2. EXPLAIN THE KEY CONCEPTS OF DIGITAL CITIZENSHIP,
DIGITAL FOOTPRINTS, DIGITAL IDENTITY, AND ICT-
RELATED LEGAL BASES, INCLUDING THEIR SIGNIFICANCE
AND IMPACT ON EVERYDAY DIGITAL INTERACTIONS
5. TITLE: BE KIND ONLINE
LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=KWX5Q2I6SNM&AB_CHANNEL=BULLIESOUT
6. UNLOCKING CONTENT VOCABULARY
click on each term to see
definitions and examples.
Link: https://padlet.com/rbfabro/digital-citizenship-and-online-safety-z417ts5vez4quzpu/slideshow/wish/3021778399
7. Elements of Digital Citizenship
Scenarios Where Digital Citizenship is Crucial
A.Social Media Interactions
Scenario: A student shares a post on social media that could
be interpreted as offensive or controversial. This leads to a
heated discussion in the comments section.
●Questions: What do you think makes someone a good
digital citizen in the context of social media interactions?
Can you share an experience where practicing good digital
citizenship on social media was important?
8. A.Online Gaming
Scenario: During an online gaming session, a player
encounters another player who is using abusive language
and harassing others.
●Questions: What do you think makes someone a good
digital citizen in the context of online gaming? Can you
share an experience where digital citizenship was
important while playing online games?
9. A.Email Communication
Scenario: A student receives an email from an unknown
sender with a suspicious link. The student needs to decide
whether to open the link or report the email.
●Questions: What do you think makes someone a good digital
citizen when it comes to email communication? Can you
share an experience where being a responsible digital citizen
in email communication was crucial?
10. A.Online Learning Platforms
Scenario: In an online class discussion forum, a student
posts a comment that is respectful and constructive, even
though they disagree with the original post.
●Questions: What do you think makes someone a good
digital citizen in the context of online learning platforms?
Can you share an experience where digital citizenship was
important in an online learning environment?
11. A.Content Creation and Sharing
Scenario: A student creates a video and shares it online,
ensuring that all content used is original or properly credited
to avoid plagiarism.
●Questions: What do you think makes someone a good digital
citizen when creating and sharing content online? Can you
share an experience where practicing good digital citizenship
in content creation was important?
12. Digital citizenship refers to the responsible
use of technology by anyone who uses
computers, the Internet, and digital devices to
engage with society on any level. It
encompasses a wide range of behaviors and
skills that are necessary for effective and
ethical participation in digital environments.
13. According to Ribble (2017), there are nine elements
of Digital Citizenship. These elements include:
1.Digital Access
2.Digital Commerce
3.Digital Communication
4.Digital Literacy
5.Digital Etiquette
6.Digital Law
7.Digital Rights and Responsibilities
8.Digital Health and Wellness
9.Digital Security (Self-protection)
15. Scenario: Cyberbullying Incident
Scenario Description
●A student, Alex, posts a picture of their new project on
a school-related social media group. Another student,
Sam, starts posting negative comments about Alex's
project, calling it "stupid" and "a waste of time." Other
students join in, and the comments escalate to
personal attacks on Alex’s appearance and abilities.
Alex feels hurt and embarrassed and doesn't know how
to respond.
16. Identify Ignored Digital Citizenship Elements
1.Digital Etiquette - Sam and the other students ignored
the norms of respectful and kind communication online.
2.Digital Rights and Responsibilities - The bullies ignored
Alex's right to a safe and respectful online environment.
3.Digital Security - The situation could escalate to a point
where Alex's personal information might be at risk if the
bullying continues.
17. Analyze the Situation
1.How did Alex feel? Discuss the emotional impact of
cyberbullying on Alex.
2.Why did Sam and the other students behave this way?
Explore the reasons behind cyberbullying behavior.
3.What role did the bystanders play? Discuss the impact of
bystanders either joining in or staying silent.
18. How Could the Situation Have Been Handled Better?
1.Digital Etiquette - Sam and the other students should
have respected Alex's post and provided constructive
feedback if necessary.
2.Digital Rights and Responsibilities- Students should
recognize their responsibility to create a positive online
environment and report inappropriate behavior.
Intervention- The teacher should intervene early to stop the
bullying and provide support to Alex
19. Discuss the Importance of Digital Etiquette and Security
1.Digital Etiquette - Emphasize the importance of treating
others with respect online, just as one would in person.
Discuss the long-term impact of negative online behavior.
2.Digital Security - Highlight the need to protect personal
information and the potential risks of sharing too much
online. Discuss how bullying can sometimes lead to more
serious security issues.
20. Learning Activity Sheet No. 1:
Understanding Digital Citizenship
Through Creative Presentations
24. 1.What do you think makes up your digital
footprint?
2.Can you think of a time when someone's
online actions affected their real life?
25. What is a Digital Footprint?
A digital footprint is the trail of data that
individuals leave behind when they use the
internet. This includes all the information
that is shared, both intentionally and
unintentionally, through various online
activities such as social media interactions,
website visits, emails, and online shopping.
26. Digital footprints can be categorized into two types:
1.Active Digital Footprints - These are the data trails you
leave intentionally, such as posts on social media, blog
entries, or any other content you actively upload or share
online.
2. Passive Digital Footprints - These are the data trails you
leave unintentionally, such as cookies that track your
browsing habits, IP addresses, and other metadata collected
by websites and online services.
27. Importance of Digital Footprints
● Privacy and Security - The data you leave behind can be used to build
a profile about you, which can be exploited for malicious purposes such
as identity theft or targeted cyber-attacks (Solove, 2007).
● Reputation Management - Your digital footprint can affect your reputation.
Employers, colleges, and other entities often search for online information
about candidates, and inappropriate content can have negative consequences
(Berkelaar, 2014).
●Personalization - Companies use digital footprints to personalize
user experiences, such as recommending products or content
based on browsing history (Turow, 2011).
28. Managing Your Digital Footprint
Managing your digital footprint involves being mindful of the
information you share online and taking steps to protect your
privacy.
Privacy Settings - Regularly review and adjust the privacy
settings on your social media accounts and other online
services to control who can see your information
●Search Yourself - Periodically search for your own name
on search engines to see what information is publicly
accessible.
29. ●Think Before You Post - Consider the long-term impact
of the content you share online. Once something is
posted, it can be difficult to remove it completely.
Use Secure Connections - Ensure that you are using
secure (HTTPS) connections when browsing the internet to
protect your data from being intercepted
30. Digital Identity
Digital identity refers to the online persona
that is created through your digital footprints. It
encompasses all the information available about you
online, including social media profiles, online
transactions, and any other digital interactions. Your
digital identity can influence how others perceive you
and can have real-world implications.
31. Components of Digital Identity
●Personal Information - This includes your name, date of
birth, address, and other identifying details.
Professional Information - This includes your employment
history, professional skills, and educational background, often
found on platforms like LinkedIn
●Social Information - This includes your social media activity,
such as posts, likes, comments, and the networks you are part
of.
●Behavioral Information - This includes your browsing
habits, purchase history, and other online behaviors that
can be tracked and analyzed.
32. Risks Associated with Digital Identity
●Identity Theft - Cybercriminals can use your personal
information to steal your identity and commit fraud (Newman
& McNally, 2005).
●Data Exploitation - Companies can exploit your digital
identity for targeted advertising and other commercial
purposes without your explicit consent (Acquisti & Gross,
2006).
Reputation Damage - Negative information or inappropriate
content associated with your digital identity can harm your
personal and professional reputation
33. Protecting Your Digital Identity
●Strong Passwords - Use strong, unique passwords for
different online accounts and change them regularly.
●Two-Factor Authentication - Enable two-factor
authentication (2FA) for an added layer of security.
Be Skeptical of Phishing - Be cautious of emails,
messages, or websites that ask for personal information
●Regular Monitoring - Keep an eye on your online
accounts for any suspicious activity.
35. 1. Republic Act No. 10844 - Department of Information and
Communications Technology Act of 2015
Relevance in Everyday Digital Activities
· This law created the Department of Information and Communications
Technology (DICT), which is responsible for planning, developing, and
promoting the national ICT development agenda.
· It ensures that there is adequate infrastructure to support digital
activities, including internet access, cybersecurity measures, and ICT
services.
· The DICT is tasked with promoting digital literacy and ensuring that
ICT services are accessible to all Filipinos, thus bridging the digital
divide.
36. Protection and Regulation
· The DICT is responsible for implementing cybersecurity policies
and programs to protect users from cyber threats.
· It works in conjunction with other agencies to ensure the
protection of personal data and compliance with data privacy laws.
· The DICT sets standards for ICT services and infrastructure to
ensure reliability and security.
37. Case Study
Free Wi-Fi in Public Places- The DICT has implemented
the Free Wi-Fi for All program, providing free internet
access in public places such as parks, libraries, and
transportation hubs. This initiative promotes digital
inclusion and empowers citizens to participate in the digital
economy.
38. 2. Republic Act No. 10627 - Anti-Bullying Act of 2013
Relevance in Everyday Digital Activities
· This law addresses bullying in all its forms, including
cyberbullying, which is prevalent in digital spaces such
as social media, messaging apps, and online forums.
· It mandates schools to implement policies that prevent
and address bullying, including cyberbullying, to create a
safe and supportive environment for students.
39. Protection and Regulation
· Schools are required to establish clear reporting mechanisms for
bullying incidents, ensuring that victims can report incidents
safely.
· Schools must provide intervention programs to support both
victims and perpetrators of bullying, promoting behavioral
change and conflict resolution.
· The law encourages parental involvement in addressing
bullying, fostering a collaborative approach to protecting students.
40. Case Study
Cyberbullying Incident in Schools- A high school student
reported being bullied on social media by classmates. The
school, following the Anti-Bullying Act, conducted an
investigation, provided counseling to the victim, and
implemented disciplinary actions against the perpetrators. This
intervention helped restore a safe learning environment and
highlighted the importance of addressing cyberbullying
proactively.
41. 3. Republic Act No. 10173 - Data Privacy Act of 2012
Relevance in Everyday Digital Activities
· This law protects personal data collected by both
public and private entities, ensuring that individuals'
privacy is respected in digital transactions and
activities.
· It mandates organizations to obtain consent from
individuals before collecting, processing, or sharing
their personal data and to be transparent about how
the data will be used.
42. Protection and Regulation
· Individuals have the right to access, correct, and delete their
personal data, as well as to object to its processing.
· Organizations are required to notify affected individuals and
the National Privacy Commission (NPC) in the event of a data
breach.
· The law imposes penalties on organizations that fail to
comply with data privacy requirements, ensuring
accountability.
43. Case Study
Data Breach Incident- A major telecommunications company
experienced a data breach that exposed the personal information of
millions of customers. The NPC conducted an investigation and
required the company to implement corrective measures, including
enhancing their cybersecurity protocols and compensating affected
customers. This case underscores the importance of robust data
protection measures and the role of the Data Privacy Act in
safeguarding personal information.
44. 4. Republic Act No. 8293 - Intellectual Property Code of the
Philippines
Relevance in Everyday Digital Activities
· This law protects intellectual property rights, including
copyrights, trademarks, and patents, in digital content such as
software, music, videos, and written works.
· It ensures that creators are compensated for their work and
that their rights are respected in digital platforms and online
transactions.
45. Protection and Regulation
· The law includes provisions to combat digital piracy,
ensuring that unauthorized copying and distribution of
protected content are penalized.
· It provides guidelines for licensing agreements and fair
use, balancing the rights of creators with the public's access
to information and content.
· The Intellectual Property Office of the Philippines
(IPOPHL) is responsible for enforcing IP laws and
addressing violations through legal and administrative
actions.
46. Case Study
Online Piracy Crackdown- IPOPHL launched a campaign
against websites that distribute pirated content, resulting
in the shutdown of several illegal streaming sites. This
action protected the rights of content creators and
highlighted the importance of respecting intellectual
property in the digital age.