # 9: Don’t abuse your power


 Do not take advantage of other people just because you have more knowledge or power than
them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule # 10: Be forgiving of other people’s mistakes


 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have good manners even though you are online and cannot see the person
face to face.

As responsible netizens, we are all expected to support a healthy interaction on the internet. A
netiquette, or the rules of socially accepted behavior online have to be observed in writing an email,
in texting, and other communications on the web.

Here are some netiquette guidelines:

1. Protect your reputation


 Whether in real or in virtual world, you are the same person.
 Do only what is appropriate and share information that does not harm you as a person.

2. Respect others
 Respect begets respect.
 Treat everyone with respect even if you have not seen him/her in person.
 Be judicious about what you say on your own and other's pages

3. Express yourself clearly and use emoticons


 Communication online is difficult because emotions are not evident during communication.
 Miscommunication usually takes place because your facial expression and your body
language cannot be seen and the tone of your voice cannot be heard. Thus, emoticons are
readily available to show your emotions

4. Remember the intellectual property


 Ideas online are products of intelligence of others.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 If you need to cite them, acknowledge the authors.


 You definitely do not want to steal properties of others.

5. Check spelling, grammar and punctuation


 Since your face cannot be seen online, you will be judged according to your posts.
 Good writing means good manners. We do not want to waste other people's time reading our
post which is incomprehensible.

6. Pause before you post.


 Take note that whatever you post becomes permanent therefore think twice or thrice before
you click send.
7. Do not share your personal information.
 Sharing your personal information online is like going around the streets wearing a shirt
printed with your name, birthday, address, name of parents, etc. You definitely do not want to
reveal all these to many people.
 Besides, providing all these publicly will make you prone to identity theft.

8. Think about who or what you are representing


 As a son/daughter, you represent your family. As a student, you represent your school. You do
not want your family or school to be put to shame by what you do

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in
touch with the old ones. It is also a source of
entertainment through games, online communities, and
everything in between. But like most things in this world,
there is always the “other side of the coin”. The internet is
one of the most dangerous places, especially if you do not
know what are you doing with it. But there is no need to
worry; it is never that late.
Type of Information Risks
1. First Name There is a risk in sharing your first name. Chances are, a hacker may
already know plenty of stuff about you even if you only give out your
first name. Likewise, you cannot just walk in a room and start
introducing yourself to everyone. You do not know whom you can come
across with.
2. Last Name If sharing your first name is a small risk, having both your first and last is
riskier. You will be vulnerable to being searched for using search
engines, which include image search. Matching a name with a face is a
modus to several cybercrimes like identity theft.
3. Middle Name Sharing your middle name alone is probably not the riskiest of these

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

shared information, but sharing your full name would be.


1. Current and previous Most people who steal identities study their subject. They can use this
school(s) information for verification purposes.
5.Your cellphone number Your cellphone number should not be posted over the Internet. The
Internet is a public place. It is the same as posting your number on a
billboard. You would not want random strangers to text or call you, or
worse, pretend that they are someone else.
6.The name of your Risky, yet not as risky as posting their full names, especially your
mother and father mother’s maiden name. In fact, you may have already encountered many
websites that require your mother’s maiden name as an answer to a secret
question whenever you lose your password.
7.The name of your Disclosing this is a huge risk. Strangers may pretend or use their identity
siblings to dupe you.
8. Your address Hopefully, you answered “no” to this one. Giving the Internet your
number is one thing; giving them your address is a whole other level. It
would be much easier for criminals to find you.
9.Your home phone This shared information is riskier than sharing your personal phone
number number. Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to be you.
10. Your birthday Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profile makes you
vulnerable to identity theft.

Internet is defined as the information superhighway.


This means that anyone has access to his highway, can place
information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way
or another. This is why social networking sites like Facebook
continue to improve their security features. The threat of
cybercrimes is very real. While you may not experience the
threat now, whatever information we share today could affect
our future.
Tips to Stay Safe Online

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public, networks/Wi-Fi. Browsing in “incognito (or private) mode”,
a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1
8. Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date”.
9. Add friends you know in real life.
DR. JEAN RACHEL A. BARROGA

Source: https://www.slideshare.net/Leelet1121/rules-of-netiquette-100105414

Ten Commandments of Computer Ethics

1. Thou shalt not use computer to harm people.


2. Thou shalt not interfere with other people’s work.
3. Thou shalt not snoop around other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software.
7. Thou shalt not use other people’s computer resources.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you write.
LESSON 3: INTELLECTUAL PROPERTY RIGHTS on the DEVELOPMENT and USE of
10. Thou
Source: shalt use a computer
Ten commandments in the
taken from ways
Userthat show consideration
Guidelines andArlene
and Netiquette (By respect.
Rinaldi)
DIGITAL MATERIALS

Intellectual Property Right

Intellectual property protection is important in fostering innovation. Without protection of


ideas, individuals will not be able to enjoy the full benefit of their inventions and they would not be
compensated for their creations. This encourages innovation without the fear that a competitor will
steal the idea and/or take the credit for it.

Intellectual Property

Refers to creations of the mind such as inventions; literary and artistic works; designs; and
symbols, names and images used in commerce. An intellectual property right is a right held by a
person or by a company to have exclusive rights over these. ( World Intellectual Property
Organization (WIPO)

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

Internationally, these intellectual properties are protected by the World Intellectual Property
Organization to which the Philippines is one of the 191 member states.
In our country, we have the Intellectual Property Office of the Philippines (IPOPHIL) which
administers and implements state policies in relation to intellectual property.
This office was created through Republic Act 8293. This act defines intellectual property to
include copyright and related rights; trademarks and service marks; geographic indications;
industrial designs; patents; layout designs (topographies) of integrated circuits; and protection of
undisclosed information. In the education setting, copyright and related rights are the ones
applicable.

What is Intellectual Property Act (RA No. 8293)?

A. Prescribe the law on:


 Copyright and Related rights
 Trademarks and Service Marks
 Geographic Indications
 Industrial Designs
 Layout Designs of Integrated Circuits
 Protection of Undisclosed Information

B. Establishes the Property Intellectual Office, providing for its powers and functions
C. Copyright refers to the legal right given to the owner of the original work or intellectual
property. These "works" are original intellectual creations in the literary and artistic domain
protected from the moment of their creation which include the following:

Copyright
Copyright refers to the legal right given to the owner of the original work or intellectual
property.
These "works" are original intellectual creations in the literary and artistic domain protected
from the moment of their creation.
Not protected are ideas, procedure, system, method of operation, discovery, concept or mere
data
No copyright for government works (but prior approval from the gov’t agency is required
for the exploitation of such work for profit)

Copyright protects Creators of:

 Original work  other forms of expressions


 literary  sound recordings
 dramatic  audiovisual/cinematographic works
 musical  sound/television broadcasts
 artistic  pictorial illustrations and advertisements
other scholarly or scientific works

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

Derivative (or new) works

 Dramatizations, translations, adaptations, abridgements, arrangement, and other alterations of


literary or artistic works
 Collections of literary, scholarly or artistic works, and compilations of data and other materials
which are original by reason of the selection or coordination or arrangement of their contents

New Works Protected


 Computer programs
 Databases
 Software protected as a literary work

Exclusive rights of creators of:


Literary, dramatic and musical Exclusive rights of creators of: Right to make commercial
works rental arrangements applies to
 Reproduce
 publish if unpublished  artistic works  computer programs
 perform in public/ or  reproduce  sound recordings
display in public  include in a TV  cinematographic
 broadcast include in cable
broadcast works
program
 make an adaptation/
 display in public
dramatization / translation  include in a cable
 Right to first sale program
 Rental right  right to first sale

Infringement under E-Commerce Act


 Piracy or the unauthorized copying,
 Reproduction, dissemination, distribution
 Importation, use
 Removal, alteration, substitution, modification
 Storage, uploading, downloading
 Communicating, making available to the public, or broadcasting
of protected material, electronic signature, or copyrighted works thru the use of
telecommunication network (INTERNET)

Copyright Ownership

Generally owned by author/creator:


 literary works
 artistic works
 if work is not part of regular duties of employment
 audiovisual works
 letters
Except:
 works created as part of regular duties
 commissioned photos
PED 8 TECHNOLOGYFOR TEACHING AND LEARNING
engravings, 1
drawings paintings, etc
 anonymous works
 pseudonymous works
DR. JEAN RACHEL A. BARROGA

Copyright Duration
Life time plus 50 years after death
 literary works and unpublished works
 works of joint authorship (from death of last surviving author)
50 years from the date of publication/making
anonymous/pseudonymous works
photographic and audiovisual works sound recordings and performances

PENALTIES
First Offense: imprisonment of 1 to 3 years and fine of P 50,000 to P 150,000
Second Offense: imprisonment of 3 to 6 years and fine of P 150,000 to P 300,000
Third Offense: imprisonment of 6 to 9 years and fine of P500,000 to P1.5 M
What the Law may allow under certain conditions?
 Recitation or performance of a work
 Quoting from a published work
 Reproducing and communicating to the public any literary, scientific or artistic work
 Inclusion of a work in a publication
 Recording of a work by an educational institution
 Use of government-controlled works
 Public display of original or copy of a work
 Use of any work for legal purposes

Library retains right to reproduce


 provided copies are not for commercial advantage
 solely for purposes of research and private study
 Original works whose fragility/rarity justifies their not being lent out;
 Articles contained in composite works or brief portions of other published works, for reason of
expediency, for purposes of research and private study, instead of lending the entire volumes
containing them;
 For preservation or replacement of lost, stolen, destroyed, unusable copy, provided, they are out
of stock.

General defenses against Copyright


 out of print, out of stock, rare

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

 for preservation
 For security (as in back-up copy for computer programs)
 Fair use for purposes of scholarship, research and private study, criticism and review, news
reporting, classroom teaching and similar purposes (provided it is not for an entire book or a
substantial part of it)

Factors in determining what is “fair


use”
Purpose and character of the use
Nature of the copyrighted work
Amount and substantiality of the portion used in relation to the work as a whole
Effect of the use upon the potential market for or value of the work

Acceptable Conditions for Classroom Copying

Single copy (not an entire book, or database, or computer program) for teaching / research
Multiple copies

provided copy is brief, and for one course

provided such copy is not repeated by the same faculty for the same material from term to term

provided such copying is done at the instance of the individual faculty and not by a higher
authority.
 provided only the actual photocopying cost is charged to the student.
How can Libraries/Archives avoid copyright liability
 Post a warning sign on every location of unsupervised copying machines re copyright
restrictions
 Include in published rules that the library reserves the right to refuse to accept a copying
request
 Remind users that copying the books lent out may exceed fair use privileges in violation of
copyright.

NEW DEVELOPMENTS

Proposed bill to provide for the protection of Community Intellectual Rights of Indigenous
Peoples HB 3182 amending Copyright Law
Amendments proposed by HB 3182 to respond to intellectual piracy
 Recommends more stringent penalties for rights-violators, particularly in the Internet,
and immediate judicial relief and alternate legal options for victims
Amendments proposed by HB 3182 to respond to intellectual piracy
 Provides similar rights accorded to authors to
 Performers
 Phonogram producers
 broadcasters
 by acknowledging their right to control or be compensated for the various ways in
which their works are used or enjoyed by others.
Amendments proposed by HB 3182 to respond to intellectual piracy rights-holders may
useTEACHING
PED 8 TECHNOLOGY FOR technology to protect
AND LEARNING 1 their own rights and to license their own works online
Impact of Amendments under HB 3182 Extends copyright protection to 70 years after
death Extension up to 95 years for anonymous or pseudonymous works, and audiovisual
DR. JEAN RACHEL A. BARROGA

Copyright infringement

It is the use of works without permission where the copyright holder has the exclusive right to
reproduce, distribute, display or perform the protected work, or to make derivative works.
Proper citations should be used when including them in our output.

Guidelines on Online Use of Copyrighted materials (Smalding, Lowther and Russel 2012):

1. Contrary to popular opinion, all material on the internet is copyrighted unless stated otherwise. It
is copyrighted even if it does not display the copyright symbol.
2. An email is an original work, fixed in a tangible medium of expression. that is covered by
copyright. Hence it is recommended that you should not forward any email without
permission, in consideration of both copyright and Privacy Act.
3. Downloading an article from a newspaper's website, making copies, and distributing them to
your students prior to a class discussion on the topic is permissible following the current
photocopying guidelines which permits making multiple copies for classroom use.
 The exception would be individually bylined, copyrighted articles, or articles from a source
specifically designed for the educational market where such articles cannot be copied
legally for class distribution (adapted from Becker, 2003).
4. You cannot post students' essays, poems, or other works on the school website unless you have
permission of the students and their parents or guardians.
5. Educators should treat copyrighted materials from the internet the same way they do to print
formats. The best guideline is to always obtain permission. When in doubt, ask!

Copyright Infringement vs. Plagiarism

Another violation on intellectual property is plagiarism.


Although plagiarism and copyright infringement are related ideas, these two are different.
Plagiarism, according to plagiarism.org, is an act of fraud; it involves both stealing someone
else's work and lying about it afterward.

Plagiarism.org further elaborates the following as plagiarism:


1. Turning in someone else's work as your own.
2. Copying words or ideas from someone else without giving credit.
3. Failing to put a quotation in quotation marks.
4. Giving incorrect information about the source of a quotation
5. Changing words but copying the sentence structure of a source without giving credit.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

6. Copying so many words or ideas from a source that it makes up the majority of your work,
whether you give credit or not (see our section on "fair use" rules)

For images, videos and music, the following are counted as plagiarism :
1. Copying media (especially images) from other websites to paste them into your own papers or
websites.
2. Making a video using footage from others' videos or using copyrighted music as part of the
soundtrack.
3. Performing another person's copyrighted music (i.e., playing a cover).
4. Composing a piece of music that borrows heavily from another composition.

Plagiarism
refers to copying the work of another and claiming it as one's ideas or without proper attribution.

Copyright Infringement
It is copying one's work without obtaining permission.

Copyright infringement is a violation of the right of the copyright holder while plagiarism is a
violation of the right of the author. We have to note that not all authors are copyright holders; there
are cases when the publisher owns the copyright. In addition, copyright infringement is a legal
violation while plagiarism is an ethical violation.
In conclusion

Administrators and teachers are responsible for implementing and enforcing acceptable use
forms for all students using the internet in schools.
Teachers are responsible for using technology in a manner that supports the curriculum.
Teachers must directly teach students to use the Internet in an appropriate manner.

Every part of education and its virtues—respect, tolerance, understanding, accountability,


responsibility, fairness, and justice—are central to what makes this educator so incredibly
important to our students. Teaching is no longer about subject and knowledge. It is about
developing the whole student, and preparing them well for a future they will both create and
sustain.

ELABORATE

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

Congratulations! You are done reading the content of this module. I want you to elaborate on the
given learning task below.

What does it mean to be a digital citizen? How can you observe social, ethical and legal
responsibilities in the use of technology tools and resources?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
Your interaction with others online shows your identity. Your online social identity is your "digital tattoo".
A digital tattoo refers to the record of your actions and communications online and its permanence, like a
physical tattoo.

Looking back at how you engage in activities online, what kind of digital citizen were you?
Reflect on this and draw your tattoo inside the box. Explain your illustration.

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________-
_________________________________________________________________________________

EVALUATE

This is the culminating part of your module. You are going to connect what you have learned
in this module in your personal life by answer the given task.

Photo Essay

A Globally Effective and Globally Competent Digital Teacher

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

VIDEO PRESENTATATION:

ADVOCACY CAMPAIGN

“Modern Manners for a Modern World,


The ultimate guide to online etiquette.”

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

Congratulations! You are done with your


last module. Report to me and submit
your learning activities

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

RESOURCES

A. BOOKS

Bilbao, p., et al. (2019). Technology and Learning 1. Quezon City. Phil: Lorimar Publishing, Inc.

Garo, Candelaria D. (2008) Theories and Principles of Educational Technology. J-Creative


Labels & Printing Corp. Quezon City, Manila, Philippines

Corpuz, Brenda B., Ph.D. and Lucido, Paz I. Ph. D. (2008) Educational Technology 1. Lorimar
Publishing, Inc., Quezon City, Metro Manila, Philippines

Corpuz, Brenda B., Ph.D. and Lucido, Paz I. Ph. D. (2015) Educational Technology 1, Third
Edition. Lorimar Publishing, Inc., Quezon City, Metro Manila, Philippines

Tabbada, Epifania V., Ed. D. and Buendia, Maria Mercedes, MA. Ed. (2015) Educational
Technology 1. Adriana Publishing Co., Inc. Quezon City, Metro Manila, Philippines.

B. Online

Ribble, M., & Bailey, G. (2007) Digital Citizenship in School. Washington, D.C.: International
Society for Technology in Education. Prepared by Kati Searcy, October 2008 for ITED 8100, Valdost

Essential elements of digital citizenship | ISTE


https://www.iste.org › explore › essential-elements-digit...

Nine Elements of Digital Citizenship - Casey County School ...


https://www.casey.kyschools.us › content

Teaching Ethical and Legal use of Technology in ... – SlideShare https://www.slideshare.net ›


Mrs.Faust › teaching-ethica...

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1


DR. JEAN RACHEL A. BARROGA

C. Picture Attributes

https://discuss.goformative.com/t/scoring-no-response/4441/2
https://nearpod.com/how-nearpod-works
https://www.google.com/search?
q=nearpod&sxsrf=ALeKk02ueFW_EKoVMcfeo5EY_UlUYZl2Mg:1623043063517&source=lnms&tbm=isch&
sa=X&ved=2ahUKEwiE4IXK4oT
https://blogs.umass.edu/onlinetools/community-centered-tools/todays-meet/
https://www.google.com/search?
q=Rezzly+icon&sxsrf=ALeKk03cE6BmA8C_oit87o1cdnbPQudcyw:1623045438804&source=lnms&tbm=isc
h&sa=X&ved=2ahUKEwig6dW264TxAhUmUPUHHbs
https://www.google.com/search?
q=graphic+design+tools&sxsrf=ALeKk02c8aPtVm2725UI1McjSwkdXdItrg:1623047621184&source=lnms&
tbm=isch&sa=X
https://www.google.com/search?
q=what+is+podcast&sxsrf=ALeKk00oF1jwVGPWC4fHbq1NTi3KWbdi1w:1623048951717&source=lnms&t
bm=isch&sa
https://www.google.com/search?q=powerpoint
%20presentation&tbm=isch&hl=en&sa=X&ved=0CCEQtI8BKAJqFwoTCNCIs9v6hPECFQAAAAAd

PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1

You might also like