Digital Cyber Literacy 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 71

Digital / Cyber
Literacy
Presented By: Group 4
Digital Literacy
• the set of competencies on the eff ective
use of digital devices for purposes of
communication, expression,
collaboration, and advocacy. (Wikipedia)

• the ability of an individual to engage


with the digital environment and how
to operate technologies safely.
Cybersecurity
• the practice of protecting systems,
networks, and programs from digital
attacks. (Cisco, n.d.)

• these cyberattacks are usually aimed


at accessing, changing, or destroying
sensitive indormation.
Tips on How to Protect Yourself
Against Cyber Threats

01 02 03 04 05
Monitor Keep devices Understand Handle Consider
behavior on safe. how best to unsafe safety for
social use contents. the future.
networks passwords.
Cyber Citizenship
• Being responsible when exploring
the Internet, including the right
manner and etiquette in using
the Web.
only.

Ways on How to be a
Good Cyber Citizen
only.

01 02 03
Be careful and Don’t post your Analyze
critical for expression everything you
whatever you online. search online.
post online.

Ways on How to be a
Good Cyber Citizen
Ways on How to be a
Good Cyber Citizen

04 05 06
Use internet Verify an Give out certain
purposely. information information
before sharing only.
or using it.
07 08 09
Don’t answer Tell a reliable Give credits,
questions that adult when always be
makes you meeting aware of
uncomfortable. someone from copyright laws.
the Internet.

10
Ways on How to be a
Good Cyber Citizen Avoid hacking.
Importance of Cyber Citizenship
Importance of Cyber Citizenship

01 It keeps the Internet free from hurtful


statements.

02 It creates a culture of more reliable information.

It gives provisions for people to be given credit


03 for what they have created.

More criminals or bullies can be caught when kids


04 are honest and talk to adults.

05 It keeps information private.


Proper Netiquette
Proper Netiquette

01 Have the correct address, correct link, and you are


sending the information to the right person.

02 Check information before sending or posting any


message. Avoid false statements and information on the
web .
Re-read what you wrote to make sure it is what you
03 want to say and the other person would interpret it the
same way.

Keep your comments clean and don’t confront others


04 online, or say anything that could be hurtful for them.
Proper Netiquette
Keep your personal and friends’ information private.
05 Don’t forward information that was just given to you
without permissions.

Watch out for spam and other fraud e-mails, never reply
06 to them.

In writing something personal or private, think twice


07 because messages can get misdelivered.

Adults should monitor kids’ messages, especially when


08 they are sending e-mails to others without permission.
10 Commandments
of Teacher Cyber
Citizenship
10 Commandments of Teacher Cyber Citizenship

1. Thou shall not post any personal matter, confidential


information, and obscene pictures and messages online
that can be accessed by students and parents.

2. Thou shall not respond or thread to any personal


message created by students online other than those
school related.
3. Thou shall not lend or let students access your
cellphone.
4. Thou shall not give your password to students.

5. Though shall not use concepts and information from


texts and references without the author’s citation.
10 Commandments of Teacher Cyber Citizenship

6. Thou shall not post to any social media account, for


whatever purposes, the pictures of students without their
or their parents’ consent.

7. Thou shall not express sentiments, disappointments, and


disagreements against superiors, colleagues, students, and
their parents using their social media accounts.

8. Thou shall not use data from Internet sources in any


documents like lesson plans, researches, and requirements
without the consent of the author.
10 Commandments of Teacher Cyber Citizenship

9. Thou shall not give any personal data or other’s


information to anyone unless for specific purposes and
given the consent.
10. Thou shall not post any student data publicly online
including academic rankings, school records, class outputs
and record of grades.

De Leon (2019)
Internet Safety
Internet Safety
• Maximizing the user’s personal safety
and security risks to private
information and property associated
with using the Internet, including self-
protection from computer crime.

• Trying to be safe on the Internet.


Information Security
Information Security
• Sensitive information, such as personal information,
identity and passwords are often associated with
personal property and privacy and may present
security concerns if leaked.

• Unauthorized access and usage of private


information may result in consequences, such as
identity and property theft.
Common Causes of Information
Security Breaches
Common Causes of Information
Security Breaches:

01 Phishing

• Common type of scam.

• Scammers disguise as a trustworthy source


in an attempt to obtain private information
such as; passwords, credit card
information, etc. throught the use of fake
websites that look identical and legitimate.
Common Causes of Information
Security Breaches:

02 Internet Scams

• Schemes that deceive the users in


various ways in an attempt to take
advantage of them.
Common Causes of Information
Security Breaches:

03 Malware

• a malicious software (spyware)

• disguised to collect and transmit private


information, such as password without the
user’s consent or knowledge, of which it is
impossible to determine whether a file is
infected.
Common Threats to
Personal Safety
Common Threats to
Personal Safety

01 02 03
Cyberstalkin Cyberbullyin Online
g g Predation

04 05
Obscene/
Offensive Content Sextortion
Computer Threats and Fixing
Solutions
Threat
• refers to anything that has the
potential to cause serious harm to a
computer system
• It is something that may or may not
happen, but has the potential to
cause serious damage and can lead
to attacks on computer sysytems and
networks.
Ways to Protect Computer Networks
1. Install anti-virus software.
6. Scan internet downloads.
2. Ensure that anti-virus
software is up to date 7. Do not run programs of
unknown origin.
3. Employ a firewall to
protect networks. 8. Implement a vulnerability
management system.
4. Filter all email traffic.
5. Educate all users to be 9. Make regular backups of
careful of suspicious e-mails. critical data.
Ways to Protect Computer Networks

10. Develop an Information


Security Policy.

11. Monitor logs and systems.

12. Develop an Incident


Response Plan.

13. Restrict end-user


access to the systems.
Cyberbullying
Cyberbullying
Cyberbullying, cyberharrasment, or online
bullying.
• is a form of bullying or harassment using
electronic means usually among minors in a
school setting.
• a process of using Internet, cellphones or other
devices to send or post texts or images that
intend to hurt or embarrass another person.
(The National Crime Prevention Counsil).

*repeated threats, sexual remarks, defamatory, false


accusations, and etc.
Doxing
- cyberbullies disclosing the
victims’ personal data on websites
or forums.
Types of Cyberbullying

01 Internet Trolling
- common form of bullying over the Internet in
an online community to elicit a reaction,
disruption or intentionally provoke and offend
others.
02 Cyberstalking
- bullying or harassment that uses electronic
communication to stalk a victim and pose a
credible threat to harass him or her.
Cybercrime
Cybercrime

• any criminal activity carried out using computers


or the Internet. (Avast)

• it uses tools like phishing, viruses, spyware,


ransomware, and social engineering to break the
law.
• a crime with the computer as the object of the
crime or is used as a tool to commit an offense.
(Technopedia).
2 Categories of Cybercrime

01 One-off Crimes
- installing virus that steals your personal data.

02 Ongoing Crimes
- cyberbullying, extortion, distributing child
pornography, or organizing terrorist attacks
Common Types of Cybercrimes

01 02 03 04 05
Online Identity Online Unauthorize Cyberterrorism
bank theft. predatory d computer
information crimes. access.
theft.
Exploring the Internet:
Researching and Evaluating
Internet
• a global communication network that allows
computers to exchange and share information
worldwide.

• It makes possible for people around the world to


connect and share ideas across time zones and
geographic locations.
3 Key Factors in Surfing the Web.

01 Most surfing sessions start with the user-


targeted keywords about the subject into a
search engine.
Writing research questions; extracting keywords
02 from the questions and searching them using
synonyms; keeping track of keywords and
synonyms used; and recording the results of
search.

03 Always be cautious about the information shared


online and in visiting websites.
2 Types of Website

01 Informational Websites
- usually strive to off er credible content to
users.

02 Commercial Websites
- present inaccurate information in order to see
something.
Checklist of Credibility Criteria

01 Author. 04 Contact.

02 Date. 05 Fact vs. Opinion

03 Purpose. 06 URL.
Common Credible URLS

- When encountering a URL, look at the letters that


01 appear after the "dot" (i.e. www.whitehouse.gov.)
and that is called top-level domain. Thus, the URL's
top-level domain helps in determining a site's
credibility.

- Websites ending in gov are government-related


02 websites, which generally, can be trusted to provide
credible statistical information, articles on many
diff erent topics and government news.
Common Credible URLS

- Websites ending in edu are the websites of


03 educational institutions, such as colleges and
universities that usually off er a variety of credible
data, especially about the school's operations and
research.

- Since students may create websites with an edu


top-level domain, but they may contain inaccurate
or biased information.
Common Credible URLS

04 - Websites ending in org are the websites of


organizations.

- While many organizations, especially nonprofi t


ones, provide credible information, they may
sometimes have advertising intent.

- Since some organizations show bias in their


provided information, so evaluate .org sites
carefully.
Recognition of Information Sources
• Similar to the information in print sources, the
use of online sources must be given credit to the
authors.

• can be done by applying proper referencing and


citation procedures that would get rid of risks,
consequences and legal implications because of
the copyright issue.
Citation
• Each entry in the bibliography.

• Proper citation must be applied or included for


every source used, whether it is a website, a
newspaper, or a book.

• Online sources are cited differently because they


are different from traditional print sources.
Citation
Author/Source Year Article Title

Transparency International (2014). Corruption perceptions index


2014: Results. Retrieved from
http://www.transparency.org/cpi2014/results, July 17, 2019

Website
URL
Retrieval Date
Practical Techniques in Responding to Data Privacy
Issues

- When getting data, put proper citation and source


01 acknowledgment (e.g. Source: National Statistics
Offi ce, 2019).

- When using needed pictures downloaded from the


02 Internet, put acknowledgment (e.g. Photo credits to
PhilPost, 2019).

- If data, concepts and information are copyrighted,


03 ask for the consent of the author, and wait for
his/her response.
Practical Techniques in Responding to Data Privacy
Issues

- If the data and information are for public domain,


04 just acknowledging/citing the author or the source
will do.

- If the author doesn't really want anyone to utilize


05 his/her data fi le or article, learn the value of
respect.
Plagiarism

• the act of taking someone else's work and


presenting it as your own (Turnitin. com).

• Plagiarism is unethical, and it can bring you in


trouble.
10 Types of Plagiarism

01 Clone Plagiarism (Identical


Copying)
- copying another work (word-for-word) without
any change and claim as his/her own work.

02 Remix Plagiarism
- collecting information from various sources and
mixing all together as a single document then,
claiming the work as their own work.
10 Types of Plagiarism

03 Ctrl+C Plagiarism
- when a signifi cant portion of text copied from
any single source without any alteration in a
written document.

04 Hybrid Plagiarism
- perfectly cited source documents are copied
and arranged as a new document without
citation.
10 Types of Plagiarism

05 Find-Replace Plagiarism
- changing the most common keywords and
phrases in the copied content but not making any
changes in the essential document.

06 Recycle Plagiarism (Self-Plagiarism)


- the act of borrowing from one's own previous
document without proper citation.
10 Types of Plagiarism

07 Mashup Plagiarism
- when the written document is copied from more
than one source and all are mixed together
without proper citation.

08 404 Error Plagiarism


- a person creates a document by copying from
various sources prepared as a single document
with the citation but inaccurate or leads to non-
existing resources.
10 Types of Plagiarism

09 Aggregator Plagiarism
- the written document includes proper citation
but it does not contain original work.

10 Re-Tweet Plagiarism
- all written documents look perfect with
properly cited mark but still, the document
resembles somewhere the original text's
structure or wordings.
Tips to Avoid Plagiarism (Turnitin.com)

1. Read and understand the original document


several times before start explaining about it.

2. Do not copy any word or sentence from the


original document.

3. Give proper citation to all sources (book, journal,


website, video, etc.).

4. In case of citing online sources, include the


retrieval date and appropriate URL in the reference.
Tips to Avoid Plagiarism (Turnitin.com)

5. Common phrases and defi nitions need to be


quoted and cited without any modifi cation.

6. Make a practice to include the "references


section whenever you write an academic document..

7. Cross verify all your citations before submitting


your document.

8. Resort to available plagiarism software to ensure


the originality of the written document.
How to Evaluate a Website (Morris,
2018)
1. Open the site.
2. Skim read.
3. Look for the answer to your question.
4. Consider the credibility of author and
website.
5. Consider the purpose of the site.
6. Look for the date.
Integrating Digital/Cyber
Literacy into the
Curriculum
Integrating Digital/Cyber Literacy into the Curriculum

1. Use an interactive whiteboard to design


and deliver lessons.

2. Allow students to maintain blogs, wikis,


web pages related to their learning.

3. Engage in email/video chat exchanges with


students.
Integrating Digital/Cyber Literacy into the Curriculum

4. Utilize storytelling media to allow students


to create and publish stories.

5. Set-up a blog site, Facebook page, Yahoo


or Google group and post weekly discussion
questions for students to respond.
Integrating Digital/Cyber Literacy into the Curriculum

6. Use video cameras to dramatize stories,


record scientifi c experiments and expose
students to video editing software to create
video production of learning.

7. Engage students in discussions about how


and why various media work well to
showcase learning and why others do not.
Integrating Digital/Cyber Literacy into the Curriculum

8. Thinking critically about the medium use


to present a message is as important as the
message itself.

9. Require E-Portfolio that would compile


their outputs and projects.

10. Allow students to use digital tools.


Impact of Integrating Digital
Literacy in the Classroom on
Teachers, Families and
Friends
1. It motivates students in their learning due to their
enjoyment and ease of use with various
technological mediums.

2. It reaches students of various learning styles and


multiple intelligences.

3. It allows students to create and design their own


unique products refl ective of their personalities and
learning needs/ styles.
4. It encourages students to manipulate media in
constructing their own meaning.

5. It enables students to share their learning with


teachers, families and friends.

6. It gives students the chance to explore


technological media that inevitably increase the job
skills needed in the workforce.
Thank
you very
much!

You might also like