Summary of "DIGITALINO TEACHERS FOR DIGITAL LITERACY OF LEARNERS"
Event context
- Free webinar series by the EdTech Teacher Training Center in partnership with google.org and the ASEAN Foundation (Director: Sir John Morata).
- Target audience: teachers and education stakeholders across the Philippines; supports teacher professional development and digital literacy for learners.
- Recording includes two main sessions:
- From Clicks to Brilliance — Sir Alan (Master Trainer)
- Decoding the Digital Realm — Dr. Carl (Master Trainer)
- Note on logistics: participants must complete registration/attendance forms and assessments (pre-test/post-test) and submit speaker evaluations within a limited time window to qualify for Google-issued certificates.
Session 1 — From Clicks to Brilliance (Sir Alan)
Main ideas and lessons
- The internet is a powerful educational tool for connectivity, access to information, collaboration, and entertainment, but it must be used intentionally and with clear classroom rules.
- Important modern digital concepts for teachers to know and teach:
- Internet of Things (IoT)
- Cloud computing (Google Drive, SharePoint)
- Cybersecurity basics and two-factor authentication (2FA)
- Include digital rules and safety in learner orientation (class/group chat etiquette, privacy settings, what not to share).
- Emotional and psychosocial impacts: online communication lacks nonverbal cues (emoji can be misread); social media can affect students’ emotions, privacy, and behavior.
- Practical classroom tech: demonstrations and hands-on practice with tools such as CuriPad (Curipad/Curi.pad), ClassPoint, Kahoot, and AI-assisted features build teacher confidence.
- Teachers—not just ICT staff—should guide students on digital safety, privacy, and responsible use.
Practical actions, instructions and recommendations
- Pre-webinar/class logistics:
- Require registration, attendance logging, and assessments (pre-test/post-test) to track participation and issue certificates.
- Device and classroom rules (examples for orientation):
- Set expectations for device use (when allowed, purpose, boundaries).
- Establish group-chat (GC) rules: limit inappropriate emoji use, teach respectful messaging, define privacy expectations.
- Involve guidance counselors and ICT coordinators in orientation about online behavior and incident response.
- Cybersecurity basics:
- Encourage/require two-factor authentication (2FA) for important accounts.
- Teach password hygiene; never share bank/account details; limit personal information posted publicly.
- If an account is hacked: act immediately — inform contacts/guidance counselors, post warnings to stop scams, report to the platform and authorities (e.g., National Privacy Commission), and remove compromised access.
- Handling misinformation and privacy:
- Teach students to verify (pack-check) before sharing: check date, source, context; cross-check multiple authoritative sites.
- Use National Privacy Commission resources for privacy guidance and classroom best practices.
- Encourage a growth mindset: repeated hands-on use and practice builds edtech competence.
Session 2 — Decoding the Digital Realm (Dr. Carl)
Main ideas and lessons
- Distinguish misinformation (false/mistaken information shared without harmful intent) from disinformation (false information created and spread deliberately to deceive).
- Misinformation/disinformation spread quickly online and can cause public-health harms, social panic, reputational damage, political manipulation, and erosion of trust.
- Teachers are trusted sources and should model and teach verification, digital critical thinking, and safe online behavior.
- Seniors and young children are especially vulnerable; involve parents and guidance counselors when necessary.
Seven common types of misleading/false content
- False connection / misleading headline — headline or opening framed to mislead, not supported by full content.
- Satire / parody — intentionally humorous or exaggerated content that some may treat as fact.
- Imposter content — false content using real names/logos/images to fabricate authority.
- Manipulated content — genuine images/audio/video altered to misrepresent events.
- False context / out-of-context content — accurate material used in the wrong time/place to mislead.
- Fabricated content — wholly invented stories, photos, or videos (100% false).
- Misleading synthesis — mixing facts from different sources to create a false narrative.
Why false information is created
- Profit (scams, ad revenue, clickbait)
- Political or reputational manipulation (influence, smear campaigns)
- Attention, entertainment, or “for fun” viral motives
- To provoke emotional reactions or confusion
Step-by-step checklist to detect and respond to misinformation
Before sharing or acting on a post:
- Pause — don’t share immediately.
- Check the source:
- Who posted it? Is the account reputable or verified?
- Is the publisher a recognized news outlet, government agency, or authoritative organization?
- Read beyond the headline:
- Open the full article; look for publication dates and context.
- Cross-check:
- Verify the claim with at least two other credible sources (official sites, mainstream reputable media, government/NGO pages).
- Use established fact-checking sites where available.
- Inspect media:
- Reverse-image search pictures; check for manipulated visuals or misattributed photos.
- Check whether videos are edited or taken out of context.
- Look for bias or agenda:
- Watch for emotional language, dramatic claims without evidence, and unnamed sources.
- If uncertain:
- Do not share; label as “unverified” or consult a specialist (guidance counselor, school ICT).
- If content is harmful or false:
- Report it on the platform (Facebook, Instagram, TikTok, etc.).
- Inform school administrators and parents if students are involved.
- Remove or request removal if it’s a school-related post.
Classroom practice:
- Teach students how to fact-check and use reliable resources (official agency pages, recognized news outlets, fact-checking organizations).
- Include digital literacy and privacy orientation in the curriculum and GC orientation.
- Use guidance counselors to address the psychosocial impact of harmful posts.
Practical steps when an account is hacked
- Immediately notify contacts that the account is compromised (post/warn in GCs).
- Change passwords and enable/verify 2FA on other accounts.
- Report the compromised account to the platform and follow recovery steps.
- Alert parents, school admin, and financial institutions if financial info may be exposed (e.g., GCash).
- Consider temporarily deactivating the account if necessary.
- Keep documentation of the hack for reporting and possible prosecution.
Classroom and school policy recommendations
- Add a digital-orientation segment at the start of classes (rules for GCs, privacy settings, emoji etiquette, what not to post).
- Make reporting pathways clear (who to contact in school for digital incidents).
- Teach students to preserve evidence of malicious content (screenshots, links) for reporting.
- Encourage open parent-teacher-student communication about online behavior.
Tools, resources, and apps mentioned
- CuriPad (Curipad / Curi.pad) — interactive live tool used for polls/word clouds and webinar giveaways.
- ClassPoint — interactive presentation tool.
- Kahoot — quiz platform.
- Cloud services — Google Drive, SharePoint.
- Two-factor authentication (2FA) — recommended for accounts (Facebook/Meta settings referenced).
- National Privacy Commission (NPC) — official government resource for privacy rules and reporting.
- Fact-checking organizations and official agency websites (e.g., DSWD, health organizations).
Logistics, participation and certificate rules
- Participants must:
- Register via the attendance/registration form (pinned link).
- Complete assessments (pre-test where applicable, post-test).
- Fill speaker evaluation within the specified time (evaluation link open for a limited window, e.g., one hour) to qualify for certificate issuance.
- Certificates are issued by Google (via the program) and dispatched by trainers within about five days; accuracy of submitted name is important.
- The webinar included interactive giveaways (Curipad premium accounts) for active participants.
Key takeaways — one-page practical checklist for teachers
- Teach orientation: set clear digital rules for class and group chats; involve guidance counselors and ICT coordinators.
- Model verification: always check source, read full content, cross-check with reputable sites, and use reverse-image search for media.
- Strengthen security: require 2FA, enforce good password practices, and never post sensitive financial or personal data publicly.
- Respond quickly to hacks: warn contacts, report to platforms and authorities, and change credentials.
- Build critical thinking: practice fact-checking activities, show types of misinformation, and discuss emotional impact and digital footprints.
- Promote reporting and support: show students how to report harmful content and where to seek adult help.
Speakers, hosts and organizations featured
- Sir Alan — Master Trainer / resource speaker (Alan Acosta / Alan EO Studio / Alan Custodio referenced).
- Dr. Carl (Carlvin) — Master Trainer.
- Sir John Morata — Director, EdTech Teacher Training Center (organizer).
- EdTech Teacher Training Center — organizer.
- google.org — program partner and certificate issuer.
- ASEAN Foundation — partner.
- National Privacy Commission (NPC) — referenced for privacy guidance.
- Tools/platform examples: CuriPad (Curipad), ClassPoint, Kahoot, Google Drive, SharePoint, Facebook/Meta.
End of summary.
Category
Educational
Share this summary
Is the summary off?
If you think the summary is inaccurate, you can reprocess it with the latest model.
Preparing reprocess...