ALS - JH - LS6 - Digital Ethics Why It Is Important - Galvez - Baguio City
ALS - JH - LS6 - Digital Ethics Why It Is Important - Galvez - Baguio City
WHY IT IS IMPORTANT?
CHARACTERISTICS
AND TYPES ODEVICE
Module in ALS - Learning Strand 6
Digital Citizenships
https://www.google.com/search?q=digital+ethics+picture
Rolando G. Galvez
Department of Education • Division of Baguio City
i
Republic of the Philippines
DEPARTMENT OF EDUCATION
Cordillera Administrative Region
SCHOOLS DIVISION OF BAGUIO CITY
#82 Military Cut-Off, Baguio City
Published by
Learning Resource Management and Development System
COPYRIGHT NOTICE
2021
“No copyright shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency of office wherein the work is
created shall be necessary for exploitation of such work for profit.”
This material has been developed for the implementation of K-12 Curriculum
through the DepEd Schools Division of Baguio City - Curriculum Implementation
Division (CID). It can be reproduced for educational purposes and the source must
be acknowledged. Derivatives of the work including creating an edited version, an
enhancement or a supplementary work are permitted provided all original work is
acknowledged and the copyright is attributed. No work may be derived from this
material for commercial purposes and profit.
ii
PREFACE
This module is a project of the DepEd Schools Division of Baguio City through
the Curriculum Implementation Division (CID) which is in response to the
implementation of the Alternative Learning System - K to 12 Curriculum.
Competencies
• Explain the meaning of digital ethics and why it is important
S6DL-DE-PSFBL/LE/AE/LS/AS1
• Distinguish ethical versus unethical behavior as a user of digital
technology
DL-DE-PSFLE/AE/LS/AS-2
●digital plagiarism
●breaking copyright and software theft
●improper use of digital resources
●securing information privacy and confidentiality
●computer fraud
• Practice respectful conduct when using the Internet
LS6DL-DE-PSFBL/LE/AE/LS/AS3
●sensitivity to national and local cultures
●avoiding identity misrepresentation and fraud
●internet etiquette while chatting, emailing, blogging, and using social
media
●protecting personal information
iii
ACKNOWLEDGMENT
The developer wishes to express his gratitude to those who helped in the
development of this learning material. The fulfillment of this learning material would
not be possible without them.
Thank you all for your moral and technical support in the crafting of this
learning module. To my colleagues in our school for sharing your knowledge and
expertise as I developed this learning resource. Lastly, to the office of DepEd
Division of Baguio City for giving us the opportunity to discover our skills as module
writers.
Development Team
Developer/s: Rolando G. Galvez
Layout Artist:
Illustrator:
CONSULTANTS
CHRISTOPHER C. BENIGNO
OIC - Asst. Schools Division Superintendent
iv
TABLE OF CONTENTS
Page
Copyright Notice………………………………………………….……...… i
Preface …………………………………………………………………...… ii
Acknowledgment……………………………………………………. ……. iii
Table of Contents……………………………………………………….… iv
What I Need To Know
Learning Objectives …………………………………………………… 1
What I Know..………………………………………………………….…… 2
What’s In……………………………………………………………………. 4
What’s New………………..………………………….……………….……. 5
What Is It……………………...……………………………………...……… 6
What’s More..……………………………………………………….……… 10
What I Have Learned.……………………………………………………… 12
What I Can Do…………………………………………………………….… 13
Post-Assessment …………………...……………………………………… 14
Additional Activities……………………………………………….………… 16
Answer Key…………………………………………………………………. 17
References…………………………………………………...…….……… 18
v
What I Need to Knowle
This module was designed to equip you with essential knowledge about
importance of digital ethics, distinguishing ethical versus unethical behavior as a
user of digital and practice respectful conduct when using the Internet.
This module contains several lessons. To make the most out of them, you need to
do the following:
1. Scan the list of Learning Objectives to get an idea of the knowledge and skills you
are expected to gain and develop as you study the module. These outcomes are
based on the content standards, performance standards, and learning competencies
of the ALS K to 12 Curriculum Digital Citizenship.
2. Each Lesson aims to develop one of the learning objectives set for the module. It
starts with an activity that will help you understand the lesson and complete the
required competencies.
3. Take your time in reading this module. Write down points for clarification. You may
discuss these points with your teacher.
4. Perform all activities and answer all worksheets. The activities and assessments
are designed to enhance your understanding of the lesson. Review the lessons if
necessary, until you have achieved a satisfactory level of understanding.
5. At the end of the module, take the Post-Assessment to evaluate your overall
understanding about the lessons.
LEARNING OBJECTIVES
At the end of the module, you should be able to:
Explain the meaning of digital ethics and why it is important.
S6DL-DE-PSFBL/LE/AE/LS/AS1
Distinguish ethical versus unethical behavior as a user of digital technology.
DL-DE-PSFLE/AE/LS/AS-2
●digital plagiarism ●breaking copyright and software theft ●improper
use of digital resources ●securing information privacy and
confidentiality ●computer fraud
Practice respectful conduct when using the Internet.
LS6DL-DE-PSFBL/LE/AE/LS/AS3
●sensitivity to national and local cultures
●avoiding identity misrepresentation and fraud
●internet etiquette while chatting, emailing, blogging, and using social
media
●protecting personal information
1
What I Know
The following activity will serve as a pre-test to determine what you already
know about mobile devices.
Read each item carefully and write the letter of the correct answer in a
separate sheet of paper.
2. Mobile devices are powerful enough to do many of the same things you can do
with a desktop computer.
a. no answer b. false c. true d. maybe
5. This upholds the principle that its integrity must be assured if it is to be of value to
consumers.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect
6. This can be accomplished by avoiding deception and being fair, but can also be
conveyed through engaging users.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect
7. This collects and manages data which must uphold the principle that its integrity
must be assured if it is to be of value to consumers.
a. Promote trust c. Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect
2
9. This is a range from small infractions such as not putting quotes around a
quotation to blatant violations such as copying an entire website.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud
10. This is a cybercrime and the act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud
11. Corporate digital ethics covers how individual users honor one another’s right to
self-determination online with respect to privacy and ownership.
a. no answer b. false c. true d. maybe
12. This is digital information and technology that is used in a wrong way by the user
such as using technology for slander, gossip, show scandals and many more.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theft d. Computer fraud
13. The users of digital technologies and Internet should practice right etiquette while
chatting, blogging and using social media as a respect to people and groups who are
going to watch, communicate and use the Internet.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information
14. The users of digital technologies and Internet should understand the national and
local cultures in digital information shared and to be shared.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information
15. Personal digital ethics is group ethics that practices an online platform like social
networks which collect sensitive information about users.
a. no answer b. false c. true d. maybe
3
What’s In
We already learned about a digital device. A digital device is a physical unit of equipment
that contains a computer or microcontroller which uses discrete, numerable data and
processes for all its operations. Today, myriad devices are digital including a smartphone,
tablet and smartwatch. This is an electronic device that can receive, store, process or send
digital information.
Activity to Review the Previous Lesson
Self-Check
Write D if the tool is a Digital Device or A for Analog Devices. Write your
answer in a separate sheet of paper.
4
What’s New
This activity will help you remember the lesson for today.
Read and understand the poem Cyber Sense from Canada Centre for Digital and
Media Literacy.
CyberSense
//I have a special secret,
\\ Whenever I’m online -
// I don’t share with others
\\ The things that are just mine.
//My e-mail and my home address,
\\ My phone number and name -
// These are just for me to know,
\\In chat rooms or in games.
//Instead, I use my nonsense name -
\\It’s my online identity!
// When people ask me who I am,
\\I introduce my “cyber-me.”
// And when I want to surf the Web,
\\ for places that are cool,
//I get some help from mom or dad,
\\ or teachers from my school.
3. What are the values that you can derive from the poem? Explain
5
What Is It
In this time of digital technology, the interconnecting devices brought by the
Internet and digital devices connect networks via Wi-Fi, Bluetooth, cellular networks
or Near Field Communication (NFC) with integrated cameras, the ability to place and
receive voice and video telephone calls, video games, and Global Positioning
System (GPS) capabilities make information and communication accessible to a
global world.
It is high time for learners to use digital devices. Digital devices are electronic
inventions that have the computer or a micro-computer to be used for storing data for
people consumption and information. Some examples of these digital devices are
computers, mobile phones, and the Internet.
During the time of the pandemic, digital technology and the Internet play
important roles and have become important tools in the learning process. These
tools give opportunities, make our life easier but at the same time have a profound
ethical implication. Digital ethics is important for learners to know the good and right
ways to use the Internet and other digital technologies.
Digital ethics comes in two words digital and ethics. Digital from Merriam Webster is
the use of electronic devices that is relating to, using to, or storing data for
information. Ethics is a set of rules or behavior based on ideas about what is morally
good and bad behavior. So with the two combined words, Digital Ethics are the
rules applied to the users (individual and group) of computer devices when using the
Internet. Digital ethics also refers to treating and resolving issues that encompass
how user’s groups and individuals in online environments interact with each other
and the technologies and platforms they used to engage.
Personal digital ethics covers how individual users honor one another’s right to
self-determination online concerning privacy and ownership. These are ways of
interpersonal conduct on the online communication between one person to another
person on the use of the Internet through their computer devices.
The following are examples of respect for privacy and ownership in the digital
environment:
1) It is commonly polite if you ask consent from an individual who shares a good
picture or sayings for you to use.
2) Giving recognition to the person by citing his/her work.
Corporate digital ethics is a group ethics that practices on an online platform like
social networks which collect sensitive information about users. This is more
concentrated in an online business or companies users’ agreement upon the matter
of how arcane, sale of user data other information should preserve it secrecy and
privacy of such individual and company. A sample of this is advertising one’s product
online as a necessary platform for products information.
6
Types of users’ ethical behavior of digital technology
Technology ethics are values that can be used to govern digital technology including
factors such as risk management and individual rights. The following are common
areas of digital technology ethics.
7
• Culture can be described as the set of shared values, beliefs and
norms that influence the way individuals within it think, feel and
behave. Values especially, are important as they articulate and
7. Promote an provide an excellent digital experience or ‘excellence through
ethical culture innovation and teamwork.
1. Digital plagiarism- Plagiarism is the act of copying someone else's work and
publishing it as your own. This includes text, media, and even ideas. Whenever
another person's work is copied and republished without an appropriate reference
or citation, it is considered plagiarism. Examples of plagiarism range from small
infractions such as not putting quotes around a quotation to blatant violations
such as copying an entire website. Plagiarism is the act of copying someone
else's work and publishing it as your own.
2. Breaking copyright and software theft- Software theft means the unauthorized
or illegal copying, sharing, or usage of copyright-protected software programs.
Software theft may be carried out by individuals, groups, or, in some cases,
organizations that distributed unauthorized software copies to users.
Copyright theft without permission for a usage where such permission is required,
thereby infringing. The copyright holder is typically the work's creator, or a
publisher or other business to whom copyright has been assigned.
8
interference, cybersquatting, Computer-related Identity Theft, Cybersex, Child
Pornography, and others.
4. Protecting personal
information: Protection of the
personal information of every user
is the right to privacy. Digital
information of an individual is the
right of the user at their disposal.
Personal information should be
protected during data gathering.
9
What’s More
This activity will help you master the topics discussed earlier.
A. Match column A with column B. Write the letter of the correct answer on the blank
before each numberon a separate sheet of paper.
A B
_____1. Being transparent means that A. Access Rights
organizations must state their intentions
regarding data usage and allow their
customers to provide their consent.
10
_____8. Sloppy writing in online forums, H. Maintain dignity and respect
device distraction while in conversation,
and sending of unsolicited emails are a
few examples.
B. Complete the diagram below and give the meaning of each unethical behavior
towards digital technology. Write answers on a separate sheet of paper.
1.
Breaking
copyright
and
software
theft
2.
Digital
plagiarism
3.
Computer
fraud
4.
Improper
use of
digital
resources
11
What I Have Learned
This activity will enrich your understanding of mobile devices.
True or False: Read each statement below carefully. Write T if you think the
statement is TRUE. Write F if you think the statement is FALSE. Write your answer
on a separate sheet of paper.
_____1. Personal digital ethics cover how individual users honor one another’s right
to self-determination, online privacy and owner.
_____2. Accountability is powering technology as a right or freedom.
_____3. Interpreting information in a way that confirms their beliefs, hypotheses, or
expectations and dismisses opinions and information that are contrary to
one's belief is not being biased.
_____4. Values are important as they articulate an excellent digital experience.
_____ 5. Ethical practices must also ensure that employees demonstrate respect to
the public and users.
_____ 6.Computer fraud and an act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system are not considered as
cybercrime.
_____ 7. The users of digital technologies and the Internet should not practice the
right etiquette while chatting, blogging, and using social media.
_____ 8. The users of digital technologies and Internet should not be avoiding
identity misrepresentation and fraud.
_____ 9. Knowing the national and local cultures should flourish and be respected in
the use of the Internet and digital technologies.
_____ 10. Digital ethics includes the method of treating and resolving issues that
encompass how user’s groups and individuals in online environments
interact with each other and the technologies and platforms they have used
to engage.
12
What I Can Do
This part is the application of what you have learned in this module.
1. ______________________________________
2. ______________________________________
3. ______________________________________
4._______________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Rubrics:
4 – 3 complete sentences related to the topic
3 – 2 complete sentences related to the topic
2 – 1 complete sentence/s related to the topic
1 – writes sentence/s not related to the topic
13
Post-Assessment
This activity will measure how well you have understood the topics
discussed in this module.
Read each item carefully and write the letter of the correct answer on a
separate sheet of paper.
2. Mobile devices are powerful enough to do many of the same things you can do
with a desktop computer.
a. no answer b. false c. true d. maybe
5. This upholds the principle that its integrity must be assured if it is to be of value to
consumers.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect
6. This can be accomplished by avoiding deception and being fair, but can also be
conveyed through engaging users.
a. Promote trust c. Design for privacy
b. Promote an ethical culture d. Maintain dignity and respect
7. This collects and manages data which must uphold the principle that its integrity
must be assured if it is to be of value to consumers.
a. Promote trust c. Make use of netiquette
b. Promote an ethical culture d. Maintain dignity and respect
14
9. This is a range from small infractions such as not putting quotes around a
quotation to blatant violations such as copying an entire website.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud
10. This is a cybercrime and the act of using a computer to take or alter electronic
data, or to gain unlawful use of a computer or system.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud
11. Corporate digital ethics covers how individual users honor on another’s right to
self-determination online with respect to privacy and ownership.
a. no answer b. false c. true d. maybe
12. This is a digital information and technology that is used in a wrong way by the
user such as using technology to slander, gossip, show scandals and many more.
a. Digital plagiarism c. Improper use of digital resources
b. Breaking copyright and software theftd. Computer fraud
13. The users of digital technologies and Internet should practice right etiquette while
chatting, blogging and using social media as a respect to people and group who are
going to watch, communicate and use the Internet.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information
14. The users of digital technologies and Internet should understand the national and
local cultures in digital information shared and to be shared.
a. Sensitivity to national and local cultures
b. Avoiding identity misrepresentation and fraud
c. Internet etiquette while chatting, emailing, blogging, and using social media
d. Protecting personal information
15. Personal digital ethics is a group ethics that practices an online platform like
social networks which collects sensitive information about users.
a. no answer b. false c. true d. maybe
15
Additional Activities
This activity will show the strength of your understanding on the lesson given
in this module.
Draw comic strips demonstrating the respectful ways of using the Internet.
Justify your answer with 3 (three) reasons/ sentences. Write your answer in a
separate sheet if necessary.
____________________________________________
__________________________________________________
__________________________________________________
______________________________________________
Rubrics:
Criteria Points
10 7 5 1
Explanation 3 complete 2 complete 1 complete Sentence/s
sentences sentences sentence not related to
related to the related to the related to the the topic
topic topic topic
Drawing Creatively Enhances Balanced, Not balanced,
enhances information uncluttered, cluttered,
information adequate insufficient
white space white space
Total
16
Answer Key
What I What’s in What’s new What’s more
know
1. d 1. d 1. The use of digital A. B.
2. c 2. d devices and internet 1. F 1. Software theft means the
3. d 3. a by the individual user. 2. H unauthorized or illegal copying,
4. a 4. a 2. The poem is nice 3. C sharing or usage of copyright-
5. a 5. d related to my 4. A protected software programs.
6. d 6. d experience that using 5. E 2. Plagiarism is the act of copying
7. a 7. d the internet I used 6. G someone else's work and publishing
8. c 8. a other name. 7. B it as your own. This includes
9. a 9. a 3. The values that I 8. I text, media, and even ideas.
10. d 10. a have learned is be 9. D Whenever another person's work is
11. b careful in the use of copied and republished without an
12. c internet, needs parent appropriate reference or citation, it is
13. c guidance and keep considered plagiarism.
14. c your secrets. 3. Computer fraud is a cybercrime
15. b and the act of using a computer to
take or alter electronic data, or to
gain unlawful use of a computer or
system.
4. Digital information and technology
used in a wrong way by the user
such as using technology to slander
scandals and many more.
What I have What I can do
learned
1. T A B C. This is the use of electronic
2. F 1. Access Rights 1. Digital plagiarism devices that is using to and storing
3. F 2. Accountability 2. Breaking data for information using rules of
4. T 3. Beware of Bias copyright and behavior based on ideas about
5. T 4. Digital Rights Software theft what is morally good. This
6. F 5. Promote trust 3. Improper use of interconnecting devices brought by
7. F 6. Design for privacy digital resources the internet and digital devices
8. F Security and integrity 4. Computer Fraud connect networks use in right way.
9. T 7. Promote an ethical This refers to the method in relating
10. T culture treating and resolving issues that
8. Maintain dignity and encompasses how individuals
respect interact in good ways with each
9. Make use of netiquette other.
17
References
https://www.google.com/search?q=digital+ethics+picture
http//www.bing.com/search?q=degital+devices+definition&qs
https://www.process.st/digital-ethics/
https://www.pcmag.com/encyclopedia/term/digital-device
https://www.reference.com/history/digital-devices
https://clipground.com/images/communication-technology-clipart
https://www.bing.com/images/search?view=detailV2&ccid
https://ictlounge.com/Images/analogue_devices
https://mediasmarts.ca//sites/default/files/pdfs
https://www.learnersdictionary.com
https://www.lifewire.com/what-are-digital-ethics
https://writingcommons.org/article/digital-ethics
https://www.pagecentertraining.psu.edu/public-relations-ethics/digital-
ethics/why-digital-ethics
https://www.consultancy.uk/news/16602/the-top-five-ethical-moral-principles
https://simplicable.com/new/technology
https://www.techopedia.com/definition/22203/software-theft
https://en.wikipedia.org/wiki/Copyright_infringement
https://techterms.com/definition/plagiarism
https://en.wikipedia.org/wiki/Computer_fraud
https://online.nwmissouri.edu/articles/education/ethics-technology-use-
classroom
https://www.ipophil.gov.ph/copyright/
18