digital literacy 2

18
NURUL MUMTAZAH BT MD JAMILUDIN 2010939805 DIGITAL LITERACY Series 11

Upload: mjjamal

Post on 14-Jul-2015

159 views

Category:

Documents


0 download

TRANSCRIPT

NURUL MUMTAZAH BT MD

JAMILUDIN

2010939805

DIGITAL

LITERACY

Series 11

There are five challenges;

(1) Moving beyond a tool-oriented focus that conflates

having access to technology with the skilful use of it

(2) Addressing risks associated with media and digital

technology

(3) Expanding the concept of literacy

(4) Strengthening people‟s capacity to assess

message credibility and quality

(5) Bringing news and current events into K–12

education

1) Viral Video / Memes

2) Misinformation, Hoaxes,

Phishing

3) Safety & Cyber bullying

4) Social Networks & Privacy

5) Digital Plagiarism

A viral video is a video that becomes popular through

the process of Internet sharing, typically through

video sharing websites, social media and email.

A meme is an idea, behaviour or style that spreads

from person to person within a culture.

A meme acts as a unit for carrying cultural

ideas, symbols or practices, which can be transmitted

from one mind to another.

1

The Lonely

Island

“ Lazy Sunday”

Numa

Numa

Chocolate

Rain

Misinformation is false or

inaccurate information that is spread

unintentionally.

It is distinguished

from disinformation by motive in that

misinformation is simply erroneous, while

disinformation, in contrast, is intended to

mislead.

2

Phishing is the act of attempting to

acquire information such as

usernames, passwords, and credit card

details (and

sometimes, indirectly, money) by

masquerading as a trustworthy entity in

an electronic communication.

FAKE ADDRESS

BAR

Pretends to

be form

Citibank

Upon clicking the

link the user is

taken to the

following

authentic-looking

page

The first indication is the

vague, slightly illogical

problem they are trying

to convince you to

solve: “some of our

members no longer have

access to their email

addresses and we must

verify it”.

Another tip-off is that

the address is

supposedly secure

(using

the https:// notation),

but there is no

padlock icon in the

bottom right hand

corner of the browser

window.

And finally, the Address Bar is

a fake. The website operator

has turned off the address bar.

Turning it back on

using View, Toolbars, Address

Bar reveals the proper

address

1

2

3

Cyber bullying is bullying that takes

place using electronic technology.

Examples of cyber bullying include

mean text messages or emails, rumours

sent by email or posted on social

networking sites, and embarrassing

pictures, videos, websites, or fake

profiles.

3

• Don‟t give out personal information online, whether

in instant message profiles, chat rooms, blogs, or on

Web sites.

• Don‟t tell anyone your email or instant messaging

passwords, even your friends.

• If someone sends a mean or threatening

message, don't respond. Save it and show it to a

trusted adult.

• You can also „block‟ certain people from sending you

messages on some Web sites.

YOU CAN‟T BE BULLIED IF THE BULLY CAN‟T

ACCESS YOU!

Online social networks are websites that allow users

to build connections and relationships to other

Internet users. Social networks store information

remotely, rather than on a user‟s personal computer.

Social networking can be used to keep in touch with

friends, make new contacts and find people with

similar interests and ideas.

1) Become familiar with the privacy settings available

on any social network you use.

2) Be aware that your full birth date, especially the

year, may be useful to identity thieves. Don‟t post

it, or at a minimum restrict who has access to it.

3) Be sure to log off from social networking sites

when you no longer need to be connected.

Technology in the classroom is a powerful

tool. The advantages of using ICT‟s certainly

out-weigh the disadvantages when

considering the incredible amount of

information that is now available to everyone.

However, digital plagiarism is a serious new

reality in education as a result of the increased

use of computers at home and at school.

• Always check that you have permission to use work that others have created, and ask for permission before you use it

• Remember to credit your sources

• Provide a web link to online sources, whenever possible

• Make sure you clearly reference any quotes you use, and link back to the original article

• If you do find yourself in a position where you have forgotten to give someone credit, apologise and make an effort to put things right.

Digital literacy present significant challenges

to policy, pedagogy, and research in relation

to education.

In our view, facing and meeting these

challenges begins from ensuring that digital

literacy does not become the

post-typographic equivalent of functional

literacy from the world of print.