01 Digital Opportunities and Risks
01 Digital Opportunities and Risks
*The longer someone reads online forums, the more information he/she could learn, but at
the same time the higher the chance of encountering something offensive.
While there are many potential risks of using ICT like mobiles, computers, and the internet,
there are indeed plenty of opportunities. Teachers have busy and complex lives, constantly
dealing with a diverse set of people, and doing a range of tasks like teaching, supervising,
mentoring, organizing events, joining meetings, attending conferences, and supporting their
families. ICT can make life easier for teachers and their students. Below we describe some
digital opportunities.
BEING MOBILE
Mobile phones and tablet computers allow people to conduct many activities that they once
would have had to do in a fixed location. People can call or text, video chat, make an
appointment, respond to an email, play games, listen to music, seek information, or even do
work online. Mobile technologies can be used inside or outside, stationary or moving, alone or
with others. The mobility aspect is actually a huge safety advantage since we can be connected
and seek help almost anywhere in times of distress.
Since smartphones include many other functions besides phone calling, such as a camera lens,
it’s not necessary to carry many other items (like cameras, calendars, notebooks, computers,
etc.) to perform the tasks you want. If you see a beautiful scene, just pull your phone out of
your pocket and take a picture!
Being mobile is not just limited to being outside; you can even “be mobile” at home. The
convenience of a handheld device can allow you to multitask and roam around from couch, to
kitchen, to bedroom while staying connected.
The proliferation of travel-related apps has brought another dimension of mobility to our lives.
Online navigation apps like Waze, Bing Maps, Google Maps, and Apple Maps have made it
easier to go from one point to another, providing us with addresses, directions, travel time
2
estimates, and some also have real-time traffic updates. Websites like Wego, Agoda,
TripAdvisor, Trivago, Traveloka, Kayak, Cheapoair, Ctrip, AsiaWeb Direct, and Booking.com
have made it easier to browse possible travel destinations, and find thousands of options for
flights, accommodation, car rentals, and more. The competition in this sector has brought
prices down, meaning that more people can afford to travel now.
The digital revolution has allowed us to meet new people who share our interests and
people whom we might not be able to easily meet in “real” life. Since the internet is global,
one is not limited to making friends with people in their immediate surroundings—
theoretically, someone can befriend a person on the other side of the world, and
communicate instantaneously at very low cost. Digital communication tools can allow us to
learn about other people’s cultures and traditions.
People can use digital communication tools to get in touch with teachers in other parts of the
world, hear their stories, and appreciate their similarities and differences. Students can do the
same with students from other parts of the world. The practice of “pen pals”, long a tradition
of the education sector, can be made easier and more frequent through social media.
MAINTAINING CONNECTIONS
It has become easier to reach out to people for academic, business, or vocational reasons
through e-networking, establishing and sustaining contacts that could help us achieve our
professional goals. Networking is no less important to teachers than it is to other professions
— perhaps even more so—given the diverse demands of the teaching job. Teachers are
resource mobilizers, mentors, cheerleaders, negotiators, assessors, designers, and even
learners. They need to maintain regular communication with other teachers, parents, learners,
administrators, and other stakeholders. Their network is key to staying up-to-date with the
latest teaching strategies, instructional material-making methods, assessments, classroom
arrangements, and a variety of other ideas for growth.
However, teachers should be careful not to let their professional life overwhelm their personal
life. Teachers and learners should be able to disconnect sometimes; they both need spare
time. They also have the right to keep their school life and personal life separate, although it is
understandable that there will be some overlap.
FACILITATING LEARNING
Students can quickly ask their peers for help, ask each other questions about homework, and
trade notes online. Even people who are not in school, like adults and out-of-school youth, can
continue learning via the internet. Millions of people around the world learn about a vast
array of subjects by reading articles, blogs, and forums, watching clips, and listening to
podcasts online. Many people join online classes and receive education even if they live in a
remote place or lack the means to travel. In the past, in-depth reading material was found
mostly in libraries, which many people did not have access to. Now, the Check out the MT4T e-
book: Teachers’ Personal and Professional Learning Networks for 21st Century internet acts as
a global library, with much more information that people can access at an affordable price,
and in far shorter time. It opens us to a world of new learning opportunities.
There are a variety of well-established modes of learning using ICT. In the 1980s and 1990s,
ICT-mediated learning mainly involved the use of desktop computers without internet, radios,
floppy disks, and CD-ROMs. In the new millennium, however, the internet—accessed through
laptops, tablet computers, and cellphones—has become the most popular medium for
elearning. E-learning can vary in formality, ranging from short nuggets of information for the
casual visitor to fully-developed courses for the degree-seeking student. An increasing number
of educational institutions offer online courses and podcasts. Podcasts are digital audio files
4
that can be downloaded from the internet and played on a computer or portable media
player, like an iPod. Online courses and podcasts may be intended for a specific audience or
for the wider public. Some require payment while others are free of charge. SEAMEO
INNOTECH offers online courses designed for both teachers (e.g. Gearing Up Responsible and
Outstanding Teachers in Southeast Asia for the 21st century, or GURO 21) and school
principals (e.g. Excellence in School Leadership for Southeast Asia). Visit SEAMEO INNOTECH’s
website for more details.
e-Learning can be text driven, or highly interactive with pictures, charts, diagrams, animations,
movies, and even augmented reality. e-Learning can be autodidactic, whereby a person learns
alone, or it can be done 1-on-1 with an instructor. One-on-one interaction is a popular
arrangement for the growing online English learning industry in Asia. Groups are also possible,
either with attention mainly on one instructor (lecture-style), or with more equal participation
(seminar-style).
Even teachers that are not officially teaching an online course can take advantage of the
growing number of online learning management platforms, such as Edmodo or Coursera, to
help them manage their regular classes. A teacher can post class announcements, lectures,
videos, and assessments to such sites, while students can submit their assignments, ask
questions, download resources, and join in discussions. Many learning management platforms
also automatically tabulate assessment results and help teachers track student performance.
There are many tools online that can facilitate instant collaboration. There are applications for
project management that allow multiple people to track tasks, resources, and people.
Many communication applications have features allowing for group communication via chat,
call and video. Cloud storage applications enable people to save files to an offsite server that
can be accessed by others, if the owner permits. These services allow people to share all sorts
of files, such as documents, spreadsheets, pictures and more, which they can view, edit, and
return. Some of these applications also enable collaboration in real-time. People with whom a
document has been shared on Google Drive, for example, can be identified as “editors” and
can simultaneously edit the document online. Many other online, live cooperative applications
have been developed for specific purposes, such as creating designs, making photo albums,
scheduling meetings, carpooling, and planning events like birthdays, weddings, and more.
5
Teachers can use these collaborative tools for school projects, such as organizing an event (e.g.
ASEAN Day), drafting a grant application, or making preparations for a new facility (e.g. a new
auditorium), which would usually involve multiple people.
DOING RESEARCH
The web is a popular tool for research. One reason why is because of powerful search engines.
Search engines are software programs that search for content across the Internet based on
keywords or phrases of the user’s choice. They give access to myriad sources, and moreover,
can provide an index of sources incredibly fast. Search engines like Yahoo, Google, Ask, Bing,
and Baidu have become household names. Teachers can use search engines to find content for
their lessons, check their facts, and access videos or images that they might want to show their
class. Students can use search engines to find out more about a particular topic, seek answers
to their questions, and collect sources for an essay.
It is important that teachers and students know how to choose the right search terms—
specific and relevant—such that the results better match their desired inquiry. Once the
engine displays the list of sources, you should check the number of options returned. If there
are too many, you can add keywords to narrow the search. Every search engine uses a
different algorithm, so it also helps to try multiple search engines to find new resources.
Despite the ample information that can be garnered from the web, it is important that people
critically evaluate the sources that appear. Consider several factors before deciding to use an
online source, for example: is the source relevant, reliable, and accurate? Is it written by an
authority of the topic? Does the author have any affiliations that might lead to bias? For whom
is the information intended? Is the content up-to-date? Is the information verifiable, including
the identity of the author?
These kinds of questions are especially important to ask when gathering information from
social media or personal blogs. A lot of information posted to social media is misinformation:
inaccurate or false. Teachers and students should be careful when using them for research.
See Chapter 11 for more guidance on tackling misinformation on the web.
The internet also facilitates the dissemination of research. In the past, academic journals only
published in print. Now, most people access academic journals online. The vast majority of
6
journals have an online presence, and many have cancelled their printed editions. This is true
for both international, regional, and country-level academic journals.
The advantage of online publications is that they can be downloaded instantly, some of their
content can be previewed before purchasing, they do not suffer from wear and tear, and they
have dynamic features. For example, graphs can be enlarged, diagrams can reveal additional
content with the hovering of a mouse, and citations have live links that can take you to other
publications.
Despite having an online presence, most traditional research publishers charge monthly
subscriptions to access their journals, or charge fees for every article downloaded. However,
there is a growing market of open access journals that are free of charge, which is great news
for educators-cum-researchers in less developed regions. There are also hybrid journals, which
charge for some articles and offer others for free. Regardless of whether a journal is free or
not, users should make sure that it is legitimate and credible. Some publishers are fake, run
money making scams, or simply incompetent. Avoid journals that do not have a proper peer
review process, or those with dubious “experts” on their editorial board. You can check lists of
these so-called predatory journals and publishers at the following websites:
archive.today
Besides academic journals, teachers can make use of general repositories of research and
knowledge products such as Academia.edu and ResearchGate wherein they can discover other
people’s work, share their own, and even connect with other researchers.
There are games to improve language skills, math skills, and critical thinking. There are games
for drawing and making music. There are also games through which students can learn subject
content, like history and geography.
A note of warning: do not forget that spending time disconnected, being present in the
moment, and taking care of ourselves is necessary for our wellbeing. Using ICT can be fun, but
we should resist the urge to constantly be stimulated thru electronic means.
PROMOTING CREATIVITY
The internet can be like a magical wonderland, in which one can encounter all sorts of strange,
exciting, surprising, thought-provoking, and hilarious things. Mobile phones, computers, and
tablets, are springboards into this wonderful world. Once you enter this world, there are
videos to inspire, games to stretch your imagination, pictures to upload and playfully edit, and
myriad applications to expose oneself to other people’s creativity or foster your own. Online,
you can get ideas about cooking, gardening, or building something, and you can also share
your own innovations. You can watch very talented people model activities that you are
interested in, such as dance, singing, acting, and others. You can see where friends have gone
on holiday, inspiring you to plan your own vacation.
Online, teachers can get ideas for creative activities or lesson plans to conduct in their
classrooms. They can find thought-provoking quotes, inspirational stories, unusual pictures,
fun songs, and interesting videos. They can look for websites or mobile applications with which
students can make things, like collages, drawings, or models. There are also applications that
allow users to record their voices, sing with others, play on electronic instruments, and mix
music. Teachers can also make more exciting lectures, using software like Prezi that uses
motion, zoom, and spatial relationships that will grab the attention of their students.
The internet can expose you to things that you would otherwise never have encountered,
fostering fresh ideas and unexpected directions in life. Inspiration and motivation in life are
very important for mental health, such as satisfaction and happiness. The online world also
gives people the chance to discover different facets of their personality and to interact in novel
ways.
In many parts of the developing world it can be hard to access a doctor. Most countries in
Southeast Asia have fewer than one doctor per 1000 people (World Bank, n.d.). With so few
8
Meanwhile, mobile phones and other technologies are being increasingly used to mediate
care, such as reminding patients to take their medicine, informing them that a medical result is
ready for pick-up, and sending warnings or important advisories. ICT can help people get
connected to a health professional, opening the possibility for instant communication of
symptoms and access to medical records.
Teachers, guidance counselors, and school nurses can explain to their teenage students the
applications of ICT to health. They can show them some of the sites where students can find
reliable information about both physical and mental health issues, particularly those
commonly experienced by young people. They should be encouraged to find out as much
information as possible about sexual health, for example, so that they can be make
responsible decisions in future. And if they think they might have a problem, they can
proactively seek professional guidance. They can also be introduced to online safe spaces for
open conversation about health problems.
The ease of communication and information sharing online makes it easier for people to stay
informed about current issues affecting their schools, communities, provinces, countries, or
even the world. Online, they can quickly plan meetings, forums, protests, seminars, and
conferences to engage with important topics, in online or offline venues, tackling problems
together rather than in isolation. In areas where free speech is limited, sometimes the internet
is the only avenue through which sensitive subjects can be discussed. This is one of the
advantages of anonymity that the online world can offer.
A great example of public participation thru ICT is in times of calamity. Even though roads are
impassable and buildings are damaged, sometimes school communities still have access to
9
electricity or a mobile signal. In such cases, people in the community (e.g. teachers, students,
parents) can find out about evacuations, the weather, the extent of destruction, and deliveries
of relief goods (e.g. food, clothes, medical supplies). Teachers can reach out to families to
know the status of their students, and update them on the resumption of classes. Principals
and teachers can organize interventions like psychosocial trainings, alternative learning
activities, and fundraisers via social media.
The internet has been used by millions of people to supplement their regular income, make a
living, or in some cases become very rich. People have started all sorts of businesses online.
Tech savvy individuals who have good ideas for mobile and web applications can develop their
apps and upload them to online app stores. They can also do web design for those who want
to create their own websites but cannot do it themselves. Some people make money by
providing remote technical support for everything from computer repairs to software issues to
even gaming.
People with niche business interests like pet food, rare wine, and handicrafts can set up
websites to promote and sell their products using e-commerce software. Budding authors and
artists who don’t have connections with established publishers and record companies,
respectively, can upload and sell their content online. Skilled workers and professionals can
promote their expertise online and market their services, such as cover letter writing,
encoding, language learning, training, coaching, task managing, and consulting. [Note: some
online businesses are scams...critical thinking is necessary to be able to recognize false
advertising, illegitimate claims, and other attempts to swindle.]
Those who are adept at using social media can become social media marketers, helping
businesses get more attention through strategic postings of text, images, and videos.
Individuals with large followings on any platform, such as Facebook, Instagram, Twitter, or blog
sites, may also be tapped by businesses to be brand advocates for them. As affiliate marketers,
they have the opportunity to earn “smart passive income.”
Even teachers who have no plans for an online business can benefit from the digital economy.
The web has opened buyers to new markets. Many online companies make deliveries all over
the world. Teachers (or their schools) can order books from other countries, in different
languages and for various levels. Teachers can buy educational materials like posters, charts,
games, and maps online. They can purchase educational assessment tools, or research
10
instruments in case they are conducting a study. Teachers are no longer limited to the
materials given to them by their government, or those found in local stores.
The following sections describe some of the risks and threats associated with the use of
mobile, computer, and internet technologies. While students and teachers can greatly benefit
from ICT, they can also have negative experiences. A Microsoft survey of 14 countries revealed
that 65% of adults and youth aged 13-17 have been exposed to an online risk, averaging 2.2
risks per person.4 The commonest negative experiences were unwanted contact (43%), being
the target of mean behavior (22%), unwanted sexting (24%), trolling (21%), harassment (17%),
hate speech (16%), sexual solicitation (15%), and doxing5 (12%). Two out of three people said
that risk exposure had consequences in their life, such as losing trust in people online (40%),
losing trust in people offline (30%), increased stress (23%), reduced sleep (23%), reduced
participation in blogs and forums (21%), depression (15%), and others.
It is important that educators and students are aware of what could go wrong in cyberspace,
so that they can recognize a risky situation when it happens. In the remaining part of this
chapter, we provide a preview of these cyber problems, and in the following chapters, we
present techniques on how to deal with them.
CYBERBULLYING
Cyberbullying is happening around the world, but rates vary. A series of Europe-wide surveys
found that cyberbullying is rising. The percentage of children aged 11-16 who reported
receiving hurtful messages online rose from 8% to 12% from 2010 to 2014, respectively.
Sometimes, perpetrators of cyberbullying do not realize that what they are saying or doing
constitutes cyberbullying, while victims likewise don’t always realize that they are being
11
cyberbullied. Online bullies of young people are most often young people as well. Youth
belonging to ethnic, religious, and sexual minorities, or who are otherwise perceived as
different (e.g. overweight, disabled, etc.), are at greater risk of being cyberbullied (Keith &
Martin, 2005).
Teachers should realize that cyberbullying could be happening between the students in their
class, or between their students and other young people. It is probable that at least one of
your students is being cyberbullied, and it is invisible to you.
Even teachers can be cyberbullied—by other teachers, their principal, parents, or even their
own students!
CYBERSTALKING
A cyberstalker takes advantage of the anonymity of the web to pursue or harass an individual,
thinking that he/she would not be held accountable for his anti-social behavior. Cyberstalking
can be considered a form of cyberbullying.
TROLLING
Trolling is also closely related to cyberbullying. Online trolls taunt and insult their targets,
which could result in someone feeling depressed, angry, or low in self-esteem. The
difference between a troll and other kinds of cyberbullies is that a troll typically does not have
a deeper goal for harassing someone except to provoke a reaction. Trolls delight in discovering
12
that they have had a negative effect on someone. Trolls are often less discriminating than
other cyberbullies when it comes to choosing whom to bother: they may even do it randomly
to strangers.
If teachers and students read news articles or forums online, they will probably encounter
trolls in the comments section below. Trolls can also be found in the comments section of
YouTube videos or pretty much any public website that allows for commenting and discussion.
How do you spot a troll? Anyone who says mean, hateful things directed to anyone is probably
a troll. Their statements are often illogical and repetitive. And if you try to reason with them,
they normally resort to ad hominem attacks, and are completely unwilling to change their
views. The best thing that teachers and students can do when they encounter trolls online:
ignore them.
In the worst cases, meeting up with cybergroomers face-to-face could lead to the child’s
abduction, direct physical exploitation (such as through pornography, prostitution, rape), sale,
slavery, and other forms of grave harm. These crimes, however, are rare.
Young people without a strong support network, such as those whose parents or siblings are
not around, could be enticed to meet strangers with the promise of “protection,” materials
goods, or money. Teachers should also remind their students to be careful about whom they
communicate with online, as not everyone is who they seem to be. Furthermore, they should
never feel compelled to share sexual images of themselves, to anyone. Once a picture like that
is in someone else’s computer, they have no control over it.
13
With a few clicks, almost any internet user in the world can access sexual, violent, or other
controversial material. Safety features of websites and web browsers are easy to circumvent
and disclaimers provide little deterrent to would-be visitors. Content that depicts or promotes
drugs, alcohol use, sex, gore, violence, hatred, and intolerance can disturb or influence
children. Professionals are concerned of growing addiction to pornography, for example, and
pressure on girls to conform to the behavior and appearance of women in pornographic
videos (UNICEF IRC, 2012).
Students have probably seen things on digital media that are inappropriate for their age. Even
the movies shown on public transportation are often disturbing. “Sanitizing” classroom
discussions—avoiding talk of violence and sexuality—is not the solution, because that means
the students are potentially being exposed to such content in their private lives without the
chance to talk about it. Teachers can carefully bring up such topics and ask the students how
they feel about it. They can also discuss what disturbing content says about the industries that
make such content, and society as a whole. Students should be made to feel that they are in
control. They can take proactive steps to avoid such content, and speak out against the people
responsible for promoting violence and degrading sexual material. Through empowerment
and critical thinking activities like the ones in upcoming chapters of this e-book, teachers can
also dissuade their students from emulating the negative behaviors they encounter in digital
media.
It’s easy for information to be put up online, but it is hard to take it down. In this day and age,
mistakes someone has committed can be revealed online and stay there indefinitely. In
previous generations, indiscretions of youth were left to fade in people’s memory, but now
people can be reminded of embarrassing moments over and over again. Information that we
would prefer to be kept private can become wide public knowledge. Our online reputation is
also called our “digital tattoo”, and it can be elevated and destroyed quickly. A damaged
14
digital tattoo can affect someone’s education, social life, and work. In the United States, for
example, a Microsoft study found that a whopping 70% of employers have rejected applicants
based on their online reputation (Cross Tab, 2010).
As teachers, there is a need to educate our students in understanding their emotions and
online behaviors: why they do what they do, why they share what they share. If we train them
to recognize, interpret, and evaluate their own emotions, then they will be less likely to impair
their digital footprint with irresponsible behavior. Chapter 10 offers some guidance on how
teachers can do this.
Children can become “addicted” to surfing the web and playing games online. It is debated by
scholars how comparable computers, mobiles, and the internet are to conventional drugs, but
there is growing consensus that excessive use of ICT is a problem, even though it might not be
classified as a formal addiction (Livingstone et al., 2011). Excessive use is less about the
amount of time spent but rather the extent to which ICT use negatively impacts upon other
aspects of one’s life. For example, if a child skips meals or sleep to be online, feels bothered
by temporary lack of access, surfs the internet even when he/she is not interested, sacrifices
interactive family and friend time to play computer games, neglects homework, or
unsuccessfully tries to reduce his/her ICT use, these are all signs of excessive ICT use. In
European countries, indicators for excessive use are on the rise, and one in four children
occasionally experiences going without sleep or eating due to the internet, and (Livingstone et
al., 2011). However, trends vary significantly from country to country. Data in Southeast Asian
countries is limited.
Consequently, teachers need to model and promote having a balance between online and
offline life, underlining the importance of mindfulness, being present in the moment, and
occasionally disconnecting from ICT. A groundbreaking Harvard study, which tracked the lives
of hundreds of people starting in 1938 and continuing to the present, found that the healthiest
and happiest people were those who maintained close, interdependent relationships with
family and friends. Their relationships mattered more than wealth, fame, and career.
The lessons of this adult development study: good relationships keep us healthier and
happier. Loneliness and isolation make us less happy, health deteriorates earlier, and brain
declines sooner. Happiness is not about the number of friends you have; it is about the
quality of your close relationships.
15
The study’s current director, Dr. Waldinger, recommends that one of the actions we can take
to improve our happiness is “something as simple as replacing screen time with people time.”
If students make positive changes to their habits now, it will have a long term impact on their
lives.
Use of computers and mobile technology can lead to several bodily ailments, such as back,
arm, and neck pains and worsening posture. If the computer use involves prolonged sitting, it
can cause hip rotation, thereby forcing a change of walking gait. A more serious possible
outcome is deep vein thrombosis, although this normally impacts middle aged and elderly
people who have limited physical activity for long periods.
Staring at a screen for a long time can strain the eyes due to glare, resulting in dry, watery,
itchy, burning, or other uncomfortable eye states (Cashin-Garbutt, 2012). An incorrectly
positioned computer screen can also cause eye strain. If the screen is too high or too low, your
stare will be forced to deviate from the natural direction (which is straight out in front, and
slightly down), leading to eye muscle fatigue. People can also forget to blink their eyes when
staring at a screen, causing dry eyes due to lack of tears.
The unnatural light of the screens also affects our sleeping patterns. Our brain does not
perceive it is night time, so the hormone serotonin in our body does not convert into
melatonin, which is what we need to feel sleepy. Without sufficient melatonin, we may
experience insomnia (the inability to fall asleep). Insufficient sleep can have many
consequences on our health, including a weakened immune system.
Mobile phones can be dangerously distracting in some situations, such as walking on the
street or driving in a car. If someone is browsing and/or typing on the phone while walking on
the street, he/she may not notice hazards like oncoming vehicles. Similarly, if someone is
attempting to ride a car, motorcycle, or bicycle while talking on the phone, it is more difficult
to monitor one’s environment and the person may not react fast enough when confronted
Check out the learning packet on Internet Addiction here! It contains a teacher’s guide and
presentation slides to conduct a learning activity for the classroom. with a hazard. Vehicular
mobile phone use has been linked to road accidents, and therefore banned in many countries.
A person is approximately four times more likely to get in a car accident when using a mobile
phone than without (NHS, 2014).
16
Teachers should raise awareness about the physical dangers of ICT use. They should warn their
students not use their mobile phones while walking on the street or driving any kind of
contraption (including bicycles)! Teachers should also explain—and even better, exhibit—the
importance of good posture, reducing screen time (thereby avoiding long periods of sitting and
strain on their eyes), and healthy sleep habits.
SALES FRAUD
Sales fraud is when products or services are offered online but turn out to not exist, do not
match the stated specifications or quality, or the payment for such products/services is not
processed correctly or fairly. Some examples include fake raffles, claims of winning money,
fake holiday trips, invitations to ghost events, websites that purport to sell original products
but are in fact selling imposter brands, and many others. In some cases, a website might offer
a genuine product, but the payment terms are misleading. For example, the billed amount is
not the same as the price advertised, or the buyer is locked into a regular subscription when
he/she thought that it was only a one-time payment. The objective of most people engaged in
sales fraud is to make money from their victims.
Educators can be victims of sales fraud. Temporary websites crop up from time to time inviting
teachers to education conferences, when in fact the conferences are imaginary. The teacher,
for instance, submits an abstract to present the results of her latest action research. The
conference website looks glamorous, and claims a number of credible sponsors with their
logos splashed on the page. A week later, the teacher receives a reply from the “conference
organizers” that her abstract has been accepted. After the teacher has paid the conference
registration fee online, the organizers no longer answer her emails. Another week later, the
conference website can no longer be found. It has been removed, and the teacher does not
get her money back.
IDENTITY THEFT
Identify theft is when personal information is stolen and used by other people pretending to
be the victim. An individual could attempt to steal one’s personal information by coaxing the
person to reveal it, or it could be automated through a website, application, or computer
virus. The thief could use the person’s name, bank information, email address, house address,
and other information. There are also scams by which the thief presents himself as a person in
an emergency, temporarily needing cash or the use of someone’s bank account, but the
money is never returned. As with sales fraud, the objective of most people engaged in identity
17
theft and related scams is to make money, but in rare cases identity theft could be used to get
communication access to other people in the victim’s network or to acquire certain privileges.
The act of acquiring someone’s personal information (especially financial information) by
posing as a legitimate company or trustworthy person is known as phishing.
For school age children, identity theft most often happens in the context of social media. A
student might create a fake account and pose as someone else. The motivation varies: some
do it for humor, others for courtship, and others for intimidating someone else. In countries
such as the Philippines, it is not uncommon for teenagers to have multiple Facebook
accounts...one for their parents’ and girlfriend’s eyes, and an alternative account for
conducting communications that they don’t want their parents or significant other to know
about. While having multiple social media accounts is not automatically bad (youth should be
able to experiment with different sides of their personality, and have a potential escape from
overly controlling loved ones), teachers can ask them to reflect on their actions. The line
between experimentation and dishonesty is fine. Secondly, while someone could assume a
fictitious identity, it is not acceptable to steal another person’s identity, because the person
never gave you permission to do so.
MISINFORMATION
Because the internet is an open community (in most places), people are free to upload
almost anything they want, even if it is not true. This characteristic is not like traditional
sources of information: most libraries, for example, collect books with a certain standard of
quality in mind, because they have an educational mandate to the public. Reputable academic
journals, meanwhile, publish articles that are rigorously vetted by experts. The internet does
not have such controls. Even a five year-old could upload material to the internet, completely
make-believe (if he/she is technically savvy enough to do so, that is). Sometimes, information
is uploaded as a joke or prank, pretending to be real when in fact it was just a hoax. These
factors have led to a proliferation of fake news, which has become a hot topic among
politicians, media outlets, and the general public. Fake news can have negative consequences,
because people might act upon the information on the assumption that it is real, potentially
harming themselves or others. People could form false opinions, views, convictions, and
stigmas, and spread the misinformation to others.
18
PLAGIARISM
In other cases, the information found online is correct, but the purported author is not who he
says he is. This is called plagiarism. Plagiarism is the act of taking someone’s work or ideas
and pretending it is yours. A person might dishonestly claim a whole work is his own creation,
or take pieces of it and incorporate into his own work without crediting the original source.
Both are forms of plagiarism and are generally illegal. Plagiarism is harmful because it takes
away someone’s chance to be recognized and benefit from his/her creations. It can also harm
the person who plagiarized: if he is exposed, his reputation, job, and future career could be
destroyed.
Recognize his or her Specify the nature, role and Formulate his or her
information and media scope of his or her information and media
(content) need, identify and information and media (content) needs into concrete
save information and media (content) need, in order to strategies and plans to search
content from easily located locate and select from various for and access information
and accessed information and potentially conflicting from diverse sources using
sources using basic tools. information sources and relevant diverse tools in a
providers of information and systematic, explicit and
media content using various efficient manner, and retrieve
tools, storing it and applying existing information for
key legal and ethical further utilization.
principles.
Select information sources Analyze and differentiate Within the context and
without clear assessment quality of and evidence of multiple conditions
criteria, and with limited relevant information sources applicable, interpret,
application and awareness of and content, understanding compare, critically evaluate,
major principles, conditions the necessity of media and authenticate and hold
and functions of media and information providers and synthesized information and
information providers in their implications for society, media content, appreciating
society as well as being unable to recognize work of author(s), and media
authentication of information different viewpoints; as well and information providers
and media content. as store selected information within the context of
and media content for further sustainable development of
application. society, organization or
community.
19
Organize and save retrieved Create, produce and Combine information and
information without communicate new media content for creation
substantive synthesis using information and media and production of new
basic tools and distribute content in new formats using knowledge considering socio-
without critical appraisal or appropriate channels and cultural aspects of the target
ethical and legal tools for well-defined audiences and then
considerations for limited application as well as communicate and distribute
application. engaging in a dialogue with in various appropriate
others with limited awareness formats and tools for multiple
of ethical and legal applications in a participatory,
implications. legal, ethical and efficient
manner, as well as monitor
influence and impact made.
https://bit.ly/2yrsHhi