Module 6
Module 6
Module 6
Cyber/Digital Literacy
Module Learning Outcomes
At the end of the module, the students are able to:
evaluate the value of cyber/digital literacy to your personal life;
evaluate the implications of cyber/digital literacy to 21st century education;
reflect on the importance of cyber/digital literacy in teaching across learning
areas; and
design teaching learning activities applying cyber/digital literacy.
Module Lessons
Cyber Citizenship in the Digital Age
Internet Safety, Cyberbullying, and Cybercrimes
Researching and Evaluating the Web
Integration of cyber/digital literacy to teaching and learning
MODULE 6: CYBER/DIGITAL LITERACY
MODULE OVERVIEW
In this digital age, it is important to develop skills and ability to use computer
technologies effectively and to understand simultaneously the implications of your
actions.
INTRODUCTION
We are facing great challenges in this digital age such as social media,
cyberbullying, internet addiction, cybercrimes and privacy concerns. This Cyber
Citizenship is a new addition to the curricula and its elements must be understood by
students, especially on how they will apply these qualities to the digital age realities.
ACTIVITY
Recall what are the characteristics of a good citizen. List down the characteristics
of a good citizen that you can remember. Use the matrix as your guide.
Treating others
Other’s property
Communication
Education
Money
Protection
Digital Etiquette is just what it sounds like: treating other internet users with
respect and avoiding inappropriate behavior.
Digital Rights & Responsibilities refers to the privileges that all students have
while using the internet, like freedom of speech.
Digital Literacy is the ability to learn how to use technology and access
information online.
Digital Law encompasses the rules or guidelines set within an organization for
using the Internet.
Digital Communication have greater options for students for communicating
online.
Digital Health and Wellness involves teaching students how to protect their
psychological and physical well-being while using the Internet.
Digital Security involves teaching students how to take steps to stay online.
APPLICATION
From the 9 Elements of Digital Citizenship, think of ways on how you can teach
your future students in order for them to learn about these elements. What activities are
you going to give them?
CLOSURE
Good that you were able to do the activity on Lesson 1, this will give you an idea
about Internet Safety which will be the next lesson.
LESSON 2: INTERNET SAFETY, CYBERBULLYING, AND CYBER CRIME
✔ Determine the importance of using the web, its risks and possible threats.
✔ Formulate ways on how to cope and prevent Cyberbullying.
TiME FRAME : 3 sessions
INTRODUCTION
The Internet enables one to access information quickly without limit,
communicate to anybody around the world and be able to do a lot of things. But the
internet is also a home to certain threats, such as malware, pharming, and phishing.
You need to understand these threats or risks if you want to stay online.
ACTIVITY # 1
Are you an Internet user? ________________________________________________
What websites do you visit most of the time?_________________________________
Why do you surf the web? _______________________________________________
Are there also drawbacks when surfing the web? _____________________________
Can you list down the drawbacks? _________________________________________
Have you experienced being threatened while using the internet? If you were not
able to experience a threat in using the internet, recall any persons whom you know
have experienced it. Write the experience and the kind of threat that the person went
through.
Recall any news report either from radio or television you’ve seen or heard about the
risks or threats in using the internet.
3
How the What tools
Are there victim was are being
Cyberbullying being used to bully
experiences? bullied? the victim?
ACTIVITY #2
Label each scenario with B for bad online behavior and G for good online behavior
____Signed on with someone else’s screen name to gather info
____Pretended to be someone else online without that person knowing
____Posted compliments about someone online
____Teased or frightened someone online or by text
____Not told someone who you really are online, telling them to “guess”
____Forwarded a private IM conversation, e-mail or text without the permission
of the other person
____Signed out of someone’s account for him/her after he/she forgot to do it and
left the room
____Told a teacher, parent, or administrator if you noticed nasty messages about
a classmate online
____Posted pictures or information about someone on a Web site without their
permission
____Used information found online to follow, tease, embarrass or harass
someone in person
____Sent rude or scary things to someone, even if you were just joking
____Used bad language online
____Texted someone “congratulations!” after he/she did well on an assignment
____Signed someone else up for something online without their permission
____Used someone else’s password for any reason without their permission
____Deleted a private text or message from a friend after reading it
____Posted rude things or lies about someone online
____Sent a supportive message or text to someone you knew what being bullied
or harassed online
Adapted from: http://www.stopcyberbullying.org/tweens/are_you_a_cyberbully.html
ANALYSIS
4. What do you think are the feelings of the persons you know were being
threatened through the internet? You think they were greatly affected?
5. What do you think will happen to those people who experienced being bullied in
the digital world?
ABSTRACTION
There are types of Websites that we can visit such as informational which gives
information and corporate or E-commerce which the primary purpose is to sell
something.
APPLICATION
1. Come up with 5 ways on how to cope with Cyberbullying
2. Based from Activity #2, write ways on how to prevent Cyberbullying
3. Create a Digital Footprint
CLOSURE
This module has given you meaningful learning about Internet safety and
Cyberbullying/Cybercrime. Enjoy creating your Digital Footprint.
LESSON 3: RESEARCHING AND EVALUATING THE WEB
INTRODUCTION
Due to rampant fake news, fake articles, fake stories flooding our newsfeed, we
need to be vigilant all the time and we have to see to it that whatever we receive may it
be a letter, invitation, news, article, stories and etc. should be well evaluated to ensure
its reliability and validity. Teachers and students are usually searching the internet for
research, to communicate and to collaborate with others. It is necessary that you know
how to evaluate the websites that you are visiting to ensure that the information you will
be gathering are true and correct.
ACTIVITY
Do you usually ask questions like how are you feeling today?
Do you usually research and evaluate the books you read, the movie you watched,
news you heard, articles forwarded to you, or a post on facebook?
If you have internet connection, check on the following websites and use your identified
criteria to evaluate them:
1. http://planetfacts.org/planet-pluto-facts/
2. https://solarsystem.nasa.gov/planets/dwarf-planets/pluto/overview/
If you cannot access the websites, let’s take the following as an example:
Website #1
Website #2
Website Evaluation Checklist
1.
2.
3.
4.
5.
6.
7.
ANALYSIS
From the activity, what criteria you use in order to evaluate your feelings, relationship,
news you heard, movie you watch, post on facebook?
Can you also use those identified criteria when evaluating websites?
What are the implications if we do not evaluate websites, we just use information in our
reports, research etc.?
ABSTRACTION
Author
Contact Information
Up-to-date material
Regularly revised information
Links to support every side fact
Informative purpose
No broken links on the page
No grammar or punctuation mistakes
No misspellings
Mentioned in scientific sources
Bibliography
APPLICATION
Check on the Websites that you usually visit and evaluate using the criteria above to
determine if they are credible and reliable.
CLOSURE
Congratulations for completing this lesson!
LESSON 4: INTEGRATION OF CYBER/DIGITAL LITERACY
TO TEACHING AND LEARNING
INTRODUCTION
You will only see if your students learn from the topics discussed if they integrate
the context of cyber/digital literacy to teaching and learning by designing instruction.
ACTIVITY
ANALYSIS
● Have you decided what topic you identify?
● What is the essential understanding of the topic?
● What learning outcomes you formulated?
● What are the activities that your students will experience?
● Do you have scaffolds to help and guide your students do the activity?
● Are you going to prepare for the materials they are going to use for the activity or
they will be the one to produce it?
● Are you going to let them do the activity alone or you decide to have it by group?
● How are you going to process the activity?
● Are you going to include the reflection part?
● What evaluation tool you are going to use to assess their outputs?
ABSTRACTION
When designing lessons there are components that we need to include such as
the following:
Learning Outcomes:
Students will learn and be able to dramatize situations or come up with a poster that
shows a clear understanding of developing a sense of responsibility in life by being safe
even in a digital world.
Students will analyze and make appropriate decisions about Internet safety scenario
presented by teacher or peers
Scenarios
1. Jack can never remember his email password, so he just uses his name Jack1
whenever he needs a password. Safe or Unsafe? Why?
2. Marjorie saw the flashing coupon on the computer that said “Click here, you have
won a free pizza.” She would really like a free pizza, so she clicks on the coupon.
Safe or Unsafe? Why?
3. She asks her mother what she should do. Safe or Unsafe? Why?
4. Davon wants to buy his dad a neat gift online. He has money from his allowance
but the company only takes credit cards. He knows his mom’s credit card
password, and decides to use it to order the gift. Safe or Unsafe? Why?
5. Tia wants to join the Penguin Chat Room. The site tells her to check with an adult
before joining and using a make-believe name. She checks with her Dad. Safe or
Unsafe? Why?
6. Bryan got an e-mail message from someone he doesn’t know. He does not open
it. Safe or Unsafe? Why?
7. Fathema got an email from a friend that said, “E-mail this message to ten friends
or you will have bad luck for a month.” She forwards the email to ten of her
friends. Safe or Unsafe? Why?
8. Vivian always makes sure the Virus Protection software is turned on and up-to-
date when she uses the computer. If the software says “Virus Found,” she is
careful to destroy the virus before opening a document. Safe or Unsafe? Why?
9. Javier found a neat game online that downloads for free, but it tells him
to turn off his Virus Protection software before downloading. He turns off his
Virus Protection. Safe or Unsafe? Why?
Have students work in pairs to analyze and make decisions about the scenarios
presented. Students should share out giving reasons for their decisions. Students can
also create their own situations or report on similar situations they have encountered.
Sharing in a big group after the pair-share activity and students can also make
additional statements to add to an Internet Safety Chart or Poster
Or they can present a skit in an assembly through portraying internet safety and
how to develop responsibility even in the digital world.
Assessment
You can have a peer assessment and self-assessment during the pair-share
activity about the scenario. A checklist for the poster/chart can be used as an
evaluation tool. A rubric on the movie that they will create by group will serve as an
assessment tool. They can also take the Safekids Online Safety & Civility Quiz if the
internet is not a problem to the students.
CLOSURE
Congratulations for successfully completing Module 6.
REFERENCES
Waterford.org July 11, 2019. How to Teach Your Students the 9 Elements of Digital
Citizenship.
https://www.waterford.org/education/digital-citizenship-activities-and-
tips/#:~:text=A%20few%20examples%20of%20digital,or%20otherwise%20disrespect%
20digital%20property
Sample Websites
https://solarsystem.nasa.gov/planets/dwarf-planets/pluto/overview/
http://planetfacts.org/planet-pluto-facts/