0% found this document useful (0 votes)
6 views

Module 6

Module 6 focuses on Cyber/Digital Literacy, aiming to equip students with skills to evaluate its value in personal life and education, and to design teaching activities that incorporate these skills. The module includes lessons on cyber citizenship, internet safety, researching the web, and integrating digital literacy into teaching. It emphasizes the importance of understanding digital rights, responsibilities, and the implications of online behavior in the digital age.

Uploaded by

Day Na
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Module 6

Module 6 focuses on Cyber/Digital Literacy, aiming to equip students with skills to evaluate its value in personal life and education, and to design teaching activities that incorporate these skills. The module includes lessons on cyber citizenship, internet safety, researching the web, and integrating digital literacy into teaching. It emphasizes the importance of understanding digital rights, responsibilities, and the implications of online behavior in the digital age.

Uploaded by

Day Na
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

COURSEPACK STRUCTURE

Module 6

Cyber/Digital Literacy
Module Learning Outcomes
At the end of the module, the students are able to:
evaluate the value of cyber/digital literacy to your personal life;
evaluate the implications of cyber/digital literacy to 21st century education;
reflect on the importance of cyber/digital literacy in teaching across learning
areas; and
design teaching learning activities applying cyber/digital literacy.
Module Lessons
Cyber Citizenship in the Digital Age
Internet Safety, Cyberbullying, and Cybercrimes
Researching and Evaluating the Web
Integration of cyber/digital literacy to teaching and learning
MODULE 6: CYBER/DIGITAL LITERACY

MODULE OVERVIEW
In this digital age, it is important to develop skills and ability to use computer
technologies effectively and to understand simultaneously the implications of your
actions.

MODULE LEARNING OUTCOMES


At the end of this module, you should be able to:
✔ evaluate the value of cyber/digital literacy to your personal life;
✔ evaluate the implications of cyber/digital literacy to 21st century education;
✔ reflect on the importance of cyber/digital literacy in teaching across learning
areas; and
✔design teaching learning activities applying cyber/digital literacy.

LESSONS IN THIS MODULE


✔ Cyber Citizenship in the Digital Age
✔ Internet Safety, Cyberbullying, and Cyber Crimes
✔ Researching and Evaluating the Web
✔ Integration of cyber/digital literacy to teaching and learning
LESSON 1: CYBER CITIZENSHIP IN THE DIGITAL AGE

INTENDED LEARNING OUTCOME


At the end of the lesson, you should be able to:
✔ evaluate the value of cyber/digital literacy to your personal life.

TIME FRAME: 2 sessions

INTRODUCTION
We are facing great challenges in this digital age such as social media,
cyberbullying, internet addiction, cybercrimes and privacy concerns. This Cyber
Citizenship is a new addition to the curricula and its elements must be understood by
students, especially on how they will apply these qualities to the digital age realities.

ACTIVITY
Recall what are the characteristics of a good citizen. List down the characteristics
of a good citizen that you can remember. Use the matrix as your guide.

Emphasis Characteristics of a good citizen

Equal Human rights

Treating others

Other’s property

Communication

Education

Money

Basic human rights of privacy

Protection

Physical and Mental health

Transform the characteristics of a good citizen into a Good Digital Citizen.

Characteristics of a good citizen Characteristics of a good digital


citizen
ANALYSIS
Focus questions:
1. How do you find the activity?
2. You think it was easy recalling the characteristics of a good citizen based on the
emphasis given?
3. How were you able to transform the characteristics of a good citizen into the
characteristics of a good digital citizen?
4. Is there a difference between the characteristics of a good citizen to the
characteristics of a good digital citizen?
5. Why do you think students should develop characteristics of a good digital
citizen?
ABSTRACTION
Based on the characteristics of a good digital citizen that you identified, these
become the basis for the 9 elements of Digital Citizenship such as the following:
1. Digital Access
2. Digital Etiquette
3. Digital Commerce
4. Digital Rights and responsibilities
5. Digital literacy
6. Digital law
7. Digital communication
8. Digital health and wellness
9. Digital security
Digital Access involves the ability to connect with others or access information
using technology.

Digital Etiquette is just what it sounds like: treating other internet users with
respect and avoiding inappropriate behavior.

Digital Commerce refers to buying and selling electronics responsible.

Digital Rights & Responsibilities refers to the privileges that all students have
while using the internet, like freedom of speech.

Digital Literacy is the ability to learn how to use technology and access
information online.

Digital Law encompasses the rules or guidelines set within an organization for
using the Internet.
Digital Communication have greater options for students for communicating
online.

Digital Health and Wellness involves teaching students how to protect their
psychological and physical well-being while using the Internet.
Digital Security involves teaching students how to take steps to stay online.

APPLICATION

From the 9 Elements of Digital Citizenship, think of ways on how you can teach
your future students in order for them to learn about these elements. What activities are
you going to give them?

CLOSURE

Good that you were able to do the activity on Lesson 1, this will give you an idea
about Internet Safety which will be the next lesson.
LESSON 2: INTERNET SAFETY, CYBERBULLYING, AND CYBER CRIME

INTENDED LEARNING OUTCOMES


After the lesson, you should be able to:

✔ Determine the importance of using the web, its risks and possible threats.
✔ Formulate ways on how to cope and prevent Cyberbullying.
TiME FRAME : 3 sessions

INTRODUCTION
The Internet enables one to access information quickly without limit,
communicate to anybody around the world and be able to do a lot of things. But the
internet is also a home to certain threats, such as malware, pharming, and phishing.
You need to understand these threats or risks if you want to stay online.

ACTIVITY # 1
Are you an Internet user? ________________________________________________
What websites do you visit most of the time?_________________________________
Why do you surf the web? _______________________________________________
Are there also drawbacks when surfing the web? _____________________________
Can you list down the drawbacks? _________________________________________
Have you experienced being threatened while using the internet? If you were not
able to experience a threat in using the internet, recall any persons whom you know
have experienced it. Write the experience and the kind of threat that the person went
through.

Person Threat experienced

Recall any news report either from radio or television you’ve seen or heard about the
risks or threats in using the internet.

Report/News Threat/Risks Experienced

3
How the What tools
Are there victim was are being
Cyberbullying being used to bully
experiences? bullied? the victim?

What do you think might


happen to the person
being bullied?

ACTIVITY #2

What are Good and Bad Online Behavior?

Label each scenario with B for bad online behavior and G for good online behavior
____Signed on with someone else’s screen name to gather info
____Pretended to be someone else online without that person knowing
____Posted compliments about someone online
____Teased or frightened someone online or by text
____Not told someone who you really are online, telling them to “guess”
____Forwarded a private IM conversation, e-mail or text without the permission
of the other person
____Signed out of someone’s account for him/her after he/she forgot to do it and
left the room
____Told a teacher, parent, or administrator if you noticed nasty messages about
a classmate online
____Posted pictures or information about someone on a Web site without their
permission
____Used information found online to follow, tease, embarrass or harass
someone in person
____Sent rude or scary things to someone, even if you were just joking
____Used bad language online
____Texted someone “congratulations!” after he/she did well on an assignment
____Signed someone else up for something online without their permission
____Used someone else’s password for any reason without their permission
____Deleted a private text or message from a friend after reading it
____Posted rude things or lies about someone online
____Sent a supportive message or text to someone you knew what being bullied
or harassed online
Adapted from: http://www.stopcyberbullying.org/tweens/are_you_a_cyberbully.html

ANALYSIS

1. Did you enjoy surfing the internet?

2. When you experienced threat or risk, how did you feel?

3. Did it affect you? In what ways?

4. What do you think are the feelings of the persons you know were being
threatened through the internet? You think they were greatly affected?

5. What do you think will happen to those people who experienced being bullied in
the digital world?

6. How do you think a person will cope with Cyberbullying?

7. Can you give ways on how to prevent Cyberbullying?

ABSTRACTION

There are types of Websites that we can visit such as informational which gives
information and corporate or E-commerce which the primary purpose is to sell
something.

Benefits of surfing the Web:


1. Easy Data Comparison
2. Convenient Media Consumption
3. Communication
Drawbacks of surfing the Web:
1. Exposure to inappropriate material
2. Exposure to Cyberbullying
3. Attack by hackers or cybercriminals
4. Attack by viruses
Computer Threats
1. Malware: Malicious software
2. Spam: unwanted mass emails
3. Phishing:fake companies trying to get private information
4. Pharming: redirecting users to phony websites
5. Pop-ups: messages(ads) that pop up while surfing the web
What happens after an attack?
● Computer crashes
● Computer slows down
● Corrupted files
● Frozen applications
● Stolen private information
Cyberbullying is the use of technology to repeatedly harass, hurt, embarrass,
humiliate or intimidate another person. Is bullying that takes place over digital devices
like cell phones, computers and tablets. Cyberbullying can occur through text and apps,
or online in social media, forums, or gaming where people can view, participate in, or
share content. Cyberbullying includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else. It can include sharing personal or private
information about someone else, causing embarrassment or humiliation. Some
cyberbullying crosses the line into unlawful criminals. (StopBullying.gov)

“Cyberbullying is when someone repeatedly and intentionally harasses,


mistreats, or makes fun of another person online or while using cell phones or other
electronic devices.” (Hinduja & Patchin, 2019 ).
Common Types of Cyberbullying
● Harassment
● Flaming
● Outing
● Degradation
● Deception
Common tools used for Cyberbullying
● Emails
● Website
● Text messaging
● Instant Forums/chat rooms
Cyberbullying can cause emotional scarring and can lead to depression.

APPLICATION
1. Come up with 5 ways on how to cope with Cyberbullying
2. Based from Activity #2, write ways on how to prevent Cyberbullying
3. Create a Digital Footprint

CLOSURE
This module has given you meaningful learning about Internet safety and
Cyberbullying/Cybercrime. Enjoy creating your Digital Footprint.
LESSON 3: RESEARCHING AND EVALUATING THE WEB

INTENDED LEARNING OUTCOMES


After the lesson, you should be able to:

✔ develop skills in researching and evaluating the Web.


✔ reflect on the importance of cyber/digital literacy in teaching across the learning
areas.

TIME FRAME: 2 sessions

INTRODUCTION
Due to rampant fake news, fake articles, fake stories flooding our newsfeed, we
need to be vigilant all the time and we have to see to it that whatever we receive may it
be a letter, invitation, news, article, stories and etc. should be well evaluated to ensure
its reliability and validity. Teachers and students are usually searching the internet for
research, to communicate and to collaborate with others. It is necessary that you know
how to evaluate the websites that you are visiting to ensure that the information you will
be gathering are true and correct.
ACTIVITY

Do you usually ask questions like how are you feeling today?

How is my relationship with my parents, siblings, friends and colleagues?

Do you usually research and evaluate the books you read, the movie you watched,
news you heard, articles forwarded to you, or a post on facebook?

How do you evaluate?

What criteria do you use to evaluate them?

Web check activity

If you have internet connection, check on the following websites and use your identified
criteria to evaluate them:
1. http://planetfacts.org/planet-pluto-facts/
2. https://solarsystem.nasa.gov/planets/dwarf-planets/pluto/overview/

If you cannot access the websites, let’s take the following as an example:

Website #1
Website #2
Website Evaluation Checklist

Come up with criteria and evaluate the two sample websites

Criteria Website #1 Website #2

1.

2.

3.

4.

5.

6.

7.

ANALYSIS

From the activity, what criteria you use in order to evaluate your feelings, relationship,
news you heard, movie you watch, post on facebook?

Can you also use those identified criteria when evaluating websites?

Why do we need to evaluate websites?

What are the implications if we do not evaluate websites, we just use information in our
reports, research etc.?

ABSTRACTION

8 Ways to determine Website reliability


1. Look for Established Institutions
2. Look for Sites with Expertise
3. Steer Clear of Commercial Sites
4. Beware of Bias
5. Check the date
6. Consider the Site’s Look
7. Avoid Anonymous Authors
8. Check the Links
Website Evaluation Checklist

Author
Contact Information
Up-to-date material
Regularly revised information
Links to support every side fact
Informative purpose
No broken links on the page
No grammar or punctuation mistakes
No misspellings
Mentioned in scientific sources
Bibliography

Credible Sources for children


● Google Scholar
● iSeek
● Microsoft Academic
● Refseek
● OCLC.org
● Dogpile
● Core
Credible Science Sources
● ScienceDirect
● WorldWideScience
● SciCentral
● Athenus
● Science.gov
● Q Sensei Scholar
Credible News Sources
● BBC News
● ABC
● NPR
● The Economist
● The Wall Street Journal
● Google News
● NBC
● The Guardian
● CNN
● PBS
Credible Science Sources
● NASA
● Scientific American
● Popular Science
● Real Clear Science
● Discovery
● Nautilus
● National Geographic

APPLICATION
Check on the Websites that you usually visit and evaluate using the criteria above to
determine if they are credible and reliable.

CLOSURE
Congratulations for completing this lesson!
LESSON 4: INTEGRATION OF CYBER/DIGITAL LITERACY
TO TEACHING AND LEARNING

INTENDED LEARNING OUTCOME


At the end of the lesson, you should be able to:

✔ design teaching learning activities applying cyber/digital literacy.

TIME FRAME: 3 days

INTRODUCTION

You will only see if your students learn from the topics discussed if they integrate
the context of cyber/digital literacy to teaching and learning by designing instruction.

ACTIVITY

Designing Lesson Activity


1. Think of a topic that you need to cover in a subject.
2. Grade level to teach the topic
3. Identify essential understanding
4. Formulate learning outcomes
5. Determine what activities the students will experience through the topic identified,
taking into considerations the realization of the learning outcome.
6. Decide whether the activity will be done individually or by group.
7. Process the activity
8. Reflecting on their journey
9. Assessing the output

ANALYSIS
● Have you decided what topic you identify?
● What is the essential understanding of the topic?
● What learning outcomes you formulated?
● What are the activities that your students will experience?
● Do you have scaffolds to help and guide your students do the activity?
● Are you going to prepare for the materials they are going to use for the activity or
they will be the one to produce it?
● Are you going to let them do the activity alone or you decide to have it by group?
● How are you going to process the activity?
● Are you going to include the reflection part?
● What evaluation tool you are going to use to assess their outputs?

ABSTRACTION
When designing lessons there are components that we need to include such as
the following:

Topic: Responsibility through Safe Navigation

Grade Level: Grade 4

Essential Understanding: To develop responsibility, students should consider all life’s


dimensions and the inclusion of media use is already part of life in this era.

Learning Outcomes:
Students will learn and be able to dramatize situations or come up with a poster that
shows a clear understanding of developing a sense of responsibility in life by being safe
even in a digital world.

Students will analyze and make appropriate decisions about Internet safety scenario
presented by teacher or peers

Introduction: Introduce and discuss Netsmartz Internet Safety Pledge


How can one develop a sense of responsibility in a digital world?

Scenarios
1. Jack can never remember his email password, so he just uses his name Jack1
whenever he needs a password. Safe or Unsafe? Why?

2. Marjorie saw the flashing coupon on the computer that said “Click here, you have
won a free pizza.” She would really like a free pizza, so she clicks on the coupon.
Safe or Unsafe? Why?

3. She asks her mother what she should do. Safe or Unsafe? Why?

4. Davon wants to buy his dad a neat gift online. He has money from his allowance
but the company only takes credit cards. He knows his mom’s credit card
password, and decides to use it to order the gift. Safe or Unsafe? Why?

5. Tia wants to join the Penguin Chat Room. The site tells her to check with an adult
before joining and using a make-believe name. She checks with her Dad. Safe or
Unsafe? Why?
6. Bryan got an e-mail message from someone he doesn’t know. He does not open
it. Safe or Unsafe? Why?

7. Fathema got an email from a friend that said, “E-mail this message to ten friends
or you will have bad luck for a month.” She forwards the email to ten of her
friends. Safe or Unsafe? Why?

8. Vivian always makes sure the Virus Protection software is turned on and up-to-
date when she uses the computer. If the software says “Virus Found,” she is
careful to destroy the virus before opening a document. Safe or Unsafe? Why?

9. Javier found a neat game online that downloads for free, but it tells him
to turn off his Virus Protection software before downloading. He turns off his
Virus Protection. Safe or Unsafe? Why?

Have students work in pairs to analyze and make decisions about the scenarios
presented. Students should share out giving reasons for their decisions. Students can
also create their own situations or report on similar situations they have encountered.

Sharing in a big group after the pair-share activity and students can also make
additional statements to add to an Internet Safety Chart or Poster

For group work


Students can make a movie with Common Craft discussing Internet Safety
Design safety posters for the classroom or for the school.

Or they can present a skit in an assembly through portraying internet safety and
how to develop responsibility even in the digital world.

Assessment
You can have a peer assessment and self-assessment during the pair-share
activity about the scenario. A checklist for the poster/chart can be used as an
evaluation tool. A rubric on the movie that they will create by group will serve as an
assessment tool. They can also take the Safekids Online Safety & Civility Quiz if the
internet is not a problem to the students.

Lesson Plan on Citizenship in the Digital Age


https://www.clintoncentral.org/ourpages/auto/2017/11/25/55758003/Citizenship%20in%
20the%20Digital%20Age.pdf

CLOSURE
Congratulations for successfully completing Module 6.
REFERENCES

Waterford.org: How to Teach Your Students the 9 Elements of Digital Citizenship?


(2019 July 11).
https://www.waterford.org/education/digital-citizenship-activities-and
tips/#:~:text=A%20few%20examples%20of%20digital,or%20otherwise%20disrespect%
20digital%20property

Goodwill Community Foundation, Inc (1998-2020). Introduction to Internet Safety.


https://edu.gcfglobal.org/en/internetsafety/introduction-to-internet-safety/1/

Waterford.org July 11, 2019. How to Teach Your Students the 9 Elements of Digital
Citizenship.
https://www.waterford.org/education/digital-citizenship-activities-and-
tips/#:~:text=A%20few%20examples%20of%20digital,or%20otherwise%20disrespect%
20digital%20property

Hinduja, S. & Patchin, J. W. (2019). Summary of Our Cyberbullying Research (2007-


2019) Cyberbullying Research Center. Retrieved from https://cyberbullying.org/2019-
cyberbullying-data
Custom-Writing.org. 2019. List of Credible sources.
https://custom-writing.org/blog/signs-of-credible-sources

Rogers, T. 2019. 8 Ways to Determine Website Reliability


https://www.thoughtco.com/gauging-website-reliability-2073838

Sample Websites
https://solarsystem.nasa.gov/planets/dwarf-planets/pluto/overview/
http://planetfacts.org/planet-pluto-facts/

You might also like