Wednesday, October 1, 2025

VE8 Q2W5D3: Integrity Online

Integrity Online

Day 3: Integrity Online — Responsible Digital Citizenship

Your online choices travel fast and last long. Today you will practice acting with integrity in digital spaces: checking sources, giving credit, protecting privacy, and communicating with respect. We will connect key ideas—digital footprint, consent, misinformation, and plagiarism—to daily actions like posting, sharing, and creating media. You will analyze short cases, test a fact-check flow, and draft clear guidelines for your own accounts. By the end, you will be ready to make posts you can be proud of tomorrow.

  • Subject: Values Education
  • Grade: 8
  • Day: 3 of 4

By the end of the lesson, you will be able to:

  1. Apply a 4-step fact-check flow to verify a post and justify your decision to share or stop in 3–4 sentences.
  2. Differentiate plagiarism, remix, and fair credit by labeling at least five examples correctly and writing proper attributions.
  3. Design a 5-line personal posting policy that protects privacy, honors consent, and prevents harm.
  • Digital Footprint — the lasting record of actions, posts, and data online.
  • Consent — permission to share someone’s image, words, or information.
  • Misinformation — false or misleading content shared without careful verification.
  • Plagiarism — using others’ words/media as your own without credit.
  • Attribution — giving proper credit (creator, title, source, date if available).
  • Privacy — control over who sees personal data and how it is used.
  • Two-Factor Authentication (2FA) — extra login step to secure accounts.

Warm-up: Answer briefly, then check each hidden key.

  1. Name one post you’re proud of and why.
  2. Show Answer Sample: A project summary with clear sources and respectful tone.
  3. What is one risk of oversharing?
  4. Show Answer Unwanted contact, embarrassment later, or identity theft risk.
  5. How can credit improve trust online?
  6. Show Answer It shows honesty, helps others find the original, and respects creators.

How to use this section: Work through each checkpoint. Each includes a mini-goal, guided discussion, real-life tie-in, mini-summary, and three guiding questions with hidden answers.

Checkpoint 1 — Your Digital Footprint

Mini-goal: Understand how posts and metadata form a lasting record of your values.

Guided discussion: Every click can leave traces: posts, comments, likes, tags, locations, and device data. Even deletions may live on in screenshots or archives. This footprint shapes how future classmates, teachers, or employers see you. A helpful rule: imagine your future self reading today’s post aloud to a group you respect. Would you still share it? Footprints are not only risks—they are chances to show growth, kindness, and skill. Think of your account as a portfolio: what patterns would a stranger see? Integrity means aligning your online record with your real values, even when no adult is watching. Small habits—checking tone, using privacy controls, and refusing gossip—build a footprint you can stand by.

Real-life tie-in: A team application asks for your public profiles. Your steady record of respectful comments and credited work strengthens your chances.

Mini-summary: Your footprint is your story. Choose posts that future-you can defend.

  1. List two parts of a digital footprint beyond posts.
  2. Show Answer Comments, likes, tags, locations, device/metadata.
  3. Why might “delete” not erase harm?
  4. Show Answer Screenshots, shares, and archives can persist.
  5. Write one “future-self” test line.
  6. Show Answer “Would I be proud reading this to my teacher and family next year?”

Checkpoint 2 — Consent and Privacy in Sharing

Mini-goal: Apply consent and privacy principles before posting others’ images or stories.

Guided discussion: Consent means asking before sharing anything that identifies someone—face, name, uniform, ID, address, or private messages. Silence is not consent. Respectful asking includes context (“Where will it be posted? Who will see it? Can they change their mind later?”). Even with “public” content, dignity matters: zooming in on a stranger’s mistake to get views may be legal but not ethical. Privacy settings help, but the safest protection is thoughtful judgment. Group photos? Ask the group or blur faces. Class screenshots? Remove names. If you’re unsure, don’t post. If you already posted and someone objects, remove it quickly and apologize for the impact.

Real-life tie-in: Your friend aces a contest. Before posting their photo, you ask permission and share the caption you plan to use. They feel respected and proud.

Mini-summary: Consent protects dignity; privacy choices protect safety. Ask first, post later.

  1. What details can identify a person online?
  2. Show Answer Face, name, voice, school logo, uniform, location, handles, private messages.
  3. How do you repair a consent mistake?
  4. Show Answer Remove content promptly, apologize clearly, and confirm the person is satisfied.
  5. Write a respectful consent request.
  6. Show Answer “Can I post this photo on my class page today? About 200 people will see it. Okay if I tag you?”

Checkpoint 3 — Spotting Misinformation: A 4-Step Flow

Mini-goal: Use a quick flow to decide whether to share or stop.

Guided discussion: Try this flow: Pause (notice emotion spikes; misinformation rides on anger or surprise). Source (who published it? credible outlet? official page? Is the account verified and consistent over time?). Corroborate (can two independent, reliable sources confirm the claim? reverse image search or check date/context). Context (is the claim satire, old news reused, or edited out of context?). If any step fails, stop and label it privately: “unverified.” Sharing wrong info—even with good intent—can harm people and your own credibility. If it’s urgent (safety), share official guidance, not rumors. When corrected, thank the person and update your post; this models integrity.

Real-life tie-in: A viral post claims a school closure. You run the flow and find no official notice. You avoid spreading confusion and wait for verified updates.

Mini-summary: Pause, Source, Corroborate, Context—four steps that protect trust.

  1. Why do emotions matter in verification?
  2. Show Answer Strong emotions can bypass careful thinking; pausing reduces impulsive sharing.
  3. Name two signs of a credible source.
  4. Show Answer Clear authorship, consistent reporting, corrections policy, official domain.
  5. How can images mislead?
  6. Show Answer Old photos reused, cropped context, or AI/edited images.

Checkpoint 4 — Credit, Remix, and Plagiarism

Mini-goal: Give proper credit and avoid academic or creative dishonesty.

Guided discussion: Creativity builds on others’ work, but integrity requires attribution. Plagiarism is presenting someone’s words, ideas, code, or media as your own. Attribution includes creator, title/description, and source link or reference; add date if available. Remix means transforming with your own analysis or style while still crediting the base materials. Quoting? Use quotation marks for exact words. Paraphrasing? Use your own structure and vocabulary and still cite. For images and music in projects, prefer materials you created yourself or works that allow reuse with credit. When in doubt, ask your teacher about acceptable references for the assignment.

Real-life tie-in: Your video project includes background music. You swap it for a track you composed and add credits for photos. Your grade—and reputation—benefit.

Mini-summary: Credit is respect in action. Cite clearly; create honestly.

  1. Write a one-line attribution for a photo you found.
  2. Show Answer “Photo by A. Cruz, ‘Sunrise Over Bay,’ accessed 2025, source: example-site.”
  3. Is paraphrasing without credit acceptable?
  4. Show Answer No. Ideas still require attribution even when reworded.
  5. What makes a remix original?
  6. Show Answer Meaningful transformation—new purpose, structure, analysis, or style—with clear credit.

Checkpoint 5 — Kind Communication: Comment, Don’t Combust

Mini-goal: Write comments that reduce harm and increase understanding.

Guided discussion: Online, tone is easy to misread. Before you hit “send,” shrink your message: fewer words, clearer purpose. Use respectful starters: “I see it differently because…,” “Could you share the source?,” or “I felt hurt by that joke; can we avoid targeting people?” Avoid pile-ons and sarcasm; they escalate quickly and can become harassment. If a thread turns hostile, step back, report when needed, and move to a private, calm channel. Public shaming can cause long-term harm. If you caused harm, repair directly: apologize, remove the post, and ask what would help. Kindness is not weakness; it’s skill.

Real-life tie-in: A classmate posts a risky dare video. You message privately: “I care about your safety; I’m worried this encourages harm. Can we take it down?”

Mini-summary: Clear, respectful, brief messages protect dignity and keep dialogue open.

  1. Write a respectful disagreement line.
  2. Show Answer “I see it differently because the data says ___. Could we check together?”
  3. When should you move a conflict off a public thread?
  4. Show Answer When emotions are high, privacy is needed, or safety/consent is involved.
  5. What are two repair steps after a harmful post?
  6. Show Answer Apologize specifically and remove/replace the post; check what the person needs.

Checkpoint 6 — Security Basics: Protect What Protects You

Mini-goal: Keep accounts safe with simple, high-impact habits.

Guided discussion: Good security enables integrity: you can’t stand by your posts if someone hijacks your account. Use strong, unique passphrases (four random words or 12+ characters mixing types). Turn on 2FA using an authenticator app or text codes. Beware of links that ask for logins; type the site address yourself. Update apps and systems to patch vulnerabilities. Lock devices with PINs or biometrics. Back up important school work to trusted storage. Security is everyone’s job: one weak account in a group can expose others’ data. If a breach occurs, change passwords immediately, log out other sessions, and alert people who might be affected.

Real-life tie-in: Your club account gets a suspicious “verify now” message. You ignore the link, open the official app, and see no alert. Crisis avoided.

Mini-summary: Strong passwords, 2FA, updates, and caution with links keep your voice yours.

  1. Why use different passwords for different sites?
  2. Show Answer If one leaks, others remain safe.
  3. What’s a safe response to a login alert message?
  4. Show Answer Do not click the link; go to the official site/app directly and check.
  5. Name one device habit that protects privacy.
  6. Show Answer Use a screen lock; disable previews on the lock screen; keep updates on.

Checkpoint 7 — Your Posting Policy

Mini-goal: Draft a personal policy you can apply in seconds before sharing.

Guided discussion: A short policy helps under pressure. Sample five lines: (1) Purpose — I post to inform, uplift, or invite learning. (2) People — I protect dignity and ask consent for others’ data/images. (3) Proof — I verify with the 4-step flow. (4) Credit — I cite creators and sources. (5) Pause — I reread tone and imagine future-me reading it aloud. Customize these lines for your platforms. Keep them visible near your device. Share your policy with friends so they understand your boundaries. Policies are living documents—revise after mistakes to grow wiser.

Real-life tie-in: During a heated trend, your policy reminds you to pause and fact-check. You choose a thoughtful post that helps classmates stay calm.

Mini-summary: A clear, five-line policy turns good intentions into reliable action.

  1. Write one line you’ll add to your policy.
  2. Show Answer Example: “No screenshots of private chats without written consent.”
  3. Which policy line protects creators?
  4. Show Answer Credit—citing creators, titles, and sources.
  5. How will you keep your policy visible?
  6. Show Answer Phone note widget, notebook front page, or sticky note on the desk.
  1. Fact-Check Flow: A post claims free tablets for first 100 commenters.
    Show Answer Pause emotions; check source (unknown page); no corroboration on official sites; likely scam → do not share, report.
  2. Consent Call: You filmed classmates for a vlog.
    Show Answer Ask permission, blur faces for anyone who declines, and share where it will be posted.
  3. Credit Case: You used an infographic in a report.
    Show Answer Add attribution: creator, title, source, date; explain how you used it.
  4. Repair Move: You posted an unverified rumor.
    Show Answer Delete/update post, thank the corrector, share verified info, and note the lesson learned.
  5. Security Save: Strange login from another country.
    Show Answer Change password, enable 2FA, log out other sessions, review connected apps.
  1. Write a respectful consent message for a group photo.
    Show Answer “Can I post this group photo on my account tonight? I’ll tag the team—okay for everyone?”
  2. Run the 4-step flow on a trending claim of your choice. Share your decision.
    Show Answer Decision sample: “Stop—no reliable source confirms it; waiting for official update.”
  3. Turn this plagiarized caption into credited text. “Amazing photo I took!” (actually by J. Dizon).
    Show Answer “Photo by J. Dizon (2025), shared with permission. My thoughts: ___.”
  4. Create a one-sentence posting policy about private chats.
    Show Answer “No screenshots of private messages without written consent from everyone involved.”
  5. Draft a kind correction under a friend’s misleading post.
    Show Answer “Hey! I think this is from 2019. Here’s a recent source—maybe update?”
  6. List three strong passphrase words (no personal info).
    Show Answer Example: river • lantern • galaxy • waffle (combine with separators).
  7. Rewrite a harsh comment into a respectful one. “Your project is trash.”
    Show Answer “I got lost in Slide 3. Could you add labels to the chart?”
  8. Identify what to blur or crop in a school hallway photo.
    Show Answer Faces, ID cards, schedules on boards, room numbers if sensitive.
  9. Paraphrase a rumor into a verification request.
    Show Answer “I heard ___. Do we have an official notice or link?”
  10. Write a short apology for sharing without consent.
    Show Answer “I posted without asking. I removed it and won’t share your image again.”
  1. Multiple choice: First step when a post triggers strong emotions?
    A) share fast B) pause C) joke about it D) ignore forever
    Show Answer B.
  2. True/False: Paraphrasing removes the need for credit.
    Show Answer False.
  3. Fill-in: Attribution includes creator, title/description, and ______.
    Show Answer Source (and date if available).
  4. Short answer: Why is public shaming harmful?
    Show Answer It damages dignity, spreads harm widely, and can last in footprints.
  5. Multiple choice: Strongest security step?
    A) same password everywhere B) 2FA C) sharing passwords with friends D) writing passwords on desk
    Show Answer B.
  6. True/False: Consent is needed even for “public” spaces when people are identifiable.
    Show Answer True (ethical best practice).
  7. Fill-in: The 4-step flow is Pause → Source → ______ → Context.
    Show Answer Corroborate.
  8. Short answer: Write a respectful disagreement opener.
    Show Answer “I see it differently because ___. May I share another source?”
  9. Multiple choice: Which is plagiarism?
    A) quoting with citation B) paraphrasing with citation C) using an image with permission and credit D) copying text without credit
    Show Answer D.
  10. True/False: Deleting a post always deletes the footprint.
    Show Answer False.
  11. Fill-in: Security is a ______ job.
    Show Answer Shared/everyone’s.
  12. Short answer: Name one sign a post might be misleading.
    Show Answer Unclear source, sensational tone, mismatched date, or edited image.
  13. Multiple choice: Best first response after posting without consent?
    A) defend yourself B) ignore comments C) remove and apologize D) blame others
    Show Answer C.
  14. True/False: Giving credit reduces your own credibility.
    Show Answer False; it increases trust.
  15. Short answer: State one line from your posting policy.
    Show Answer Example: “I verify claims with two reliable sources before sharing.”
  1. Footprint Audit: Review your last 30 days of activity. List three posts to keep, two to archive, and one to rewrite with better tone or credit.
    Show Answer Teacher guidance: Look for thoughtful reasons tied to values, consent, and accuracy.
  2. Source Sleuth: Compare two reports of the same event. Identify what each gets right/wrong and how you know.
    Show Answer Teacher guidance: Reward use of official pages, timestamps, and independent confirmation.
  3. Caption Clinic: Select three images and write model attributions.
    Show Answer Teacher guidance: Check creator, title/description, source, date.
  4. Policy Poster: Design a 5-line posting policy card for your device.
    Show Answer Teacher guidance: Assess clarity, brevity, and practicality.
  5. Kindness Campaign: Draft three comment templates that de-escalate tough threads.
    Show Answer Teacher guidance: Emphasize neutral language, questions, and thanks for corrections.

Notebook Task: In 6–8 sentences, describe a post you might share this week. Apply the 4-step flow, state your consent/credit plan, and write the exact caption you will use. End with one promise to protect someone’s dignity online.

No comments:

Post a Comment

Search This Blog

Powered by Blogger.