0% found this document useful (0 votes)
63 views

Module 15.Docx

Module 15 focuses on cyber and digital literacy, emphasizing the importance of these skills in today's interconnected world. It outlines the objectives of understanding digital literacies, digital citizenship, and the negative impacts of ICT, including cyberbullying. The module also discusses the elements of digital citizenship and netiquette guidelines to promote responsible online behavior.

Uploaded by

lyssaaustria
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Module 15.Docx

Module 15 focuses on cyber and digital literacy, emphasizing the importance of these skills in today's interconnected world. It outlines the objectives of understanding digital literacies, digital citizenship, and the negative impacts of ICT, including cyberbullying. The module also discusses the elements of digital citizenship and netiquette guidelines to promote responsible online behavior.

Uploaded by

lyssaaustria
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

FM-AA-CIA-15 Rev.

0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__

STUDY GUIDE FOR MODULE NO. 15

Module 15 – Cyber/Digital Literacy


MODULE OVERVIEW

In the teaching and learning context, digital literacy is an important competence.


In school, it has become a buzzword which refers to the ability to access, process,
understand, utilize, and create media content using information technologies and the
internet (Hsieh, 2012).

MODULE LEARNING OBJECTIVES


1. familiarize with the concepts of cyber and digital literacy
2. identify and describe the digital literacies and digital literacy skills
3. discuss the concept and elements of digital citizenship
4. cite the negative effects of ICT and cyber bullying and the efforts to e-safety
5. recognize the relevance of the Web, social, mobile devices, and digital traits

MODULE
LEARNING LEARNING
CONTENTS OBJECTIVES
(title of the subsection)

Introduction
Since we are considered citizens of the community we live in, then as users of
the internet we can also call ourselves as citizens of the digital world where we live,
learn, and work in an interconnected manner.

Cyber/Digital literacy
Cyber Literacy means the ability to use computer technologies effectively and to
simultaneously understand the implications of those actions.
Cyberspace is a domain characterized by the use of electronics and the
electromagnetic spectrum to store, modify, and exchange data via networked systems
and associated physical structures. In effect, cyberspace can be thought of as the
interconnection of human beings through computers and telecommunication, without
regard to physical geography.
Radio, television and the Internet are contemporary technologies devised by
man. Wireless radio, cable television, and Internet sites are the boon of modern age
which utilizes the boundless cyberspace. Today, cable television has allowed homes to
have access to television programs worldwide, use the web-camera for person-to-
person visual contact with friends and business colleagues, get published through blogs
and Web sites, get online jobs as writers or encoders, possibly even gain instant
popularity through videos uploaded in the U-tube. These are easily recalled examples of
Cyberspace providing benefits to societies in this digital age.
The term ‘digital literacy ‘was coined by Paul Gilster in 1997 and it came from
the discussion of the concepts on a) visual literacy when images and non-verbal
symbols try to capture the knowledge; b) technological literacy requiring one to be
able to use technology in addressing a need; c) computer literacy, which in the 1980s
started to become a household item manipulated to
achieve one’s target; and d) information literacy which refers to the finding, evaluating,
using and
sharing of information.
Thinking on how to use the digital tools, accessing information, and exhibiting
ways of

PANGASINAN STATE UNIVERSITY 1


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
working in a globally competitive contexts, together with the skills in living in the 21 st
Century refer to the digital literacies. The skills you need to be able to perform well in
the situations are known as ‘digital literacy.’ In the 21 st century, you need to be
equipped with these skills to be abreast with the demands in the workplace.

Digital literacies
Digital literacies are the individual’s capabilities to be able to effectively and
responsibly function and perform in a digital society.
Media literacy is one’s ability to critically read information or content and utilize
multimedia in creatively producing communications.
Information literacy is locating information from the web and interpreting while
evaluating its validity in order that it can be shared.
ICT literacy is knowing how to select and use digital devices, applications or
services to accomplish tasks requiring the use of the Internet.
Communications and Collaboration are one’s capabilities in being able to
participate in the digital networks in the teaching and learning context.
Identity management is being able to understand how to ensure safety and
security in managing online identity and foster a positive digital reputation.
Learning skills are ways of knowing how to study and learn in a technology-
enriched environment, this is knowing how to use technology in addressing the need
to learn efficiently.
Digital scholarship is being able to link and participate in professional and
research practices.

Digital literacy skills


The basic literacies (knowledge, skills, and values) of the 3 Rs (reading, writing
and ‘rithmetic), will not be replaced by new digital skills, but they will be
complemented by six essential skills to equip students for success in the millennial
world. Rather than call them literacy skills, these are better referred to as fluency
skills conveying the ease and facility in acquiring and using them.
Solution fluency. This refers to the capacity and creativity in problem solving. It
requires whole brain thinking executed when students define a problem, design the
appropriate solution, apply the solution, and assess the process and result.
Information fluency. This involves three subsets of skills namely, a) an ability
to access information - access may involve not only of the Internet, but other
sources like the CD-ROM software; b) an ability to retrieve information - retrieved
information may include not only texts, but images, sound and video. The searches
may be perspective of trends in the digital info scope, in the accuracy of data, and
in the methodology for data gathering; and c) an ability to reflect on, assess and
rewrite for instructive information packages.
Collaborative fluency. This refers to teamwork with virtual or real partners in
the online environment. There is virtual interaction in social networking and online
gaming domains. Distance has been abridged, such that learning comes to an
exciting potential for partnership in discovery learning. Individual and school to
school s are now possible for multi-cultural learning.
Media fluency. Media refer to channels of mass communication (radio,
television, magazine, advertising, graphic arts) or digital sources. There is a need for
an analytical mind to evaluate the message in a chosen media, as well as a creative
ability to publish digital messages. There are paid-for and free-domains, such as
blog pages, in which personal reflection or journal messages can be published
without cost. Sites on the educational sector especially of developed countries,
published articles, researches and lesson plans are easily accessible by researchers
and learners.

PANGASINAN STATE UNIVERSITY 2


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
Creativity fluency. Artistic proficiency adds meaning by way of design, art, and
story-telling to package a message. Font, color, patterns, layout are elements to
creative fluency. Templates for Powerpoint presentation and blogs are available for
free access in the internet.
Digital ethics. The digital citizen is guided by principles of leadership, global
responsibility, environmental awareness, global citizenship, and personal
accountability. Sad to say, the digital world is not free from those who exploit the
digital space for personal selfish commercial and criminal activities.

Citizenship in the digital world


Digital citizenship is an idea that all persons using the internet have civic rights
and responsibilities. It centers on safe, savvy and ethical use of technology. Citizenship
is known as netizenship in the virtual world. This is making the person consider how
one behaves accordingly by observing the norms and rules that are I accordance with
what are sociably and virtually acceptable. As result, one is projecting a reputable
digital identity which is his or her character.
Digital citizenship covers appropriate and exemplary behavior in our online
environments. It’s about working towards making our transparent digital world safe for
ourselves and others. Just like personal responsibility, this involves moving
accountability for appropriate behavior to our students. We teach them how to govern
their behavior, act in just and moral ways, and lead by good example in all online
associations. In doing so, they foster independence within themselves and hopefully
light the way for others and to do the same.
Digital citizenship is very similar to our citizenship in our immediate community.
There are social, ethical and legal issues involved in our day to day dealings with
people and the surroundings. It is not just about recognizing and dealing with online
hazards. It is about building safe places and communities, understanding how to
manage personal information, and about being savvy – using our online presence to
grow and shape our world in a safe and, creative way, inspiring others to do the same.
(Blackboard 2018).
Moreover, a digital citizen adheres to guidelines that govern the ethical and
responsible use of technology and acts responsibly in all relationships and interactions
in the digital world.

Elements of digital citizenship


Digital citizenship is now a component of global citizenship, and is in fact one of
the facets of Global Digital Citizenship. Under digital citizenship, there are nine
elements:
Digital access
Equal digital rights and electronic access is the starting point of digital
citizenship. Digital access is supposed to be available to all in the same manner that
education is made sure by the Philippine government to be available to all citizens.
Currently, on this matter, the Republic Act 10929 was signed on July 25, 2016
requiring all public places in the country to have free internet access. Public places
in this act cover national and local government offices, public basic education
institutions, state universities and colleges and TESDA technology institutions,
public parks and barangay reading centers, public airports and seaports, and public
transport terminals. Despite this law, however, many are still deprived of internet
access and therefore deprived of some resources. To become productive citizens, we
need to provide and expand access to technology and we need to be committed
that no one is denied digital access.
Digital commerce
Technology users need to understand that a large share of market is being done

PANGASINAN STATE UNIVERSITY 3


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
electronically. Nowadays people shop through different websites and even do online
transactions for banking. Many other online transactions are occurring including the
illegal downloading, pornography, and others thus a safe and secure online
shopping and other commercial transactions have to be done. With this, an e-
commerce act or RA 8972 was signed in July 2000. This act aims to facilitate
domestic and international dealings, transactions, arrangements, agreements,
contracts and exchanges and storage of information through the utilization of
electronic, optical and similar medium, mode, instrumentality and technology to
recognize the authenticity and reliability of electronic documents related to such
activities and to promote the universal use of electronic transaction in the
government and general public.
Digital communication
It is another element that we seem to be embracing wholeheartedly. Digital
communication is the electronic exchange of communication which includes e-
mailing, texting, instant messaging, utilizing cellphones, etc. As digital
communications continues to grow, it is important that we do not forget how to
communicate face-to-face. We have to utilize digital channels of communication to
enhance our ability to communicate, but do not allow it to replace our ability to
communicate.
Digital literacy
As digital citizens, it is our responsibility to develop and continually enhance our
technological knowledge. We should support and encourage the acquisition of
technological knowledge by others. We should model the positive and proactive use
of technology for good causes, personal and professional growth and education.
Digital etiquette
This refers to the electronic standards of conduct or procedure. This is often seen
as one of the most pressing problems when dealing with Digital Citizenship. Imagine
a teenager who spreads hate speech about a classmate online. Or one who browses
Facebook while attending Mass. Browsing social media sites have become so
addictive that young people tend to lose distinction between what is appropriate
and what is not. It begins with rules. It is not enough however to create rules and
policies, everyone must be taught to become responsible digital citizens.
Digital law
Digital law refers to the electronic responsibility for actions and deeds. The
digital world is so huge that there should be order, discipline, and ethical use.
Plagiarism and copyright infringement, hacking of information, identity theft are
crimes that are commonly violated by online users. As digital citizens, we must be
aware of these illegal behaviors so that we can avoid them and report those who
illegally engage in them.
Digital rights and responsibilities
“For every right, there is a corresponding duty and for every privilege, there is a
corresponding responsibility.” The privileges of digital access come along with
responsibility. Just as the Philippine constitution protects us with rights of being
Filipino citizens such as the right to privacy, we also have the responsibility to be
cautious in opur online activities such as posting our photos and videos online.
Digital health and wellness
Our physical and psychological well-being in a digital technology world should be
a priority. Many illnesses have become associated with technology use such as
carpal tunnel syndrome, eyestrain and childhood obesity as an effect of children’s
prolonged sitting in front of the computer screen. Technology has also posed an
inherent danger of addiction and threat from online predators. Thus, children and
adults alike must learn how to protect themselves as digital citizens through
education and training.

PANGASINAN STATE UNIVERSITY 4


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
Digital security
How to keep oneself in any community is a major concern. If we keep our home
safe with gates and locks, we also need to protect the information that we provide
online with privacy setting and strong passwords. We also need to have virus
protection and backups of our data. As responsible digital citizens, we must know
how to keep our data, our money, and out identity from all hazards in the digital
world.

Netiquette guidelines
While working online, we all create a digital tattoo and we leave digital
footprints. We have to remember that our digital world is permanent, and with each
post, we leave a digital footprint. By doing self-reflecting before we self-reveal, we are
able to consider how what we share online can impact ourselves and others
(www.commonsensemedia. org).
Scrutinizing the term again, a netizen, according to the Merriam-Webster
Dictionary, is an active participant in the online community of the Internet. The medical
dictionary refers to it as an Internet citizen who uses networked resources, which
connotes civic responsibility and participation. Thus, netizenship means citizenship in
the Internet or in the virtual world.
As responsible netizens, we are all expected to support a healthy interaction on
the Internet. A netiquette, or the rules of socially accepted behavior online have to be
observed in writing an e-mail, in texting, and other communications on the web.
Below are some netiquette guidelines:
1. Protect your reputation. Whether in real or in virtual world you are the same
person. Do only what is appropriate and share information that does not harm
you as a person.
2. Respect others. Respect begets respect. Treat anyone with respect even if you
have not seen him or her in person. Be judicious about what you say on your own
and other’s pages.
3. Express yourself clearly and use emoticons. Communication online is
difficult because emotions are not evident during communication.
Miscommunication usually takes place because your facial expression and your
body language cannot be seen and the tone of your voice cannot be heard. Thus,
emoticons are readily available to show your emotions.
4. Remember the intellectual property. Ideas online are the product s of
intelligence of others. If you need to cite them, acknowledge the authors. You
definitely do not want to steal properties of others.
5. Check spelling, grammar and punctuation. Since your face cannot be seen
online, you will be judged according to your posts. Good writing means good
manners. We do not want to waste other people’s time reading our post which is
incomprehensible.
6. Pause before you post. Take note that whatever you post becomes permanent
therefore think twice or thrice before you click send.
7. Do not share your personal information. Sharing your personal information
online is like going around the streets wearing a shirt printed with your name,
birthday, address, name of parents, etc. You definitely do not want to reveal all
these to many people. Besides, providing all these publicly will make you prone
to identity theft.
8. Think about who or what you are representing. As a son/ daughter, you
represent your family. As a student, you represent your school. You do not want
your family or school to be put to shame by what you do.

Each of us has a significant contribution to the kind of community we have in the


virtual world. As the Association of American Medical Colleges (2015 in

PANGASINAN STATE UNIVERSITY 5


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
www.cyberbullying.org) says it, “We are responsible for the ‘public face’ that the
connected world sees”. Consequently, our individual
digital reputation is shaped by our posts on social media.

Internet safety
The internet
The Internet, also simply called the Net, is the largest and far-flung network
system-of-all systems. Surprisingly, the Internet is not really a network but a loosely
organized collection of about 25,000 networks accessed by computers on the planet. It
is astonishing to know that no one owns the Internet. It has no central headquarters, no
centrally offered services, and no comprehensive online index to tell users what
information is available in the system.
Everything is coordinated in the Internet through a standardized protocol (or set
of rules for exchanging data) called Transmission Control Protocol/Internet Protocol
(TCP/IP). To gain access to the Internet, the computer must be equipped with what is
called a Server which has special software (program) that uses the Internet protocol.
Originally developed and still subsidized by the Unites States government, the Internet
connect not only commercial, industrial, scientific establishments but all other sectors
including education and its libraries, campuses, and computer centers.
The great attraction of the Internet is that once the sign-up fees are paid, there
are no extra charges. Electronic mail, for example, is free regardless of the amount of
use. In contrast, individuals using the Internet on their own personal computers must
pay ongoing monthly fees to whoever is their service provider.

Risks in the use of ICT and e-Networking


Using technology, particularly the Internet is not a risk by itself, but how it is
used will be vulnerable to risks. When improperly used, it will pose danger to the users
in school and at home. Despite the so many benefits for teaching and learning, there
are also negative effects or influence on the learners. Safeguard and protection should
be primordial role of parents, teachers and schools. There are many risks that we have
to be aware of in the use of digital technologies, the Internet in particular. These may
include the following:
1. Exposure to inappropriate content, including on-line pornography, extremism
(exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images of messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and many
more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressure to maintain online networks via texting and social networking
sites.

Minor misuse of ICT


In school, some minor misuse made by learners includes the following:
- Copying information into assignment and failing to acknowledge the source
(plagiarism and copyright infringement)
- Downloading materials not relevant to their studies
- Misconduct associated with subjects logins, such as using someone else’s
password

PANGASINAN STATE UNIVERSITY 6


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
- Leaving a mobile phone turned on during class period
- Unauthorized taking of pictures or images with mobile phone camera, still or
moving.

e-safety
With all the misuse and risks in the use of digital technologies, how do we
confront all of these so as to protect our future generation? e-safety takes care not
only of internet technologies but also of electronic communications via mobile
phones, games consoles an wireless technology. It highlights the need to educate
children and young people about the benefits a, risks, and responsibilities of using
information technology. Here are some issues of e-safety:
- e-safety helps safeguard children and young people in the digital world;
- e-safety emphasizes learning to understand new technologies in positive ways;
- e-safety educates children about the risks as well as the benefits so we can be
confident on-line; and
- e-safety supports young learners and adults to develop safer online behaviors,
both in and out of school.

Network management
1. Safety in the use of networks in schools
1.1. Make clear that no one should log on as another user.
1.2. Require all users to always log off when they have finished working.
1.3 Maintain equipment to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-
learning/
1.5. Set up a clear disaster recovery system in place for critical data that include
secure, remote back up of critical data.
1.6. Secure wireless network to appropriate standards suitable for educational
use.
1.7. Install all computer equipment professionally and meet health and safety
standards.
1.8. Review the school ICT system regularly with regard to health and safety and
security.
2. Password policy
2.1. Only authorizes users will have individual passwords. Users are not
permitted to disclose their passwords unless they got permission from the
owner or from the management. The equipment that keeps the personal
information shall be locked when unattended to prevent unauthorized
access.
3. Personal mobile phones and mobile devices
3.1. All mobile phones shall be kept away in a box away from the children or
learners and access is only allowed at break time or at the end of classes or
when needed during the class period.
4. Cameras
4.1. Taking pictures only from parents or caregivers and not from any other
family member or friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.

Negative impacts of ICT


So far, not everything is clearly right and wrong with the use of cyberspace. It
appears that modern man has the right to use cyberspace fi=or his own advantage,
while he is also obliged no to infringe on other people’s rights over the same virtual
privilege. Therefore, those who invade cyberspace privacy, security and intellectual
property rights appear apparently to be in the wrong. Also, specific issues such as

PANGASINAN STATE UNIVERSITY 7


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
hacking, spamming unwanted messages, extorting money from innocent Internet
users, using the Web for commercial sex, etc., call for more incisive assessment so that
law and order could be installed in virtual space. Owing to negative destructive impacts
of information and communication technology, clarification on ‘right’ and ‘wrong’ needs
to be done, leading to the formulation of laws that define the civil, as opposed to what
is criminal, in the use of cyberspace.
ICT has problematic implications. Three main types of issues with ethical
implications are identifiable:
Personal privacy. Modern man is able to exchange information and communicate
on a wide scale instantaneously and on a wide scale throughout the world. In this
situation, affront on privacy is possible depending on technology expertise by privacy
intruders. Thus, the spams in whoever in e-mails are situations which boil down to the
e-mailer taking necessary precautions to protect his/her privacy. In protecting financial
interests it is well to be warned about giving disclosures about our bank accounts or PIN
numbers.
Right to access. Due to the advent of international business and finance,
computer security and access must be given high priority attention, most especially as
there have been attempts at illegal access on national military and scientific
installations by computer hackers. Needless to say, without protective systems, as well
as administrative and legal measures, Cyberspace cannot be secured from unethical or
illegal access.
Harmful actions. Harmful consequences can result by way of invasion of privacy,
loss of intellectual or real property rights, and costly damage to technological systems.
A table can illustrate a broad classification of various activities that are unethical
and illegal in Cyberspace.

Unethical & illegal Examples


Practice
Fraudulent information, violation of privacy, false
rumors, obscene information, libelous
Illegal information
information, civil rights violations, gambling
information
False rumors, drug information, sex information,
Prejudicial information
violent information
e.g., the publication of the topless photograph of
Infringement on privacy
the Duchess of Cambridge which was in the news
and security
recently

Cyber bullying and cyber crimes


The modern society has become more complex than ever with the advent of
modern technology. Computers boomed, making children spend more time on it. They
spend more time using the Internet to do any of the following – researching, watching
movies, listening to music, chatting, and the like. They use the Internet in various ways
that sometimes they do not notice they use it in an abusive way.
With the presence of computers, cyber bullying has emerged as the most
anonymous for of bullying. It is done through the use of technology and can easily go
undetected because of lack of parental guidance and supervision. This includes abuse
through websites, Facebook accounts, Twitter accounts, e-mail, instant messaging, text
messaging and other forms.
Cyber bullying is one of the most rampant issues that need to be tackled if we
want to preserve the psychological state of mind of our children. Based on a study,
conducted by Telenor, the Norwegian telecom company, 66% of teenagers these days
received bullying messages on the Internet or mobile phones coming from either
friends or chat mates. Gone were the days when bullying only happened inside the

PANGASINAN STATE UNIVERSITY 8


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
school campus, in the cafeteria, or in the playground and would stop immediately when
the bell ran and they had to go back inside their classrooms or went home. With cyber
bullying, it now happens 24/7.
Cyber bullying or electronic bullying involves posting sensitive or private
information about another person, sending mean text messages or emails, rumors sent
by e-mail or posted on social networking sites, intentionally excluding someone from an
online group, and pretending to be someone else in order to make that person look
bad. This could be done by teens through instant messaging, e-mails, text, or digital
imaging messages sent on mobile phones, blogs, chat rooms, and web pages.
Unlike physical bullying where the victim could just simply walk away,
technology now allows for continuous harassment in a variety of ways and from any
distance. Thus, this could pose a negative or destructive emotional effect on the victim,
ranging from hurt feelings to intense anger. It may also lead to depression or, in most
severe cases, may result in suicide. Unfortunately, children rarely report instances such
as these to their parents or any adult so they could be properly guided.

Managing computer threats


Efforts at Cyberspace protection
In order to protect users from people eavesdropping on private information,
computer developers have proposed intrusion-detection systems which can detect any
illegitimate use of an information site or system.
- national communities and the international community have given attention to
comprehensive protection laws
- technical systems have been devised such as the setting up of protective firewalls
on sites or systems.
- legislations have been formulated by some countries – worthy laws and guidelines
on the use of Cybespace:
- legislations in the U.S.A. includes acts enacted on freedom of information,
privacy protection, Internet privacy, consumer Internet privacy, and data
privacy.
- legislations are also enacted in other countries such as Japan, Canada,
Singapore, Australia and Korea. New participating countries have started
formulating statutory laws to secure individuals from the potential invasion of
privacy.
- in the Philippines, RA No. 10175 or the Cybercrime Prevention Act of 2012 was
approved on September 2012.

Parents, teachers, and children can prevent cyber bullying. The best things for
parents and teachers to do are:
1. Get involved so children would think that it is fun to have their parents or
teachers take part in their activity.
2. Find time to talk and listen to them.
3. Do some worthwhile activities with them.
4. Be vigilant enough to monitor their Internet activities to avoid bullying.
5. Do a constant reminder to think before clicking.

6. Check them right away when you find out that they are bullying their
friends, chat mates or anybody over the net. Just make sure you do it in a nice
way.
7. Always implant in their minds that respect begets respect.

Researching and evaluating the web

PANGASINAN STATE UNIVERSITY 9


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
World Wide Web (www), also called the Web, is graphical environment on
computer networks that allows you to access, view and maintain documentations that
can include text, data, sound and videos (Smaldino, 2005). It is way of accessing
information over the medium of the Internet. It is an information model that is built on
top of the Internet.
Web access is the ability of the learner to access the Internet at any point during
the lesson in order to take of the array of available education resources.
Tim Berners-Lee conceptualized the world wide web (1989), which could
hyperlink information through a web of networked nodes anywhere and anytime.
Various hardware especially the modem that encodes and decodes different kinds of
signals into digital information turned Berners-Lee’s dream of the Internet into a
widespread reality. When browsers allowed people to easily log on to and navigate
through the world wide web, Dot.Com companies were founded, offering Internet users
new types of media content, such as personal web pages, web directories (e.g.,
Yahoo!), and online encyclopedias. But by 1999, Darcy DiNucci heralded Web 2,0,
which would go beyond the Dot.Com world and was to be “ a transport mechanism, the
ether through which interactivity happens. It will …appear on your computer screen, …
TV set, car dashboard, cell phone, handheld game machines,…maybe even your
microwave oven. “It was Tim O’reilly, in 2004 who popularized the term Web 2.0 to
refer to second-generation Internet applications that allow people to create, share, and
modify online content and that intensify interaction and collaboration. Blogs, wikis,
social networking and media uploading sites are embodiments of Web 2.0.

Social media use


Socialization occurs in family settings, schools, churches, organizations,
friendships, among others; teaches us to identify ourselves as children, students,
believers, members, or friends; and allows us to express ourselves in socially
acceptable ways according to the values, attitudes, practices, and aspirations of our
various social contexts. If your family puts great value on respecting the elderly, your
school encourages creativity and independent thinking, your church respects tolerance
and inclusiveness, your organization rewards excellence, and your friendship is built on
trust and mutual help, then you internalize these “cultures,” which partly determine
you expression of who you are and what is important to you. In no small way is media
part of our socialization! We cannot possibly relate our individual selves to a myriad of
social contexts all the time, but we are able to do so imaginarily and vicariously
through media exposure.
How early in life did we start getting exposed to teen movies in which finding a
boyfriend/girlfriend is portrayed as the highlight of high school life? Prom nights and
partying are conventionally visualized in media, but struggling through and eventually
loving physics is not the stuff of teen movies. The former might be conventionally
deemed “cool”, while the latter “corny”, nerd, slut, jock, or outcast by the time we
reached high school> How much of our own high school life, as result, has been fact
imitating fiction and vice versa? How badly have we wished that we were like Romeo,
swaggering down the hall, turning all heads, especially Juliet’s? We know what pains
Laura, but what do teenage Manobos dream of and what do teenage Ifugaos aspire for?
Conventional media form/content significantly narrows down the range of
normal, in the process marginalizing ideas and actual people that are different and fall
by the wayside of mediated norms. Media exposure without reflection and the
unselfconscious acceptance of media convention, therefore, have deep and profound
impact in what we come to view as commonsensical, appropriate, desirable, among
others. Do we dare allow media to socialize us as we remain passively entertained?
Media genres, or the conventional combinations of form/content, are a mode and
a picture of socialization. For example, in Nicanor G. Tiongson’s study of Philippine
cinema, he argues that centuries of socialization by colonially influenced entertainment

PANGASINAN STATE UNIVERSITY 10


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
have resulted in cinematic values that marginalize Filipino in their own culture and work
against their interest and well-being. These values which we have come to accept as
“natural” through continued and continuing practice are summed up by Tiongson as
follows:
- Maganda ang maputi
- Masaya ang may palabas
- Mabuti and inaapi
- Maganda pa ang daigdig.
To put it another way, these values have defined media representations of the
world for so long that these values seem merely to reflect the world. The bida in
Philippine media looks the role if she has white skin; the kontrabida, sidekick, and
laughing stock look the part if they are like many other Filipinos who are brown.
Entertainment exists mainly as a means to escape from the darkness and difficulty of
daily life, not as a way of engaging with life. Pleasure is derived from watching the
suffering of the pure-hearted protagonist in the hands of unexplainable evil. But, in
spite of all the
trials and tribulations that the protagonist must go through, all stories must end
happily-ever-after because that is entertainment
Social media continues to change the way we live. Here are some facts from We
Are Social regarding digital statistics in the Philippines for 2016.
1. Of the entire Philippine population, 47% are active social media users and
40% are active mobile social users.
2. The total number of mobile subscription is 119.2 million, it’s 117% of the total
Philippine population.
3. 87% of adult population are mobile phone users.
4. Facebook is the most active social media platform with 26%, followed by
Facebook Messenger with 23%, while Twitter and Instagram also tops the list
with 13% and 12&.
5. Ages 20-29 years old are the most active users on Facebook.
6. When it comes to mobile activity: 3% are using Mobile Messenger; 26%
watching videos and 23% playing games.
7. Social media platforms are used for searching and purchasing products and
services by 29% of the population.
8. Along with Brazil, Philippines top time spent on the internet using PC or tablet
with 5 hours and 12 minutes; the highest time spent among other countries.
9. Philippines has only an average of 3.2 Mbps in terms of the net connection
speed versus the global average of 5.1Mbps.
10.Philippines tops the list of countries with the most time spent on social media
each day
(Source: Philippines Social Media, Industry Trends/Accessed 9-15-16)

Mobile devices
Mobile device is a general term for any handheld computer or smartphone. The
term is interchangeable with 'handheld,' 'handheld device,' and 'handheld computer.'
Tablets, e-readers,

smartphones, PDAs and portable music players with smart capabilities are all mobile
devices
The current systems employ technologies by integrating ICT tools and
applications in education and in instruction. ICT stands for Information and
Communication Technology. This refers to various tools and devices or gadgets used in
communicating, disseminating, creating, sorting and managing information. It is
important that learners understand how to use these tools in helping them learn.

PANGASINAN STATE UNIVERSITY 11


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
It is not necessarily the presence of advanced technology or the use of ICT tools
that can ensure the success in engaging learners, but it still remains that the effective
use of ICT tools
depends on how the teachers and learners will use them.

Characteristics of Mobile Devices


Mobile devices have similar characteristics. Among them are:
- Wi-Fi or cellular access to the internet
- A battery that powers the device for several hours
- A physical or onscreen keyboard for entering information
- Size and weight that allows it to be carried in one hand and manipulated with the
other hand
- Touch-screen interface in almost all cases
- A virtual assistant, like Siri, Cortana or Google Assistant
- The ability to download data from the internet, including apps and books
- Wireless operation

Smartphones
Smartphones have taken our society by storm. If you don't already have one,
you want one. Examples include the iPhone and Android phones, including
the Google Pixel line. Smartphones are advanced versions of traditional cell phones
in that they have the same features as cell phones — such as the ability to make
and receive phone calls, text messages and voicemail — but they can also be used
to browse the internet, send and receive email, participate in social media and shop
online.
They also can download apps from the internet using a cellular or Wi-Fi
connection to expand the smartphone capabilities in a vast number of ways.
Tablets
Tablets are portable, like laptops, but they provide a different experience.
Instead of running a traditional laptop and desktop computer applications, they run
apps designed specifically for tablets. The experience is similar, but not the same as
using a laptop computer. Tablets come in all sizes, from slightly larger than a
smartphone to the size of a small laptop.
Although you can buy a separate keyboard accessory, tablets come with virtual
onscreen keyboards for typing and inputting information. They use touch-screen
interfaces, and the familiar mouse is replaced with a tap from a finger. There are
many tablet manufacturers of tablets, but among the best-reviewed are Google
Pixel, Samsung Galaxy Tab, Nexus, and Apple iPad.
E-Readers
E-reders are specialized tablets that are designed for reading digital books.
Those digital books can be purchased or downloaded free from online sources. Well-
known e-reader lines include Barnes & Noble Nook, Amazon Kindle and Kobo, all of
which are available in several models. You can also read digital books on tablets that
have an ebook app installed. For example, Apple's iPad ships with iBooks and
supports downloadable apps to read Nook, Kindle and Kobo digital books.
Other Mobile Devices
Some portable music players have access to the internet and can download
apps to enhance their value to their owners. Apple's iPod touch is an iPhone without
the phone. In all other respects, it offers the same experience. Sony's high-end
Walkman is a luxurious audio player with Android streaming apps.
PDAs, the business person's best friend for years, fell out of favor with the
introduction of smartphones, but some are being reimagined with Wi-Fi access and
with rugged designs that make them useful to the military and people who work
outdoors.

PANGASINAN STATE UNIVERSITY 12


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
Wearables, like smartwatches and fitness trackers, are among the newest
additions to the mobile device landscape. Many are powered by the same mobile
operating systems as phones and tablets, and they're capable of running their own
apps. Most wearable devices are made to pair with another mobile device, like a
smartphone to share data and create an altogether more convenient .

There is a variety of devices from which to choose. When employed


appropriately, the potentials of their uses can have bearing on the lesson and the
learners’ engagement in the process of learning. In instruction the mobile devises
can be used in the presentation of the lesson, demonstrating a point or presenting a
concept. There are devices that can be used in providing practice or provide the
chance to apply the skills taught. Even when you are working as a team or a group,
devices can be employed to facilitate the accomplishment of the task during the
class or even after beyond the face-to-face session.

Digital traits
Who has a digital mindset?
A person with a digital mindset applies technology to become more efficient and
collaborative. It’s someone who is relentlessly curious, questions the status quo and
one who doesn’t limit herself to the job scope. She explores experiments and copes
well in rapidly changing environments, both on a professional and personal level and all
while having fun at work! It’ll definitely help your company or business innovate faster
and gain competitive advantage if everyone adopts a digital mindset. You might then
ask what traits and behaviors constitute a digital mindset?

The 10 Digital Mindset Traits


1. Always wanting to grow!
An employee with a digital mindset is always hungry to learn and do more. He’s
always ready to lead and embrace What’s Next. The digital mindset is especially
ingrained by those with a drive for high performance. They look for new ways of
performing better. They’re widely read and keep track of the latest trends. Self-
learning is not alien to them. They are excited about exploring new territories so
that they can develop new skills to help them become better at work and in their
personal lives.
Stanford university psychologist Carol Dweck breaks people in two groups;
those with a (1) fixed mindset and (2) growth mindset. A person with a digital
mindset belongs to the latter – with an insatiable desire to learn and embrace
challenges; a willingness to struggle and persist to achieve desired results; and
learn from others through criticism and feedback. Most importantly, growth is
always a big part of their agenda. They will grab any opportunity to keep learning
and growing.
2.Embrace diversity
The best ideas are much more likely to evolve in teams with different
personalities, racial profiles, professional backgrounds, world-views, cultures and
genders. By embracing diversity, you will more likely be exposed to different
thoughts, dialogues, ideas and ways of doing things.
New Ways of Working which most corporates speak about is not a fixed state we
want to reach. It’s about evolving, renewing and challenging the status quo so we
can outthink and outpace our competitors. A diverse workforce will help us renew
ourselves and advance the way we do things. The best leaders and experts know
how to extract the most value from meetings involving colleagues from other
departments and divisions by listening and letting themselves be inspired. The force
is always with those who embrace diversity!

PANGASINAN STATE UNIVERSITY 13


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
3.Glocal approach
The world has truly become borderless with Whatsapp, Facebook, Snapchat,
Instagram and the likes. We are constantly updated about our friends, business
partners and colleagues from every corner of the globe. Distance and borders are no
longer obstacles to partnerships. The ability to contribute to projects by sharing and
building ideas through cross-border connections is now the norm rather than the
exception.
LinkedIn and Facebook groups connect like-minded people from all over the
world to share and solve challenges virtually. People with a digital mindset have the
passion to align
and connect with each other regardless of distance and time zones. If you have a
digital mindset, you will contextualise learnings, products and solutions from
anywhere in the world and adapt them to your local environment. The digital
mindset gets inspiration wherever and customise whatever they find to satisfy their
local needs.
4.Passionately explores and experiments
Experimenting with new apps, systems, concepts and ideas feels natural for a
person with a digital mindset. If you take risks and are prepared to fail, you will rise
stronger than ever. You should not be limited to a job description or profile. Seize the
opportunity to learn and execute beyond what is required. Keep thinking about new
ways of doing things and how to grow your portfolio. Expand your knowledge within
undiscovered areas to stay relevant in an ever-changing world. Taking calculated
risks and accepting that failing will happen is the way to go. No one enjoys failures,
but you will always rebound after each failure—wiser and an experience or two
richer.
5.Thrives in an agile environment
Sudden changes due to new findings or developments are part and parcel of
this digital era. Technology is evolving exponentially and the way we work must
follow suit. You must be prepared to review long-held beliefs. Often you have to
demolish what you created in the past—along with your pride—to make space for
more efficient systems and solutions. You should foresee change before the need to
change arises.
With technology evolving exponentially, change is the only constant in the
digital world and you must find a way to turn it to your competitive advantage. You
must be comfortable with technology, see change as an opportunity and accept new
ways of working without feeling threatened. The competition is fiercer and more
dynamic than ever before. Start-ups are forever finding new ways to shake the
foundations of the corporate world. Speed and adaptability are keys to staying
relevant—the market dictates it.
6.Sharing is not just caring
Sharing new findings and advising one another about the latest technologies
are all
important actions that will help us stay ahead of the competition in an ever-
changing environment. Hoarding information in the hope of being the go-to person
is a trait that needs to be removed from every individual in any organisation. Being
a bottleneck is a sign of uncooperative behavior. Find a way to make your
knowledge explicit and teachable so you can contribute and engage yourself for
something bigger.
The “one company” attitude has to be real. Everyone is working to achieve the
same big hairy goal. So share whatever that can help others accomplish the goals
they are working on. This is how we can really move forward and be admired for
excellence!
7. Data driven

PANGASINAN STATE UNIVERSITY 14


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
The amount of data produced is expected to reach 44 zettabytes in 2020,
according to the
global market intelligence firm IDC. IoT is expected to account for at least 10% of
the data created. 32 billion devices are expected to be connected in 2020. There’s
already lots of data and there will only be more of it. Big Data alone won’t bring you
anywhere by itself. You will have to turn data into meaningful insights that you can
take advantage of. One of the most sought-after talents these days are data
scientists who can connect the vast amount of data to insights benefiting
businesses.
A data driven approach can even help ordinary employees challenge the
opinion of their C-suite by backing their arguments up with insightful analytics. An
employee with a digital mindset doesn’t necessarily need to be a data scientist. But
understanding numbers, asking the right questions, being able to predict outcomes
and knowing how to articulate your findings and insights, are definitely skills that
will bring you far in the digital age.
8. Being obsessed with customers
User, Customer and Employee Experience are not just buzzwords; they are
here to stay. The old way of segmenting customers according to age, geography and
race is the business intelligence of yesterday. Today we have technologies and
knowledge that help us predict individual customer behaviour and needs. “Segment
of One” marketing has now become so advanced that we are able to personalise
both our sales and marketing to give our customers the best possible experience.
Thanks to our ability to capture big data loads and the advancement of Business
intelligence tools we can now do what we couldn’t even imagine few years back.
Companies have to create the right user interface and experiences for both
their customers and employees in a way that satisfies each person on an individual
level. To reach this level, you must be obsessed with customer and employee
experience. Digital tools can help create an unmatched customer experience. But in
the end, no matter how many awesome tools you have in your hands, your attitude
is the dealbreaker. The ability to create a great customer experience stems from
your own passion and desire to give every customer a like moment!
9.Collaborative in every aspect
Working well together has always been important. Though, the speed of
change today is way faster than ever before. Being flexible, adaptable and
understanding the needs of your colleagues, customers and vendors are ways to
gain a competitive advantage. Vendors have to be treated as your partners. Your
employees have to be treated as your enablers and not be bossed around. You
should strive to always offer your customers the best deals instead of thinking of
them as accounts you have to exploit.
Innovation has been our mantra for many years. However, the best innovations
rarely come from one idea or person but rather built up by continuously developing
on each other’s ideas.
A person with a digital mindset is inclusive and team-oriented. At the same time it’s
important to have the courage to challenge your team and your management. Being
collaborative doesn’t mean you agree with your team. Collaboration is about
pushing each other to think harder, smarter and better. The best innovations and
results happen when teams push each other beyond their imagination, when they
share ideas and disagree openly, where the introverts are heard and the extroverts
are listening and where the ego is shelved
10. Having fun together
Lastly, having fun is rarely heard of when it comes to values, mindset, or a way to
achieve competitive advantage. If you want to keep the spirit and the high drive,
you must enjoy coming to work. Being able to joke about mistakes and successes,

PANGASINAN STATE UNIVERSITY 15


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
party together and just pull each other’s legs is the way to survive in a highly
competitive market where speed, agility and delivery is so much in focus.
So go out there, have some fun and at the same time deliver great
performance. If you can find ways to digitalise the way you work to become more
efficient and deliver better results, by all means, go ahead!

SUMMARY

Digital literacy has been defined in many that is understandable by both digital
natives and digital immigrants. Teachers and students should not only be proficient in
how to use (digital skills)
but they need to see the information and media technology to find, evaluate, create
and communicate information requiring both cognitive and technical skills.
Cyberspace is both a boon and a curse. It is delivering untold benefits to
individuals, business, governments and society as a whole. But it is also a tool and a
target for those with more evil intentions.

LEARNING ACTIVITY 1

1. Complete the table below by giving a brief description of the different concepts of
cyber/digital literacy.
Concept Description
Cyber/digital citizenship
Internet safety
Cyber bullying and cyber
crimes
Computer threats
The Web
Social media
Mobile devices
Digital mindset/traits

ASSESSMENT TASK

1. In your own words and in not less than 5 sentences each:


a) elaborate on the concept of cyber/digital citizenship.
b) explain the need to know the appropriate use mobile devices.
c) recommend some strategies to prevent cyber bullying and cyber crimes

2. From your readings on the negative impacts of ICT, how can you observe ethical responsibilities
in the use of technology tools?

REFLECTION

1. Write your reflection. From the Module on Cyber/Digital Literacy, I realized


that . . . . .

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

PANGASINAN STATE UNIVERSITY 16


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

________________________________________________________________________________________
__________

LEARNING ACTIVITY 2

1. Show by means of a graphic organizer, the six digital fluencies.

REFERENCES

Bilbao, Purita P. et.al. Technology for Teaching and Learning 1. Lorimar Publishing Inc.
Manila 2019
Corpuz. Brenda B. et.al. Special Topics in Education. Volume 1. Lorimar Publishing Inc.
Quezon City 2013
Dayagbil, FilomenaT. et.al. Special Topics in Education. Volume 3. Lorimar Publishing
Inc. Manila 2012

PANGASINAN STATE UNIVERSITY 17


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in PROF ED 110 Building and Enhancing New Literacies Across the Curriculum
Module No.__
Lucido, Paz I. Educational Technology 2. 2nd Edition: Lorimar Publishing Inc. Manila
2012
The Modern Teacher. Volume LXII, No. 4. September 2013
Vega, Violeta A. et. al. Dimensions of Education. Revised Edition: Lorimar Publishing,
Inc. Quezon City. 2019
Zulueta, Francisco M. General Sociology. Revised Edition: Academic Publishing
Corporation, Mandaluyong City 2002
E-materials from the Internet

PANGASINAN STATE UNIVERSITY 18

You might also like