0% found this document useful (0 votes)
22 views

Data Literary

The document outlines the concept of data literacy, emphasizing its importance in making informed decisions and understanding data in everyday life. It discusses the data pyramid, which illustrates the stages from raw data to wisdom, and highlights the significance of data privacy and security in the digital age. Additionally, it provides best practices for cybersecurity and methods for qualitative and quantitative data interpretation.

Uploaded by

Aryan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Data Literary

The document outlines the concept of data literacy, emphasizing its importance in making informed decisions and understanding data in everyday life. It discusses the data pyramid, which illustrates the stages from raw data to wisdom, and highlights the significance of data privacy and security in the digital age. Additionally, it provides best practices for cybersecurity and methods for qualitative and quantitative data interpretation.

Uploaded by

Aryan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Learning Objective s

• Defin e data litera cy and explain its importan ce with a real-world example
• Relate to the impa ct created by data literacy in everyday life
• Develop awareness about personal data, data privacy, and data security

Defining Data Literacy refers t o the ability to read, comprehend and use information
effectively.

Data + Literacy= Data Literacy Data literacy means knowing how to understand, work with,
and talks about data. It's ab out being able to collect, analyse, and show data in ways that
m ake sense.

Data literacy is essential because it enables individuals to make informed decisions, think
critica lly, solve problems , and inn ovat e.

I ll€'r..:t<V

/,b,h , o teddl compreh end


Ra··. facts or ·,qures cH d ( orrnnt H' { dtP

I) s d It ( l 4j ( y I~ t I • , :I t 1' l C
l
r tt1'r rti.,. a d co 1 m11r i <1
How to become Data Literate?
Every data tells a story, but we must be careful before believing the story. Data Literate is a
person who can interact with data to understand the world around them.

Let's understand it with following example:


Scenario: Buying a Video game online Data literacy helps people research about products
while shopping over the internet How do you decide the following things when we are
shopping online?
• Which is the cheapest product available?
• Which product is liked by the users the most?
• Does a particular product meet all the requirements?

A data literate person can -

• Filter the category as per the requirement - If the budget is low, select the price filter as low
to high
• Check the user ratings of the products
• Check for specific requirements in the product
, What is Data Pyramid:
• It's the data pyramid that is made up of different stages of working data.
• Let us understand different parts of Data pyramid ,Moving up from the bottom .
• Data is available in a raw form. Data in this form is not very useful.
• Data is processed to give us information about the world.
• Information about the world leads to knowledge of how things are happening.
• Wisdom allows us to understand why things are happening in a particular way.

Different Stages of the Data Pyramid


\Vhe1muvir .y uu llvm th~ bonon 1111 thr DJ\J Pyr 11111 dwet.nde1stand that the warn1d 1s rnJdc upof.
, D.1,1~611w lr-nt
o In ;h:, ~tr.qr- <l~1.-, 1c; in 11' most lmK fr.rm. 111,pro, "''"Pd ilndu1 ht111c111r~l.
0 II h1'I 11 Ill dllll'~ (Ill !,, nol 'MY \l)!'r ul 111 lhl\ forill
, inlo in,1\1111,
Who1\Nhrtt1
o It i.1 uprom~cd dai,1:hut co11ccti\'dy ca,riei ,1 lo91cJI n-,ea11:11g ~ Vhc1i1WhQ1c)
c It is oi t.i ned b·,, ana yfr1q 1j\'.' dm to 1ml:011 u;dul for rleci~10n m1bng 1

1
~awl\ilaund
t ~llO'.', ei!~jt- i,,!om .,1ii't1 - t:-:::::::::~---~~·---
Q Ii\ , . . 10\ in! ,11111 1 1 11 1hdt t <i:!, 'O tJ dee:ier undw:c1.11dm1

o ~ rtp·~sc~b an« r~ pro:ollnd co·np1Qh1m~io·1 of hw.- thms~ i-.ipptn


:· ,s ~.,.~ J._ hi.Y ·o use 1rfor111aUDn to ~ch~'- f'.1(1:i~,rfld oulpul
, ~.'1~ii,•11 (Tq le\'e
o l i, ihe hqhc)t levt' ol ui d~1~tr1·ld1.1~.
"' ·11, 1• l !h I l\' +,. u11d, r. . t«111d di) 1~n·9, i1re h~ppcn no III apjruculm w~y.
1

.rm, 1\ ~ cn.tLal. i'\'-. nq ,.,. Bf er re~ data a'll 'll,1~.i ~wu1I u)11~i\1en1 de: "i:1•',
111 rl •,. ) I l ,.

! ocf\n to st1_,p th e c11

1rt11f1c I I qhr 11, my dlr('IC"T ,on 11::i r: ru r nr•rj rr>rf

~ >ut/, fa. ,, ,q H\it l ic l,qht on /'.B( :ilfc1::t h.)s turne


d r,::d

l<1.;d, I 1o.1lfic_ Liq ht_ 1

Pv1,ir11id lor pldlll llll(l u PIUIIL us ..1 :stude nt dt~ef reu:,vmg tlie
I el 11 ·,d(, rHICd l ,,.3r t~·•. d rri pff., ('( CrPrt tinq rl 0,Jfd

q{I ,, 1 ,t I. •l I Pr fr( ,m ,c hnol·

Oeos i,Jt I makin g t ,a sed on ZJ holistic understand


ma °' th0 pK 11c

Plf ,flrtf-'m :.-i dlld it'.> brodd er irnpliLa


tion~.

'-,19,11h,<.1fl( ,, ,) ( HW p1, rn c c~•·d n-.. :>Off-lnl1.1 l 1t11D.lCi mt , u, ,al


111t•~ ··ddf,. 11, 1fl:1:,,:\1i.1on, ,:\ncl 1x1son,:I \'. t:ll-b0in,:·.

R0:~c·11ch11 1g·ll -<l{ 1 )f lolt>,1 /llcl

·.. := ~~ ~- -- -- -- -- - -
r :c,JrO \' 1Hr..a. ,on, r h,

',".'I, it I bnr q, dress .:ode and expe (ted bt:th1\•101


Data Literacy Process Framework
The data literacy framework
.
· data efficiently and with all levels of
pro VI'd es gu1·d ance on using
awareness. Data literacy framework is an iterative process.

What _are Data Security and Privacy? How are they related to Al? Data Privacy and Data
Security are often used interchangeably but they are different from each other.

What is Data Privacy? Data privacy referred to as information privacy is concerned with the
proper handling of sensitive data including personal data and other confidential data, such as
certain financial data and intellectual property data, to meet regulatory requirements as well
as protecting the confidentiality and immutability of the data.

The following best practices can help you ensure data privacy: • Understanding what data,
you have collected, how it is handled, and where it is stored. • Necessary data required for a
project should only be collected. • User consent while data collection must be of utmost
importance.

What is Data Security? Data security is the practice of protecting digital information from
unauthorized access, corruption, or theft throughout its entire lifecycle. Why is it important?
Due to the rising amount of data in the cloud there is an increased risk of cyber threats. The
most appropriate step for such an amount of traffic being generated is how we control and
protect the transfer of sensitive or personal information at every known place. The most
th
possible reasons why data security is more important now are: • Cyber-attacks affect all e
people • The fast-technological changes will boom cyber attacks
Best Practices for Cyber Security Cybersecurity invol
ves prote cting computers,servers, mobile
devices, electronic systems, networks, and data from
harm ful attacks.

Do's
• Use strong, unique passwords with a mix of chara
cters for each account.
• Activate Two-Factor Auth entic ation (2FA) for adde
d security.
• Download softw are from trust ed sources and scan
files before opening.
• Prioritize websites with "http s://" for secure login
s.
• Keep your browser, OS, and antivirus updated regul
arly.
• Adjust social media privacy settings for limited visib
ility to close contacts.
• Always lock your screen when away.
• Connect only with trust ed individuals online.
• Use secure Wi-Fi netw orks .
• Report onlin e bully ing to a trust ed adult immediate
ly

Don' t 's
• Avoid sharing personal info like real name or phon
e number.
• Don' t send pictu res to strangers or post them on
social media.
• Don' t open emails or attac hme nts from unknown
sources.
• Ignore suspicious requests for personal info like bank
account details.
• Keep passwords and security questions private.
• Don' t copy copy right ed softw are with out permissio
n.
• Avoid cyber bully ing or using offensive language
online.
model for a self-
~-~ .. , . . . , .... ',-:.~,'! ~ e \\\rn t to collect data for making a CV
, ·' ~,'\•.'\ , .... \ L "':- ~,,\ \\

, \ . . . ..: ... ~ ,-.


,. :---, ''

• ~\ ~ \\ and the objects on roads


· '",~ ... · .'(' ~... -...--: ... '\.')~ ..._,-= :· ...."'2ds
""~ ...."'\\ '".02 c. :·1Is data from the
inte rne t
• \ ·....... ,--..-:.-, $'"' ..": :'(' ·, ..~·--"~

data
2 2 ..:g·-- 12r:2.:·.::-- ;---,22 . . s ::-:c .. eas ing the am oun t of data by adding copies o· ex:sting
• :,5:
=.::l,
\ '• -. . - _-: : ....I '-::: I c t • .__::: - -:,'-"-
1

e::. :-:e:-e doe s ;;o~ cha nge , but we get data on t~e :ma ge b',1 chang:ng
• y ... e ·-~ 2ge g\
: ·.:..:e .. e,...: :2 ...a'":le:e ...s .:ke cc .o:- and brig
htness
existing data Acquirin g Data - Sample Data
• N2""" :2:2 is acd ed bys :g.~tiy c:ianging the
Ge: ... er; tion
~::e",'s .,...
v . •... "'-•
cre" • •:ng
• 'era
or rec ord ing data using sensors
111 ..._ :: -... ,·,....,...
r;:;"' np.r:
1
... :::-::: ~ ... v b 1.. ~

ding is an example of data generation


• ,...,1....,, L'-" et::

• :;e:c--s ~:-g :e~ ~e- -atv ·e read :,...gs of a buil


~e: c . . :ec da:2 .s sto'"ed ,r a com put er
in a suitable form

--~.... ,_ ._....,...,
.;. . ::.. ··O
r-
....,
-~·· e r,:
_, --··-· ..,,
2.

__
,,,,,_ ,, ,,..
- ,,,,. ,.,. ~,, .. ,-.,,,,.,...
, r.,,,,,_

Dd tb fntr !fpn :t;., tion bee n proces sed .


• It i-: ~-- ~ r;l'r/ _(,;# ;: r.J.C ,.,.. ~ ✓ -r r~ :.c; T.. ~_; ,:,..,~ 0+- '...i:Jta thc::t has
"/r ,:; ;;,~;:; ,. (:. :-.1:. -':. ;;r,:.,, ue critic.al
questions using dat a
, • ,, f::. i,,., r:. ,,,..,, "(; ... :; .. • ,..J,
i\ lethods of Data Interpretation How t .
are two ways to interpret data- o interpret Data? Based on the two types of data, there
• Quantitative Data Interpretation
• Qualitative Data Interpretation

Qualitative Data Interpretation


• Qual~tat!ve data tells us about the emotions and feelings of people
• Qualitative data interpretation is focused on insights and motivations of people

Data co:· ection Methods -


• C.Lla:·tative Data Interpretation Record keeping:
• -:-~:s ;?:e:hod uses existing reliable documents and other similar sources of information as
::--.e data so~rce. It is simil ar to going to a library.
• Observafo:i: In this method, the participant - their behavior and emotions - are observed
ca:--e~Jlly
• Case 5:'1d: es: :r. :his method, data is collected from case studies .
Focus g:oups: !n this method, data is collected from a group discussion on relevant topic.
:..o~g': .... c:':--:a. St~d :es: This data collection method is performed on the same data source
'epca:ed 1\ o :e,. a:1 extended period. 0
• n e-:c-8:-'e mter ✓ :e:1s: In this method, data is collected using a one-to-one interview
Steps to Qualitative Data Analysis
1. Collect Data
2. Organize and connect the qualitative data
3. Set a code to the Data Collected
4. Analyze your data
5. Reporting
Data Collection Methods -Quantitative Data Interpretation
Interviews: Quantitative interviews play a key role in collecting Information.
Polfs: A poll is a type of survey that asks simple questions to respondents. Polls are usually limited to one
question.
Observations: Quantitative data can be collected through observations in a particular time period
LongitJdinal Studies: A type of study conducted over a long time
Survey: Surveys can be conducted for a large number of people to collect quantitative data.
Steps to Quantitative Data Analysis
1. Relate measurement scales with variables
2. Connect descriptive statistics with data
3. Decide a measurement scale
4. Represent data in an appropriate format
Qualitative Data Interpretation
Quantitative Data Interpretation
Provid P5 insights into fe elings and emotions Provides insights into quantity
Answ ers how and why Answers when, how many or how often
Methods - Intervi ew s, Focu s Groups Methods - Assessment, Tests, Polls, Surveys
E xampl<.=!
question - Why do students like Example question - How many students
attending onlin e classes? like attending online classes?
Types of Dat a Interpretation
There are three w ays in which data can be
presented:

Textual DI
• The data is mentioned in th e text form, usually
in a paragraph.

• Used when the data is not large and can be


easily comprehended by rea ding.

• Textual presentation is not suita bl e for large


data.
Tabular DI
• Data is represented systt•matict.1lly in thP form of row{, and ~olumn<,.
• Title of the Table (Item of ~xpenditurc) contain~ the dl!SCription of the table content.
• Column Headings (Year; Salary; Fuel and Transport; Bonus; lntere!:>t on Loans; Taxes)
contains the
description of information contained in columns.

llem of Expcndituro
Year
Salary Fuel and Transport Bonus I terest on Lo n TX s

i9S8 266 98 3.00 23.4 83


1999 342 112 2.52 32.S 108

2000 324 101 3.84 41 .6 1t.

2DOi 33€ 133 3.68 36.4 88

2J02 ~20 142 3.96 49.4 98

Graphical DI
Bar Graphs: In a Bar Graph, data is represented using verflcal and horizontal bars.
Pie Charts: Pie Charts have the shape of a pie and each sli ~e of the pie represents the
portion of the entire pie allocated to each category. j
Line Graphs: A line graph is created by connecting variou~ data points. It shows the change
in quantity over time.
https:/ /www.youtube .com/watch ?v=N LCzpPRCc7U
• https://www.yo utube.com/wa tch ?v= _M8BnosAD78
Note: You may also use Ms Excel or Datawrapper (https: ( /www.datawrap per.de/) for the

You might also like