SlideShare a Scribd company logo
1 of 18
DIGITAL
    LITERACY
     Series 11
NURUL MUMTAZAH BT MD
 JAMILUDIN
        2010939805
There are five challenges;
(1) Moving beyond a tool-oriented focus that conflates
having access to technology with the skilful use of it
(2) Addressing risks associated with media and digital
technology
(3) Expanding the concept of literacy
(4) Strengthening people‟s capacity to assess
message credibility and quality
(5) Bringing news and current events into K–12
education
1) Viral Video / Memes
2) Misinformation, Hoaxes,
  Phishing
3) Safety & Cyber bullying
4) Social Networks & Privacy
5) Digital Plagiarism
1
A viral video is a video that becomes popular through
the process of Internet sharing, typically through
video sharing websites, social media and email.

A meme is an idea, behaviour or style that spreads
from person to person within a culture.

A meme acts as a unit for carrying cultural
ideas, symbols or practices, which can be transmitted
from one mind to another.
The Lonely
     Island
 “ Lazy Sunday”


Numa
Numa




                  Chocolate
                    Rain
2
Misinformation          is           false         or
inaccurate    information     that      is    spread
unintentionally.


It                 is                 distinguished
from   disinformation    by    motive        in   that
misinformation is simply erroneous, while
disinformation, in contrast, is intended to
mislead.
Phishing is the act of attempting to
acquire      information     such    as
usernames, passwords, and credit card
details                            (and
sometimes,      indirectly, money)   by
masquerading as a trustworthy entity in
an electronic communication.
FAKE ADDRESS
                         BAR
Pretends to
  be form
 Citibank




Upon clicking the
 link the user is
   taken to the
    following
authentic-looking
       page
1 The first indication is the
    vague, slightly illogical
   problem they are trying
      to convince you to
     solve: “some of our
   members no longer have
     access to their email
   addresses and we must
           verify it”.

2 Another tip-off is that
     the address is
   supposedly secure
          (using                 3   And finally, the Address Bar is
  the https:// notation),             a fake. The website operator
     but there is no                 has turned off the address bar.
   padlock icon in the                     Turning it back on
    bottom right hand                using View, Toolbars, Address
  corner of the browser                  Bar reveals the proper
         window.                                 address
3
Cyber bullying is bullying that takes
place using electronic technology.

Examples of cyber bullying include
mean text messages or emails, rumours
sent by email or posted on social
networking sites, and embarrassing
pictures, videos, websites, or fake
profiles.
• Don‟t give out personal information online, whether
in instant message profiles, chat rooms, blogs, or on
Web sites.
• Don‟t tell anyone your email or instant messaging
passwords, even your friends.
• If someone sends a mean or threatening
message, don't respond. Save it and show it to a
trusted adult.
• You can also „block‟ certain people from sending you
messages on some Web sites.
    YOU CAN‟T BE BULLIED IF THE BULLY CAN‟T
Online social networks are websites that allow users
to build connections and relationships to other
Internet users. Social networks store information
remotely, rather than on a user‟s personal computer.
Social networking can be used to keep in touch with
friends, make new contacts and find people with
similar interests and ideas.
1) Become familiar with the privacy settings available
   on any social network you use.
2) Be aware that your full birth date, especially the
   year, may be useful to identity thieves. Don‟t post
   it, or at a minimum restrict who has access to it.
3) Be sure to log off from social networking sites
   when you no longer need to be connected.
Technology in the classroom is a powerful
tool. The advantages of using ICT‟s certainly
out-weigh     the      disadvantages      when
considering the incredible amount of
information that is now available to everyone.

However, digital plagiarism is a serious new
reality in education as a result of the increased
use of computers at home and at school.
• Always check that you have permission to use
  work that others have created, and ask for
  permission before you use it
• Remember to credit your sources
• Provide a web link to online sources, whenever
  possible
• Make sure you clearly reference any quotes you
  use, and link back to the original article
• If you do find yourself in a position where you have
  forgotten to give someone credit, apologise and
  make an effort to put things right.
Digital literacy present significant challenges
to policy, pedagogy, and research in relation
to education.

In our view, facing and meeting these
challenges begins from ensuring that digital
literacy     does      not      become  the
post-typographic equivalent of functional
literacy from the world of print.
Digital literacy 2

More Related Content

What's hot

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internetgulsheramjad
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetCarlos Diclear Hijo
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpointPatrick706
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01L14MaoP
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetSai Sreeram
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantagesHamza Iqbal
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internetLeomar Bondoc
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2BAS ADITYA SRINIVAS
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfnight seem
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 

What's hot (20)

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpoint
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 

Viewers also liked

Digital Literacy Course - Module One
Digital Literacy Course - Module OneDigital Literacy Course - Module One
Digital Literacy Course - Module OneAngela Maiers
 
ORIC Introduction to OER
ORIC Introduction to OERORIC Introduction to OER
ORIC Introduction to OERoricproject
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designoricproject
 
An introduction to digital literacy to support the learning of undergraduate ...
An introduction to digital literacy to support the learning of undergraduate ...An introduction to digital literacy to support the learning of undergraduate ...
An introduction to digital literacy to support the learning of undergraduate ...Rita Ndagire Kizito
 
7 vital details your boss expects you to know about digital literacy
7 vital details your boss expects you to know about digital literacy7 vital details your boss expects you to know about digital literacy
7 vital details your boss expects you to know about digital literacySally Pewhairangi
 
Digital literacy
Digital literacyDigital literacy
Digital literacyH00330795
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Bill Condo
 

Viewers also liked (7)

Digital Literacy Course - Module One
Digital Literacy Course - Module OneDigital Literacy Course - Module One
Digital Literacy Course - Module One
 
ORIC Introduction to OER
ORIC Introduction to OERORIC Introduction to OER
ORIC Introduction to OER
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum design
 
An introduction to digital literacy to support the learning of undergraduate ...
An introduction to digital literacy to support the learning of undergraduate ...An introduction to digital literacy to support the learning of undergraduate ...
An introduction to digital literacy to support the learning of undergraduate ...
 
7 vital details your boss expects you to know about digital literacy
7 vital details your boss expects you to know about digital literacy7 vital details your boss expects you to know about digital literacy
7 vital details your boss expects you to know about digital literacy
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)
 

Similar to Digital literacy 2

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Comp 8 Part 1 Digital Citizenship being a good man
Comp 8 Part 1 Digital Citizenship being a good manComp 8 Part 1 Digital Citizenship being a good man
Comp 8 Part 1 Digital Citizenship being a good manMarvinDiadula2
 
Patrick's Powerpoint
Patrick's PowerpointPatrick's Powerpoint
Patrick's PowerpointPatrick706
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 

Similar to Digital literacy 2 (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Comp 8 Part 1 Digital Citizenship being a good man
Comp 8 Part 1 Digital Citizenship being a good manComp 8 Part 1 Digital Citizenship being a good man
Comp 8 Part 1 Digital Citizenship being a good man
 
Facebook
FacebookFacebook
Facebook
 
Patrick's Powerpoint
Patrick's PowerpointPatrick's Powerpoint
Patrick's Powerpoint
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 

Digital literacy 2

  • 1. DIGITAL LITERACY Series 11 NURUL MUMTAZAH BT MD JAMILUDIN 2010939805
  • 2.
  • 3. There are five challenges; (1) Moving beyond a tool-oriented focus that conflates having access to technology with the skilful use of it (2) Addressing risks associated with media and digital technology (3) Expanding the concept of literacy (4) Strengthening people‟s capacity to assess message credibility and quality (5) Bringing news and current events into K–12 education
  • 4. 1) Viral Video / Memes 2) Misinformation, Hoaxes, Phishing 3) Safety & Cyber bullying 4) Social Networks & Privacy 5) Digital Plagiarism
  • 5. 1 A viral video is a video that becomes popular through the process of Internet sharing, typically through video sharing websites, social media and email. A meme is an idea, behaviour or style that spreads from person to person within a culture. A meme acts as a unit for carrying cultural ideas, symbols or practices, which can be transmitted from one mind to another.
  • 6. The Lonely Island “ Lazy Sunday” Numa Numa Chocolate Rain
  • 7. 2 Misinformation is false or inaccurate information that is spread unintentionally. It is distinguished from disinformation by motive in that misinformation is simply erroneous, while disinformation, in contrast, is intended to mislead.
  • 8. Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
  • 9. FAKE ADDRESS BAR Pretends to be form Citibank Upon clicking the link the user is taken to the following authentic-looking page
  • 10. 1 The first indication is the vague, slightly illogical problem they are trying to convince you to solve: “some of our members no longer have access to their email addresses and we must verify it”. 2 Another tip-off is that the address is supposedly secure (using 3 And finally, the Address Bar is the https:// notation), a fake. The website operator but there is no has turned off the address bar. padlock icon in the Turning it back on bottom right hand using View, Toolbars, Address corner of the browser Bar reveals the proper window. address
  • 11. 3 Cyber bullying is bullying that takes place using electronic technology. Examples of cyber bullying include mean text messages or emails, rumours sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.
  • 12. • Don‟t give out personal information online, whether in instant message profiles, chat rooms, blogs, or on Web sites. • Don‟t tell anyone your email or instant messaging passwords, even your friends. • If someone sends a mean or threatening message, don't respond. Save it and show it to a trusted adult. • You can also „block‟ certain people from sending you messages on some Web sites. YOU CAN‟T BE BULLIED IF THE BULLY CAN‟T
  • 13. Online social networks are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than on a user‟s personal computer. Social networking can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas.
  • 14. 1) Become familiar with the privacy settings available on any social network you use. 2) Be aware that your full birth date, especially the year, may be useful to identity thieves. Don‟t post it, or at a minimum restrict who has access to it. 3) Be sure to log off from social networking sites when you no longer need to be connected.
  • 15. Technology in the classroom is a powerful tool. The advantages of using ICT‟s certainly out-weigh the disadvantages when considering the incredible amount of information that is now available to everyone. However, digital plagiarism is a serious new reality in education as a result of the increased use of computers at home and at school.
  • 16. • Always check that you have permission to use work that others have created, and ask for permission before you use it • Remember to credit your sources • Provide a web link to online sources, whenever possible • Make sure you clearly reference any quotes you use, and link back to the original article • If you do find yourself in a position where you have forgotten to give someone credit, apologise and make an effort to put things right.
  • 17. Digital literacy present significant challenges to policy, pedagogy, and research in relation to education. In our view, facing and meeting these challenges begins from ensuring that digital literacy does not become the post-typographic equivalent of functional literacy from the world of print.