Educ 110 Module Midterm
Educ 110 Module Midterm
Educ 110 Module Midterm
EDUC.110
MODULE 4
SOCIAL LITERACY
LEARNING OUTCOMES
CONCEPT EXPLORATION
The school is a social institution established for the contemplation of reality in a profound, personal, informal
and unstructured way. Teachers facilitate learning, teach students and model certain types of acceptable
behavior while developing them in all aspects: academically, physically, emotionally and socially, In performing
such tasks, teachers also relate to parents and other stakeholders. That is why understanding and attaining
social literacy is imperative among them.
Social Literacy
Social literacy entails the development of social skills, knowledge and positive human values toward desire and
ability in human beings to act and react positively and responsibly in a wide range of complex social settings. It
can be acquired through social process of inquiry, values exploration and social decision-making that relate to
the acquisition of knowledge and understanding (Arthur, Davison and Stow,2000).
In school, social literacy can be demonstrated by teachers in dealing with their superiors, colleagues, parents,
students and others, while for students, by way of interaction and interrelation with the surroundings around
them - their peers, the media and political influencers, technology agents, religious groups, school staff, family
members, etc.
Social Skills
Social skills are aspects of social literacy. As such, these are an integral part of functioning in society. 'It
involves good manners, communicating effectively with others, being considerate of others' feelings and
expressing personal needs. In fact, children gain social skills through playing while adults obtain it by
interrelating with others, both verbally (spoken language) and non-verbally. (gestures, body language, facial
expressions, eye contact and appearance).
Social skills are also important in schools because they help build, maintain and grow relationships of students
with classmates, peers, teachers, students, and others, while for teachers, with their superiors, colleagues,
parents, students, and others. These can be attained through:
(1) gaining ideas, information, techniques and perspectives from people with different areas of expertise;
(2) providing their own perspective for the benefit of others;
(3) accomplishing tasks and working together toward shared goal;
(4) providing mutual support for difficult situations;
(5) expanding network to learn about and pursue new opportunities;
(6) gaining feedback and referrals from people who can personally attest to work, skills and qualities; and
(7) making the school truly a healthy and conducive learning environment.
1. Effective communication. It is the ability to communicate 'effectively and share thoughts and
ideas with students through group conversations, discussions, etc.
2. Conflict resolution. It is the ability to get to the source of the problem and find a workable solution
by weighing both sides from those involved with the goal of mediating for reconciliation
3. Active listening. It is the ability to pay close attention toa student in times of counseling,
introspection and consultation.
4. Empathy. It is the ability to understand and identify the feelings of students in times of difficulty and
trouble.
5. Relationship management. It is the ability to maintain relationships and build key connections
with school stakeholders for the student's development.
6. Respect. It can be done by knowing when to initiate communication and respond during
interactions or even in times of heated arguments and confrontations.
7. Problem-solving skills. These involve seeking help, making effective decisions and accepting
consequences to derive better solutions to the problem.
8. Interpersonal skills. These include the abilities of sharing, joining activities, asking for permission
and waiting for one's turn in every facet of school undertakings.
Improving social skills. Social skills can be improved by focusing on sustaining desirable attitudes and
eliminating those undesirable ones through modeling, role-playing and performance feedback mechanisms.
Goleman (1996) defines Emotional Intelligence (EQ) as the ability 1o:(1) recognize, understand and manage
own emotions; and (2) recognize, understand and influence the emotions of others.
It is being aware that emotions can drive behavior and impact people (positively and negatively), and learning
how to manage those emotions, both one's own and others' when under pressure, especially in times of:(1)
giving and receiving feedback;(2) meeting tight deadlines;(3) dealing with challenging relationships;(4) not
having enough resources;(5) dealing with change; and (6) experiencing setbacks and failure.
1. Emotional Literacy Workshop. This will help teachers to communicate with students, recognize and
manage emotions and increase self -awareness.
2. Emotional Literacy Museum. It is a self-directed learning experience that teaches about the
physiology of emotions, emotional regulation, and emotional literacy.
3. Mixed Emotions Cards. It is a beautiful deck of "tarot-like" cards of feelings (labeled with feelings and
synonyms).
4. eMotion Cards. It is an evocative, playful moon face illustration of emotions (open-ended without
labels).
5. Biodots. It is a simple reminder that emotions are part of our physiology.
6. Bingo Emotions. It is typically a classic “bingo” game played with emotions.
7. Feeling Faces. These are photos of real people and data about how survey respondents evaluated
each picture.
8. Six Seconds Emotional Intelligence Assessment. It provides feedback about the way one uses EQ
and how to improve in this area.(http://www.6seconds.org/2018/02/27/emotional-intelligence-tips-
awareness/)
9. The Zoo: Animal Workshop. It is an activity that intends to imitate an animal behavior and gesture that
ends with reflections and group sharing.
10. Face Workshop. It is an activity, in which partners face each other while showing different facial
expressions and qualities that ends with reflections.
11. The Machine Transformer. Participants in groups have to transform into an assigned machine or
vehicle, of which each member shall comprise different parts, deemed essentials and equally
important that usually ends up with interactions and reflections.
12. Tower Building. Groups will be tasked to build a tower using pop sticks and straws. The goal is to
make the tallest and strongest tower of all. This will end up with interactions, sharing, open forums and
patching of emotional barriers.
13. Build Me a House. The participants in groups will be tasked to build a house using any available
material around them. The goal is to make the strongest house. Then, the facilitator will suddenly
destroy the house made by the group and observe the members' emotions and reactions and let them
express their feelings and thoughts. At the end, each one will draw realizations, lessons and values for
reflection.
14. Internalization Activity. This is an activity that helps participants to reflect on the narrations of the
facilitator with a background music in a dim and candle lighted room. Everyone can express his/her
emotions and feelings of resentment, remorse, agony, disappointment, and sadness.
15. Mirroring and, Unmasking Activity. Each participant shall prepare a piece of paper and 'put it at
his/her back. In a circular formation, everyone has to write that person's negative attitude on that
paper. Everyone will be given time to see those feedbacks and reflect on them while they are also
given a chance to express themselves. These negative feedbacks will be called masks to be torn-off
and burned at the end of the activity and they will be led to a prayer for self-renewal and rejuvenation.
1. Empathy. Empathy is the capacity to understand or feel what another person is experiencing from
within their frame of reference.
Greater Good Science Center in UC Berkeley laid down two different types of empathy, namely: (a)
Affective empathy-refers to the sensations and feelings that one gets in response to others'
emotions including mirroring what that person is feeling, or just feeling stressed when he/she
detects another's fear or anxiety; (b) Cognitive empathy (sometimes called “perspective-taking") -
refers to one's ability to identify and understand other people's emotions.
2. Self-awareness. It is the art of understanding one's self, recognizing the stimuli that he/she faces and
preparing how to manage him/herself, both in a proactive and reactive manner.
3. Curiosity. It is one's willingness to learn and improve. When one is curious, he/she is passionate
and therefore, he/she is driven to desire to be at his/her best.
4. Analytical mind. It pertains to being critical thinker that analyzes and processes all new
information that comes his/her way and see if they can extract ways to improve.
5. Belief. It is the power of believing in one's self, both at present and the future. It is a matter of
affirming that people and things in one's life happen for a reason and that everything will ultimately
turn out to be good.
6. Needs and wants. It is something to discern between things that one needs versus things that
he/she just wants and establishing needs prior to fulfilling wants.
7. Passion. It is the natural desire, instinct, drive, ambition and Module 6: Social Literacy motivated
love for a subject or someone. More so, it brings going. positive energy that helps sustain and
inspire one to keep
8. Optimism. It is about maintaining a positive attitude that may increase one's opportunities, improve
relationships and think clearly and constructively.
9. Adaptability. It is an important recognition and the ability to make or remake decisions in one's
best interest. It is also determining when to continue ‘his/her course, or when is the time for a
change.
10. Desire to help others succeed. It is becoming interested and appreciative of the success and
achievement of others.
People Skills
Like emotional intelligence and social skills, people skills have been widely used in demonstrating social
literacy at home, in school or anywhere that a person may be.
According to Wikipedia, people skills are patterns of behavior and behavioral interactions. For Thompson
(2009), this is an area of exploration about how a person behaves and how he/she is perceived irrespective of
his/her thinking and feeling. 'Honey (2001) defines it as the dynamics' between personal ecology (cognitive,
affective, physical and spiritual dimensions) and its function with other people's personality styles in numerous
environments (life events, institutions, challenges, etc.).
On the other hand, people skills are tools used to communicate and interact effectively with others. Therefore,
individuals with strong people skills are able to predict behavior, relate to others and socialize easily.
People skills can also be defined in three sets of abilities:(1) personal effectiveness or about how.one comes
across with others; (2) interaction ability or how well one predicts and decodes behavior; and (3) intercede
easily or ability to lead, influence and build bridges between people.
Moreover, people skills are the ability to accept, appreciate and admire others on a personal or professional
level. Good people skills extend to the ability to listen and empathize with others, as well as work toward
common goals with them. Therefore, these are sets of skills that enable a person to get along with others,
communicate ideas effectively, resolve conflicts and achieve personal or professional goals.
Educational Impact of People Skills. People skills are important for teachers in effective classroom
management. Knowing how to communicate and teach people Instead of simply teaching their subjects will
help make a difference
In the classroom (Bolton, 2009). Accordingly, almost 50 percent of classroom success lies on effective
Interpersonal relationships, while the other 50 percent lies within academic skills (Boyle, 2011). This is because
teachers tend to interact and relate with students.Therefore,they need to learn how to practice these people
skills effectively in order to create a healthy and conducive learning atmosphere in the classroom.
In general, people skills are an essential part of work, life and social success. When one has strong people
skills, he/she is able to: (1) pitch him/herself;(2) overcome social anxiety;(3) communicate ideas; and (4)
influence others positively.
1. Being socially assertive. Social assertiveness is essential for conserving social energy in the right
ways. People with high social assertiveness have more focused social energy 'and more clarity in
their interactions.
2. Crafting a memorable presence.People with great presence take it easy in making connections and are
extremely good at rapport building. Those with a strong presence can attract others, are well-
remembered and are likable.
3. Mastering communication. This is knowing how to present one's self and, in turn, gets one's message
across.
4. Sustaining lasting confidence. People, who can sustain lasting confidence are able to conquer their
shyness, avoid awkwardness and get through their anxiety or overcome any nervous tendencies.
5. Being an excellent conversationalist. This is essential in communicating and interacting. with others.
Excellent conversationalists are people whom others may be fond of. listening to and discussing with.
Most interactions happen in three levels: (1) The First Five. Minutes: This is the first impression and
the time to decide if someone is worth getting to know; (2) The First Five Hours: This is moving past
first ‘impressions into rapport building; and (3) The First Five Days: This is the final and ultimate level
of trust and connection. Thus, a conversation is the key to moving up these three levels.
6. Being highly likable. Likability is an important facet of trust by through being authentic or genuine with
their true selves.
7. Being exceptional at decoding emotions. People, who are good at reading people, are exceptionally
strong at knowing how others think and feel.
8. Pitching ideas. Pitching is a very important people skill because it happens all the time when one is
asked for his/her opinion and in-introducing himself/herself.
9. Being charismatic. Charisma is the perfect blend of two essential people skills traits such as warmth
and competence.
10. Being an influential leader. Leaders in both personal, social and professional life are able to gain
camaraderie. (Source:www.scienceofpeople.com/people-skils/)
By integrating social literacy in the curriculum content, teachers do not only give students opportunities to
practice their social-emotional skills, but also show them how integral these skills are in their daily lives.
Hence, reviewing curricula through social, emotional and moral lens is like a habit of mind that 'the more it is
done, the easier it gets. Obviously, the greatest benefit of teaching lessons like these is that students can begin
to examine their education, their decisions, their interests and their relationships through this lens, while helping
them cultivate a more thoughtful and discerning approach to life.
MEDIA LITERACY
Learning Outcomes:
Concept Exploration
Today, information comes through an interwoven system of media technologies. The ability to read many
types of media has become an essential skill in the 21st Century. Thus, schools are greatly confronted
with this challenge.
Media Literacy
Lynch(2018) coined the term “media” that refers to all electronic or digital means and print or artistic
visuals used to transmit messages through reading (print media), seeing (visual media), hearing (audio
media), or changing and playing with (interactive media), or some combinations of each. Media can be a
component of active learning strategies, such as group discussions or case studies (Mateer and
Ghent,n.d.).
Media literacy is the ability to access, analyze, evaluate, and create media(Firestone, 1993). Media
literate youth and adults can understand the complex messages received from television, radio, Internet,
newspapers, magazines, books, billboards, video games, music, and all other forms. of media. Therefore,
media literacy skills are included in the educational standards in language arts, social studies, health,
science, and other subjects. Many educators have discovered that media literacy is an effective and
engaging way to apply critical thinking skills to a wide range of issues. (http:// medialiteracyproject,org)
The Ontario Ministry of Education (1989) stressed that media literacy means helping students develop an
informed and critical understanding of the nature of mass media, the techniques used and their impact. It
aims to enhance students' understanding and appreciation how media work, how they produce meaning,
how they are organized, and how they construct reality. More so, it intends to provide students the ability
to create media products (http://www.medialit. org).
Media literacy therefore, is the ability to identify different types of media from wide array of sources and
understand the messages they bring (Hobbs, 1997).
But most of all, these have one thing in common: that someone created it for a reason. Therefore,
understanding that reason is the basis of media literacy.
Social Media
Social media is a term that describes websites to connect people and involve user-generated content,
which is the hallmark of a social media site. It is sometimes called Web 2.0, which is currently a huge
opportunity to reach target audience and increase online sales (Go, 2019)
The UNESCO defines it as the set of competencies to search, critically evaluate, use and contribute
information and media content wisely; the knowledge of one's rights online; refraining from cyberbullying;
understanding related ethical issues; and engaging with media and ICTs to promote equality, free
expression, intercultural/interreligious' dialog, peace, etc. (UNESCO,2016).
Aspects of MIL
According to Reineck and Lublinski (2015), MIL is the optimal outcome of media, information and
communication technology (ICT) education along three aspects: technical skills, critical attitudes and facts
about media and ICT. Technical skills involve ability to access and use computers, mobile and other
technical devices that offer media and information content. UNESCO's (2011) MIL curriculum delves on
“accessing information. effectively and efficiently” as an aspect put into practice.
Baacke (1996) included compositional skills in his media competence model that involves creating new
kinds of media content, encouraging self-determination, and increasing individuals' chances for
participation. MIL also involves performative aspect that entails the competence to do rather than just to
know certain things.
Moeller (2009) summarized the facets of MIL from the user perspective, emphasizing media consumers in
identifying news and understanding media's role in reshaping the global issues. Norbert Groeben (2002)
pointed out the importance of knowledge of the inner workings(contexts, routines, contents) and the
effects of media. Fostering certain attitudes toward media and other information sources involves both
being critical on the negative impact of media and defending it against sources of influence.
Disadvantages of Media
1. They lead to individualism. Spending too much time on the Internet and watching television
usually impedes socialization with friends, family and others.
2. Some media contents are not suitable for children.
3. A newspaper is geographically selective.
4. The increase in advertisements in television and radio makes them less attractive.
5. The internet can be a possible way for scams, fraud and hacking.
6. Media can be addictive that may result in people's decreased productivity.
7. They can cause health hazards, such as radiation effects, poor eyesight, hearing defects, and
others.
8. They may induce drugs and alcohol use.
9. They can lead to personal injury by imitating the stunts showcased in media.
10. They can ruin reputation through an anonymous account, malicious scandals, false accusations
and rumors. (https://www.importantindia.com/22940/media-advantages-disadvantages/)
Lynch (2018) presents six ways to integrate media literacy into the classroom for students to become
media literate while making media education a meaningful and integrated part of classroom practice.
1. Teach students to evaluate media. Students learn to evaluate what they are viewing by
showing them that media changes depending on who created it, the intended audience and the
biases that may be attributed to the source.
2. Show students where to find digital resources and databases. Teachers should provide
students with reliable and safe media sources and trustworthy content. . '
3. Compare/contrast various media sources. In the discussions, distinguish various media
sources and compare elements.
4. Discuss how the media edits and alters. Purposely point out to students examples of media
altering photographs or stories while teaching them to be critical of what they see or read at face
value.
5. Examine the “truth” in advertisements. Let students identify what advertisements are trying to
sell and what promises or ideas are they using to convince them to buy the product.
6. Have students create media. Let students create media websites. appropriate to their levels
such as presentations, videos or websites
Media skills. Although this is given little emphasis in the classroom, Hobbs and Frost (1994) present the
skills that students are able to possess with the media they use in class. To wit: (1) reflect on and analyze
their own media consumption habits; (2) identify the author, purpose and point of view in films,
commercials, television and radio programs, magazine and newspaper editorials and advertising; (3)
identify the range of production techniques that are used to communicate opinions and shape' audience's
response; (4) identify and evaluate the quality of media's representation of the world by examining
patterns, stereotyping, emphasis and omission in print and television news and other media; (5)
appreciate the economic underpinnings of mass media industries to make distinctions between those
media which sell audiences to advertisers and those which do not;(6) understand how media economics
shapes message content; (7) gain familiarity and experience in using mass media. tools for personal
expression and communication and for purposes of social and political advocacy.
Approaches to teaching media literacy. Kellner and Share (2007) mentioned three approaches to
teaching media literacy that would utilize media in pedagogical practice.
1. Media Arts Education Approach. It intends to teach students to value the aesthetic qualities of
media and the arts while using their creativity for self-expression through creating art and media.
2. Media Literacy Movement Approach. It attempts to expand the notion of literacy to include
popular culture and multiple forms of media (music, video, Internet, advertising, etc.)while still
working within a print literacy tradition
3. Critical Media Literacy Approach. It focuses on ideology critiquing and analyzing the politics of
representation of crucial dimensions of gender, race, class, and sexuality; incorporating
alternative media production; and expanding the textual analysis to include issues of social
context, control, resistance, and pleasure.
Utilizing Media across disciplines. Media education can be integrated.in every course discipline. The
following are examples of using media in different subject areas using PPPP (Purpose, Process,
Performance, Product)
Assessing and evaluating media literacy work. Just like any student outputs, media-oriented works should
also be evaluated to assess quality based on standards. Students need regular feedback to be able to
reflect on their progress and develop mastery and that would remind them that it is an important part of
the course.
However, for some teachers, creating assessment and evaluation tools for media education is more
challenging than traditional means due to the lack of technical skills. Also, it is because media education
is all about finding the right questions to ask, rather than learning previously determined answers.
Canada's Center for Digital and Media Literacy prescribed two important steps in creating objectives,
comprehensive and meaningful assessment and evaluation tools for media literacy work, namely:(1) by
using a rubric to assess the work of students; and (2) by framing the expectations within the rubric in
terms of key concepts of media literacy.
However, whenever any form of media is being utilized, there should be a reflection at the end by asking
students how media form has shaped their thinking, decision-making, analysis, choices, values and
interrelationships.
Thus, media educators base their teaching on key concepts for media literacy, which provide an effective
foundation for examining mass media and popular culture. These key concepts act as filters that any
media text has to go through in order to critically respond.
1. Media are constructions. Media products are created by individuals who make conscious and
unconscious choices about what to include and how to present it. It can assess students'
understanding of how media product was created and the analysis of creators' beliefs or
assumptions reflected in the content.
2. The audience negotiates meaning. The meaning of any media product is a collaboration between
the producers and the audience. It can assess students' understanding of concepts and the
elements in a relevant medium or product
3. Media have commercial implications. Since most media production is a business, it makes profits
and it belongs to a powerful network of corporations that exert influence on content and
distribution. It can assess students' knowledge and understanding of the commercial factors
influencing the creation of media product and analysis of how media product is influenced by
commercial factors or the owner.
4. Media have social and political implications. Media convey ideological messages about values,
power and authority and they can have a significant influence on what people think and believe. It
can assess students' knowledge and understanding of how this medium communicates ideas and
values.
5. Each medium has a unique aesthetic form. The content of media depends in part on the nature of
the medium that includes technical; commercial and storytelling demands. It can assess students'
knowledge and understanding of the technical elements of the medium and the tropes, clichés,
codes and conventions of the medium and genre (http:// mediasmarts.ca/digital-media-literacy).
Digital Cyber Literacy
CONCEPT EXPLORATION
Technology has been part of everyone's life, be it at home, in school, or anywhere with every facet of our
undertaking. However, in many instances, we may not be aware that we have been misusing or abusing it
or in another way around, we may find ourselves being used by other people with their malicious motives
using digital tools. Therefore, we may end up being liable or a victim of such irresponsible kind of
technological processing and utilization. It is in this case that we must gain further understanding and
application of digital/cyber literacy, be it on. Personal or professional merit.
Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for full participation in society
that includes knowledge, skills, and behaviors involving. the effective use of digital devices for
purposes of communication, expression, collaboration and advocacy.
Simply, it is the ability of an individual to engage with the digital environment and operate technologies
safely by knowing what to do and what not to do and how to avoid unnecessary risks.
Digital literacy is an individual's ability to access both information and methods of communication through
technological tools, such as smartphones, tablets, laptops and desktop PCs. While digital literacy is
initially focused on digital skills and stand-alone computers, its focus has shifted to network devices,
including the Internet and the use of social media.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks (Cisco,
n.d.). These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information;
extorting money from users; or interrupting normal business processes.
Implementing effective cybersecurity measures is challenging because there are more devices than
people, and attackers are becoming more innovative. Here are some tips on how to protect yourself
against cyber threats.
1. Monitor behavior on social networks. Before posting or uploading something online, try to realize:
(a) Does this need to be public?; and (b) Is it worth the risk? Remember, not only what we share
online is available to friends and family, but also to cybercriminals.
2. Keep devices safe. Protect your technology tools by installing Anti-virus software, a configuration
of settings on the devices and by completing software updates.
3. Understand how best to use passwords. Passwords need to be complex and hard to guess, but
can still be remembered. One strategy is "passphrase" or a password that comes from the first
letter of each word in the phrase. There is also a password manager app to help keep track of all
the passwords called "KeePass" which is free of charge. Importantly, do not use the same
password for all accounts.
4. Handle unsafe content. Know exactly how to respond or react to unsafe situations online, such as
(1) suspicious emails; (2) pop-ups claiming that your computer is infected; and (3) BitTorrent
sites.
5. Consider safety for the future. Take individual responsibility in using devices with an utmost care
and critical thinking when online(https://www.esentire.com).
Cyber Citizenship
Citizenship is an old value that is now applied to a new medium, the Internet. Cyber citizenship refers to
being responsible when 'using the Internet. Doing online when no one is looking speaks a lot about one's
character and morals. The power of this digital world is associated with responsibilities and
consequences.
Therefore, we can explore and navigate all information available online however, we should observe
cyber citizenship or manners and etiquette on the Web.
Internet Safety
Internet safety, online safety or cyber safety means trying to be safe on the Internet. It is maximizing the
user's personal safety and security risks to private information and property associated with using the
Internet, including self-protection from computer crime. As the number of Internet users continues to grow
worldwide, issues and concerns also continuously exist.
Information security. Sensitive information, such as personal information, identity and passwords are
often associated with personal property and privacy and may present security concerns if leaked.
Unauthorized access and usage of private information may result in consequences, such as identity and
property theft.
1. Phishing. It is a common type of scam, of which the scammers disguise as a trustworthy source
in an attempt to obtain private information, such as passwords, credit card information, etc.
through the use of fake websites that look identical and legitimate.
2. Internet scams. These are schemes that deceive the users in various ways in an attempt to take
advantage of them.
3. Malware. It is a malicious software (particularly spyware) disguised to collect and transmit private
information, such as password without the user's consent or knowledge, of which it is impossible
to determine whether a file is infected.
Personal safety and threats. The growth of the Internet gave rise to many important services accessible
to anyone with a connection, such as digital communication. While it allows communication with others, it
is also being grabbed by malicious users for bad intent. The following are common threats to personal
safety.
1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or harass an
individual, group or organization through false accusations, defamation, slander and libel,
intentional monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering
information that may be used to threaten, embarrass or harass.
2. Cyberbullying. It is the use of electronic means, such as instant messaging, social media, e-mail
and other forms of online communication with the intent to abuse, intimidate, or overpower an
individual or group.
3. Online predation. It is the act of engaging an underage minor .into inappropriate sexual
relationships through the Internet. Online predators may attempt to initiate and seduce minors
into relationships through. the use of chat rooms or Internet forums. The behavior characteristics
are categorized into three groups: A) Manipulative-typically a child molester; B)·Opportunist -
typically a rapist; and C) Coercive - being a mixture of both rapists and child molesters.
4. Obscene/offensive content. Various websites on the Internet contain material that may deem
offensive, distasteful or explicit, which may often not be of the user's liking. Such websites may
include the Internet, shock sites, hate speech or otherwise, and inflammatory content. Such
content may manifest in many ways, such as pop-up ads and unsuspecting links.
5. Sextortion. It is the use of webcams for flirting and cybersex. Often, this involves a cybercriminal
posing as someone else, such as an attractive person initiating communication of a sexual nature
with the victim. The video is recorded by the cybercriminal to demand money or other services,
threaten to publicly release the video and send to family members and friends of the victim if they
do not comply.(https://en.wikipedia.org/ wiki/Internet safety)
A threat, in the context of computer security, refers to anything that has the potential to cause serious
harm to a computer system. It is something that may or may not happen, but has the potential to cause
serious damage and can lead to attacks on computer systems and networks
(https://www.techopedia.com).
Cybercrime is now becoming alarming in the life of every individual and the organization as they intend to
steal information that they can sell or trade, such as financial details, credit card information, personal
details, or any other information using computer networks.
Likewise, while email has been the main method for the spread of computer viruses, it can also enter a
network by the USB device, Internet download, visiting an infected website, instant messaging or
messaging in social media platforms, file transfer and file-sharing programs, or by remote users
connecting directly to the corporate network with an infected PC. Once a computer virus gets into a
network, it can spread from computer to computer in multiple. ways.
Given the numerous ways a computer virus can spread, the following are ways on how to ensure that
computer networks can be protected.
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all computers,
including all servers, PCs and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released daily
and so it is essential that computers are protected by keeping the anti-virus software-up-to-date.
3. Employ a firewall to protect networks. As computer viruses can spread by means other than
email, it is important that unwanted traffic is blocked from entering the network by using a firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly used by
computer viruses to spread themselves, such as .EXE,.COM and SCR files. These should be
prevented from entering the network.
5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to never open an
attachment or to click on a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files downloaded from the Internet are scanned against
computer viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted source for software
requirements to be installed and ensure it can be accounted for their names. This can leave the
cyberbully anonymous and difficult to be caught or apprehended for his/her behavior:
8. Implement a vulnerability management system. It is important to regularly review network and the
applications running on it for new vulnerabilities and a plan on how to manage them, either by
patching or upgrading them using tools, such as firewalls or Intrusion Detection Systems that.
Should be put in place.
9. Make regular backups of critical data. There is a need to keep important files on removable
media, such as portable drives or tape for back-up in the event that the network is infected with a
computer virus.
10. Develop an Information Security Policy. The creation and publication of an Information Security
Policy is key to ensuring that information security receives the profile it requires in order to secure
the systems and data.
11. Monitor logs and systems. Regular monitoring of network and system logs can assist in the early
identification of a computer virus infecting the network or other attacks by criminals.
12. Develop an Incident Response Plan. The incident response plan outlines the roles and
responsibilities of people in the event of a computer virus infecting the network or any other type
of security breach.
13. Restrict end-user access to the systems. Where possible, end users are prohibited from access
to the system so that the virus will also be restricted. (https://bhconsulting.ie/computer-security-
threats-solutions/)
Cyberbullying
Cyberbullying, cyber harassment or online bullying is a form of bullying or harassment using electronic
means usually among minors in a school setting and has become increasingly common, especially
among teenagers.
It is an aggressive, intentional act or behavior that is carried out by a group or an individual using
electronic forms of contact, repeatedly against a victim who cannot easily defend him or herself. The
National Crime Prevention Council defines it as a process of using the Internet, cell phones or other
devices to send or post texts or images that intend to hurt or embarrass another person. It may also
include public actions, such as repeated threats, sexual remarks, pejorative labels or defamatory false
accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking
into or vandalizing sites about a person, and posting false statements to discredit the targeted person.
Cyberbullying is similar to traditional bullying, It is just that victims may not know the identity of their bully
and the reason for bullying them. Cyberbullies may disclose victims' personal data on websites or forums-
called doxing, or may use impersonation, and create fake accounts, comments or sites for the purpose of
publishing material in their names. This can leave the cyberbully anonymous and difficult to be caught or
apprehended for his/her behavior.
Cyberbullying types. There are various types of cyberbullying and research has revealed serious
profound consequences on victims.
1. Internet trolling is a common form of bullying over the Internet in an online community to elicit a
reaction, disruption or intentionally provoke and offend others.
2. Cyberstalking is another form of bullying or harassment that uses electronic communication to
stalk a victim and pose a credible threat to harass him/her.
Implications of bullying in schools. Schools should initiate various anti-bullying programs and
campaigns to protect students from being threatened or victimized by such offense. More so, teachers
should be oriented and trained in handling bullying cases and executing teaching strategies to address
and reduce bullying cases in class. Also, schools should conduct student empowerment activities that can
be engaged in by students, including the bullies to divert their attention and energy into something
worthwhile and engagements that they can be busy about.
Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers or the Internet. Cybercrime
uses tools like phishing, viruses, spyware, ransomware and social engineering to break the law (https://
www.avast.com/c-cybercrime).
On the other hand, cybercrime is defined by Techopedia as a crime with the computer as the object of the
crime (i.e. hacking, phishing, spamming) or is used as a tool to commit an offense (i.e. child pornography,
hate crimes). Cybercriminals may use computer technology.to access personal and confidential
information or use the Internet for exploitative or malicious purposes.
There is a wide variety of cybercrimes, which can broadly be placed into two categories: one-off crimes,
such as installing a virus that steals your personal data; and ongoing crimes, such as cyberbullying,
extortion, distributing child pornography or organizing terrorist attacks (https://www.avast.com/c-
cybercrime).
Cybercrime may also be referred to as computer crime practiced by those who have technological skills
and use the Internet to achieve their bad motive. Cybercriminals employ their diverse skill to access bank
accounts, steal identities, blackmail, defraud, stalk, and harass or use a compromised computer to attack
their victims. Criminals can also use computers for communication and document or data storage and
those, who perform these illegal activities, are often referred to as hackers.
On the other hand, malware downloaded from the computer may slow it down and prompt it to give error
messages. Likewise, phishing attacks usually involve receiving emails from unknown sources while trying
to trick someone into giving up his/her passwords or personal data. Keyloggers leave their own telltale
signs, like strange icons, or duplicating the messages.
Techopedia cites common types of cybercrime that include online bank information theft identity theft,
online predatory crimes, unauthorized computer access, and the most serious one like cyberterrorism.
Cybercrime encompasses a wide range of activities that can be categorized as: (1) crimes that target
computer networks or devices, including viruses and denial-of-service (DoS) attacks; and (2) crimes that
use computer networks to advance other criminal activities, including cyberstalking, phishing and fraud or
identity theft. (https://www.techopedia.com/definition/2387/cybercrime)
Commonly, this is important among schools in doing researches and other related works. Therefore, this
aspect needs to. be explored by teachers and students in doing their, works.
Surfing the Web. The following are the three key: factors in surfing the web.
1. Most surfing sessions start with the user-targeted keywords about the subject into a search
engine.
2. Good strategies for searching the Web include writing research questions; extracting keywords
from the questions and typing them into a search engine using synonyms if the keywords do not
bring up desired results; keeping track of keywords and synonyms used; and recording the
results of search.
3. Always be cautious about the information shared online and in visiting websites.
Assessing credibility. Different websites accessible on the Web can make the job of researchers very
challenging. Carefully evaluate the information searched online. Consider the credibility, or
trustworthiness and reliability of the content before taking it. There are two types of websites:
informational and commercial. Informational Websites usually strive to offer credible content.to users
while commercial websites present inaccurate information in order to see something.
Checklist of credibility criteria. The first step in evaluating the credibility of websites is to review several
important aspects of the site.
1. Author.Check the credentials of the author, the company or the expert and determine the
qualifications to provide information on the subject being researched. Some websites do not list
specific authors, but the credibility of a company can be explored by reviewing the site's "About”
page, if available.
2. Date. Look for copyright information at the bottom of a website's home page. If the site is more
than a few years old and it has not been updated regularly, look for more up-to-date information.
3. Purpose. Analyze the goals of the website to determine if it is an informational or an
advertisement site.
4. Contact. Most credible websites list down contact information, such as telephone number, email
address, or mailing address so that users may get in touch if they have questions.
5. Fact vs. Opinion. When doing research for a school paper, go to sites that present factual
information provided by experts, rather than opinions. Be on the lookout for biases, too. If the
author is biased, so as the information on the site.
6. URL. The URL may look like ending in .edu (for education),.gov (for government), .org (for
organization), .com (for commercial sites), or .net (for network sites). Different websites have
different URLs. To help determine a site's credibility, determine if that is a personal website or
blog, a government website, or other types of website.
Common credible URLS. One way of determining the credibility of a website is through the URLS.
Although a website's URL gives clues as to credibility, there is still a need to evaluate it carefully.
1. When encountering a URL, look at the letters that appear after the
“dot"(i.e.www.whitehouse.gov.) and that is called top-level domain. Thus, the URL's top-level
domain helps in determining a site's credibility.
2. Websites ending in .gov are government-related websites, which generally, can be trusted to
provide credible statistical information, articles on many different topics and government news.
3. Websites ending in edu are the websites of educational institutions, such as colleges and
universities that usually offer a variety of credible data, especially about the school's operations
and research. Since students may create websites with an .edu top-level domain, but they may
contain inaccurate or biased information.
4. Websites ending in org are the websites of organizations. While many organizations, especially
nonprofit ones, provide credible information, they may sometimes have advertising intent. Since
some organizations show bias in their provided information, so evaluate .org sites carefully.
Recognition of information sources. Similar to the information in print sources, the use of online
sources must be given credit to the authors. This can be done by applying proper referencing and citation
procedures that would get rid of risks, consequences and legal implications because of the copyright
issue, which means that the ideas and words used belong to the author.
Citation. Each entry in the bibliography is called a citation. Proper citation must be applied or included for
every source used whether it is a website, a newspaper, or a book. Online sources are cited differently
because they are different from traditional print sources. There are different formats used to cite the
sources.
Data privacy implication. The implementation of data privacy in the country is becoming stronger and
powerful, especially in utilizing data for research and other forms of report and paper works. This has also
corresponding legal implications once not processed immediately and properly. It involves uploading of
pictures, designs, graphics, concepts/ideas, frameworks, art work, data, and other information that are
copyrighted without the consent of the author or the source. These are commonly observed in schools.
Research and data collection protocols. When researching and collecting data from the Web, avoid
plagiarism, which is the act of taking someone else's work and presenting it as your own (Turnitin. com).
Plagiarism is unethical, and it can bring you in trouble. Sometimes, students don't mean to plagiarize, but
they end up doing it .accidentally because they are unaware or unclear about it.
The following are 10 types of plagiarism that teachers, researchers and students should know. ,
1. Clone Plagiarism. It is also called identical copying or copying another work (word-for-word)
without any change and claim as his/her own work.
2. Remix Plagiarism. It refers to collecting information from various sources and mixing all together
as a single document then, claiming the work as their own work.
3. Ctrl+C Plagiarism. This is when a significant portion of text copied from any single source
without any alteration in a written document.
4. Hybrid Plagiarism. Here, perfectly cited source documents are copied and arranged as a new
document without citation.
5. Find-Replace Plagiarism. This is changing the most common keywords and phrases in the
copied content but not making any changes in the essential document.
6. Recycle Plagiarism, Also called self-plagiarism, it refers to the act of borrowing from one's own
previous document without proper citation.
7. Mashup' Plagiarism. It is when the written document is copied from more than one source and
all are mixed together without proper citation.
8. 404 Error Plagiarism. Here, a person creates a document by copying from various sources
prepared as a single document with the citation but Inaccurate or leads to non-existing resources.
9. Aggregator Plagiarism. Here, the written document includes proper citation but it does not
contain original work.
10. Re-Tweet Plagiarism. Here, all written documents look perfect with properly cited mark but still,
the document resembles somewhere the original text's structure or wordings.
Impact of integrating digital literacy in the classroom on teachers, families and friends.
Integrating digital literacy in the classroom can bring a positive impact on students' learning as evidenced
by the following:
1. It motivates students in their learning due to their enjoyment and ease of use with various
technological mediums.
2. It teaches students of various learning styles and multiple intelligences.
3. It allows students to create and design their own unique products reflective of their personalities
and learning needs/ styles.
4. It encourages students to manipulate media in constructing their own meaning.
5. It enables students to share their learning with teachers, families and friends.
6. It gives students the chance to explore technological media that inevitably increase the job skills
needed in the workforce.
(http://purposefultechnology.weebly.com/how-can-we-embed-digital-literacy-in-the-classroom.htm/
BUILDING AND ENANCING NEW LITERACIES ACROSS THE CURRICULUM
EDUC.110
MODULE 5
FINANCIAL LITERACY
CONCEPT EXPLORATION
In some instances, teachers are confronted with issues and concerns on financial debt, being victimized
by fraud and other related scams, both personal and electronic ways. More so, some teachers are
drowned by emergent financial needs and unexpected debt, especially in difficult times, sickness and
inevitable circumstances and calamities. Others do not prepare for their retirement that they usually end
up highly frustrated. This is the reason why financial literacy has been a subject in many faculty
development programs, seminars, and even becomes a topic for researches, while many schools have
integrated it in the curriculum.
Financial literacy is a core life skill in an increasingly complex world where people 'need to take charge
of their own finances, budget, financial choices, managing risks, saving, credit, and financial transactions.
Poor financial decisions can have a long-lasting impact on individuals, their families and the society
caused by lack of financial literacy. Low levels of financial literacy are associated with lower standards of
living, decreased psychological and physical well-being and greater reliance on government support.
However, when put into correct practice, financial literacy can strengthen savings behavior, eliminate
maxed-out credit cards and enhance timely debt.
Financial literacy is the ability to make informed judgments and make effective decisions regarding the
use and management of money. Hence, teaching financial literacy yields better financial management
skills.
The importance of starting financial literacy while still young. National surveys show that young
adults have the lowest levels of financial literacy as reflected in their inability to choose the right financial
products and lack of interest in undertaking sound financial planning. Therefore, financial education
should begin as early as possible and be taught in schools. Akdag (2013) stressed that in the recent
financial crisis, financial literacy is very crucial and tends to be advantageous if introduced in, the very
early years as preschool years. Financial education is a long-term process and incorporating it into the
curricula from an early age allows children to acquire the knowledge and skills while building responsible
financial behavior throughout each stage of their education (OECD, 2005).
Likewise, financial literacy is the capability of a person to handle his/her assets, especially cash more
efficiently while understanding how money works in the real world.
Financial Plan
Teachers need to have a deeper understanding and capacity to formulate their own financial plan. It is
wise to consider starting to plan the moment they hand in their first salary, including the incentives,
bonuses and extra remunerations that they receive.
There are three key areas in setting investment goals for consideration.
A. Time horizon. It indicates the time when the money will be needed. To note, the longer the time
horizon, the more risky (and potentially more lucrative) investments can be made.
B. Risk tolerance. Investors may let go of the possibility of a large gain if they knew there was also
a possibility of a large loss (they are called risk averse); while others are more willing to take the chance
of a large loss if there were also a possibility of a large gain (they are called risk seekers). The time
horizon can affect risk tolerance.
C. Liquidity needs. Liquidity refers to how quickly an investment can be converted into cash (or the
equivalent of cash). The liquidity needs usually affect the type of chosen investment to meet the goals.
D. Investment goals: Growth, income and stability. Once determined the financial goals and how
time horizon, risk tolerance, and liquidity needs affect them, it is time to think about how investments may
help achieve those goals. When considering any investment, think about what it offers in terms of three
key investment goals: (1) Growth (also known as capital appreciation) is an increase in the value of an
investment; (2) Income, of which some investments make periodic payments of interest or dividends that
represent investment income and can be spent or reinvested; and(3) Stability, or known as capital
preservation or protection of principal.
An investment that focuses on stability concentrates loss on increasing the value of investment and more
on trying to ensure that it never loses value and can be taken when needed
(https://www.flexscore.com/eamingcenter/setting-financlal-and investment-goals).
Step 1: Set realistic goals. Goals for the money will help make smart spending choices upon deciding on
what is important.
Step 2: Identify income and expenses. Upon knowing how much is earned each month and where it all
goes, start tracking the expenses by recording every single cent.
Step 3: Separate needs from wants. Set clear priorities and the decisions become easier to make by
identifying wisely those that are really needed or just wanted.
Step 4: Design your budget. Make sure to avoid spending more than what is earned. Balance budget to
accommodate everything needed to be paid for.
Step 5: Put your plan into action. Match spending with income time. Decide ahead of time what you will
use each payday. Non-reliance to credit for the living expenses will protect one from debt.
Step 6: Plan for seasonal expenses. Set money aside to pay for unplanned expenses so to avoid going
into debt.
Step 7: Look ahead. Having a stable budget can take a month or two so, ask for help if things are not
getting well.
Spending
If budget goals serve as a financial wish list, a spending plan is a Way to make those wishes a reality.
Turn them into an action plan. The following are practical strategies in setting and prioritizing budget
goals and spending plan:
1. Start by listing your goals. Setting budget goals requires forecasting and discussing future
needs and dreams with the 2. family.
2. Divide your goals according to how long it will take to meet each goal
Classify your budget goals into three categories: short-term goals (less than a year), medium-
term goals (one to five years), and long-term goals (more than five years). Short-term goals
are usually the immediate needs and wants; medium. term goals are things that you and your
family want to achieve during the next five years; and long-term goals extend well into the
future, such as planning for retirement.
3. Estimate the cost of each goal and find out how much it costs. Before assigning priority
to goals, it is important to determine the cost of each goal. The greater the cost of a goal, the
more alternative goals must be sacrificed in order to achieve it.
4. Project future cost. For short-term goals, inflation is not a big factor, but for medium and
long-term goals, it is a big factor. To calculate the future cost of the goals, there is a need to
determine the rate of inflation applied to each particular goal.
5. Calculate how much you need to set aside each period. Upon knowing the future cost of
the goaIs next is to determine how much to put aside each period to meet all the goals.
6. Prioritize your goals. Upon listing down all the goals and the estimated amount needed for
each goal, prioritize. Them. This serves as guide in decision-making.
7. Create a schedule for meeting your goals. It is important to lay down all the goals
according to priority with the corresponding amount of money needed, the time it will be
needed, and the installments needed to meet the goals.
(https://www.flexscore.com/learningcenter/the-spending-plan-setting-and-prioritizing-your-budget-goals)
Savings
In order to get out of debt, it is important to set some money aside and put it into a savings account on a
regular basis. Savings will also help in buying things that are needed or wanted without borrowing.
Emergency Savings Fund. Start as early, setting aside a little money for emergency savings fund. If you
receive a bonus from work, income tax refund or earnings from additional or side jobs, use them as an
emergency fund.
Here are some of the most common financial scams, along with ways to identify them early and how to
protect one's self from being
A. Phishing. Using this common tactic, scammers send an email that appears to come from
a financial institution, such as a bank and asks you to click on a link to update your account
information. If you receive any correspondence that asks for your information, never click on the
links or provide account details. Instead, visit the company's website, find official contact
information, and call them to verify the request.
B. Social Media Scams. Scammers are adept at using social media to gather information
about the traveling habits of potential victims. They also have phishing tactics, including posts
seeking charity donations with bogus links that allow them to keep your money. Therefore, be
conscious of the information you post online, especially personal details unoccupied. and plans
for a vacation that you would leave your house
C. Phone Scams. Another prevalent tactic is scamming phone calls. The scammers pose
as a government agency, such as the Bureau of Internal Revenue or local law enforcement
agencies and use scare tactics to acquire your personal information and account numbers. Never
provide your account information over the phone. Look for the agency's contact information and
call them to verify any request. To note, money. government agencies will never text or call you to
ask for
D. Stolen Credit Card Numbers. There are numerous ways that scammers can obtain your
credit card information, including hacking, phishing, and the use of skimming devices, such as
small card readers attached to unmanned credit card readers (i.e. ATMs, gas pumps, and more).
These small devices pull data from your card when you swipe it. Before you use an ATM or swipe
your card, look for suspicious devices that may be attached to the card reader.
E. Identity Theft. Depending on the amount of information a scammer is able to obtain,
identity theft may extend beyond unauthorized charges on a debit or credit card. If scammers are
able to obtain your Social Security number, date of birth, and other personal information, they
may be able to open new accounts in your name without your knowledge. Be aware of an
information you share and with whom, and always shred sensitive information before disposing it.
By taking preventative measures and being aware of scams, you can minimize the risks of fraud.
Monitoring your online or mobile banking accounts daily can also help you see fraudulent charges quickly.
(https://www.regions.com/Insights/Personal/Financial-Hardship/Disaster-eoovery/common financial
scams-to-avoid)
Financial Scams among Students. Students can also be susceptible to different financial scams and
fraud. Learning how to manage finances and being aware of financial scams are skills that every student
should master.
The following are common financial scams that students should watch out for and learn to protect one's
identity and finances.
A. Fake scholarships. While it is beneficial for students to apply for as many scholarships, it is
important to become aware of related scams and frauds. Students should thoroughly; check scholarship
sources before applying to verify legitimacy. Never apply for a scholarship that asks for money in return.
B. Diploma. Mills. There are schools that offer fake degrees and diplomas: in exchange for a fee.
Check from government education agencies the prospective school to enroll in if it is government-
recognized, legitimate or accredited.
C. Online book scams. While, students, often go for the best deals on textbooks online, scammers
can use this opportunity to get students' credit 'card information. When buying anything online, be sure to
do it on a credible site.
D. Credit card scams. Oftentimes, credit card companies go to school campuses to convince
students to fill out card applications. Scammers may also grab this chance to steal students' information.
It is important to visit a local credit union or bank for credit card application. Also, regularly check the
credit card statement and once there are any unrecognized charges, contact your banking institution
immediately.(https://www.adt.com/resources/financial-scam-safety)
There are various types of insurance to choose from, such as life insurance, health insurance, motor
insurance, property insurance, business insurance, etc. Besides, the financial protection derived from
insurance entails tax benefit claim on the paid premiums.
The following are concepts related to insurance and taxes that every teacher should know. However,
he/she should carefully analyze and critically examine well before pursuing any deal with them.
1. Employer-Sponsored Insurance. If working in a company with 50 or more full-time employees, the
employer is required to provide employee-only insurance that meets minimum guidelines. .
Examine the plan offered, but do not pay over 9.66 percent of household income in premiums.
2. Marketplace Plans. Marketplace plans are available based on an area of residence and income
upon meeting minimum coverage requirements. Marketplace plans come in three tiers: bronze,
silver and gold. Generally, bronze plans offer the least coverage at the lowest premiums, while
gold plans provide the most coverage at the highest price.
Life insurance. Life insurance is a type of insurance that compensates beneficiaries upon the death of
the policyholder. The company will guarantee a payout for the beneficiaries in exchange of premiums.
This compensation is called “death benefit.”
Depending on the type of insurance one may have, these events can be anything from retirement to
major injuries, to critical illness or even to death.
1. Preferred Plus-The policyholder is in excellent health, with normal weight, no history of smoking,
chronic illnesses, or family history of any life-threatening disease.
2. Preferred-The policyholder is in excellent health but may have minor issues on cholesterol or
blood pressure but under control.
3. Standard Plus-The policyholder is.in very good health but some factors, like high blood pressure
or being overweight impede a better rating.
4. Standard-Most policyholders belong to this category, as they are deemed to be healthy and have
a normal life expectancy although, they may have a family history of life-threatening diseases or
few minor health issues.
5. Substandard - Those with serious health issues, like diabetes or heart disease are placed on a
table rating system, ranked from highest to lowest. On average, the premiums will be similar to
Standard with an additional 25% lower claim on table ratings.
6. Smokers- Due to an added risk of smoking, the policyholders in this category are guaranteed to
pay more. Aside from health class, age is also a critical factor in determining premiums.
Therefore, older people pay more expensive premiums.
Financial Stability
Like anyone else, teachers also aim to become financially stable if not today, maybe in the future. Being
financially stable means confidence with the financial situation, worriless paying the bills because of
available funds, debt-free, money savings for future goals and enough emergency funds.
Financial stability is not about being rich but rather more of a mindset. It is living a life without worrying
about how to pay the next bill and becoming stress-free about money while focusing energy on other
parts of life (Silva, 2019).
In support, Barry (2013) underscored that financial literacy has a wide repercussion outside the family
circle and more precisely, the school. Hence, administrators and professors need to develop a curriculum
that would provide students insights on having the value of financial literacy Including the effect it can
bring them.
Moreover, there should be a learning framework, which sets out goals, learning outcomes, content,
pedagogical approaches, resources and evaluation plans. The content should cover knowledge, skills,
attitudes and values. A sustainable source of funding should be identified at the outset.
Financial education should Ideally be a core part of the school curriculum. It can be integrated into other
subjects like, mathematics, economics, social, studies, technology and home economics, values
education and others. Financial education can give a range of 'real-life' contexts across a range of
subjects.
Teachers should be adequately trained and resourced, made aware of the importance of financial literacy
and relevant pedagogical methods and they should receive continuous support to teach it or integrate in
their lesson. More so, there should be easily accessible, objective, high-quality and effective learning
tools and pedagogical resources available to Schools and teachers that are appropriate to the level of
study. Students’ progress should also be assessed through various high impact modes.