All Skills
Research Skills

Digital Literacy

How to use, evaluate, and stay safe with technology — a practical skill for every classroom, designed for low-cost environments where devices may be shared or limited and internet access may be inconsistent.

Key Ideas at This Level
1 Technology is a tool — it helps us, but we are in charge of it.
2 We keep some information private — like our name, our home, and our family.
3 Not everything on a screen is real or true.
4 We ask a trusted adult when we are not sure about something online.
5 Screens need rest time — so do our eyes and our bodies.
Teacher Background

Digital literacy at Early Years level is about building three simple habits: pause before you touch or share, tell a trusted adult when something feels wrong, and remember that technology is a tool — not a world. Many children in low-income settings first encounter technology through shared family phones, community radios, or televisions rather than personal devices. This is normal. You do not need devices in the classroom to teach digital literacy. Role-play, stories, drawings, and discussion are all highly effective. Focus especially on the idea of private information. In many communities, personal safety concerns — trafficking, exploitation, or community conflict — make this a genuinely important protective lesson, not just a technical one. Avoid making children afraid of technology. The goal is confidence and care, not fear. Celebrate children who ask questions and who tell adults when something confuses or worries them.

Skill-Building Activities
Activity 1 — The trusted adult rule
PurposeChildren learn that a trusted adult is the right person to ask when they are unsure about anything on a screen.
How to run itAsk children: Who do you trust most? Let children name people — a parent, an aunt, a teacher, a grandparent. Draw or mime each one. Then say: When something on a screen worries you, confuses you, or feels wrong, you go straight to this person. You do not click, you do not share — you STOP and TELL. Practise the phrase together: Stop. Tell a trusted adult. Role-play simple situations: A phone makes a strange sound — what do you do? A picture on a screen makes you feel scared — what do you do? Reinforce: this is not being in trouble. Telling an adult is always the right choice.
💡 Low-resource tipNo device needed. Use pictures drawn on the board or paper. Children can draw their own trusted adult to keep.
Activity 2 — Private and public: what do we share?
PurposeChildren learn the difference between information that is private (kept close, like a family secret) and information that is public (safe to share with anyone).
How to run itPlay a sorting game. Call out different types of information and ask children to stand up (public, okay to share) or sit down (private, keep it safe). Examples: The colour of the sky — stand up. Your home address — sit down. Your favourite food — stand up. Your telephone number — sit down. The name of your school — discuss together, as this depends on the situation. After the game, explain: private information is like a small, precious thing we keep close. We do not give it to people we do not know. This is true in real life AND on screens.
💡 Low-resource tipWorks without any materials. You can use objects — things kept in a pocket (private) versus things placed on a table for all to see (public).
Activity 3 — Real or pretend?
PurposeChildren begin to understand that screens can show both real things and invented things, and that we need help from adults to tell the difference.
How to run itShow or describe images — or simply tell short stories. For each one, ask: Is this REAL or PRETEND? Use examples: a photo of a child's family (real), a cartoon animal talking (pretend), a news story about rain (probably real), an advertisement showing a food that makes you fly (pretend). After each, ask: How do you know? Introduce the rule: if you are not sure whether something on a screen is real, ask your trusted adult. Explain: even some adults find this hard — that is why we always check together.
💡 Low-resource tipDescribe scenarios verbally. If you have magazines or newspapers, cut images out. No phone or computer needed.
Reflection Questions
  • Q1What is a screen? Can you name three things that have a screen?
  • Q2Who are your trusted adults? What would you tell them if something worried you on a phone or TV?
  • Q3What information should we keep private? Why?
  • Q4Have you ever seen something on a screen that you were not sure was real? What did you do?
  • Q5What is the difference between a real person and a character on a screen?
Practice Tasks
Drawing task
Draw your trusted adult. Write or say: When I am not sure about something on a screen, I ___________.
Skills: Connecting a self-image as a safe technology user to a specific protective habit
Model Answer

Any drawing of a named trusted adult with a completion such as: I go to my mother, or I stop and tell my teacher. The goal is for children to identify a real person they can go to and connect that to a concrete action.

Marking Notes

Look for a specific named person and an active response verb — tell, ask, go to. Discuss: who is this person? When did you last talk to them? Have you told them about this lesson?

Sorting task
Draw a line down the middle of a page. On one side write PRIVATE. On the other side write PUBLIC. Place these things on the right side: your phone number, your favourite colour, your home address, your name, a picture of the sky.
Skills: Applying the private/public distinction to concrete examples
Model Answer

Phone number and home address are private. Favourite colour and a picture of the sky are public. Name is a useful discussion — context matters and both answers can be valid depending on the situation.

Marking Notes

Celebrate all thoughtful answers. The most important outcome is the discussion about why, not just correct placement. Use any disagreements to explore the idea that context changes what is safe to share.

Common Mistakes
Common misconception

If I can see it on a screen, it is real and true.

What to teach instead

Screens can show real things and pretend things. We need to ask an adult we trust when we are not sure if something is real.

Common misconception

Technology is only for adults.

What to teach instead

Children use technology every day — radios, phones, TVs, and more. Learning how to use it carefully is an important skill for everyone.

Common misconception

Sharing my name or photo online is the same as telling a friend.

What to teach instead

When something is shared online, many people can see it — not just one friend. We should always ask a trusted adult before sharing anything about ourselves.

Key Ideas at This Level
1 How devices and the internet work — in simple terms
2 Staying safe: passwords, private information, and trusted adults
3 Thinking carefully about what we read and see online
4 Being kind and responsible in our online behaviour
5 Understanding that online actions have real-world consequences
6 Using technology as a tool for learning and creativity
Teacher Background

Digital literacy at primary level goes beyond safety to include information evaluation, responsible use, and the basics of how technology works. In many developing-world contexts, primary students encounter technology primarily through mobile phones — sometimes shared family devices — rather than personal computers or tablets. Teaching should reflect this reality. Key local considerations: In many communities, mobile data is expensive and internet access is irregular. Students may be more familiar with SMS and WhatsApp than with web browsing. False information spreads very rapidly through messaging apps and is a genuine community concern in many regions. Online scams — especially those targeting money transfers, fake job offers, and false health claims — are common and cause real harm. Cyberbullying may look different in low-connectivity contexts: it often happens through SMS, voice messages, or on platforms used by adults as well as children. All activities can be taught without devices. Where a device is available, it can be used as a demonstration tool, but this is not required. The thinking skills are more important than the technology.

Key Vocabulary
Device
A machine that can store, process, or send information — such as a phone, tablet, computer, or radio.
Internet
A large network that connects computers and devices around the world so they can share information.
App
A program on a phone or computer that does a specific job — such as sending messages, taking photos, or learning maths.
Password
A secret word or set of characters that you use to access your account. A strong password is hard for others to guess.
Online safety
Protecting yourself and your personal information when using devices or the internet.
Personal information
Details about you that are private — such as your name, address, school, phone number, or photo.
Source
Where information comes from. A reliable source is one that can be trusted.
Screenshot
A picture of what is on a screen at that moment. Screenshots can be saved and shared.
Skill-Building Activities
Activity 1 — How does information travel? (the message chain)
PurposeStudents understand how information moves through networks — and why this means it can spread quickly and be hard to control once shared.
How to run itStand students in a line or circle. Whisper a short message to the first student. Each student passes it on by whispering. Compare the final message to the original. Then ask: What changed? Why? Now discuss: when we send a message on a phone, it travels through many points — towers, cables, servers — before it arrives. Each point can store a copy. This is why: (a) information can travel very fast to many people; (b) it is very hard to take back something you have sent; (c) private messages can sometimes be seen by others. Ask: Has a message ever spread further than you expected? What happened? Conclude: think carefully before you send, share, or post. Once it travels, you cannot always stop it.
💡 Low-resource tipWorks entirely as a speaking and listening activity. No devices needed. A secondary version can include discussion of how WhatsApp groups work.
Activity 2 — Is it true? Checking information (STOP-CHECK-SHARE)
PurposeStudents learn and practise a three-step method for evaluating information before sharing it — designed for low-connectivity environments where WhatsApp and SMS are the main channels.
How to run itIntroduce STOP-CHECK-SHARE. STOP — Do not share immediately. Read or listen again carefully. Does it make sense? Is it trying to make you feel afraid, angry, or very excited? Those are warning signs. CHECK — Who sent this? Do you trust them? Can you find this same information from another source you trust — a teacher, a radio programme, a known organisation? Is there a reason someone might want you to believe this? SHARE — Only share if you are confident it is true and if sharing it will help someone. If you are not sure, do not share. Now give students three short news items described verbally or written on the board representing: (a) a true fact, (b) a common local false story such as a false health claim, (c) something impossible to check. Students apply STOP-CHECK-SHARE to each one and discuss: What questions did you ask? What would help you check this? Adapt the false story example to something realistic in your local context.
💡 Low-resource tipWrite STOP-CHECK-SHARE on the board and keep it visible permanently. Works entirely without devices.
Activity 3 — Strong passwords and safe habits
PurposeStudents understand what makes a password strong and learn three safe habits for protecting accounts and personal information.
How to run itBegin with a quick vote: How many of you know someone whose phone or account was accessed by someone they did not want? Discuss briefly. Introduce the three safe habits. HABIT 1 — Use a strong password. A strong password is long (at least eight characters), uses different types of characters if possible, and is not easy to guess — not your name, birthday, or 1234. Think of a sentence you will remember and use the first letter of each word. HABIT 2 — Do not share your password. Not with friends, not with classmates. If a website or message ever asks for your password, this is a warning sign. HABIT 3 — Lock your device. If you share a family phone, always log out of your accounts when you finish. Practise together: students invent a fictional strong password using the sentence method and explain why it is strong.
💡 Low-resource tipWorks without devices. Students practise inventing fictional passwords and testing their strength verbally or on paper. Emphasise that they must never share or write their real password.
Reflection Questions
  • Q1What is the difference between information that is private and information that is public? Give two examples of each.
  • Q2Have you ever seen a message or story that you think was not true? How did you know? What did you do?
  • Q3Why is it sometimes hard to check if information is true before sharing it? What makes it easier?
  • Q4What should you do if someone you do not know sends you a message asking for personal information or money?
  • Q5How is talking to someone online different from talking to them in person? What risks are different?
  • Q6Why do companies make free apps? Where does the money come from if users do not pay?
Practice Tasks
Task 1 — Apply STOP-CHECK-SHARE to a real message
Find one message, post, or story that you have seen or heard this week. Write: (a) What did it say? (b) Who shared it and why might they have shared it? (c) How did you STOP, CHECK, and SHARE (or not share)? Write 4 to 6 sentences.
Skills: Applying the STOP-CHECK-SHARE method and source evaluation to a real-world example
Model Answer

A message came to our family WhatsApp group saying that drinking hot water with lemon every morning cures malaria. It was shared by a family member who was trying to help people stay healthy. I stopped before sharing it because I know malaria is a serious illness and I was not sure this was true. I checked by asking my teacher, who said this claim is not supported by medical evidence and that malaria needs proper medicine from a health clinic. I did not share the message and I explained to my family member what my teacher said.

Marking Notes

Award marks for: identifying a specific real-world message; noting the source and a plausible reason for sharing; applying all three steps; and explaining the decision to share or not share with a reason. Strong answers will identify a genuine warning sign or a genuine checking step using a non-internet source such as a teacher, health worker, or radio programme.

Task 2 — Design a safe habits poster
Create a poster for younger students with three rules for staying safe with technology. Use simple words and pictures. For each rule, explain WHY it matters in one sentence.
Skills: Applying safety knowledge to a practical and audience-aware communication task
Model Answer

Rule 1: Never share your password — even with a friend — because if they tell someone else, your account is not safe. Rule 2: Ask a trusted adult before clicking a link — because some links download bad things onto the phone without you knowing. Rule 3: Stop and check before you share a message — because false information can hurt people in your community.

Marking Notes

Award marks for three specific, actionable rules — not just be careful — with genuine explanations of why. The explanations should show understanding of cause and effect. Penalise vague rules such as be safe online with no specific action.

Common Mistakes
Common misconception

Free things online have no cost.

What to teach instead

Free apps and websites often collect your personal information — who you are, what you do, who you know. Your data has value, even when you do not pay money.

Common misconception

If a message looks official, it must be real.

What to teach instead

Anyone can make a message look official with logos, names, and formal language. Always check the sender's real contact details and never click links without asking a trusted adult.

Common misconception

What I do online is private because I use a nickname.

What to teach instead

Nicknames do not make you invisible online. Apps, websites, and companies collect information about your device, your location, and your behaviour even if they do not know your real name.

Common misconception

I can trust information if many people have shared it.

What to teach instead

False information can spread very quickly online. The number of shares or likes does not tell us whether something is true. We must check the source.

Key Ideas at This Level
1 How algorithms shape what we see — and what we miss
2 Understanding your digital footprint and managing your online identity
3 Evaluating information: misinformation, disinformation, and manipulation
4 Online safety: phishing, scams, cyberbullying, and protecting data
5 Digital rights, privacy, and justice — including in low-connectivity contexts
6 Artificial intelligence — what it is, how it works, and how it affects your life
7 Using technology ethically and for positive change in your community
Teacher Background

Secondary digital literacy requires students to engage critically with the systems behind technology — not just how to use it safely. At this stage, students can and should ask harder questions: Who controls this? Who benefits? Who is left out? In developing-world contexts, several issues are particularly urgent.

Access inequality

Students may have fewer opportunities to practise digital skills, which disadvantages them in further education and employment.

Economic scams

False job advertisements, pyramid schemes promoted on social media, and advance-fee fraud are serious threats in many communities. Mobile money fraud is widespread in parts of Africa and South and Southeast Asia.

Health misinformation

False claims about vaccines, traditional medicine, and disease treatment spread rapidly and cause serious harm.

Political manipulation

During elections, false information and coordinated manipulation of social media are documented in many countries. These are not hypothetical threats — they affect students' families and communities directly.

On AI

Many students will already interact with AI systems in translation apps, recommendation feeds, image filters, and exam-preparation tools. Teaching a realistic understanding of what AI can and cannot do, and where its biases come from, is increasingly essential. AI systems built primarily on data from wealthy, English-speaking countries may not work well for all languages, cultures, or contexts — and this is a justice issue, not just a technical one.

Key Vocabulary
Digital footprint
The record of everything you do online — posts, searches, messages, and accounts. This record can last for many years.
Misinformation
False information shared by people who do not know it is wrong. Different from disinformation, which is shared on purpose to deceive.
Algorithm
A set of rules that a computer uses to make decisions — such as which posts you see first or which videos are suggested next.
Encryption
A way of protecting data by turning it into a code that only the right person can read.
Phishing
A trick where someone pretends to be a trusted organisation to steal your password or money. Often done by fake messages or websites.
Filter bubble
When an algorithm only shows you information that matches what you already believe, so you stop seeing other views.
Data privacy
Your right to control who can collect, use, or share information about you.
Digital rights
The rights people have when using technology — including the right to privacy, access, and fair treatment.
Cyberbullying
Using technology — messages, social media, or online games — to hurt, threaten, or embarrass someone.
Verification
Checking whether information is true by looking at the original source and comparing different reliable sources.
Skill-Building Activities
Activity 1 — The algorithm decides: who controls what you see?
PurposeStudents understand how recommendation algorithms work, why they can create filter bubbles, and what this means for the information they receive.
How to run itBegin with a thought experiment. Ask students: Imagine you watch one video about a football team winning a match. A computer system notices this. What do you think it shows you next? (More football videos.) What if you watch several videos from one political party? What might happen? Introduce the concept: algorithms are sets of rules that decide what content to show you. Their main goal is usually to keep you watching for as long as possible — because more time watching means more money from advertising. This means they often show you more of what you already like and agree with, creating a filter bubble. Ask: What might you miss if the algorithm only shows you one type of news? Now discuss local examples: mobile data is expensive, so many people primarily use one platform such as WhatsApp or Facebook Lite. If false information spreads in a WhatsApp group, who controls what people see? What can individuals do? Conclude: algorithms are designed to serve the company's interests, not yours. Knowing this is the first step to using platforms more deliberately.
💡 Low-resource tipWorks entirely without devices through discussion and thought experiments. If one device is available, demonstrating a recommendation feed live is powerful but optional.
Activity 2 — Spotting manipulation: five techniques
PurposeStudents learn to recognise five common techniques used to spread false or manipulative information, with examples relevant to their context.
How to run itTeach the five techniques with a local example for each. (1) Emotional headline — a headline designed to make you angry or afraid before you read the details. Example: POISON in the water supply — government hiding the truth! (2) Out-of-context image — a real photo used with a false caption. Example: a photo from a flood in one country shared as if it is from a different country or time. (3) False authority — a claim presented as coming from a doctor, scientist, or official who either does not exist or never said it. (4) Urgency pressure — a message that tells you to share immediately before it is too late or deleted. Urgency is designed to stop you from checking. (5) Partial truth — a story that contains some true facts but leaves out important context so the overall impression is false. For each technique: show or describe an example, ask students to identify the technique, and ask: What questions would help you spot this? After all five, students work in pairs to create their own fictional example and challenge the class to identify it.
💡 Low-resource tipWrite the five technique names on the board and keep them visible. All examples can be described verbally. This activity works well as a competition or game.
Activity 3 — Digital rights and digital justice
PurposeStudents explore the concept of digital rights, identify inequalities in access and representation in the digital world, and consider what fair and just digital systems would look like.
How to run itBegin with a class survey (hands up): Who has regular access to the internet at home? Who uses a shared device? Who has ever been unable to complete a school task because of lack of connectivity or data? Use the results to open a discussion: access to technology is not equal, and this creates real disadvantages. Introduce three digital rights: The right to ACCESS — everyone should be able to connect and participate in the digital world. The right to PRIVACY — you should be able to control who collects and uses information about you. The right to SAFETY — you should be protected from harm, including scams, cyberbullying, and manipulation. Then present three questions for group discussion: (1) When AI translation tools do not work well in your language, whose interests are being ignored and why? (2) When a company stores your data and sells it to advertisers, who benefits and who pays? (3) What could governments, communities, or schools do to make digital access more fair? Conclude: digital literacy is not just a personal skill — it is connected to bigger questions about power, fairness, and rights.
💡 Low-resource tipHighly effective as a discussion activity with no technology needed. Community examples such as local scams, connectivity issues, and language representation make the discussion more relevant.
Reflection Questions
  • Q1What is a digital footprint? What do you think your digital footprint looks like right now? Does this worry you?
  • Q2Algorithms are designed to keep you engaged for as long as possible. Does this goal conflict with your interests? When?
  • Q3False health information about vaccines and disease treatments spreads rapidly in many communities. Why is this dangerous? What is the best response when a family member shares something you believe is false?
  • Q4Who benefits when your personal data is collected by apps and websites? Who pays the cost? Is this a fair arrangement?
  • Q5Do you think people in your community have the same digital rights as people in wealthier countries? What differences exist and why?
  • Q6Some people argue that social media platforms should be controlled or regulated by governments. What are the arguments for and against this?
  • Q7If an AI system was trained mostly on data from English-speaking countries, what problems might this cause for users in other countries or language groups?
Practice Tasks
Task 1 — Analyse a piece of misinformation
Choose one piece of false or misleading information you have seen or heard in your community recently. Write: (a) What did it claim? (b) Which manipulation technique did it use? (c) What harm could it cause? (d) How would you check whether it is true? (e) What would you say to someone who believes it? Write 300 to 400 words.
Skills: Identifying manipulation techniques, evaluating evidence, and constructing a respectful response to a false belief
Model Answer

During the last election period in our community, a voice message spread on WhatsApp claiming that a candidate had been arrested for corruption and that voting for them would result in the whole community losing government support. The message used urgency pressure — it said to share immediately before it was deleted — and false authority, claiming it came from a senior official. To check it, I would search a trusted news website, listen to a national radio news programme, and contact the candidate's office directly. When speaking to someone who believes it, I would say: I heard this too and I wanted to check it before believing it. I could not find any trusted source that reported this. The technique of urgency — share before it is deleted — is a warning sign that someone does not want us to check. A true story does not disappear.

Marking Notes

Award marks for: a specific and realistic example from the student's own context; correct identification of at least one technique with an explanation of how it works in this case; a realistic account of potential harm; at least two checking strategies, ideally including a non-internet option; a respectful and realistic response to the believer that addresses the concern underneath the false belief.

Task 2 — Essay: technology and justice
Choose ONE of the following questions and write a 400 to 600 word essay. (a) Digital technology creates more opportunity for young people in developing countries than it removes. Do you agree? (b) The biggest threat that digital technology poses to your community is misinformation, not privacy. Do you agree? (c) Governments have a responsibility to make internet access free or affordable for all citizens. Make the case for or against.
Skills: Constructing a reasoned argument with evidence, engaging with counterarguments, and applying digital literacy concepts to real-world questions of justice and access
Common Mistakes
Common misconception

Deleting a post means it is gone forever.

What to teach instead

Anyone can take a screenshot before you delete something. Companies also store data for long periods. Think carefully before you post — deletion is not always possible or complete.

Common misconception

Using private browsing or a VPN makes me completely anonymous.

What to teach instead

Private browsing only stops your device from saving your history. Your internet provider, school network, and websites can still see what you do. A VPN adds some protection but is not total anonymity.

Common misconception

Artificial intelligence is neutral and has no bias.

What to teach instead

AI systems are trained on data made by humans. If that data contains bias — about gender, race, or class — the AI learns that bias too. AI can make unfair decisions that affect real people.

Common misconception

Only careless people get scammed or hacked online.

What to teach instead

Cybercriminals use advanced and convincing tricks. Many educated, careful people are successfully deceived. Staying safe requires knowledge and up-to-date habits, not just carefulness.

Further Practice & Resources

Key resources for teachers: The SIFT method (Stop, Investigate, Find better coverage, Trace claims) is documented at checkplease.cc and works well in low-connectivity contexts. First Draft (firstdraftnews.org) publishes free guides on misinformation in local contexts including Africa, Asia, and Latin America. The Alliance for Affordable Internet (a4ai.org) tracks connectivity and access data by country. Mozilla Foundation digital literacy resources (foundation.mozilla.org) are free and available in multiple languages. For AI literacy: the AI4K12 initiative provides free age-appropriate resources. For cybersecurity basics appropriate for low-resource contexts: the Electronic Frontier Foundation's Surveillance Self-Defence guide (ssd.eff.org) is free, practical, and available in many languages.