0% found this document useful (0 votes)
12 views

Digital Literacy

The document outlines the importance of digital literacy, cyber citizenship, and proper netiquette for responsible internet use. It provides tips against cyber threats, guidelines for being a good cyber citizen, and emphasizes the need for data privacy and proper citation to avoid plagiarism. Additionally, it includes specific commandments for teachers regarding their online conduct and strategies for assessing the credibility of online information.

Uploaded by

denielnaceno76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Digital Literacy

The document outlines the importance of digital literacy, cyber citizenship, and proper netiquette for responsible internet use. It provides tips against cyber threats, guidelines for being a good cyber citizen, and emphasizes the need for data privacy and proper citation to avoid plagiarism. Additionally, it includes specific commandments for teachers regarding their online conduct and strategies for assessing the credibility of online information.

Uploaded by

denielnaceno76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Digital Literacy

- It is the set of competencies required for full participation in society that includes knowledge, skills,
and behaviors involving the effective use of digital devices for purposes of communication,
expression, collaboration and advocacy.

Tips Against Cyber Threats

1. Monitor behavior on social networks.


2. Keep devices safe.
3. Understand how best to use passwords.
4. Handle unsafe content.
5. Consider safety for the future.

Cyber Citizenship
- It refers to being responsible when using the internet.

Ways on How to be a Good Cyber Citizen

1. Be careful and critical for whatever you post online that could be visible to the public even if on a
"private" page through tagging by a friend.

2. If you have a problem with someone, go to that person or an adult to help work it out, instead of posting
your expression online.

3. Use the internet to help you with your schoolwork, but give credit to the sources you use and critically
analyze everything you search online.

4. Use internet purposefully to learn more about anything you are interested in, to help you research relevant
and needed data or information and to stay connected with friends throughout the world.

5. Make sure you verify information before you share it or use it in a project and check on accuracy and
truth in the information you search on the web.

6. Give out certain information only.

7. Don't answers questions that make you uncomfortable.

8. Always make sure you have told a reliable adult if you decide to meet someone you knew through the
internet.

9. Always be aware f the copyright laws and give credit to whom an article or a part of it is due.

10. Use only the computers that you are allowed to use. Avoid hacking.

Importance of Cyber Citizenship

1. It keeps the internet free from hurtful statements.


2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for what they have created.

4. More criminal or bullies can be caught when, kids are honest and talks to adults.
5. It keeps information private.

Proper Netiquette

1. Make sure you have the correct address (with proper spelling). correct link and you are sending the
information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false statements and information to
the right person when doing it online.
3. Re-read what you wrote to make sure it is what you want to say and the other person would interpret it the
same way.
4. Keep your comments clean and don't confront others online or say anything that could be hurtful to them.
5. Keep your personal and friends' information private and don't forward information that was just given to
you without his/her permission
6. What out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because messages can get
misdelivered.
8. Adults should monitor kids' messages, especially when they are sending e-mails to others without
permission.

Ten Commandments of a Teacher Cyber Citizenship

1. Thou shall not post any personal matter, confidential information and obscene picture and messages
online that can be accessed by students and parents.
2. Thou shall not respond or thread to any personal message created by students online other than those
school-related.
3. Thou shall not lend or let students access your cellphone.
4. Thou shall not give your email password to students,
5. Thou shall not use concepts or information from text and references without author's citation.
6. Thou shall not post to any social media account, for whatever purposes, the picture of students without
their or their parents' consent.
7. Thou shall not express sentiments, disappointments and disagreements against superior, colleagues,
students and other parents using their social media accounts.
8. Thou shall not use data from internet sources in any document like lesson plans, researches and
requirements without the consent of the author.
9. Thou shall not give any personal data or other's information to anyone unless for specific purposes and
given the consent.
10. Thou shall not post any student data publicly online including academic ranks, school records, class
outputs and record of grade

Computer Threats and Fixing Solutions

1. Install anti-virus software.


2. Ensure that the anti-virus software is up-to-date.
3. Employ a firewall to protect networks.
4. Filter all email traffic.
5. Educate all users to be careful of suspicious emails.
6. Scan internet downloads
7. Do not run programs of unknown origin.
8. Implement a vulnerability management.

9. Make regular backups for critical data.


10. Develop an Information Security Policy.
11. Monitor logs and systems.
12. Develop Incident Response Plan.
13. Restrict end-user access to the systems.

Exploring the Internet: Researching and Evaluating the Web

Assessing the Credibility


- Consider the credibility, or trustworthiness and reliability of the content before taking it.
- Informational and Commercial Websites
-
Exploring the Internet: Researching and Evaluating the Web

• Checklist of Credibility Criteria


• Author
• Date
• Pupose
• Contact
• Fact vs. Opinion

Common Credible URLS

1. When encountering a URL, look at the letters that appear after the "dot" (www.whitehouse.gov) and that
is call top-level domain. Thus, the URL's top-level helps in determining a site's credibility.
2. Websites ending in gov are government-related websites.
3. Websites ending in edu are the websites of educational institutions, such as colleges and universities that
usually offer a variety of credible data.
4. Websites ending in org are websites of organizations.

Recognition of Information Sources

Applying proper referencing and citation procedures that would get rid of risks, consequences and legal
implications because of the copyright issue, which means that the ideas and words used belong to the author.

Data Privacy Implication

1. When getting data, put proper citation and source acknowledgement.


Source: National Statistics Office

2. When using needed pictures downloaded from the Internet, put acknowledgement.
3. If data, concepts and information are copyrighted, ask for the consent of the author, and wait for the
author or the source will do.

4. However, if the data and information are for public domain, just acknowledging/citing the author or the
source will do.

5. If the author doesn't really want anyone to utilize his/her data fi article

Research and Data Collection Protocols

A. Clone Plagiarism/Control+C Plagiariam- identical copying or copying another work (word-for-


word) without any change and claim as his/her own work.

B. Remix Plagiarism/Mashup Plagiarism- collecting information from various sources and mixing all
together as a single document then, claiming the work as their own work.

C. Find-Replace Plagiarism- Changing the most common keywords and phrases in the copied content
but not making any changes in the essential document.

You might also like