Module 8 & 9 Zairah Abila [PDF]

  • 0 0 0
  • Gefällt Ihnen dieses papier und der download? Sie können Ihre eigene PDF-Datei in wenigen Minuten kostenlos online veröffentlichen! Anmelden
Datei wird geladen, bitte warten...
Zitiervorschau

MODULE 8 FINANCIAL LITERACY LEARNING OUTCOMES 1. 2. 3. 4. 5. 6. 7.

Define financial literacy Distinguish among financial plan, budgeting, saving, spending and investing Present ways on how to avoid financial crises and scams Demonstrate understanding of insurance and taxes Describe a financially stable person Determine ways on how to integrate financial literacy in the curriculum Draw relevant life lessons and significant values from personal experiences on financial crises and scams 8. Analyze research abstract on financial literacy and its implications to the teaching learning process 9. Make a personal financial plan based on short-term and long-term goals.

INTERACTIVE PRESENTATION Deal or No Deal. This is an interactive activity adapted from a TV game show segment which entails a student to pick any of the briefcases containing an amount and he/she then, takes deal or no deal with the banker’s offer against the amount in the briefcase. Procedure: 1. The teacher will choose 10 students who will prepare different amounts written in 10 folders that will serve as briefcases. 2. During the game, the class will choose a player. 3. While playing the “Deal or No Deal” with background music downloaded from the internet, the player will choose the briefcase to be opened to see the amount. 4. The selection of briefcases to be opened shall continue until only the last three remain. 5. Then, the teacher will say, “The banker has an offer”. 6. There will be biding of amount offered by the banker in lieu of opening their remaining brief cases by player. 7. The last briefcase will be opened and find out if the banker’s offer is higher than the amount in the chosen last briefcase. 8. There shall be a reflection in the class by asking “What will you do if banker will offer an amount of money”. The teacher will generate answer from the students. CONCEPT EXPLORATION In some instances, teachers are confronted with issues and concerns on financial debt, being victimized by fraud and other related scams, but personal and electronic ways. More so, some teachers are drowned by emergent financial need and unexpected debt, especially in

difficult times, sickness and inevitable circumstances and calamities. Others do not prepare for their retirement that they usually end up highly frustrated. This is the reason why financial literacy has been a subject in many faculty developments programs, seminars and even becomes a topic for researches, while many schools have integrated it in the curriculum. FINANCIAL LITERECY Financial literacy is a core life skill in an increasingly complex world where people need to take charge of their own finances, budget, financial choices, managing risks, saving, credit, and financial transactions. Poor financial decision can have a long-lasting impact on individuals, their families and the society caused by lock of financial literacy. Low levels of financial literacy are associated with lower standards of living, decreased psychological and physical well-being and greater reliance on government support. However, when put into correct practice, financial literacy can strengthen savings behavior, eliminate maxed-out credit cards and enhance timely debt. Financial literacy is the ability to make informed judgement and make effective decisions regarding the use and management of money. Hence, teaching financial literacy yields better financial management skills. The importance of starting financial literacy while still young. National surveys show that young adults have the lowest level of financial literacy reflected in their inability to choose the right financial products and lack of interest in undertaking sound financial planning. Therefore, financial education should begin as early as possible and be taught in schools. Akdag (2013) stressed that in the recent financial crisis, financial literacy is very crucial and tends to be advangeous if introduced in the very early years as preschool years. Financial education is a long-term process and incorporating it into the curricula from an early age allows children to acquire the knowledge and skills while building responsible financial behavior throughout each stage of their education (OECD,2005). Likewise, financial literacy is the capability of a person to handle his/her assets, especially cash more efficiently while understanding how many works in the real world. FINANCIAL PLAN Teachers need to have a deeper understanding and capacity to formulate their own financial plan. It is wise to consider starting to plan the moment they hand in their first salary, including the incentives, bonuses and extra remunerations that they receive. Kagan (2019) defines a financial plan as a comprehensive statement of an individual’s long-term objectives for security and well-being and detailed savings and investing strategy for achieving the objectives. It begins with a thorough evaluation of the individual’s current financial state and future expectations. The following are steps in creating a financial plan.

1. Calculating net worth. Net worth is the amount by which assets exceed liabilities. In so doing, consider (1) assets that entail one’s cash, property, investments, savings, jewelry and wealth; and (2) liabilities that include credit card debt, loans and mortgage. Formula: total assets-minus total liabilities = current net worth. 2. Determining cash flow. A financial plan is knowing where money goes every month. Documenting it will help to see how much is needed every month for necessities, and the amount for savings and investment. 3. Considering the priorities. The core of a financial plan is the person’s clearly defined goals that may include: (1) Retirement strategy for accumulating retirement income; (2) comprehensive risk management plan including a review of life a life and disability insurance, personal liability coverage, property and casualty coverage, and catastrophic coverage; (3) Long-term investment plan based on specific investment objectives and a personal based on specific investment objectives and a personal risk tolerance profile; and (4) Tax reduction strategy for minimizing taxes on personal income allowed by the tax code. Five Financial Improvement Strategies Financial literacy shapes the way people view and handle money. The following are financially improvements suggested by Investopedia as a journey to financial literacy. 1. Identify your starting point. Calculating the net worth is the best way to determine both current financial trouble by spending too much on wants and nothing enough for the needs 2. Set your priorities. Making a list of rated needs and wants can help set financial priorities. Needs are things one must have in order to survive ( i.e food, shelter, clothing, healthcare and transportation); while wants are things one would like to have but are not necessary for survival. 3. Document your spending. One of the best ways to figure out cash flow or what comes in and what goes out is to create a budget or a personal spending plan. A budget list down all income and expenses to help meet financial obligations. 4. Lay down your debt. Leaving with is costly not just because of interest and fees but it can also prevent people from getting ahead with their financial goals. 5. Secure your financial future. Retirement is an uncontrollable stage in a worker’s life, of which counterpart are loosing their job, suffering from an illness or injury, or to be forced to care for a loved one that may lead to an unplanned retirement. Therefore, knowing more about retirement options is an essential part of securing financial future. Financial Goal Planning and Setting Setting goals is a very important part of life, especially in financial planning. before investing the money, consider setting personal financial goals. Financial goals

A.

B.

C.

D.

are targets, usually driven by specific future financial needs, such as saving for a comfortable retirement, sending children to college, enabling a home purchase. There are three key areas in setting investment goals for consideration. Time horizon. It indicates the time when the money will be needed. To note, the longer the time horizon, the more risky ( and potentially more lucrative) Investments can be made. Risk tolerance. Investors may let go of the possibility of a large gain if they knew there was also a possibility of a large lost ( they are called risk averse); While others are more willing to take the chance of a large loss if there were also a possibility of a large gain (they are called risk seekers). The time horizon can affect risk tolerance. Liquidity needs. Liquidity refers to how quickly an investment can be converted into cash ( or the equivalent of cash) The liquidity needs usually affect the type of chosen investment to meet the goals. Investment goals: Growth, income and stability. Once determined the financial goals and how time horizon, risk tolerance, Liquidity needs affect them, it is time to think about how investments may help achieve those goals. When considering any investment, think about what it offers in terms of three key investment goals: (1) Growth ( also known as capital appreciation) is an increase in the value of an investment; (2) Income, of which some investments make periodic payments of interest or dividends that represent investment income and can be spent or reinvested; (3) Stability, or known as capital preservation or protection of principal. An investment that focuses on stability concentrates less on increasing the value of investment and more on trying to ensure that it never loses value and can be taken when needed. Budget and Budgeting A budget is an estimation of revenue and expenses over a specified future period of time and is usually compiled and re-evaluated on a periodic basis. Budgets can be made for a variety of individual or business needs or just about anything else that makes and spends money. Budgeting on the other hand is the process of creating a plan to spend money. Creating this spending plan allows one to determine in advance whether he/she will have enough money to do things he/she needs are likes to do. Thus, budgeting ensures to have enough money for the things needed and those important ones and will keep one out of debt. Seven Steps to Good Budgeting The following are seven steps that may help in attaining good budgeting. Step 1: Set realistic goals. Goals for the money will help makes smart spending choices upon deciding on what is important

Step 2: Identify income and expenses. Upon knowing how much is earned each month and where it all goes, start tracking the expenses by recording every single cent. Step 3: Separate needs from wants. Set clear priorities and decisions become easier to make by identifying wisely those that are not really needed or just wanted. Step 4: Design your budget. Make sure to avoid spending more that what is earned. Balance budget accommodate everything needed to be paid for. Step 5: Put your plan into action. Match spending with income time. Decide ahead of time what will you use each pay day. Non-reliance to credit for the living expenses will protect from one debt Step 6: Plan for seasonal expenses. Set money aside to pay for unplanned expenses so to avoid going into debt. Step 7: Look ahead. Having a stable budget can take a month or two so, as for help if things are not getting well. Spending If budget goals serve as a financial wish list, a spending plan is a way to make those wishes a reality. Turn them into an action plan. The following are practical strategies in setting and prioritizing budget goals and spending plan 1. Start by listing your goals. Setting budget goals requires forecasting and discussing future needs and dreams with the family. 2. Divide your goals according to how long it will take to meet each goal. Classify your budget goals into three categories: Short term goals ( less than a year), medium term goals ( one to five years ) and long term goals ( more than five years). Short term goals are usually the immediate needs and wants; Medium term goals are things that you and your family want to achieve during the next five years; and long term goals extend well into the future, such as planning for retirement 3. Estimate the cost of each goal and find out how much it costs. Before assigning priority to goals, it is important to determine the cost of each goal. The greater the cost of goal, the more alternative goals must be sacrificed in order to achieve it 4. Project future cost. For short term goals, inflation is not a big factor, but for medium and long term goals, it is a big factor to calculate the future cost of the goals, there is a need to determine the rate of inflation applied to each particular goal

5. Calculate how much you need to set aside each period. Upon knowing the future cost of the goals, next is to determine how much to put aside each period to meet all the goals 6. Prioritize your goals. Upon listing down all the goals and the estimated amount needed for each goal, prioritize them. This serves as guide in decision making 7. Create a schedule for meeting your goals. It is important to lay down all the goals according to priority with the corresponding amount of money needed, the time it will be needed, and the installments needed to meet the goals.

Investment and Investing As teachers, when you have saved more money than what you expect at a time of need, consider investing this money to earn more interest than what your savings account is paying you. There are many ways you can invest your money but consider four aspects: 1. How long will you invest the money? (Time Horizon) 2. How much money do you expect your investment to earn each year (Expectation of return) 3.How much of your investment are you willing to lose in the short term in order to earn more in the long term? (Risk Tolerance) 4. What type of investments interest you? (Investment type) Savings In order to get out of debt, it is important to set some money aside and put it into a savings account on a regular basis. Savings will also help in buying things that are needed and wanted without borrowing. Emergency savings fund. Start as early, setting aside little money for emergency savings fund if you receive a bonus from work, an income tax refund or earnings from additional or side jobs, use them as an emergency fund. 10 Reasons why save money With credit so easy to get here are why practical reasons why it is important to save money that everyone, including teachers must know. 1. To become financially independent. Financial independents is not having to depend on receiving a certain pay but setting aside an amount to have savings that can be relied on. 2. To save on everything you buy. With savings, you can buy things when they are on sale and can make better spending choices without being compromised on credit card interest charges.

3. To buy a home or a car. Savings can be used in buying a home in full or down payment, especially in times of promo deals, bids and inevitable sale and at a reasonable interest rate. 4. To prepare for the future. Through savings, you can be confident to face the future without worrying on how you will survive 5. To get out of debt. If you want to get out of debt, you have to save money 6. To augment annual expenses. In order to attain a good stress-free financial life, there is a need to save for annual expenses in advance. 7. To settle unforeseen expenses. Savings can respond to unforeseen expenses in times of need. 8. To respond to emergencies. Emergencies may happen any time and these can be expensive so, there is a need to get prepared rather than potentially become another victim of an emergency. 9. To mitigate losing your job or getting hurt. Bad things can happen to anyone, such as losing a job, business bankruptcy or crisis being injured or becoming to sick to work. Therefore, having savings is the key to resolve such a dilemma 10. To have a good life. Putting aside some money to spend when needed can bring about quality and worry-free life at all times. Common Financial Scams to Avoid Financial Fraud can happen to anyone, including the teachers at any time. While some forms of financial fraud, such as massive data breaches, are out of one’s control, there are many ways to proactively get rid of financial scams and identify theft. Here are some of the most common financial scams, along with ways to identify them early and how to protect one’s from being victimized A. Phishing. Using this common tactic, scammers send an email that appears to come from a financial institution, such as a bank and asks you to click on a link to update your account information. If you receive any correspondence that asks for your information, never click on the links or provide account details. Instead, visit the company’s website, find official contact information, and call them to verify the request. B. Social Media scams. Scammers are adept at using social media to gather information about the traveling habits of potential victims. They also have phishing tactics, including posts seeking charity donations with bogus links that allow them to keep your money. Therefore be conscious of the

information you post online, especially personal details and plans for a vacation that you would leave your house unoccupied. C. . Phone Scams. Another prevalent tactic is scamming phone calls. The scammers pose as a government agency, such as the Bureau of Internal Revenue or local law enforcement agencies, and use scare tactics to acquire your personal information and account numbers. Never provide your account information over the phone. Look for the agency’s contact information, and call them to verify any request. To note, government agencies will never text or call you to ask for money. D. Stolen Credit card numbers. There are numerous ways that scammers can obtain your credit card information, including hacking, phishing, and the use of skimming devices, such as small card readers a touch to unmanned credit card readers (I.e ATMs, gas pumps, and more). These small devices pull data from your card when you swipe it. Before you use an atm or swipe your card, look for suspicious devices that maybe attached to the card reader. E. Identify Theft. Depending on the amount information, a scammer is able to obtain, identify theft may extend beyond an authorized charges on a debit or credit card. If a scammers are able to obtain your social security number, date of birth and other personal information, they maybe able to open new accounts with your name without your knowledge, be aware of an information you share and with whom and always shared sensitive information before disposing it. By taking preventative measures and being aware of scams, you can minimize the risks of fraud. Monitoring your online or mobile banking accounts daily can also help you see fraudulent charges quickly. 10 Tips to Avoid Common Financial Scams Every year, fraud cases are getting worse, leaving countless victims in trouble and danger through data breaches, identify theft and online scams unfortunately new and improve technology only gives fraudsters an edge, making it easier than ever for scam artists to nab financial data from unsuspecting consumers (Bell, 2019). 1. Never wire money to a stranger. Although it is one of the oldest internet scams, there are still consumers to fall for this rip-off or some variations of it. 2. Don’t give out financial information. Never reveal sensitive personal financial information to a person or business you don’t know, thru phone, text or email. 3, Never click on hyperlinks in emails. If you receive an email from a stranger or company asking you to click on a hyperlink or open an attachment and then, enter your financial information, delete the email immediately

4.Use difficult passwords. Hackers can easily find password that are simple number combinations. Create passwords that are at least 8 characters long and that include lower and uppercase letters, numbers and special characters. You should also use a different password for every website you visit. 5. Never give your social security number. If you receive an email or visit a website that ask your social security number, ignore it. 6. Install anti-virus and spyware protection. Protect the sensitive information stored on your computer by installing anti-virus, firewall and spyware protection. Once you install the program, turn on the auto updating features to make sure the software is always up to date. 7. Don’t shop with unfamiliar online retailers. When it comes to online shopping, only do business with familiar companies. When purchasing a product from an unfamiliar retailer, do some research to ensure the business is legit and reputable. 8. Don’t download software from pop-up windows. When you are online, do not trust pop-up windows that appear and claim your computer is unsafe. If you click on the link in the pop-up to start the “systems scan “or some other programs, malicious software known as “malware” could damage your operating system. 9. Make sure the websites you visit are safe. Before you enter your financial information on any website, double-check the websites privacy rules. Also, make sure the website uses encryption, which is usually symbolized by a lock to the left of the web address which means it is safe and protected against hackers. 10. Donate to known charities only. If you receive a call or an email for solicitations of charity donations, critically examine it. Some scammers create bogus charities to steal credit card information. Financial Scams among Students. Students can also be susceptible to different financial scams and fraud. Learning how to manage finances and being aware and financial scams are skills that every student should master. The following are common financial scams that students should watch out for, and learn to protect one’s identity and finances. A. Fake Scholarships While it is beneficial for students to apply for as many scholarships as they can, it is important that they are aware of the scholarship related financial scams. Student should thoroughly check scholarship sources before applying to verify that they are legitimate. Never apply for a scholarship that asks for money in return. B. Diploma Mills Diploma or degree mills are colleges that offer fake degrees and diplomas in exchange for a fee. Check from government education

agencies the prospective school to enroll in if it is government – recognized legitimate or accredited. C. Online book scams While college students often search high and low for the best deals on textbooks, online book sites can be an easy way for scammers to get students’ credit card information. When buying anything online, be sure that you are shopping on a credible site before entering your personal and financial information. D. Credit card scams Oftentimes credit card companies go to college campuses to attempt to get students to fill out credit card applications. While many credit card companies who market to college students are genuine businesses, others are scammers who utilize applications to steal students’ information. Avoid being scammed by going to your local credit union or bank to get a credit card. Also, regularly check your credit card statement. If you see any charges that you do not recognize, contact your banking institution immediately.

Insurance and Taxes Insurance is a contract (In the form of a policy between the policy holder and the insurance company, whereby the company agrees to compensate for any financial loss from specific ensured events. In exchange for the financial protection offered, policy holder agrees to pay a certain sum of money, known as premiums to the insurance company. Insurance is the best form of risk management against uncertain loss. There are various types of insurance to choose from, such as life insurance, health insurance, motor insurance, property insurance, business insurance and etc. Besides, the financial protections derived from insurance entails, tax benefit, claim on the paid premiums. The following are concepts related insurance and taxes but every teacher should know. However he/she carefully analyze and critically examine well before pursuing any deal with them. 1. Employer- Sponsored Insurance. If working in a company with 50 or more full -time employees. The employer is required to provide employee – only insurance that meets minimum guidelines. Examine the plan offered, but do not pay over 9.66% of household income in premiums. 2. Marketplace Plans. Marketplace Plans are available based on an area of residence and income upon meeting minimum coverage requirements. Marketplace plans come in three tiers: Bronze, silver and gold. Generally bronze plans offer the least coverage at the lowest premiums while gold plans provide the most coverage at the highest price. Life insurance. Life insurance is a type of insurance that compensates beneficiaries upon the death or the policyholder. The company will guarantee a payout for the beneficiaries in exchange of premiums. This compensation is

called “death benefit." Depending on the type of insurance one may have. these events can anything from retirement. to major injuries. to critical illness or even to death. The following are common risk categories: 1. Preferred Plus -The policyholder is in excellent health. With normal weight. no history of smoking. chronic illnesses, or family history of any lifethreatening disease. 2. Preferred - The policyholder is in excellent health but may have minor issues on cholesterol or blood pressure but under control. 3.Standard Plus - The policyholder is in very good health but some factors, like high blood pressure or being overweight impede a better rating. 4.Standard- Most policyholders belong to this category, as they are deemed to be healthy and have a normal life expectancy although. they may have a family history of life-threatening diseases or few minor health issues. 5.Substandard — Those with serious health issues. like diabetes or heart disease are placed on a table rating system, ranked from highest to lowest. On average, the premiums will be similar to Standard with an additional 25% lower claim on table ratings. 6. Smokers - Due to an added risk of smoking, the policyholders this category are guaranteed to pay more. Aside from health age is also a critical factor in determining premiums. Benefits of Life Insurance The following are the benefits of life insurance. 1. It pays for medical and funeral costs. Life insurance helps the incurred expenses for medical and funeral services to I the grief among family and relatives for being unprepared. 2. For financial support. Life insurance can become a source temporary income during the difficult period of adjusting coping with the loss of a loved one, especially if he/she is the breadwinner. 3.For funding various financial goals. Life insurance additional benefits through the form of fund accumulation for specific future financial goals. 4. Acts as a retirement secured conform. Modern life insurance also serves as a tool that principal holders can use to get in a better financial position in the future. 5. It covers costs incurred from taxes and debt. Life insurance can serve as protection since (he premium can be used to pay for unsettled debts and taxes. Types of Life Insurance The table below shows a comparative analysis of different types of life insurance along characteristics, advantages and disadvantages that may serve as a reference.

Type

Characteristic

Advantage

Disadvantage

1. Endowment

2. Term

3. Whole Life.

4. Variable Universe life (VUL)

It grants a lump sum after a specified amount of time or upon death. The policy owner is required to pay the premium for a predetermined number of years or until a specific age is reached. It is the simplest form of life insurance to obtain, of which upon death, the beneficiaries are paid with the benefit

It allows for saving up for specific purposes. It guarantees returns upon maturity. It offers some form of insurance coverage. It entails low premium requirements. It is a strong option for policyholders who need insurance but cannot afford whole life or endowment.

It is easy to understand It provides coverage It offers permanent for the policyholder's protection for full entire life or until they life for 100 years. reach 100 years old. It is flexible in terms It acts both as of payments of protection and savings premiums. mechanisms since a portion of the It entails fixed premium is allocated premiums. to build up cash values. It usually comes with additional features and "living" benefits. It serves as both fire It takes dual protection and purpose: Life investment vehicle in insurance plus one package. A investment tool. portion of the premium is allocated It has no maturity into various age.

It requires higher premiums than other types of life insurance. It is not the best option for those looking at full life protection It has no benefit if policyholder outlives the term period set. Premium usually gets higher upon renewal of terms.

It requires higher premium. It is difficult to understand due to complexity.

Cash values and dividends are not guaranteed. Face amount and death benefit are dependent on

investment vehicles for the purposes of wealth creation. The contract's earnings are based on the performance of selected investments.

The cash value is payable along with the assured sum. The death component is not limited to face value.

investment performance. It includes various investment fees.

It depicts liquidity, wherein funds can be accessed in times of need and can serve as emergency funds. Financial Stability Like anyone else, teachers also aim to become financially stable if not today, maybe in the future. Being financially stable means confidence with the financial situation, worriless paying the bills because of available funds, debt-free, money savings for future goals and enough emergency funds. Financial stability is not about being rich but rather more of a mindset. It is living a life without worrying about how to pay the next bill, and becoming stress-free about money while focusing energy on other parts of life (Silva, 2019). 10 Strategies in Reaching Financial Stability Just like any goal, getting the finances stable and becoming financially successful requires the development of good financial habits. Babauta (2007) suggests 10 habits toward financial stability and success. 1. Make savings automagical. Savings should be made a top priority, especially as an emergency fund and a bill payment from the amount are automatically transferred from the checking account, like an online savings account. 2. Control your impulsive spending. Control yourself from impulsive spending on eating out, shopping and online purchases that may ruin your finances and budget. 3. Evaluate your expenses and live frugally. Analyze spend your money, see what you can reduce and determine expenses that are necessary and eliminate the unnecessary 4. Invest in your future. start preparing and investing for your future retirement while still young in your career field. 5. Keep your family secure. Save for an emergency fund, so you have something to spend if anything happens with the family

6. Eliminate and avoid debt. Eliminate credit cards, personal loans, or other debt forms as it will not work on you but even pull you down and make you drowned with obligations that may even resort to surrendering your properties, jewelry and investments as payment. 7. Use the envelope system. Set aside three amounts in your budget each payday, withdraw those amounts and put them in three separate envelopes. In that way, you can easily track how much remains for each of the expenses or if you already run of money. 8. Pay bills immediately. One good habit is to pay bills as soon as they come in and try to get your bills to be paid through automatic deduction. 9. Read about personal finances. The more you educate yourself, the better your finances will be. Look to grow your net worth. Do whatever you can to improve your net worth, either by reducing your debt, increasing your savings, or increasing your income, or all of the above. Signs of Being Financially Stable Teachers, like anyone else, often work to the extent to earn more even through additional jobs on the side just for their desire for financial stability. Rose (2019) presents some signs of a financially stable person. 1. You never overdraw your checking account. 2. You don't lose sleep over finances. 3. You use credit cards for convenience and rewards but out of necessity. 4. You don't worry about losing your job. 5. You pay your bills ahead of time. 6. People ask your opinion about financial matters and inspire them. 7. You're generally happy with your financial situation. 8. You finance your cars over five years or less if you take loans at all. 9. You contribute more to your retirement. 10. You don't feel guilty when you're out for special occasions. 11. You can afford to buy the things you really want. 12, Recreational spending doesn't appeal to you. 13. You're a natural saver. 14. You're generous with money when it comes to charities or helping others. 15. You're confident about your future. 16. Your net worth grows significantly from year to year.

17. You have substantial equity in your home. 18. You consistently live beneath your means. 19. You could survive for months without a paycheck. 20. You feel in control of your finances and never dominated by them. Integrating Financial Literacy into the Curriculum Financial education in schools should be part of a collaborative national strategy to ensure relevance and long-term sustainability. The education system and profession should be involved in the development of the strategy. In support, Barry (2013) underscored that financial literacy has a wide repercussion outside the family circle and more precisely, the school. Hence, administrators and professors need to develop a curriculum that would provide students insights on having the value of financial literacy including the effect it can bring them. Moreover, there should be a learning framework, which sets out goals, learning outcomes, content, pedagogical approaches, resources and evaluation plans. The content should cover knowledge, skills, attitudes and values. A sustainable source of funding should be identified at the outset. Financial education should ideally be a core part of the school Curriculum. It can be integrated into other subjects like mathematics, economics, social studies, technology and home economics, values education and others. Financial education can give a range of 'real-life' Contexts across a range of subjects. Teachers should be adequately trained and resourced, made aware of the importance of financial literacy and relevant pedagogical methods and they should receive continuous support to teach it or integrate in their lesson. More so, there should be easily accessible, objective, high quality and effective learning tools and pedagogical resources available to Schools and teachers that are appropriate to the level of study. Students' Pt0gress should also be assessed through various high impact modes.

QUESTIONS FOR DISCUSSION 1.What is financial literacy? Explain. 2. Differentiate budgeting, saving, spending and investing.

3. What are ways of avoiding financial scams? 4. How do you understand insurance and what type do you want to avail of? 5. When can we say that a person is financially stable? 6. How will you integrate financial literacy in the curriculum related disciplines? (The class may also consider doing a forum discussion by inviting resources persons who can discuss insurance plans, savings and investments.) RESEARCH ANALYSIS AND IMPLICATION Direction: Analyze the following research abstract and cite its implication on teaching-learning. You may download the full paper of research on the website given below. Financial literacy and financial planning among teachers of high education: A study on critical factors of select variables Surendar and Subramanya Sarma (2018) Abstract Teachers are the most influential people in our society. Apart from academics, they have the ability to positively affect many aspects of people's lives. By having financial literacy and managing personal finance properly, they can become role models to the students and help to develop fiscally and socially responsible citizens. An individual with good financial sense may plan better his/her personal finance' particularly teachers who are key contributors to the development society. In this background, this study has been conducted to the critical factors using factors analysis in enhancing the financial literacy levels and study their impact on select variables of financial planning among teachers of higher education. The study found the level of financial literacy among higher education teachers is satisfactory. It demonstrates the importance of contextual variables that may influence financial literacy and personal financial planning. It also explored the relationships among the select variables of financial literacy and personal financial planning using a methodology that is free from the influence of the attribute of the respondents. The study that the majority of higher education teachers have a high level of financial literacy, are aware of various aspects of personal financial planning and are able to plan on their own irrespective of their subject. It also revealed that retirement planning, tax planning and control, financial planning, financial capacity and inflation are critical factors in personal financial planning among them. Analysis 1: What are the critical factors in personal financial planning among higher education teachers? _______________________________________________________ ________________________________________________________________________ ________________________________________________________________________ Implication: 2. What is the impact of each of the factors on financial literacy and planning among teachers? __________________________________________________________

________________________________________________________________________ ________________________________________________________________________

FINANCIAL LITERACY  Financial literacy is the ability to make informed judgments and make effective decisions regarding the use and management of money.  A financial plan is a comprehensive statement of an individual's long-term Objectives for security and well-being that details savings and investing strategy for achieving those objectives based on an individual's current financial state and future expectations.  A budget is an estimation of revenues and expenses over a specified future period of time and is usually compiled and re-evaluated on a periodic basis while budgeting is the process of creating a plan to spend money.  The saved money will earn more, if it is invested upon understanding the essential factors, such as time horizon, an expectation of return, risk tolerance, and investment type.  It is equally important to have savings on a regular basis in order to get out of debt or buy things we want, and most of all, to keep an emergency fund in times of need.  Financial fraud may happen to anyone at any time, such as massive breaches, however, there are many ways to get rid of financial phishing, social media and phone scams, stolen credit card numbers identity theft.  Insurance, regardless of type, is a contract between the policyholder and the insurance company, whereby the company agrees to compensate for financial loss arising from specific insured events.  Being financially stable means confidence with the financial situation, paying of bills because of available funds, debt-free, money savings for future goals and enough emergency funds.  Financial literacy should be made part of the curriculum that should begin at the early age using a coordinated national strategy.

CURRICULUM APPLICATION Direction: Make a personal financial plan based on short-term and long-term goals. Use the template sample provided below.

Short-Term Goal 

Long-Term Goal

Target  Cost  Value

Target

Target Cost Value

Target Year1 Date

Date

SAVINGS PLAN Month 1

Month 2

Year2

Month 3

Year3

Month 4

Year4

Month 5

Year5

Total  Savings

Total Savings

BUDGET PLAN Outstanding Cash Income: EXPENSES

AMOUNT

1 2 3 4 5 6 TOTAL REMAINING CASH

BUDGET PLAN Outstanding Cash Income: RANK

BUDGETED ITEMS

General Expenses, Payable and House Share Allowance Bank Savings

AMOUNT

Emergency Fund (Cash available anytime) Insurance Investment (i.e Cooperatives, shares, business, etc.) Total

LET SAMPLERS: TAKING THE EXAMINATION  Read and analyze each item carefully, Choose the letter of the best answer. 

1. Surveys reveal that some teachers face their retirement without savings at hand which usually bring them to worse poverty scenario. What are the reasons behind this?  I. Culture of extended family dependency  II. Lack of priority on retirement preparation during earning career years III. Strong passion and value for the teaching profession  IV. Lack of value on their career effort and remuneration.  A. I and II only C. Il and IV only  B. II and III only D. I, II, Ill and IV  2. Who among the following would be mostly target victims of financial scammers? A. The rich and powerful  B. Tho generous and kind  C. The passive and submissive  D. The financially illiterate 

3. Which of the following strategies can teachers LEAST consider in preparing for their retirement?  A. Continuing professional development towards promotion and increment B. Sustain expenses relatively lower than salaries  C. Avail of life and retirement insurance  D. Frequent trips with grabbed promo fares and freebies  4. According to previous researches, teachers go into unreasonable debts and loans which eventually lead them to payables and unnecessarily leading them to surrender their ATM cards. Which financial factor is considered the least to affect this practice and its results?  A. Savings C. Compensation and fringe benefits 

B. Expenses D. Emergency funds  5. Why are people victimized by financial scams that end up to the loss of properties, investments and savings, and even to ruining their lives?  A. They have not learned in school how to avoid being scammed.  B. They desire for easy and quick money.  C. It is already their destiny that may happen anytime sketched in the palm of their lives.  D. It is always part of life and it is just that they are not enough to cope with it. Module 9: DIGITAL/CYBER LITERACY LEARNING OUTCOMES   1. Define digital/cyber literacy and cybersecurity   2. Elaborate on cyber citizenship   3. Determine netiquette and safety use of digital media   4. Identify common computer threats and the corresponding fixing solutions 5. Elucidate cyberbullying and cybercrimes 6. Examine Internet exploration, source citation, research and data gathering protocols and website evaluation   7. Cite how digital/cyberliteracy may be integrated 8. Draw relevant life lessons and significant values from personal experiences on digital risks and consequences 9. Analyze research abstract on digital/cyber literacy and its implications to the teaching learning process 10. Produce and evaluate a digital tool that may be utilized in the classroom  

INTERACTIVE PRESENTATION   Cross Sectional Dilemmatters Jury Trial: This activity is intended for students to analyze dilemmas. The points of view are supported by provisions, theories and frameworks. Then, groups present their propositions and analysis subjected to critiquing and assessment by other groups. It enhances critical thinking, analysis, objectivity, communication skills, collaboration and unity.   Procedure:   1. The students form four groups in class.   2. The teacher prepares dilemmas on mal-use, misuse and abuse of technology to be examined and analyzed by the students as an advanced assignment.  

3. Two groups will be given a dilemma to be resolved. Both groups will take their justifications and counter propositions on the issue just like a debate.   4. Members of the groups will share ideas and opinions regarding issues being raised. The members agree to common propositions and justifications based on their opinions supported by legal, philosophical and moral bases that they have researched on in advance.   5. The groups present their analysis and propositions and react to the opposing group's justifications in class. 6. Meanwhile, the other (remaining) two groups will serve both as audience and adjudicators. They will also analyze assess the given propositions of the presenting groups. 7. Therefore, the groups of adjudicators will also choose the that they will defend and justify against the opposing side. 8. Just like the two presenting groups, the two groups adjudicators will also debate on the issue by examining counter propositions of the opposing group upon presenting, their side. Therefore, two different sets of debating teams expected to perform. 9. The teacher clarifies and synthesizes the ideas and propositions given by the presenting groups, as Well as the defense and the critiquing made by the adjudicators. 10. The class will find time for a brief reflection on the activity. Samples of dilemmas to be resolved in class Dilemma No. 1: 1. The Bridgeton Academy conducted a United Nations activity by performing cultural presentations done in different including appropriate costumes and props. After students were fulfilled and they happily celebrated of their presentations through picture taking. A student, who served as leader of one of the groups, posted their picture online and put a hashtag (which was the name of the country that they presented) on it. All the while, the student became unaware of the impact of what he did that the picture online even reached the country mentioned in the given hashtag. This made the people in the said country react on the posted picture vehemently, for them, that was an insult and discriminator to their culture and race. Many citizens put their negative impressions, comments and ill statements against the pers who posted it while the rest responded in the thread. Th were searching for the school where the picture came from demanded for an apology to their nation and the people. How would you defend the sides of two involved in the issue the student who unintentionally posted the picture out of and the people who reacted to it? Dilemma No. 2: 2. After the swimming class, a student, who was given co by her classmate, took a video of the letter in the cc room while changing her swimsuit. Suddenly, the came out with the student's nude body and was view many, including her family and friends. Being affect such malicious scandal, the said student's family immediately confronted the school to hear explanations from those concerned. Upon investigation, they found out that the one who took the video, had mistakenly pressed the button of the cellphone marked "video share" that made it accessible to accounts registered in the contacts right away, which caused its intermediate spreading.

Who do you think has the main liability on this issue - the who allowed someone to take the video of her nude body or the one who caused its widespread? Justify. How should this matter be resolved? CONCEPT EXPLORATION Technology has been part of everyone's life, be it at home, in school, or anywhere with every facet of our undertaking. However, in many instances, we may not be aware that we have been misusing abusing it or in another way around, we may find ourselves being used by other people with their malicious motives using digital Therefore, we may end up being liable or a victim of such responsible kind of technological processing and utilization. It is in this case that we must gain further understanding and application of digital/cyber literacy, be it on personal or professional merit. Digital Literacy According to Wikipedia, digital literacy is the set of competencies required for full participation in society that includes knowledge, skills, and behaviors involving the effective use of digital devices for purposes of communication, expression, collaboration and advocacy. Simply, it is the ability of an individual to engage with the digital environment and operate technologies safely by knowing what to do and what not to do and how to avoid unnecessary risks. Digital literacy is an individual's ability to access both information and methods of communication through technological tools, such as smartphones, tablets, laptops and desktop PCs. While digital literacy is initially focused on digital skills and stand-alone computers, its focus has shifted to network devices, including the Internet and the use of social media. Cybersecurity Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks (Cisco, n.d.). These cyberattacks usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is challenging because there are more devices than people, and attackers are more innovative. Here are some tips on how to protect yourself against cyber threats. 1. Monitor behavior on social networks, uploading something fry to (a) to be public and (b) Is it worth the risk? Remember, not only what we share online is available to friends and family, but also to cybercriminals. 2. Keep devices safe. Protect your technology by Anti-virus software, a configuration of settings on the devices and by completing software updates. 3. Understand how best to use passwords. Passwords needs to be complex and hard to guess, but can still be remembered. One strategy is "passphrase' or a password that comes first letter of each word in the phrase. There is also a manager app to help keep track of all the passwords called "KeePass" which is free of charge. Importantly; do not use same password for all accounts. 4. Handle unsafe content. Know exactly how to respond or read to unsafe situations online, such as (1) suspicious (2) pop-ups claiming that your computer is infected; and BitTorrent sites.   5. Consider safety for the future. Take individual responsibility using devices with an utmost cave and critical thinking online  

Cyber Citizenship   Citizenship is an old value that is now applied to a new medium, the Internet. Cyber citizenship refers to being responsible when using the Internet. Doing online when no one is looking speaks a lot about one's character and morals. The power of this digital world is associated with responsibilities and consequences. Therefore, can explore and navigate all information available online however, we should observe cyber citizenship or manners and etiquette on the Web.  Ways on How to be a Good Cyber Citizen  The enlisted ways of becoming a good cyber citizen would guide everyone on his/her digital operations and information processing and would prevent anyone from further consequences, distractions, damages and risks.   1. Be careful and critical for whatever you post online that cd be visible to the public even if on a "private" page through tagging by a friend.   2. If you have a problem with someone, go to that person an adult to help work it out, instead of posting your expression online.   3. Use the Internet to help you with your schoolwork, but credit to the sources you use and critically analyze you search online. 4. Use the Internet purposefully to learn more about anything you are interested in, to help you research relevant and needed data or information and to stay connected with friends throughout the world. 5. Make sure you verify an information before you share it or use it in a project and check on accuracy and truth in the information you search on the web. 6.Give out certain information only. 7. Don’t answer questions that make you uncomfortable. 8. Always make sure you have told a reliable adult if you decide to meet someone you knew through the Internet. 9. Always be aware of copyright laws and give credit to whom an article or a part of it is due. 10. Use only the computers that you are allowed to use. Avoid hacking. Importance of Cyber Citizenship 1. It keeps the Internet free from hurtful statements. 2. It creates a culture of more reliable information. 3. It gives provisions for people to be given credit for what they have created. 4. More criminals or bullies can be caught when kids are honest and talk to adults. 5. It keeps information private. Paper Netiquette Follow these simple rules to ensure that you make wise choices when sending messages online. 1. Make sure you have the correct address (with proper spelling), correct link and you are sending the information to the right person when doing it online.

2. Check information before sending or posting any message and avoid false statements and information on the web or forwarding junk mail or chain letters to family or friends. 3. Re-read what you wrote to make sure it is what you want to say and the other person would interpret it the same way. 4. Keep your comments clean and don't confront others online or say anything that could be hurtful to them. 5. Keep your personal and friends' information private and don't forward information that was just given to you without his/her permission. 6.Watch out for spam and other fraud e-mails and never reply to them. 7.If you are going to write something personal or private, think twice because messages can get misdelivered. 8.Adults should monitor kids' messages, especially when they are sending e-mails to others without permission. The Ten Commandments of Teacher Cyber Citizenship At some point, misuse and abuse of technology may also in schools involving teachers with their students, colleagues and others. The following are reminders to teachers regarding the media tools. 1.Thou shall not post any personal matter, information and obscene pictures and messages online that can be accessed by students and parents. 2.Thou shall not respond or thread to any personal message created by students online other than those school-related. 3.Thou shall not lend or let students access your cellphone. 4.Thou shall not give your email password to students. 5.Thou shall not use concepts and information from texts and references without the author's citation. 6.Thou shall not post to any social media account, for whatever purposes, the pictures of students without their or their parent consent. 7. Thou shall not express sentiments, disappointments and disagreements against superiors, colleagues, students and their parents using their social media accounts. 8. Thou shall not use data from Internet sources in any documents like lesson plans, researches and requirements without the consent of the author. 9.Thou shall not give any personal data or other's information to anyone unless for specific purposes and given the consent. 10.Thou shall not post any student data publicly online including academic rankings, school records, class outputs and record of grades. De Leon (2019) Internet Safety Internet safety, online safety or cyber safety means trying to be safe on the Internet. It is maximizing the user's personal safety and security risks to private information and property associated with using the Internet, including self-protection from computer crime, the number of Internet users continues to grow worldwide, issues and concerns also continuously exist. Information security. Sensitive information, such as person information, identity and passwords are often associated with personal property and privacy and may present security concerns if

leaked Unauthorized access and usage of private information may result consequences, such as identity and property theft. Common causes of information security breaches include: 1. Phishing. It is a common type of scam, of which scammers disguise as a trustworthy source in an attempt to obtain private information, such as passwords, credit card. information, etc. through the use of fake websites that look identical and legitimate. 2. Internet scams. These are schemes that deceive the users in various ways in an attempt to take advantage of them. 3. Malware. It is a malicious software (particularly spyware) disguised to collect and transmit private information, such as password without the user's consent or knowledge, of which it is impossible to determine whether a file is infected. Personal Safety and threats. The growth of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication. While it allows communication with others, it is also being grabbed by malicious user’s bad intent. The following are common threats to personal safety. 1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or harass an individual, group or organization through false accusations, defamation, slander and libel, intentional monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass. 2. Cyberbullying. It is the use of electronic means, such as instant messaging, social media, email and other forms of online communication with the intent to abuse, intimidate, or overpower an individual or group. 3. Online predation. It is the act of engaging an underage minor into inappropriate sexual relationships through the Internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or Internet forums. The behavior characteristics are categorized into three groups: A) Manipulative - typically a child molester; B) Opportunist typically a rapist; and C) Coercive - being a mixture of both rapists and child molesters 4. Obscene/offensive content. Various websites on the Internet contain material that may deem offensive, distasteful or explicit, which may often not be of the user's liking. Such websites may include the Internet, shock sites, hate speech or otherwise, and inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links. 5.Sextortion. It is the use of webcams for flirting and cybersex. Often, this• involves a cybercriminal posing as someone else, such as an attractive person initiating communication of a sexual nature with the victim. The video is recorded by the cybercriminal to demand money or other services, threaten to publicly release the video and send to family members and friends of the victim if they do not comply. Computer Threats and Fixing solutions The realm of Information Technology (IT) security professionals and computer security

has become an issue and concern for many people (Honan 2014) A threat, in the context of computer security, refers to that has the potential to cause serious harm to a computer is something that may or may not happen, but has the cause serious damage and can lead to attacks on computer and networks. Cybercrime is now becoming alarming in the life of individual and the organization as they intend to steal information they can sell of trade, such as financial details, credit card information personal details, or any other information using computer networks. Likewise, while email has been the main method for the of computer viruses, it can also enter a network by the USB Internet download, visiting an infected website, instant messaging in social media platforms, file transfer and file-sharing programs, or by remote users connecting directly to the corporate network with an infected PC. Once a computer virus gets into network, it can spread from computer to computer in multiple ways. Given the numerous ways a computer virus can spread, following are ways on how to ensure that computer networks can protected. 1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all computers, including all servers, Pc and laptops. 2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released daily and so it is essential that computers are protected by keeping the anti-virus software up-todate. 3. Employ a firewall to protect networks. As computer viruses can spread by means other than email, it is important the unwanted traffic is blocked from entering the network by using a firewall. 4. Filter all email traffic. Example of emails with certain file attachments commonly used by computer viruses to spread themselves, such as .EXE, .COM and .SCR files. These should be prevented from entering the network. 5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to never open an attachment or to click a link in an email they are not expecting. 6. Scan Internet downloads. Ensure that all files downloaded the Internet are scanned against computer viruses from central point on the network. 7. Do not run programs of unknown origin. It is important to a trusted source for software requirements to be installed ensure it can be accounted for. 8. Implement a Vulnerability management system. It is important to regularly review network and the applications running on it tor new vulnerabilities and a plan on how to manage them, either by patching or upgrading them using tools, such as firewalls or Intrusion Detection Systems that should be put in place. 9.Make regular backups of critical data. There is a need to keep important files on removable media, such as portable drives or tape for back-up in the event that the network is infected with a computer virus. 10. Develop an Information Security Policy. The creation and publication of an Information Security Policy is key to ensuring that information security receives the profile it requires in order to secure the systems and data. 11.Monitor logs and systems. Regular monitoring of network and system logs can assist in the early identification of a computer virus infecting the network or other attacks by

criminals. 12. Develop an Incident Response Plan. The incident response plan outlines the roles and responsibilities of people in the event of a computer virus infecting the network or any other type of security breach. 13. Restrict end-user access to the systems. Where possible, end users are prohibited from access to the system so that the virus will also be restricted.  

Cyberbullying    Cyberbullying, cyber harassment or online bullying is a form of bullying or harassment using electronic means usually among minors in a school setting and has become increasingly common, especially among teenagers.    It is an aggressive, intentional act or behavior that is carried out by a group or an individual using electronic forms of contact, repeatedly against a victim who cannot easily defend him or herself. The National Crime Prevention Council defines it as a process of using the Internet, cellphones or other devices to send or post texts or images that intend to hurt or embarrass another person. It may also include public actions, such as repeated threats, sexual remarks, pejorative labels or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false Statements to discredit the targeted person.    Cyberbullying is similar to traditional bullying. It is just that victims may not know the identity of their bully and the reason for bullying them. Cyberbullies may disclose victim’s personal data on websites or forums-called doxing, or may use impersonation, and create fake accounts, comments or sites for the purpose of publishing material in their names. This can leave the cyberbully anonymous and difficult be caught or apprehended for his/her behavior.   Cyberbullying types. There are various types of cyberbullying and research has revealed serious profound consequences on victims.  1. Internet trolling is a common form of bullying over the Internet in an online community to elicit a reaction, disruption intentionally provoke and offend others.   2. Cyberstalking is another form of bullying or harassment uses electronic communication to stalk a victim and pose credible threat to harass him/her.    Implications of bullying in schools. Schools should initiate various anti-bullying programs and campaigns to protect students from being threatened or victimized by such offense. More so teachers should be oriented and trained in handling bullying cases and executing teaching strategies to address and reduce bullying cases in class. Also, schools should conduct student empowerment activities that can be engaged in by students, including the bullies to divert their attention and energy into something worthwhile and engagements that they can be busy about.   Cybercrime  

 Avast defines cybercrime as any criminal activity carried out computers or the Internet.  Cybercrime uses tools like phishing, spyware, ransomware and social engineering to break the law.    On the other hand, cybercrime is defined by Techopedia as a crime with the computer as the object of the crime (i.e., hacking, phishing, spamming) or is used as a tool to commit an offense (i.e., child pornography, hate crimes). Cybercriminals may use computer technology to access personal and confidential information or use the Internet for exploitative or malicious purposes.    There is wide variety of cybercrimes, which can broadly be placed into two categories. one off crimes, such as installing virus that steals your personal data; and ongoing crimes, such a cyberbullying, extortion, distributing child pornography or organizing terrorist attacks.  Cybercrime may also be referred to as computer crime practiced by those who have technological skills and use the Internet to achieve their bad motive. Cybercriminals employ their diverse skill to acc bank accounts, steal identities, blackmail, defraud, stalk, and har or use a compromised computer to attack their victims. Criminals also use computers for communication and document or data storage and those, who perform these illegal activities are often referred to hackers. On the other hand, malware downloaded from the computer may slow it down and prompt it to give error messages. Likewise, phishing attacks usually involve receiving emails from unknown sources while trying to trick someone into giving up his/her signs, passwords or personal data. Keyloggers leave their own telltale sign like strange or icons, or duplicating the messages.    Techopedia cites common types of cybercrime that include online bank information theft, identity theft, online predatory crimes, unauthorized computer access, and the most serious one like that cyberterrorism. can be categorized Cybercrime as: encompasses (1) crimes that a target wide computer range of networks activities or devices, including viruses and denial-of service (DOS) attacks; and (2) crimes that use computer networks to advance other criminal activities, including cyberstalking, phishing and fraud or identity theft.   Exploring the Internet: Researching and Evaluating the Web The Internet is a global communication network that allows computers to exchange and share information worldwide. It makes possible for people around the world to connect and share ideas across time zones and geographic locations. However, because cyberspace is such a large realm, sometimes it is difficult to find the needed information. So, the most effective way to explore the Internet is to have strategies in place for doing research on the Web and for evaluating the websites.  Commonly, this is important among schools in doing researches and other related works.  Therefore, this aspect needs to be explored by teachers and students in doing their works. Surfing the Web. The following are the three key factors in surfing the web. 1. Most surfing sessions start with the user-targeted keywords about the subject into a search engine. 2. Good strategies for searching the Web include writing research questions; extracting keywords from the questions and typing them into a search engine using synonyms if the keywords do not bring up desired results; keeping track of keywords and synonyms used; and recording the results of search.

3. Always be cautious about the information shared online and in visiting websites. Assessing credibility. Different websites accessible on the Web can make the job of researchers very challenging. Carefully evaluate the information searched online. Consider the credibility, or trustworthiness and reliability of the content before taking it. There are two types of websites: informational and commercial. Informational Websites usually strive to Offer credible content to users, while commercial websites present inaccurate information in order to something,

Checklist of credibility criteria. The first step in evaluating credibility of websites is to review several important aspects of the site 1. Author. Check the credentials of the author, the company expert and determine the qualifications to provide the subject being researched. Some websites do not lists authors, but the credibility of a company can be explored by reviewing the site's "About” page if available. 2. Date. Look for copyright information at the bottom of a website. home page. If the site is more than a few years old and it has been updated regularly, look for more up-to-date information 3. Purpose. Analyze the goals of the website to determine an informational or an advertisement site.  4. Contact. Most credible websites list down contact information such as telephone number, email address, or mailing so that users may get in touch if they have questions. 5. Fact vs. Opinion. When doing research for a school paper go to sites that present factual information provided by experts rather than opinions. Be on the lookout for biases, too. author is biased, so as the information on the site. 6. URL. The URL may look like ending in .edu (for education), .gov (for government), .org (for organization). .com (for commercial sites), or .net (for network sites).  Different websites have different URLs. To help determine a site's credibility, determine if that is a personal website or blog, a government website, other types of website. Common credible URLS. One way of determining the credibility of a website is through the URLS. Although a website's URL gives clues as to credibility, there is still a need to evaluate it carefully. 1.When encountering a URL, look at the letters that appear alter the "dot" and that is called toplevel domain. Thus, the URL's top-level domain helps in determining a site's credibility. 2.Websites ending in .gov are government-related websites which generally, can be trusted to provide credible statistics information, articles on many different topics and government news. 3.Websites ending in .edu are the websites of educational institutions, such as colleges and universities that offer a variety of credible data, especially about the operations and research. Since students may create webs* with an .edu top-level domain, but they may contain inaccurate or biased information.

4.Websites ending in .org are the websites of organizations. While many organizations, especially nonprofit ones, provide credible information, they may sometimes have advertising intent, Since some organizations show bias in their provided information, so evaluate .org sites carefully. Recognition Of information sources. Similar to the information in print sources, the use of online sources must be given credit to the This can be done by applying proper referencing and citation PCOC0dUfes that would get rid of risks, consequences and legal implications because of the copyright issue, which means that the ideas and words used belong to the author. Citation. Each entry in the bibliography is called a citation. Proper citation must be applied or included for every source used, whether it is a website, a newspaper, or a book. Online sources are cited differently because they are different from traditional print sources. There are different formats used to cite the sources. Author/Source > Year > Article >Website >URL >Retrieval Date Data privacy implication. The implementation of data privacy in the country is becoming stronger and powerful, especially in utilizing data for research and other forms of report and paper works. This has also corresponding legal implications once not processed immediately and properly. It involves uploading of pictures, designs, graphics, Concepts/ideas, frameworks, art work, data, and other information that are Copyrighted without the consent of the author or the source. These are commonly observed in schools. The following are practical techniques in responding to data Privacy issues. 1. When getting data, put proper citation and source acknowledgment (e.g. Source: National Statistics Office, 2019). 2. When using needed pictures downloaded from the Internet, put acknowledgment (e.g. Photo credits to PhilPost, 2019). But if possible to have personal pictures taken with your original concept. Although, there is still a need to seek consent of those in the pictures.  3. If data, concepts and information are copyrighted, ask for consent of the author, and wait for his/her response. 4. However, if the data and information are for public just acknowledging/citing the author or the source will do. 5. If the author doesn't really want anyone to utilize his/her file or article, learn the value of respect, anyway that is her property. The author's disapproval usually manifest through difficulty in downloading the file, some tricky signs that appear on screen, or direct statement or notice disapproval contained in the file.   Research and data collection protocols. When researching and collecting data from the Web, avoid plagiarism, which is the act of taking someone else's work and presenting it as your own.   Plagiarism is unethical, and it can bring you in trouble Sometimes, students don't mean to plagiarize, but they end up doing the accidentally because they are unaware or unclear about it.   The following are 10 types of plagiarism that teachers’ researchers and students should know.  

1. Clone Plagiarism. It is also called identical copying or copying another work (word-for word) without any change and claim as his/her own work.   2. Remix Plagiarism. It refers to collecting information from various sources and mixing all together as a single document then, claiming the work as their own work.  3. Ctrl+C Plagiarism. This is when a significant portion of ten copied from any single source without any alteration in a written document.   4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and arranged as a new document without citation.   5. Find-Replace Plagiarism. This is changing the most common keywords and phrases in the copied content but not making any changes in the essential document. 6. Recycle Plagiarism. Also called self-plagiarism, it refers to the act of borrowing from one's own previous document without proper citation.  7. Mashup Plagiarism. It is when the written document is copied from more than one source and all are mixed together without proper citation.   8. 404 Error Plagiarism. Here, a person creates a document copying from various sources prepared as a single document with the citation but inaccurate or leads to nonexisting resources. 9. Aggregator Plagiarism. Here, the written document includes proper citation but it does not contain original work.   10. Re-Tweet Plagiarism, Here, all written documents look perfect with properly cited mark but still, the document resembles somewhere the original text's structure or wordings.   Tips to Avoid Plagiarism   Turnitin.com suggests some techniques to avoid plagiarism that teachers, researchers and students should know.   1. Read and understand the original document several times before start explaining about it. 2. Do not copy any word or sentence from the original document.  3. Give proper citation to all sources. (book, journal, website,   4. In case of citing online sources, include the retrieval date and appropriate URL in the reference.   5. Common phrases and definitions need to be quoted and cited without any modification.  6. Make a practice to include the "references" section whenever you write an academic document.   7. Cross verify all your citations before submitting your document 8. Resort to available plagiarism software to ensure the originality of the written document.  

How to Evaluate a Website   Morris (2018) suggests ways oh evaluating a website as reference in research.   1. Open the site. When looking through Google search results, open sites in new tabs, leave search results in a tab for easy access later (e.g. right-click on the title and click "Open link in new tab").  

2. Skim read. Determine whether you can read and understand the text. If it is too complicated or difficult to understand, find another website that may provide the information you need.   3. Look for the answer to your question. Find out if the information on the site actually answers your question. You can use a search box, navigation menu, or pull up your own search box by pressing Control/Command F and type in the keywords you are searching for.   4. Consider the credibility of the author or website. You need to consider the credibility of the author — domains or website that by considering the following: (1) Domain include .gov or .edu are trustworthy sources; (2) Author's information ----- look at the author's bio or About page regarding the qualification of the author; (3) Design avoid site that are cluttered and difficult to navigate; and (4) Sources trustworthy articles usually link to other sources or cite their facts come from.   5. Consider the purpose of the site. Think about the purpose the site and whether it meets your needs.  6. Look for the date. Consider whether the information is enough for your topic. You can look for the date when the article was written or last updated. Sometimes, URLs include dates.   Integrating Digital/Cyber Literacy into the Curriculum  The following are suggested activities to integrate digital literacy higher-order thinking and construction of meaning in the classroom   1. Use an interactive whiteboard to design and deliver lessons. Use Promethean and Smart Notebook with teacher-created lessons if you are not yet capable of designing your own. 2. Allow students to maintain blogs, wikis, web pages related to their learning. 3. Engage in email video chat exchanges with students.   4. Utilize storytelling media to allow students to publish stories.  5. Set-up a blog site, Facebook page, Yahoo or group and post weekly discussion questions for students to respond.   6. Use video cameras to dramatize stories, record scientific experiments and expose students to video editing software to create video production of learning.   7. Engage students in discussions about how and why various media work well to showcase learning and why others do not.   8. Thinking critically about the medium use to present a message is as important as the message itself.   9. Require E-Portfolio that would compile their outputs' projects, messages and photo documents of group activities and investigations online.   10. Allow students to use digital tools, such as mobile phones iPad and netbooks for Google search, dictionary APPS' YouTube, Podcast and Spotify applications in class complement their learning, especially during group work! and concept reporting.

Impact Of integrating digital literacy in the classroom on teachers, families and friends. Integrating digital literacy in the classroom can bring a positive impact on students' learning as evidenced by the following:   1. It motivates students in their learning due to their enjoyment and ease of use with various technological mediums.  2. It reaches students of various learning styles and multiple   3. It allows students to create and design their own unique products reflective of their personalities and learning needs/ styles.  4. It encourages students to manipulate media in constructing their own meaning. 5. It enables students to share their learning with teachers, families and friends. 6. It gives students the chance to explore technological media that inevitably increase the job skills needed in the workforce.   Life and Values Integration   Share a personal experience wherein you encountered digital risk and lessons and values consequence. What life lessons and values have you realized and learned?   QUESTIONS FOR DISCUSSION  1. How do you define cyber/digital literacy and cybersecurity?   2. What do you mean by cyber citizenship? Elaborate.   3. What are netiquette and the process of safety use of digital media? Give examples. 4. What are the common computer threats and how can these be fixed?  5. What is meant by cyberbullying and cybercrimes? Discuss.  6. How can you practice the processes of Internet exploration, source citation, research and data-gathering protocols and website evaluation?   7. How can cyber/digital literacy be integrated in the teaching. learning process?  RESEARCH ANALYSIS AND IMPLICATION  Direction: Analyze the following research abstract and cite implication on teaching-learning. You may download the paper of this research on the website given below   Teachers' beliefs about integrating digital literacy into classroom practice: An investigation based on the Theory of Planned Behavior   Sadaf and Johnson (2017)  

Abstract   This study explored teachers' behavioral, normative, and control beliefs related to digital literacy integration into their Classrooms. Ajzen's Theory of Planned Behavior (TPB) was used as a theoretical framework to collect and analyze data. Findings revealed that teachers' integration of  digital literacy were related to their behavioral beliefs (attitude towards outcomes of a behavior)  about the value of digital literacy for developing students' 21' century skills, increasing

student  engagement, and preparation for future careers; normative beliefs (social support) about  meeting the expectations of administrators, parents, colleagues, and students; and control  beliefs (perceived behavioral control) about ease of integrating digital literacy due to access to  technology, professional development, and curriculum resources.   Analysis: How do teachers perceive digital literacy integration into their classrooms, according to the study? __________________________________________________________________________ __________________________________________________________________________ _____________________________________________________________________  Implication: How does the result of the study impact the students' learning and the development of 21st century skills? ____________________________________________________________________________ ____________________________________________________________________________ _______________________________________________________________________

SYNTHESIS AND LEARNING REFLECTION DIGITAL/CYBER LITERACY

 Digital literacy is the set of competencies on the effective use of digital devices for purposes of communication, expression, collaboration and advocacy while cybersecurity is the practice of protecting system networks and program from digital attacks.  Cyber citizenship refers to being responsible when exploring the Internet, including the right manner and etiquette in using the web.  Internet safety is preventing from online security risk to private information and property and protecting self from computer threats and cybercrimes.  Cyberbullying is a form bullying or harassment using electronic means that is punishable by law while cybercrime is any criminal activity carried out using the computer or internet.  A computer threats refers to anything that has the potential to cause serious harm and damage to a computer system, that must be fixed immediately and effectively with solutions.  In order to avoid digital risks and consequences, proper Internet explorations, source citation, data privacy imposition, research and data gathering protocols and website evaluation are imperative.  As digital literacy impacts teaching – learning process. Its wide dissemination in schools and integration in the classroom is timely, relevant and necessary.

CURRICULUM APPLICATION  Direction: Produce and evaluate a digital tool that can be utilized in the classroom. PROJECT PLAN Digital Tool: Brief Description: Purpose: Topic: Subject: Materials: Estimated Cost: PROCEDURES

OUTPUT  (Paste a picture of created digital tool here.) 

PREPARED BY: ______________________________ COURSE/SECTION: __________________________

LET SAMPLERS: TAKING THE EXAMINATION   Direction: Read and analyze each item carefully. Choose the letter of the best answer.   1. If you plan to produce a digital tool as a learning material, which of the following aspects will you consider first?   A. Validity, relevance and appropriateness   B. Quality, efficiency and technicality   C. Economic value, durability and long-term usability   D. User-friendliness, convenience, accessibility and visual impact 

2. To avoid risks and consequences brought about by technology in the use of social media, which ethical principle is the most important and which encompasses other principles A. Choose the social media account that you will keep.   B. Be careful in responding to the messages while threading to an issue.   C. Think before you click.   D. Select the best type of social media to be utilized.  

3. Which of the following instructional strategies can be used effectively in presenting lessons on cyberbullying and cybercrime?   A. Discuss the provisions of the law and administer a short quiz after.   B. Research on how the law was amended and how it would impact both the victim's and the culprit's lives.   C. Analyze related cases guided by legal provisions to be presented in class using jury trial technique.  

D. Report to class the status of cybercrime in the country taken from Internet source.  

4. When you receive a suspicious e-mail asking you to withdraw big amount from a prestigious bank upon winning the grand prize in an automated raffle draw, which you know you have not participated in, what would be your first and immediate move?  A. Ignore the email, do not open and delete it right away.   B. Take the e-mail and verify it to the concerned bank and relevant agencies.  C. Contact the owner of the e-mail and ask him to discuss with you the content of the message.   D. Take the e-mail and transact immediately the given message, there's no harm in trying, anyway 5. When researching data from the Internet, which of the following reminders should be taken into account to avoid com plications risks and negative consequences?   l. Choose creditable and reputable sources of data that you need.   ll. Apply proper citation of the source/reference.   Ill. Rephrase statements while retaining its original concept and meaning IV. Include pictures and graphics to be downloaded, copied and pasted in the report. A. I and Il only B. l, Il and IV

C. l, Il and Il l   D. l, II, Ill an IV