Artigas PR1
Artigas PR1
Chapter 1
INTRODUCTION
Many people, especially those who did not grow up immersed in technology,
have trouble understanding the systems necessary for computer literacy (Cohen,
2010). Computer literacy is a mandatory skill for success in school, the job force, and
certain familial norms and socioeconomic factors can affect a child's ability to learn
computer skills such as typing, online researching, and discerning internet usage can
fall behind in their classes and struggle to maintain their grades. Such difficulties can
understanding of how to be digitally literate. Moreover, the study determined the skills
and competencies needed for the sustainability of digital economy (Media Awareness
Network, 2011).
Locally in Davao De Oro, it has been observed that several students of senior
high school encountered multiple difficulties while adapting to the new digital
computer using menus and functionality, log into online platforms, operating software
applications,saving work to a disk drive or who to ask for help all contribute to
2
decreasing student participation and can even confuse them and can diminish the
learning experience. Without these basic skills a great deal of frustration may occur
on students as it seem like a daunting task to have learn these basics before even
Although digital literacy is well known term that has been used
interchangeably, there is still a lack of research on the topic and more research is
senior high school students that could close the gap left by earlier studies and help
develop digital literate students to prepare and make them successful in the future.
The findings of the study may help educators better understand the use of
technology by students and how to encourage that use for learning. They may also
help determine the urgency of students' digital literacy and provide insights regarding
The purpose of this study is to explore the digital literacy of learners of Senior
high school and their technology- related challenges as learning is carried out
through technology in the 21st century and with the expansion of technology usage in
K-12 higher education classrooms as well as their coping mechanisms and insights
on the use of digital tools and resources for a more effective learning and assist
homework completion .
Research Questions
1. What are the struggles being experienced by the Senior high school students
on digital literacy?
2. How do the Senior high school students deal and cope with the challenges in
digital literacy?
3
3. What insights can you give to the students experiencing the same problems
on digital literacy?
Theoretical Lens
contextualized to provide students with realistic roles that serve to enhance the
learning process.
Students take the technology as the carrier, use the reality of living world as main
example of the instruction is the "Jasper Woodbury Video Series". The Jasper
Woodbury Video Series consists of 12 video adventure CD's. Students identify and
story is designed under the U.S National Mathematics Framework Standards issued
believes that when new educational technology optimizes instruction, it requires our
key is that we must be able to effectively balance the "discovery instruction" design
and " heuristic- guided instruction" design. Today, supported by the rapid
Connectivism is one of the most prominent of the the network learning theories that
(2005) on-line publication "Connectivism": A learning theory for digital age", ideas
Haythornthwaite, 2007, Mehta et al.,2013; Lau, 2014; Downes, 2015; Flynn et al.,
2015) due to it’s claims to provide a lens through which teaching and learning using
digital technologies can be better understood and managed. This paper aims to
knowledge, or building knowledge. Instead it emerges from the connections that are
formed during network activity. Distributing cognition, sense and meaning making
5
and filtering to networks of human and technological nodes helps cope with the rapid
This theory builds on the idea that technology has increased the spread of our
students make choices about learning, collaborating, and learning from diverse
learning environments that foster collaboration and research. The teacher provides
resources to the students, facilitates the collaborative process, and gives timely
most recent studies and learning models, you will not just effectively and purposefully
use technology in the classroom but also help students to move forward to the level.
This study will be limited to Senior High School students of Elizalde National
Digital literacy. The conduct of this study will be in May 2023 to June 2023 school
year 2022-2023. within the selected secondary schools of Davao de Oro division.
There are also some obvious limitations, such as the quantity of participants.
The sample size of participating students are relatively small, and they are not
represented most students in the country especially the private education sector.
This will also indicate that key results should not be expected in the broad sense, nor
should they extend beyond the context of the participants. Thus, subjects and
discussions that was not included in this limitation served as the study's delimitation
for individuals, groups, and organizations interested in learning more about the
For the school heads and principals as a leader of the school, the result
provides them more information and encouragement to improve their program for the
Furthermore, they may use the outcome as a starting point for giving seminars,
digital learning to improve students learning in delving into the world of computer.
knowledge in computer and digital literacy and what's lacking in the students in their
computer skills and capabilities. Teachers will benefit from the knowledge gained in
this research work because they will be able to use the study's findings as a their
starting point on what they need to do to eradicate students problem in digital literacy
For the Department of Education being the policy implementers, this study will
serve as additional information in formulating plans, help them to improve and have
Education may be able to use the study's findings to help them formulate programs
that could improve development for the learners. They could also provide the needs
For the students as the primary recipient of education, they will adjust,
understand and see ways to learn the computer and digital literacy as part of
educational Innovation. This study would also be valuable to them since it would help
them to overcome this difficulties when it comes to computer and digital literacy.
For future researchers may use the result of this phenomenological study as
their guide and reference in conducting research like this study as this also act as a
basis for other researchers who express an interest in studying the same issue and
7
research, but who will employ a different research design than that employed in the
current study..
Lastly, the knowledge gained from this study will be used to and added to
Definition of Terms
literacy and media literacy (Antoninis, 2019). In this study this refers to the students
institutions" and who are engaged in the process of learning and developing their
knowledge and skills in various academic disciplines" (Saxberg, 2019). In this study
the research.
study, research questions, and theoretical lens. Also, this chapter discussed the
scope and limitations of the study, as well as the description or meaning of the
Chapter 2 shows and presents the review of related literature and thoughts
from numerous related papers that the researcher included in the study.
discusses the research design, research participants, the role of the researcher, the
8
data collection procedures, data analysis, trustworthiness of the study, and ethical
consideration.
during the interview and discussion, as well as the participants' primary themes and
basic concepts, will be presented in this Chapter, along with verbatim remarks and
translations.
Chapter 5 will discuss the findings or results of the study, which will represent
the data collected and acquired from the detailed responses of the participants in
response to the research questions posed during the interview process. The result
will be examined considering the produced themes backed up by the literature given
in Chapter 2.
9
Chapter 2
inquiry are presented in this chapter of the study, which will be gathered through
references, books, published and unpublished journals, the internet, and magazines.
Articles focus on the experiences of students about Digital Literacy. The authors
compute use in the classroom has increased dramatically in recent years; in 2011
Germany, most functions are deeply digitalized beyond teaching and learning,
enrolling, and managing students, etc.) libraries (i.e, online journals and books),
research (i.e, data gathering, storage and analysis, writing and publishing reports and
learning, as well as opportunities to learn in very different spaces, when designed for
use in these ways, thus blurring the boundary between physical and virtual presence
learning, but it requires that we create appropriate national policy and development
frameworks, that we learn from practice and that we continue to conduct research
and evaluation into what works (Mishra and Panda, 2020). Prior to the pandemic,
education institutions had started to actively engage with strategies that incorporated
Students must have the skills and knowledge necessary to sense one’s own
technology; to draw on knowledge of one’s own skills; to seek support when needed
progress toward goal completion and alter course when a new approach or
Kolsaker, 2015) and is changing the ways today’s students learn (Coccoli et al.,
software, e.g. mobile devices, web tools, application software, communications and
storage services, etc. (Mohammadyari and Singh, 2015; Ng, 2012). Students use
digital technology for such learning activities as reading and sending email,
academic courses (Blau, Shamir-Inbal & Avdiel, 2020), has been defined in the
current literature as the competencies and skills required for navigating a fragmented
Today’s students are familiar with digital technology and generally know how
to access, create, and share digital information (Ting, 2015). To be digitally literate,
11
one not only needs to be able to search and manage, but also to scrutinise and
2014). They conclude that students need to acquire planning, monitoring, and
skills.
literacy model: media literacy, information literacy, digital scholarship, learning skills,
communications and collaboration, career and identify management, and ICT literacy
(Jisc, 2014).Digital literacy comprises three key dimensions: technical, cognitive, and
proficiently. The cognitive dimension concerns the skills needed to search, evaluate,
and synthesize digital information critically, and at the same time, to be conscious of
any ethical, moral, and legal issues. The social‐emotional dimension concerns the
Students can exhibit different levels of digital literacy. Thus, assuming that
all students have the same level or a certain level of digital literacy can lead to a
problem in online learning – What the students are capable of doing might be
Science and technology has a big impact in the society. Without science and
technology, the world is a complete mess. People would become well-informed and
allow them to make better decisions and choices by being scientifically and
technologically literate (Ng, 2013). Through the advent of technology, science has
become a very powerful tool in analyzing, exploring and discovering new concepts
and ideas relevant in today’s generation (Macanas & Rogayan, 2019). The ability to
access, process, understand, and create information or media content in the digital
environment is known as digital literacy (Hsieh, 2012). The ability to locate and
12
process of critical evaluation are the practices involved in becoming digitally literate
(Spires & Bartlett, 2012). However, despite of being part of the Generation Z, still
Digital literacy facilitates better learning for the students. Many students,
digital devices in digital environments (Yamada-Rice, 2011; Potter, 2012). Above all,
teachers and school administration have a significant role in preparing the future
manage digital and technological tools may lead students to risks such as believing
(Tamoria, 2016).
At the onset of the fourth industrial revolution (FIRe), Education 4.0 is a model
believed to respond to its demands (Hussin, 2018; Morales, 2019; Rogayan, 2019;
Rogayan & Albino, 2019). Education 4.0 promotes a new learning vision and novel
ways of learning that emphasize collaboration of men and machines (also known as
Although students use technology in their everyday activities, they might not
necessarily be familiar with or use technology for learning (Waycott et al., 2010).
Students might use technology more for social or entertainment purposes but not for
learning (Prior et al., 2016). Digital learners need help on how to use technology
effectively for learning.Students might not know how to use technology for
literacy, however, they should be able to learn to use technology for learning
definitions and classifications, but there is still no consensus on the larger themes
ambiguity’ (van Deursen et al., 2015), and Internet skills are only a part of digital
skills. While there is already a plethora of research in this field, this research paper
hereby aims to provide a general framework of digital areas and themes that can
best describe digital (cap)abilities in the novel context of Industry 4.0 and the
There is a stake of digital skills for disruptive digital business, and they
connect it to the latest developments, such as the Internet of Tings (IoT), cloud
technology, big data, artificial intelligence, and robotics (Sousa & Rocha, 2019) . The
topic is even more important given the large disparities in digital literacy across
regions (Tinmaz et al., 2022). More precisely, digital inequalities encompass skills,
addressed, as they are credited with a ‘potential to shape life chances in multiple
As the times and science advance, humans will continue to make various
developments that occur cannot be avoided, along with the development of needs
In the 21st century, all information and communication can be done easily,
master various 21st century skills and use them to improve the quality of civilization.
21st century skills are skills that must be mastered by everyone in order to succeed
in facing the challenges, life problems, and careers of the 21st century (Redhana,
2019). 21st century skills that are integrated in knowledge, skills, and attitudes, as
well as mastery of technology can be developed through critical thinking and problem
Students must have the skills and knowledge necessary to complete non-
on new technologies or, if needed, new tasks requiring use of new technologies
pursuits, social or professional networking, civic participation, and for future uses not
activities that support students’ use of a broad range of technologies can help them
understand a range of opinions on the issue, and then instructed to collaborate using
example, not only is the goal of activity focused on a problem, but the integration of
each technology employed likely requires untangling minor problems caused by use
of the technology.
Students must have the skills and knowledge necessary to understand where
problem using digital media and text, online learning tools, and social media
resources (Partnership for 21st Century Learning, 2019; Wyatt, 2018). As is possible,
classroom activities should include authentic internet based resources. For example,
15
if you are working with an English Language Arts class on social media, have the
learners examine their own networks to better understand audience and purpose of
each. If you are helping students learn how to use mapping technologies, ask them
to identify actual destination and modes of transport they are likely to use, then
create worked examples to get them to practice finding places. A teacher might
create an activity that requires students to use technology to map public transit
routes from their home or school to relevant locations (e.g., doctor’s office, American
Provide ample opportunities for use of technology both in class and out of
class. Blended learning programs in any academic content area make this possible;
providing low-stakes reasons for using new digital literacy skills (Rosen & Stewart,
Make use of the devices that learners own so that they can develop comfort
using them in new ways. Teachers must attend to issues of Internet access. Although
more than 95% of adults in the United States have access to mobile devices, not all
have smartphones and even fewer adults have data plans (Pew Research Center,
2018). Provide computer labs; offer location information for area libraries or
lending programs.
learning, as well as opportunities to learn in very different spaces, when designed for
use in these ways, thus blurring the boundary between physical and virtual presence
to support deep learning (Fullan & Langworthy, 2014) in affordable, scalable, and
If we can ensure access to appropriate devices and Internet, we can use the
new possibilities to work towards more open educational practices which provide
training and support to staff in sharing their intellectual property and experience,
making more constructive use of videos and discussion forums, and guiding and
Students who lack digital literacy skills will have difficulty sharing and searching for
resources. Without the capacity to utilize computerized innovations truly intends that
there are numerous things you essentially can't do or access and this increasingly
route and evaluate the quality and legitimacy of the data. Even though digital literacy
is a difficult skill to master, it helps students learn quickly and thrive in today's digital
world.
17
Chapter 3
METHODOLOGY
study's execution. These were followed and used to best achieve the study's
principal purpose. This chapter also discussed the research design, researcher’s
role, and the subject of this study. Also, the data sources, the data collecting
Research Design
employed in this study which described the experiences of students about Digital
science research that collects and analyzes non-numerical data to derive meaning
from primary data in order to better understand social life via the study of specific
groups or locations. Also, qualitative research aims to uncover the meaning behind
comprehend students lived experiences and the behavioral, emotional, and social
their own words, without the limits imposed by fixed-response questions that are
under consideration. An empirical technique was used in this study, and the
researcher has collected data through an in-depth interview and focus group
discussion with the senior high school students about their experiences, thoughts,
18
had a lived experience of it. The fact that this is a qualitative study of story data
means that the methods used to assess the data must be considerably different from
on (Umanailo, 2019).
Research Participants
The participants in this phenomenological study were the selected ten (10)
senior high school students of Elizalde National High School. Five (5) participants
were subjected to focus group discussion (FGD) and five (5) participants were
(5) to twenty-five (25) participants who have all experienced the same occurrence
the phenomenon being studied, prior to conducting the study. These participants
were selected using pre-inclusion criteria: (1) they must be a senior high school
student; (2) and they must be a self-confessed students who experienced difficulty
ensured that the participants must be a male or female teacher, they must be of legal
age, they must belong to any subject areas, and they must be willing to share his/her
experiences. They were chosen since they best suited the researcher's purpose of
Literacy.
As a researcher of this qualitative study, our role was to attempt to access the
well-being of the participants as well as to safeguard the data collected from them.
accountable for meeting all the requirements both prior to and throughout the
interview process. As the primary tool for acquiring knowledge from the participants,
We also acted as a moderator that was responsible for ensuring that the ethical rules
for qualitative research are followed during the in-depth interview and during the
Additionally, it was also our responsibility to record all the responses using an
audio recorder and accounted the proceedings of the interviews and discussion with
the approval and consent of the participants, using a google meet recording features
and other. We made sure to make backed up notes if the recordings will not be
successful.
information. This allowed me to ensure that the interaction of ideas and information
were correct, audibly captured, and allowed us to transcribe all the reports uttered
or dialect with which they are comfortable, so that they could openly communicate
their views and experiences in detail and without fear of communication and linguistic
obstacles. With this, We was also a translator to ensure that the responses are
participants for this qualitative research to comprehend the overall narrative and
develop themes from the data that were collected in order to present the data in a
more complete and comprehensive manner to the assigned data analyst. In addition,
20
We asked the assistance of my thesis adviser to ensure that the data acquired were
properly processed.
Lastly, We double checked all the data by giving it back to the selected
participants of the study, who are the senior high school students, so they have
checked if their answers during the interview are properly accounted for and
transcribed, which in this case increased the credibility of my study even further.
Data Sources
(group interviews), documents, and artifacts are all methods used to gather
information. In-depth interview and focus group discussion are the most often used
tools for gathering primary data and possible sources of valuable data (Malbašic,
In addition, the main sources of data in our study are the responses of
research participants from the in-depth interview (IDI) and focus group discussion
(FGD) which is the senior high school student. These were deemed primary data
because it came directly from the mouths of the participants when they were
questioned about their experiences, ideas, and observations concerning the issue
under inquiry. In-depth interviews gave significant more detailed information than
other data collection methods. Additionally, an in-depth interview provided far more
(Showkat & Parveen, 2017). Meanwhile, focus group discussion has the potential to
Furthermore, data from secondary sources were used in this study to discuss
the study's emerging themes as revealed by participants during the interview and
discussion, to discuss the study's problem, and to conduct the study centered on how
such sources and information deepened and narrowed the study's conduct. These
secondary sources were drawn from websites, books, journal articles, publications,
21
and other studies completed that are believed related to the current study to
First, we will seek an approval to conduct our study from the School Head of
the Elizalde National High School. After that, in order also to obtain an authorization
to conduct our study we will submit a letter of request to the school head of Elizalde
National High School. After that, the letter will be accepted and approved by the
school head and will furnish a copy of the approved letter to the grade level heads for
their information as this study will be carried out in their respective grade levels.
Second, after obtaining the relevant authorization letters such as the permit to
conduct the study and a validation of research instrument to made sure that the
interview questions are well validated and is appropriate to extract the data needed
to answer the research questions. We will identify the participants that will take part
of the study. Also, we will ask the assistance of the advisers in identifying those
individuals were able to meet the requirements in our study. The participants are
identified by their names on the list provided by the adviser that ensured that the
research participants.
Third, after the confirmation from the adviser regarding the status of the
research participants which are the Senior High School Students of Elizalde National
High School. The chosen participants will be informed and ask to attend a meeting so
that they are aware of their involvement in the study. They will be told about the
meeting in advance through text message, chat, or email so they can prepare. They
will also be educated about the research protocols, expected benefits, and potential
hazards, as well as their desire to take part in the study and their right to withdraw as
22
a first step in the interview process. The purpose of the study will also be explained
to the participants.
the research begin. They were also notified that the data will be stored securely in a
secure location and on an encrypt laptop to guarantee the safety and anonymity of
the participants. Finally, they were notified that after the research is completed, all
acquired data, including audio and transcripts, will be deleted, and burned.
Fourth, they were thoroughly explained the informed consent letter, that was
written in English. Because they are all legal age, only the informed consent letter
was sent to them. Queries and clarifications were addressed throughout the
orientation. The participants got the informed consent letter. Additionally, prior to the
conduct of the interviews on the agreed-upon schedule and time between the
researcher and the participants, the signed informed consents letter was collected,
and I politely and accurately response and address the participants questions,
clarifications and or any concerns about the content of the informed consent letter.
Fifth, during the in-depth interview, each participant was asked self-
real-life experiences, how they coped with challenges, and their coping mechanisms
during the focus-group discussion. The researcher being the moderator reviewed the
participants on the proper protocol before the interview and discussion started.
During the FGD, We as the researcher tried a technique such as round robin to avoid
everyone talking at once. We ensured that all the participants can talk or share about
the questions being raised in the discussion. Part of the FGD rule is to require the
FGD participants to raise their hand when they want to say something for the
discussion to remain in order. And that they can also turn off their microphone when
Finally, any information acquired in connection with this study that can be
linked back to the participants was be kept private and shared only with their
and a pseudonym was used to code the data about the participants.
Data Analysis
The data that were gathered during the study's conduct had been evaluated
and examined to arrive at conclusions that addressed the study's problem using
intriguing patterns in data, and then used those themes to address the research or
say something about an issue. A strong thematic analysis does more than simply
summarize the data; it analyzes and makes meaning of it. The usage of the primary
interview questions as the themes is a common blunder. This usually indicates that
the material has been summarized and structured rather than examined (Braun &
Clarke, 2021).
Further, the data analysis was completed after transcribing the findings of the
IDI and FGD conducted among the participants. In this study, We used coding and
theme analysis to examine the data that was gathered and obtained. For display and
presentation, the data were separated into numerous categories, with comparable
replies from different participants. The process is called thematic analysis, and it was
material that was collected from each of the interview sessions. The interview was
transcribed verbatim in its entirety first. In this study, We were the ones who
transcription was carefully studied and then sorted into relevant analytical units,
which were called categories, by the transcriptionist which is also the researcher.
After identifying the meaningful categories, the researcher classified them and then
24
develop themes based on the coded categories. The information was organized
thematically.
In addition, after familiarizing with the data, We began the coding then
combined to come up and develop themes, concepts, and categories. Then, relevant
text parts were identified and was labelled with a code so that they are quickly
Additionally, we labeled the clusters after the codes were clustered together
based on the meaning or linkages shared among the codes. The next step is naming
the codes, which involved using the labels established for the theme and coming up
with a comprehensive name that reflected the link or meaning given in that theme.
Furthermore, data were presented in tabular style, showing the emerging themes of
each research question, which are correctly coded, and particular replies from
analyst, a specialist for this field, as well as my thesis adviser, to double-check the
information. The findings and interpretation of the data was presented utilizing tabular
comprehension and elaboration. Meanwhile, all data collected during the study's
study that must have trustworthiness which is essential to attain success. There are
2017.
In obtaining credibility in my study, we made sure that all our data contains
securing the data acquired. With these, we were confident that my study will manifest
credibility. Transcribed data was given back to the participants for validity check to
determine if the essence of the interview were captured correctly. This were given
wrong interpretations. Repetitive questioning was done also to ensure the richness of
data that was obtained from the participants (Wang & Scheinbaum, 2018).
researcher comes back to issues previously raised by the participants and extracts
question confidently.
opportunity to clarify their objectives, fix any inaccuracies, and provide further
information if necessary. This was also validated the veracity of the synopsis, which
states that these are all their personal experiences. Likewise, the primary data
collecting approach was the IDI and the FGD. In this instance, the data thickness
result, we made sure that each participant can supply, explain, and deliver the
Further, checking was carried out that it is the single most essential provision
that can was made to strengthen the credibility of our study. Checked on the
26
accuracy of the data were performed "on the spot" during the duration of the data
participation, participants were also required to check any transcripts of the dialogues
in which they took part. In this case, the focus was the participants beliefs that their
words accurately reflect what they truly intended, because of a tape recorder was
used, it is likely that at the very least the articulation itself has been accurately
recorded.
transferred to another context. The reader takes notice of the specifics of the study
setting and methodology, and then compares them to a similar situation that they are
more familiar with to draw conclusions. For similar situations, the original researcher
provides a highly thorough account of their problem and methodology, if the details
detailed manuscript ensuring that details will be properly documented then allow the
research participants to see the results before arriving at a final manuscript. To make
this study transferable, transcripts and data analysis document were included in the
Appendices and the texts used in my study were arranged logically to present a
replicability of a study, or whether the same results would be obtained if the study
To address the dependability of our study, the procedures within the course of
my study were reported in detail, such as the in-depth interview. We used voice
recorder to assess my study especially in retrieving information out from the lived
experiences of the participants. With this, consistency of the statement was obtained.
27
Dependability stresses the need for me to take into consideration the always
In this study, the researcher goes over the specifics of what is done in the
field in terms of data collection and analyzing the effectiveness of the inquiry process
as well as assessment and evaluation reporting. The participants in this study also
they are all supported by the data collected from the study's informants. Furthermore,
replicate the work and make changes and adjustments that could add to the current
body of knowledge. The documents that were used and obtained, such as raw
transcriptions of data, and interview guides, were preserved for cross-checking the
inquiry process.
Confirmability is a concept that deals with the issue of research bias and
determines whether another person can put their trust in the results. Also referred to
as degree of neutrality, this term describes the extent to which the conclusions of a
study are formed by the participants, rather than by the researcher's own bias,
that the study panel and adviser could check to see if the interpretations and findings
could be tracked back to their original sources of information (Ghafouri & Ofoghi,
2018).
are only the result of the focus inquiry and not the researcher's biases. In addition,
we demonstrate how the data eventually lead to the creation of suggestions that
were gathered and analyzed during the study's execution. Raw data, such as audio
recordings, written field notes, and documents, were reviewed and reassessed
because of this. The respondents were given the transcription in the form of printed
texts for authentication and verification, which they signed. Also, we made certain
that all study-related records are structured, retained, and properly archived so that
28
other people, such as the research panel and the adviser, can check and see if the
interpretations and conclusions can be traced back to a genuine source, with this,
Ethical Considerations
The main concern of this study was to explore the experiences of students of
digital literacy. Because of the in-depth nature of the study process, ethical
even more important. They may become agitated while expressing their emotions
during the interview (Arifin, 2018). This study adheres to the three principles: the
principle of respect for person, beneficence, and justice that attempts to summarize
the basic ethical principles in research involving human participants as cited in the
The first principle, respect for persons, is founded on two ethical principles.
The first is autonomy; individuals are independent entities with the right to choose
whether to engage in clinical research. This gives people the freedom to make their
own decisions and choices. The second ethical notion under the heading of respect
for persons is to make concessions for those who are particularly vulnerable and
require further protection. Also, this refers to the right of an individual to determine
what activities they will or will not participate in. Thus, informed consent is necessary
(Miracle, 2018).
participants were provided with complete information about the research, including
risks and benefits, and were given the opportunity to decide whether or not they
right to withdraw from the study, the study's focus, and procedures to be applied, as
well as comments regarding confidentiality and the signatures of both the researcher
and the subjects. Furthermore, we made certain that our research subjects agreed to
29
take part in the study voluntarily and without being coerced. Only those senior high
available time for the in-depth interview as well as their time for the schedule of focus
group discussion where they may openly share their ideas regarding the study were
Lastly, to ensure that the ethical considerations are religiously followed, the
of Elizalde National High School. to ensure that all necessary and important
information for the participants will be included in the consent. The participants were
given the authorize contextualized informed consents, which were written in English,
good." There are two norms that guide research and clinical research, just as there
are two laws that guide respect for people. The first is to "do no damage," while the
maximize benefits for individual participants and/or society while limiting the risk of
presentation, especially that We are using an in-depth interview (IDI) and focus-
group discussion (FGD). The reason for the use of code is for the participant’s right
to privacy through anonymity. We made sure that the results of my study will be
guarantee that no psychological harm came to anyone who participated in the study.
equal manner, which means that populations that may be unfairly compelled into
people should be exposed to the dangers and rewards of study in the same way, and
30
persons should only be included or omitted for reasons related to the research
To establish justice, We made sure that the participants were selected based
on the inclusion criteria set to best address the purpose of the study. To protect the
names. Interview were done in the convenient time and conducive place google
meet. The names of senior high school students were kept anonymous during the
data collection process, as well as during the presentation of data and distribution of
study conclusions. The result of this study was made known to the participants and
made sure that subjects only participated in the study voluntarily and with informed
consent. Also, We made certain to inform the participants that they had the right to
resign or withdraw from the study at any time if they so desired, and that doing so will
submitting it to my thesis adviser and panel of examiners for review before it was
used. In every study, the participant's privacy and anonymity are of fundamental
concern. As a result, the participants in this study were given codes and/or
pseudonyms to keep their identities hidden throughout the study. Moreover, ethical
consideration can be listed as one of the most crucial aspects of the study
(Greenwood, 2018).
This study also adheres to Republic Act 10173, also known as the
Philippine Data Privacy Act of 2012, which strives to strike a balance between the
right to privacy and the efficient exploitation of information. According to the Act's
flow of information for the purposes of innovation, growth, and national development,
therefore, it should take rigorous steps to adhere to the process. We made sure and
used the data gathered only for my research and there shall be no other purposes,
as well as the questions are relevant to the phenomenon, and no other ancillary
questions were asked from the participants who are not related to our study. We
analyzed the data carefully so that it will be accurate, follow the process in order not
to harm the participants, and the data given will be secured and safe.
Moreover, these three principles and data privacy act were applied to specific
ethical situations. Rest assured that we kept in mind these three principles and data
protection act to help me clarify the student experiences about digital literacy, We
ensured that the principles that are mentioned in the Belmont Report and Data
Privacy Act were addressed to protect the rights of the participants which are the
Finally, this chapter includes a description of what the study is about, what its
emphasis is, who the individuals involved, agencies, and authorities are, and why
their approval, permission, and consent was a top priority, which every researcher
must accomplish first. The step-by-step procedure of gathering and evaluating data,
which was the most challenging component of the research, it will also be detailed in
this chapter. To that purpose, each study endeavor must maintain a high degree of
credibility, which may be accomplished in a variety of ways. Lastly, keep in mind that
every study endeavor must follow and adhere to ethical rules and consideration.
References
Bates, A. W. (2018, February 14). Some thoughts on scaling online and digital
learning. [Blog post].Retrieved from
https://www.tonybates.ca/2018/02/14/some-thoughts-on-scaling-online-and
digital-learning
Becker, S.A., Cummins, M., Davis, A., Freeman, A., Hall Giesinger, C., &
Ananthanarayana, V. (2017). NMC horizon report: 2017 higher education
edition. Austin, TX; The new Media Consortium.
Blau, I., Shamir-Inbal, T., & Avdiel, O. (2020). How does the pedagogical design of a
technology-enhanced collaborative academic course promote digital
literacies, self-regulation, and perceived learning of students? The Internet
and Higher Education, 45, 100722.
Bransford, J.D. & Stein, B.S(1993). The Ideal Problem Solver (2nd Ed). New York:
Freeman
Coccoli, M., Guercio, A., Maresca, P. and Stanganelli. L. (2014) " Smarter
Universities: A Vision for the Fast Changing Digital Era", Journal of Visual
Languages and Computing, Vol. 25, pp. 11-25
Flynn L, Jalali A, Moreau KA.(2015). Learning theory and it's application to the use of
social media in Education. Postgraduate Medical Journal. 91(1080):556-60
Fullan, M., & Langworthy, M. (2014). A rich seam: How new pedagogies find deep
learning. London: Pearson.
Greene, J.A., Yu, S.B. and Copeland, D.Z. (2014) “Measuring Critical Components of
Digital Literacy and their Relationships with Learning”, Computers &
Education, Vol. 76, pp. 55‐69.
Gurung, B. and Rutledge, D. (2014) “Digital Learners and the Overlapping of their
Personal and Educational Digital Engagement”, Computers & Education,
Vol. 77, pp. 91–100.
Hsieh, Y. P. (2012). Online social networking skills: The social affordances approach
to digital inequality. First Monday, 17(4).
https://doi.org/10.5210/fm.v17i4.3893
Hussin, A. A. (2018). Education 4.0 made simple: Ideas for teaching. International
Journal of Education and Literacy Studies, 6(3), 92-98.
https://doi.org/10.7575/aiac.ijels.v.6n.3p.92
Jacobs, G., & Castek, J. (2018). Digital problem solving: The literacies of navigating
life in the digital age. Journal of Adolescent and Adult Literacy, 61(6), 681-
685.
Jones, C., Ramanau, R., Cross, S. and Healing, G. (2010) “Net Generation or Digital
Natives: Is there A Distinct New Generation Entering University?”,
Computers & Education, Vol. 54, pp. 722‐732.
Lau VKH. (2011). Computer-based teaching module design: principles derived from
learning theories. Medical Education, 48(3):247-254
Macanas, G.A., & Rogayan, D.V., Jr. (2019). Enhancing elementary pupils’
conceptual understanding on matter through Sci-vestigative Pedagogical
Strategy (SPS). Participatory Educational Research, 6(2), 206-220.
http://dx.doi.org/10.17275/per.19.22.6.
Menaker, E., Coleman, S., Collins, J., and Murawski, M.(2006). Harnessing
experiential learning theory to achieve Interservice/ Industry Training,
Simulation & Education Conference,
http://www.idsi.com/downloader/download.aspx?fileID=773
Morales, M.P.E. (2019). Foreword: Education under FIRe. The Normal Lights, 13(1),
v – x.
Ng, W. (2012) “Can We Teach Digital Natives Digital Literacy?”, Computers &
Education, Vol. 59, pp. 1065‐1078.
Orr, D., Luebcke, M., Schmidt, J.P., Ebner, M., Wannemacher, K., Ebner, M., &
Dohmen, D. (2020). Higher education landscape 2030. A trend analysis
based on the AHEAD international horizon scanning. Springer Briefs in
Education. https://doi.org10.1007/978-3-030-44897-4
Parker, K., Lenhart, A., and Moore, K., (2011). The digital revolution and higher
education: college, presidents, public differ on value of online learning. Pew
Internet & American Life Project.
Partnership for 21st Century Learning. (2019). Framework for 21st century learning:
Definitions. Columbus, OH: Battelle for Kids. Retrieved from
https://www.battelleforkids.org/learning-hub/learning-hubitem/framework-for-
21st-century-learning-definitions
Porter, W.W., Graham, C.R., Spring, K.A. and Welch, K.R. (2014) “Blended Learning
in Higher Education: Institutional Adoption and Implementation”, Computers
& Education, Vol. 75, pp. 185‐195.
Potter, J. (2012). Digital media and learner identity: The New Curatorship. New York:
Springer.
Prior D. D., Mazanov, J., Meacheam, D., Heaslip, G. and Hanson J. (2016) “Attitude,
Digital Literacy and Self Efficacy: Flow‐On Effects for Online Learning
Behavior”, Internet and Higher Education, Vol. 29, pp. 91‐97.
Robinson, L., Cotton, S. R., Ono, H., Quan-Haase, A., Mesch, G., Chen, W., Schulz,
J., Hale, T. M., & Stern, M. J. (2015). Digital inequalities and why they
matter. Information, Communication & Society, 18(5), 569–582.
https://doi.org/10.1080/1369118X.2015.1012532
Rogayan, D.V., Jr., & Albino, M.M. (2019). Filipino students’ common misconceptions
in biology: Input for remedial teaching. Online Science Education Journal,
4(2), 90-103.
Rosen, D. J., & Stewart, C. (2015). Blended learning/or the adult education
classroom. Essential Education. Retrieved from
http://app.essentialed.com/resources/blended-learning-teachers-guide-
web.pdf
Sandars J, Morrison C. ( 2007). What is the Net Generation? The challenge for future
medical education. Medical Teacher, 29 (2-3):85-8
Siemens. G( 2005). Connectivism: A learning theory for the digital age. International
Journal of Instructional Technology and Distance Learning. 2(1). Retrieved
from http://www.itdl.org/Journal/Jan05/ article01.htms
Sousa, M. J., & Rocha, A. (2019). Skills for disruptive digital business. Journal of
Business Research, 94, 257–263.
https://doi.org/10.1016/j.jbusres.2017.12.051
Spires, H. A., & Bartlett, M. E. (2012). Digital literacies and learning: Designing a path
forward. Friday Institute White Paper Series, 5.
Ting, Y. (2015) “Tapping into Students’ Digital Literacy and Designing Negotiated
Learning to Promote Learner Autonomy”, Internet and Higher Education,
Vol. 26, pp. 25‐32.
Tinmaz, H., Fanea-Ivanovici, M., & Baber, H. (2022). A snapshot of digital literacy.
Library Hi Tech News, (ahead-of-print).
Van Deursen, A. J. A. M., Helsper, E. J., & Eynon, R. (2015). Development and
validation of the Internet Skills Scale (ISS). Information, Communication &
Society, 19(6), 804–823. https://doi.org/10.1080/1369118X.2015.1078834
Vanek, J., (2017). Using the PIAAC framework for problem solving in technology-rich
environments to guide instruction: An introduction for adult educators.
Retrieved from
https://static1.squarespace.com/static/51bb7b8e4b0139570ddf020/t589a3d
3c1e5b6cd7b42cddcb/1486503229769/PSTRE Guide Vanek 2017 pdf.
Vanek, J., Simpson, D., Johnston, J., & Petty, L. I. (2018, August). IDEAL distance
education and blended learning handbook (6th ed.). Boston, MA: World
Education. Retrieved from
https://edtech.worlded.org/wp-content/uploads/2018/08/IDEAL-Handbook-
6th-Edition-8-16-18.pdf
Waycott, J., Bennett, S., Kennedy, G., Dalgarno, B. and Gray, K. (2010) ”Digital
Divides? Student and Staff Perceptions of Information and Communication
Technologies”, Computers & Education, Vol. 54, pp. 1202‐1211
Yamada‐Rice, D. (2011). New media, evolving multimodal literacy practices and the
potential impact of increased use of the visual mode in the urban
environment on young children’s learning. Literacy, 45(1), 32-43.
https://doi.org/10.1111/j.1741-4369.2011.00578.x
Yaumi, M. (2018). Learning media and technology [Learning media and technology].
Jakarta: Prenadamedia Group.