Lesson 3 Digital/Cyber Literacy
Technology has been part of everyone’s life, be it at home, in school, or anywhere
with every facet of our undertaking. However, in many instances, we may not be aware
that we have been misusing or abusing it or in another way around, we may find ourselves
being used by other people with their malicious motives using digital tools. Therefore, we
may end up being liable or a victim of such irresponsible kind of technological processing
and utilization. It is in this case that we must gain further understanding and application of
digital/cyber literacy, be it on personal or professional merit.
Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full
participation in society that includes knowledge, skills, and behaviors involving the
effective use of digital devices for purposes of communication, expression, collaboration
and advocacy.
Simply, it is the ability of an individual to engage with the digital environment and
operate technologies safely by knowing what to do and what not to do and how to avoid
unnecessary risks.
Digital literacy is an individual’s ability to access both information and methods of
communication through technological tools, such as smartphones, tablets, laptops and
desktop PCs. While digital literacy is initially focused on digital skills and stand-alone
computers, its focus has shifted to network devices, including the Internet and the use of
social media.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from
digital attacks (Cisco, n.d.). These cyberattacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money from users; or interrupting normal
business processes.
Implementing effective cybersecurity measures is challenging because there are
more devices than people, and attackers are becoming more innovative. Here are some tips
on how to protect yourself against cyber threats.
1. Monitor behavior on social networks. Before posting or uploading something
online, try to realize: (a) Does this need to be public?; and (b) Is it worth the risk?
Remember, not only what we share online is available to friends and family, but also to
cybercriminals.
2. Keep devices safe. Protect your technology tools by installing Anti-virus
software, a configuration of settings on the devices and by completing software updates.
3. Understand how best to use passwords. Passwords need to be complex and hard
to guess, but can still be remembered. One strategy is “paraphrase” or a password that
comes from the first letter of each word in the phrase. There is also a password manager
app to help keep track of all the passwords called “KeePass” which is free of charge.
Importantly, do not use the same password for all accounts.
Cyber Citizenship
Citizenship is an old value that is now applied to a new medium the Internet. Cyber
citizenship refers to being responsible when using the Internet. Doing online when no one
is looking speaks a lot about one’s character and morals. The power of this digital world is
associated with responsibilities and consequences. Therefore, we can explore and navigate
all information available online however, we should observe cyber citizenship or manners
and etiquette on the Web.
Ways on How to be a Good Cyber Citizen
The enlisted ways of becoming a good cyber citizen would guide everyone on his/
her digital operations and information processing and would prevent anyone from further
consequences, distractions, moral damages and risks.
1. Be careful and critical for whatever you post online that could be visible to the
public even if on a “private” page through tagging by a friend.
2. If you have a problem with someone, go to that person or an adult to help work
it out, instead of posting your expression online.
3. Use the Internet to help you with your schoolwork, but give credit to the sources
you use and critically analyze everything you search online.
4. Use the Internet purposefully to learn more about anything you are interested in,
to help you research relevant and needed data or information and to stay connected with
friends throughout the world.
5. Make sure you verify an information before you share it or use it in a project and
check on accuracy and truth in the information you search on the web.
6. Give out certain information only.
7. Don’t answer questions that make you uncomfortable.
8. Always make sure you have told a reliable adult if you decide to meet someone
you knew through the Internet.
9. Always be aware of copyright laws and give credit to whom an article or a part
of it is due.
10. Use only the computers that you are allowed to use. Avoid hacking.
Importance of Cyber Citizenship
1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.
4. More criminals or bullies can be caught when kids are honest and talk to adults.
5. It keeps information private.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when sending
messages online.
1. Make sure you have the correct address (with proper spelling), correct link and
you are sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false
statements and information on the web or forwarding junk mail or chain letters to family
or friends.
3. Re-read what you wrote to make sure it is what you want to say and the other
person would interpret it the same way.
4. Keep your comments clean and don’t confront others online or say anything that
could be hurtful to them.
5. Keep your personal and friends’ information private and don’t forward
information that was just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because
messages can get misdelivered.
8. Adults should monitor kid’s messages, especially when they are sending e-mails
to others without permission. ([Link]
The Ten Commandments of Teacher Cyber Citizenship
At some point, misuse and abuse of technology may also happen in schools
involving teachers with their students, colleagues and others. The following are reminders
to teachers regarding the use of media tools.
1. Thou shall not post any personal matter, confidential information and obscene
pictures and messages online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students
online other than those school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students.
5. Thou shall not use concepts and information from texts and references without
the author’s citation.
6. Thou shall not post to any social media account, for whatever purposes, the
pictures of students without their or their parents’ consent.
7. Thou shall not express sentiments, disappointments and disagreements against
superiors, colleagues, students and their parents using their social media accounts.
8. Thou shall not use data from Internet sources in any documents like lesson plans,
researches and requirements without the consent of the author.
9. Thou shall not give personal data or other’s information to anyone unless for
specific purposes and given the consent.
10. Thou shall not post any student data publicly online including academic
rankings, school records, class outputs and record of grades (De Leon, 2019).
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the Internet.
It is maximizing the user’s personal safety and security risks to private information and
property associated with using the Internet, including self-protection from computer crime.
As the number of Internet users continues to grow worldwide, issues and concerns also
continuously exist.
Information security. Sensitive information, such as personal information,
identity and passwords are often associated with personal property and privacy and may
present security concerns if leaked. Unauthorized access and usage of private information
may result in consequences, such as identity and property theft.
Common causes of information security breaches include:
1. Phishing. It is a common type of scam, of which the scammers disguise as a
trustworthy source in an attempt to obtain private information, such as passwords, credit
card information, etc. through the use of fake websites that look identical and legitimate.
2. Internet scams. These are schemes that deceive the users in various ways in an
attempt to take advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect
and transmit private information, such as password without the user’s consent or
knowledge, of which it is impossible to determine whether a file is infected.
Computer Threats and Fixing Solutions
A threat, in the context of computer security, refers to anything that has the potential
to cause serious harm to a computer system. It is something that may or may not happen,
but has the potential to cause serious damage and can lead to attack on computer systems
and networks ([Link]
Cybercrime is now becoming alarming in the life of every individual and the
organization as they intend to steal information that they can sell or trade, such as financial
details, credit card information, personal details, or any other information using computer
networks.
Likewise, while email has been the main method for the spread of computer viruses,
it can also enter a network by the USB device, Internet download, visiting an infected
website, instant messaging or messaging in social media platforms, file transfer and file-
sharing programs, or by remote users connecting directly to the corporate network with an
infected PC. Once a computer virus gets into a network, it can spread from computer to
computer in multiple ways.
Given the numerous ways of computer virus can spread, the following are ways on
how to ensure that computer networks can be protected.
1. Install anti-virus software
2. Ensure that the anti-virus software is up-to-date
3. Employ a firewall to protect networks
4. Filter all email traffic
5. Educate all users to be careful of suspicious e-mails/ links.
6. Scan Internet downloads
7. Do not run programs of unknown origin
8. Implement a vulnerability management system
9. Make regular backups of critical data
10. Develop an Information Security Policy
11. Monitor logs and systems
12. Develop an Incident Response Plan
13. Restrict end-user access to the systems
Cyberbullying
Cyberbullying, cyberharassment or online bullying is a form of bullying or
harassment using electronic means usually among minors in a school setting and has
become increasingly common, especially among teenagers.
It is an aggressive, intentional act or behavior that is carried out by a group or an
individual using electronic forms of contact, repeatedly against a victim who cannot easily
defend him or herself. The National Crime Prevention Council defines it as a process of
using the internet, cell phone or other devices to send or post texts or images that intend to
hurt or embarrass another person. It may also include public actions, such as repeated
threats, sexual remarks, pejorative labels or defamatory false accusations, ganging up on a
victim by making the person the subject of ridicule in online forums, hacking into or
vandalizing sites about a person, and posting false statements to discredit the targeted
person.
Cyberbullying types. There are various types of cyberbullying and research has
revealed serious profound consequences on victims.
1. Internet trolling is a common form of bullying over the internet in an online
community to elicit a reaction, disruption or intentionally provoke and offend others.
2. Cyberstalking is another form of bullying or harassment that uses electronic
communication to stalk a victim and pose a credible threat to harass him/her.
Implications of bullying in schools. Schools should initiate various anti-bullying
programs and campaigns to protect students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in handling bullying cases and
executing teaching strategies to address and reduce bullying cases in class. Also, schools
should conduct student empowerment activities that can be engaged in by students,
including the bullies to divert their attention and energy into something worthwhile and
engagements that they can be busy about.
Exploring the Internet: Media, Research and Websites
The Internet is a global communication network that allows computers to exchange
and share information worldwide. It makes possible for people around the world to connect
and share ideas across time zones and geographic locations. However, because cyberspace
is such a large realm, sometimes it is difficult to find the needed information.
Today, information comes through an interwoven system of media technologies.
The ability to read many types of media has become an essential skill in the 21 st Century.
Thus, schools are greatly confronted with this challenge.
Media Literacy
Media literacy is the ability to access, analyze, evaluate, and create media
(Firestone, 1993). Media literate youth and adults can understand the complex messages
received from television, radio, Internet, newspapers, magazines, books, billboards, video
games, music, and all other forms of media. Therefore, media literacy skills are included
in the educational standards in language arts, social studies, health, science, and other
subjects. Many educators have discovered that media literacy is an effective and engaging
way to apply critical thinking skills to a wide range of issues
([Link]
Roles of Media Literacy
It becomes easy to create media, however, it is difficult to know the creator of this,
his/her reason, and its credibility. Specifically, it helps individuals to:
1. Learn to think critically. When people evaluate media, they decide if the
messages make sense, including the key ideas before being convinced on the information
that they get from it.
2. Become a smart consumer of products and information. Media literacy helps
individuals learn how to determine whether something is credible, especially the
advertising before they can be persuaded with the products on sale.
3. Recognize point of view. Identifying an author’s perspective helps individuals
appreciate different ideas in the context of what they already know.
4. Create media responsibly. Recognizing one’s ideas and appropriately
expressing one’s thoughts lead to effective communication.
5. Identify the role of media in our culture. Media conveys something, shapes
understanding of the world, and makes an individual to act or think in certain ways.
6. Understand the author’s goal. Understanding and recognizing the type of
influence something has, people can make better choices. ( Common Sense Media, n.d.)
Social Media
Social media is a term that describes websites to connect people and involve user-
generated content, which is the hallmark of a social media site. It is sometimes called Web
2.0, which is currently a huge opportunity to reach target audience and increase online sales
(Go, 2019).
Types of Social Media Websites
There are different types of social media websites and the ways of using them to
reach the target audience.
1. Social Media News Websites. It entails users to submit links to Web content
like articles, podcasts, videos, etc. that they find interesting, such as Digg, Reddit,
and Stumble Upon.
2. Social Media Networking Websites. It depicts ability to upload a personal
profile that usually connects with other people, such as LinkedIn (social networking
for professionals) and facebook (social networking for everyone). These sites serve
as avenue for meeting people and developing relationships that can lead to joint-
venture partnerships, career opportunities, and research.
3. Social Media Photo and Video Sharing. It allows users to upload photos
through Facebook, Instagram, and Pinterest while videos through YouTube.
4. Microblogging and Blogging Websites. Sometimes called “presence apps”,
these services let users post very short messages like blogging, and easily keep up with
what their friends are posting. Twitter is the most popular microblogging service that limits
to 280 characters per post and allows to follow a set of users from one dashboard. Another
popular social media app is SnapChat, which is video-based.
5. Social Media Review Websites. It shows how social reviews can make or break
a company or an organization, such as Amazon and eBay.
Media and Information Literacy (MIL)
Media and Information is a combination of knowledge, attitudes, skills, and
practices required to access, analyze, evaluate, use, produce, and communicate information
and knowledge in creative, legal and ethical ways that respect human rights (Moscow
Declaration on Media and Information Literacy, 2012).
Aspects of MIL. According to Reineck and Lublinski (2015), MIL is the optimal
outcome of media, information and communication technology (ICT) education along
three aspects: technical skills, critical attitudes and facts about media and ICT. Technical
skills involve ability to access and use computers, mobile and other technical devices that
offer media and information content. UNESCO’s (2011) MIL curriculum delves on
“accessing information effectively and efficiently” as an aspect put into practice.
Baacke (1996) included compositional skills in his media competence model that
involves creating new kinds of media content, encouraging self-determination, and
increasing individual’s chances for participation. MIL also involves performative aspect
that entails the competence to do rather than just to know certain things.
Moeller (2009) summarized the facets of MIL from the user perspective,
emphasizing media consumers in identifying news and understanding media’s role in
reshaping the global issues. Norbert Groeben (2002) pointed out the importance of
knowledge of the inner workings (context, routines, contents) and the effects of media.
Fostering certain attitudes toward media and other information sources involves both being
critical on the negative impact of media and defending it against sources of influence.
Integrating Media Literacy in the Curriculum
Although media literacy is now a part of the curricula, it is confronted with a variety
of factors, such as limited access to equipment, teachers’ lack of confidence with the
material, and perception of media education as just an accessory to the curriculum.
Lynch (2018) presents six ways to integrate media literacy into the classroom for
students to become media literate while making media education a meaningful and
integrated part of classroom practice.
1. Teach students to evaluate media. Students learn to evaluate what they are
viewing by showing them that media changes depending on who created it, the intended
audience and the biases that may be attributed to the source.
2. Show students where to find digital resources and databases. Teachers should
provide students with reliable and safe media sources and trustworthy content.
3. Compare/ contrast various media sources. In the discussions, distinguish
various media sources and compare elements.
4. Discuss how the media edits and alters. Purposely point out to students
examples of media altering photographs or stories while teaching them to be critical of
what they see or read at face value.
5. Examine the “truth” in advertisements. Let students identify what
advertisements are trying to sell and what promises, or ideas are they using to convince
them to buy the product.
6. Have students create media. Let students create media appropriate to their
levels such as presentations, videos or websites.
Surfing the Web. The following are the three key factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the subject into
a search engine.
2. Good strategies for searching the Web include writing research questions;
extracting keywords from the questions and typing them into a search engine using
synonyms of the keywords do not bring up desired results; keeping track of keywords do
not bring up desired results; keeping track of keywords and synonyms used; and recording
the results of search.
3. Always be cautious about the information shared online and in visiting websites.
Assessing credibility. Different websites accessible on the Web can make the job of
researchers very challenging. Carefully evaluate the information searched online. Consider
the credibility, or trustworthiness and reliability of the content before taking it. There are
two types of websites: informational and commercial. Informational websites usually strive
to offer credible content to users, while commercial websites present inaccurate
information in order to see something.
Checklist of credibility criteria. The first step in evaluating the credibility of websites is
to review several important aspects of the site.
1. Author. Check the credentials of the author, the company or the expert and
determine the qualifications to provide information on the subject being researched. Some
websites do not list specific authors, but the credibility of a company can be explored by
reviewing the site's "About" page, if available.
2. Date. Look for copyright information at the bottom of a website's home page. If
the site is more than a few years old and it has not been updated regularly, look for more
up-to-date information.
3. Purpose. Analyze the goals of the website to determine if it is an informational
or an advertisement site.
4. Contact. Most credible websites list down contact information, such as
telephone number, email address, or mailing address so that users may get in touch if they
have questions.
5. Fact vs. Opinion. When doing research for a school paper, go to sites that present
factual information provided by experts, rather than opinions. Be on the lookout for biases,
too. If the author is biased, so as the information on the site.
6. URL. The URL may look like ending in .edu (for education), .gov (for
government), .org (for organization), .com (for commercial sites), or .net (for network
sites). Different websites have different URLs. To help determine a site’s credibility,
determine if that is a personal website or blog, a government website, or other types of
website.
Data privacy implication. The implementation of data privacy in the country is becoming
stronger and. powerful, especially in utilizing data for research and other forms of report
and paper works. This has also corresponding legal implications once not processed
immediately and properly. It involves uploading of pictures, designs, graphics,
concepts/ideas, frameworks, art work, data, and other information that are copyrighted
without the consent of the author or the source. These are commonly observed in schools.
The following are practical techniques in responding to data privacy issues.
1. When getting data, put proper citation and source acknowledgment (e.g. Source:
National: Statistics Office, | 2019).
2. When using needed pictures downloaded from the Internet, put acknowledgment
(e.g. Photo credits to PhilPost, 2019). But if possible to have personal pictures taken with
your original concept. Although, there is still a need to seek the consent of those in the
pictures.
3. If data, concepts and information are copyrighted, ask for the consent of the
author, and wait for his/her response.
4. However, if the data and information -are for public domain, just
acknowledging/citing the author or the source will do.
5. If the author doesn't really want anyone to utilize his/her data file or article, learn
the value of respect, anyway that is his/her property. The author's disapproval usually
manifests through difficulty in downloading the file, some tricky signs that appear on
screen, or direct statement or notice of disapproval contained in the file.
How to Evaluate a Website
Morris (2018) suggests ways on evaluating a website as reference in research.
1. Open the site. When looking through Google search results, open sites in new
tabs, leave search results in a tab for easy access later (e.g. right-click on the title and click
"Open link in new tab").
2. Skim read. Determine whether you can read and understand the text. If it is too
complicated or difficult to understand, find another website that may provide the
information you need.
3. Look for the answer to your question. Find out if the information on the site
actually answers your question. You can use a search box, navigation menu, or pull up your
own search box by pressing Control/Command F and type in the keywords you are
searching for.
4. Consider the credibility of the author or website. You need to consider the
credibility of the author or website by considering the following: (1) Domain - domains
that include .gov or .edu are trustworthy sources; (2) Author's information - look at the
author's bio or About page regarding the qualification of the author; (3) Design - avoid sites
that are cluttered and difficult to navigate; and (4) Sources - trustworthy articles usually
link to other sources or cite where their facts come from.
5. Consider the purpose of the site. Think about the purpose of the site and
whether it meets your needs.
6. Look for the date. Consider whether the information is current enough for your
topic. You can look for the date when the article was written or last updated. Sometimes,
URLs also include dates. ([Link]
Integrating Digital/Cyber Literacy into the Curriculum
The following are suggested activities to integrate digital literacy, higher-order
thinking and construction of meaning in the classroom.
1. Use an interactive whiteboard to design and deliver lessons. Use Promethean and
Smart Notebook with teacher-created lessons if you are not yet capable of designing your
own.
2. Allow students to maintain blogs, wikis, web pages related to their learning.
3. Engage in email/video chat exchanges with students.
4. Utilize storytelling media to allow students to create and publish stories.
5. Set-up a blog site, Facebook page, Yahoo or Google group and post weekly
discussion questions for students to respond.
6. Use video cameras to dramatize stories, record scientific experiments and expose
students to video editing software to create video production of learning.
7. Engage students in discussions about how and why various media work well to
showcase learning and why others do not.
8. Thinking critically about the medium. use to present a message is as important
as the message itself.
9. Require E-Portfolio that would compile their outputs, projects, messages and
photo-documents of group activities and investigations online.
10. Allow students to use digital tools, such as mobile phones, Ipad and netbooks
for Google search, dictionary Apps, YouTube, Podcast and Spotify applications in class to
complement their learning, especially during group works and concept reporting.
Impact of integrating digital literacy in the classroom on teachers, families and
friends. Integrating digital literacy in the classroom can bring a positive impact on students'
learning as evidenced by the following:
1. It motivates students in their learning due to their enjoyment and ease of use with
various technological mediums.
2. It reaches students of various learning styles and multiple intelligences.
3. It allows students to create and design their own unique products reflective of
their personalities and learning needs/styles.
4. It encourages students to manipulate media in constructing their own meaning.
5. It enables students to share their learning with teachers, families and friends.
6. It gives students the chance to explore technological media that inevitably
increase the job skills needed in the workforce.
([Link]
[Link])