1 / 11

Cyber Literate

Cyber Literate. Module 2. What is ‘Cyber Literate’?. Cyber Literate = Ability to use technology + knowing when, when not and how to use it appropriately . It teaches us how online behaviour can have major consequences offline. . Key words. appropriate = مناسب literate = مثقف

leann
Download Presentation

Cyber Literate

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Literate Module 2

  2. What is ‘Cyber Literate’? • Cyber Literate = Ability to use technology + knowing when, when not and how to use it appropriately. • It teaches us how online behaviour can have major consequences offline.

  3. Key words • appropriate = مناسب • literate = مثقف • consequences = العواقب • ability = القدرة • reliable = موثوق • unreliable = غير موثوق • negative = سلبي • positive = إيجابي • implication = تأثير • footprint = البصمة • evaluate = تقييم • trustworthiness = الثقة/ إخلاص شديد • cyber bullying = البلطجة عبر الإنترنت • impact = تأثير • victims = ضحية • differentiate between = التفريق بين • reputation = سمعة

  4. Learning Outcomes By the end of this module, you should be able to: • Identifytwo appropriate ways when communicating digitally • Differentiatebetween reliable and unreliable resources from the Internet • Describethree negative implications of digital footprint • Listtwo best ways to evaluate trustworthiness of a website • Describethree cyber-bullying activities and their impact on the victims

  5. Outcome 1 Question: Identify2appropriate ways when communicating digitally Possible answer: (s) • Joining a virtual community Social networking site e.g. Twitter. To network with people who have similar interests to you. E.g. Books, Cooking, • Communication Professional and Social e.g. IM, Email or VOIP (Skype) 3. Education (e-learning) Independent learning - searching web pages Guided learning - via email, learning systems like Edmodo or VOIP (Skype) • E-business • E-Government http://www.government.ae/ http://www.abudhabi.ae/ • E – Career/E-Jobs http://www.bayt.com http://www.recruitgulf.com http://jobs.abudhabi.ae http://www.manpower.com

  6. Utilize the privacy setting features on your social networking websites. This will help secure your information. You may want only a selected group of friends to view your personal data and not everyone. • • Remember, what you post online is not private. Your parents, teachers and potential employers may go online and find out about you. • • Don’t ever complete any online profiles. You should limit your profile information • posted online. • • Have you ever conducted

  7. Outcome 2 Question: • How do you Differentiate between reliable and unreliable resources from the Internet? Answer: By checking the reliability of the author. You can do this in 3 ways: • Is the author qualified in the subject? • Doesthe author have a reputation for telling the truth? • Is the website a government or educational website? E.g . ac.ae or ae.gov

  8. Outcome 3 Question: • Describe2 negative implications of digital footprint Answer: • Breaking the law - Posting pictures of your friends • Getting a bad reputation - Forgetting who might be on Face book (current or potential employers

  9. Outcome 4 Question: • List two best ways to evaluate trustworthiness of a website جدير بالثقة – صادق ? Answer: Same as outcome 2 answer

  10. Outcome 5 Question: • Describe three cyber-bullying activities and their impact on the victims Answer: • Cyber-bullying may include the following activities: • • Posting of slanderous messages on social networking sites • • Spreading of rumors online • • Excluding a person from an online group • • Sending of unsolicited messages via text, instant messaging or email • As this kind of bullying can take place anywhere, victims can no longer feel safe within their homes. • The disturbing effects on the victims of cyber-bullying may comprise of the following: • • Poor grades • • Emotional spirals • • Poor self-esteem • • Repeated school absences • • Depression • • Suicide • U.A.E LAW: According to Article No.9, anyone convicted of using the internet or any other high-tech means for threatening or black mailing another person, to incite him to carry out an act or not, shall be sentenced to no more than two years in jail and fined no more than Dh50, 000, or both.

  11. Practice Exam Questions Exercise Q1. Choose the best way to disclose your personal information on a social-networking website without exposing yourself to identity theft? • A. Impersonate others • B. Reveal upon request • C. Use false information • D. Disclose minimal information Q2. How might tagging names to online photos negatively affect future employment opportunities? • A. It promotes your image and personality • B. It helps you to be outstanding from other jobseekers • C. It reveals your personal associations and social preferences • D. It allows a prejudgment and wrong interpretation of your character

More Related