top of page
a desk with lots of technology on it

DIGITAL LITERACY

In Focus

"See more clearly when you are informed"

Digital Literacy is becoming more and more important as the world shifts towards using digital tools. Understanding this lifelong learning topic will keep your information and data safe. Below you will find key terms, statistics, and other useful tools to understand and talk about Digital Literacy. If you would like to know more, consider coming to an IYC event. Our next one can be found below in the section labeled Our Events. We host them virtually, on a wide range of topics, discussing policy, civics, and current events. 

Key Terms You Should Know

Digital Literacy

the ability to find, create, evaluate, think and communicate about, and share information from technological or media platforms.

Algorithm:

well-defined mathematically oriented instructions designed to quickly process information, automate tasks, respond to queries, solve problems, and make decisions.

Digital Footprint:

the relatively permanent traces of data people leave behind after interacting with digital platforms and internet sites; people have little control if any over the existence of their digital footprint or how it is used by others.

Echo Chamber:

refers to an online environment that reinforces and potentially amplifies people’s pre-existing beliefs and biases.

Cybersecurity:

the protection of data (e.g., identity, sensitive information, etc.), data networks, and technological and digital devices from unauthorized access or criminal activity.

several people pointing at a laptop screen

Moments In History

1969 - The first message sent over ARPANET, the ‘original’ internet, happened on Oct. 29, 1969.

1998 - “You’ve Got Mail” brings Internet chatting to the movie screen as part of a romantic comedy.

2023 - Cyber Science is offered as a major at the US Military Academy at West Point combining cybersecurity and digital literacy.

1980s - Computers are introduced into the public school system.

2005 - Largest data breach occurred due to a leak from Cognyte. “Over a four-day period, the database was exposed, leaving 5,085,132,102 records vulnerable that contained information including Names, Email addresses, Passwords, etc.”

Statistics

20% of black students were more likely to use technology for drill and practice compared to white peers’ use for problem solving

46% of US adults regularly use voice-controlled digital assistants

Two Factor

Authentication (2FA) blocks

99.9%

of break-in attempts

17/18

US aged 16-34 scored lower on digital skills compared to this many peer countries

13% vs 35%

U.S. workers w/

no digital skills vs

those who are proficient 

Values

User Friendliness

Privacy Protection

Computer with screen text "Do what is great"

Lifelong Learning

Skepticism

Digital Citizenship

Notable Names

Ada_Lovelace.jpg
Anonymous
Hana Rafeeq Logo
Jimmy Wales
Tom Anderson

Ada Lovelace

Anonymous

Hana Rafeeq

Jimmy Wales

Tom Anderson

Symbols

Untitled design (20)_edited_edited.jpg
suspicious figure
envelope with fishing hook
document with signature
figure wearing headphones

Our Events

Past

Future

Further Resources

Digital Literacy Infographic

Share what you have learned about Digital Literacy. Our Infographic has been designed to be shared easily by printing, emailing, or posting on social media. Click on the image to view or download the PDF File. (Not for commercial use.)

Digital literacy Infographic 3-25 (1).png

Know-It-All Event Video

Our speaker event was insightful and fun! The interesting anecdotes from Gina Marcello, a professor of digital literacy, and Jacob Haimes, an advocate of digital safety, were invaluable and truly entertaining. Watch the video to further understand the need to understand Digital Literacy and embrace a responsible lifestyle. You can also make an event out of it yourself by hosting your own Know-It-All Watch: Digital Literacy Discussion Party. Feel free to share this video with others! (Not for commercial use.)

Take Action

Computer desk set up

Take free library access digital literacy lessons online (e.g., LinkedIn Learning).

Phone with lock on screen

Take control over your data. Inspect your privacy settings. Back up your data. Reject unnecessary cookies. Read consent forms. Implement strong passwords.

Digital brain image

Label AI generated content and include a retrieval date for transparency.

Social Media login on phone

Never grant unsolicited remote access. Make sure any tech support taking over your computer (i.e., remote desktop) is legit. They will always ask for consent and many have automated systems to privately enter personal details. Don’t feel pressured by scare tactics or false urgency. See cybersecurity definition; see skepticism value.

Friends hanging out

Share our Infographic with friends, family, and anyone and everyone you think would appreciate becoming more informed!

bottom of page