LEARNING OUTCOME
Able to know the importance of media and information to an individual and the society;
Able to outline pros and cons of the social media.;
Able to differentiate between fact and opinion; and
Able to give a brief summary of the different crimes committed on the internet.
MEDIAAND INFORMATION LITERACY
"Media and Information Literacy consists of the
knowledge, the attitudes, and the sum of the skills
needed to know when and what information is
needed; where and how to obtain that information;
how to evaluate it critically and organize it once it
is found; and how to use it in an ethical way.
IMPORTANCE OF MEDIA LITERACY
Media literacy is essential because it helps people
understand the messages that are being
communicated to them. With so many sources of
information today, media literacy can help people
identify reliable sources and filter through the
noise to get at the truth.
MEDIAAND INFORMATION LITERATE INDIVIDUAL
Media and information literate individuals have the
ability to find, evaluate, and use reliable
information, and communicate it through various
formats and media. Such literacy is important for
learning, making sound decisions and solving
problems.
THE INTERNET
As defined in the Oxford Dictionary, the Internet is “a
global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.”
SOCIAL MEDIA
Social media refers to the means of interactions among
people in which they create, share, and/or exchange
information and ideas in virtual communities and
networks. Sample forms of social medias are Facebook,
Twitter, Instagram, LinkedIn and YouTube.
Observable that social media present enormous risks
for individuals, communities, firms, and even for.
society as a whole. Examples for this “dark side” of
social media include cyberbullying, addictive
use, trolling, fake news, and privacy abuse.
FAKE NEWS
Wikipedia states that "fake news is a type of yellow
journalism or propaganda that consists of deliberate
misinformation or hoaxes spread via traditional print and
broadcast news media or online social media. Fake news is
written and published with the intent to mislead in order to
gain financially or politically, often with sensationalist,
exaggerated, or patently false headlines that grab attention.
Most common among internet crimes are fraud,
sexual abuse and exploitation, bullying, and
identity theft. Before the COVID-19 pandemic,
the country already saw a rise in cybercrime cases,
as the Philippine National Police (PNP) recorded
only 42 cases of online scam in 2013, compared to
550 in June 2019.
The Internet is a useful way to reach a mass audience
without spending a lot of time or money. Crime in
which the perpetrator develops a scheme using one or
more elements of the Internet to deprive a person of
property or any interest, estate, or right by a false
representation of a matter of fact, whether by providing
misleading information or by concealment of
information
PHISHING EMAIL
SCAMS
Phishing scams are based on
communication made via email or on
social networks. In many cases, cyber
criminals will send users messages/emails
by trying to trick them into providing them
valuable and sensitive data ( login
credentials – from bank account, social
network, work account, cloud storage) that
can prove to be valuable for them.
THE NIGERIAN
SCAM
A typical Nigerian scam involves an emotional
email, letter, text message or social
networking message coming from a scammer
(which can be an official government member,
a businessman or a member of a very wealthy
family member – usually a woman) who asks
you to give help in retrieving a large sum of
money from a bank, paying initially small fees
for papers and legal matters. In exchange for
your help, they promise you a very large sum of
money. They will be persistent and ask you to
pay more and more money for additional
services, such as transactions or transfer costs
LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This type
of online scam may come in various forms, such
as the one threatening that they will kidnap a
family member unless a ransom is paid in a time
frame provided by the scammers. To create the
appearance of real danger, the message is filled
with details from the victim’s life, collected from
an online account, a personal blog or from a
social network account.
HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This
type of online scam may come in various
forms, such as the one threatening that they
will kidnap a family member unless a ransom
is paid in a time frame provided by the
scammers. To create the appearance of real
danger, the message is filled with details from
the victim’s life, collected from an online
account, a personal blog or from a social
network account.
ONLINE DATING
(ROMANCE) SCAMS
A romance scam usually takes
place on social dating
networks, like Facebook, or
by sending a simple email to
the potential target, and
affects thousands of victims
from all over the world.
FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
MAKE MONEY FAST SCAMS
(ECONOMIC SCAMS)
This scamming method is similar to the
romance scam mentioned above, where the
cyber attackers address the emotional side
of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part
of the online criminals’ arsenal. Using
various job types, such as work-at-home
scams, the victim is lured into giving away
personal information and financial data with
the promise of a well-paid job that will
bring lots of money in a very short period of
time.
MAKE MONEY FAST
SCAMS (ECONOMIC
SCAMS)
This scamming method is similar to the romance scam
mentioned above, where the cyber attackers address the
emotional side of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part of the online
criminals’ arsenal. Using various job types, such as work-
at-home scams, the victim is lured into giving away
personal information and financial data with the promise of
a well-paid job that will bring lots of money in a very short
period of time.
PONZI
SCHEMES
A Ponzi scheme is an investment
fraud that pays existing
investors with funds collected
from new investors. Ponzi
schemes are named after Charles
Ponzi. In the 1920s, Ponzi
promised investors a 50% return
within a few months for what he
claimed was an investment in
international mail coupons.
FAKE SHOPPING
WEBSITES
There are thousands of websites out
there that provide false information
and might redirect you to malicious
links, giving hackers access to your
most valuable data. If you spot a
great online offer which is “too
good to be true”, you might be
tempted to say “yes” instantly, but
you need to learn how to spot a
fake shopping site so you don’t get
scammed.
FAKE SHOPPING
WEBSITES
There are thousands of websites out there that provide
false information and might redirect you to malicious
links, giving hackers access to your most valuable data.
If you spot a great online offer which is “too good to be
true”, you might be tempted to say “yes” instantly, but
you need to learn how to spot a fake shopping site so
you don’t get scammed.
JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct
message on LinkedIn) from
someone claiming to be a recruiter
from a well-known company who
saw your CV and saying they are
interested in hiring you.
JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct message
on LinkedIn) from someone claiming
to be a recruiter from a well-known
company who saw your CV and
saying they are interested in hiring
you.
SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
POVERTY PORN
A form of exploitation that has been defined as "any type of media,
be it written, photographed or filmed, which exploits the poor's
condition in order to generate the necessary sympathy for selling
newspapers, increasing charitable donations, or support for a given
cause". It also suggests that the viewer of the exploited protagonists
is motivated by gratification of base instincts. It is also a term of
criticism applied to films that objectify people in poverty for the
sake of entertaining a privileged audience
SEXUAL ABUSE
Sexual abuse is unwanted sexual activity, with
perpetrators using force, making threats or taking
advantage of victims not able to give consent. Most
victims and perpetrators know each other. Immediate
reactions to sexual abuse include shock, fear or
disbelief.
SEXUAL EXPLOITATION
Sexual exploitation is defined as an actual or
attempted abuse of someone's position of
vulnerability (such as a person depending on you for
survival, food rations, school, books, transport or other
services), differential power or trust, to obtain sexual
favours, including but not only, by offering money or
other social, economic or political advantages. It includes
trafficking and prostitution.
ONLINE HARASSMENT
Cyber Harassment is the use of Information and
Communications Technology (ICT) to harass, control,
manipulate or habitually disparage a child, adult, business or
group without a direct or implied threat of physical harm. Unlike
physical harassment involving face-to-face contact, cyber
harassment requires the use of ICT and is verbal, sexual,
emotional or social abuse of a person, group or organization. The
cyber harasser’s primary goal is to exert power and control over
the targeted victim(s).
CYBERSTALKING
The use of the Internet, email, or other
electronic communications to stalk; generally
refers to a pattern of threatening or malicious
behaviors, including communicating a credible
threat of harm.
CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
IDENTITY THEFT
From a legal perspective, identity theft means that
someone has stolen your personal information. This
could be personal information like your name, address,
date of birth, Social Security number, credit card
number, etc. They are stealing your personally
identifiable information, and using it (typically) for
financial gain.
IMPERSONATION
is when someone pretends to be someone else. A
person could pretend to be you to do a job, or to
get information. However, impersonation does not
always involve your identity being stolen.
TAKE AWAY LESSON
Media and information literate individuals have the ability to interpret
and make informed judgments as users of information and media, as
well as to become skillful creators and producers of information and
media messages in their own right. And aware of the different crimes
that exist within the internet to avoid being targeted by these illegal acts.
Notes de l'éditeur
What is MIL
Importance of learning MIL - Media literacy is the ability to think critically about what you are seeing, reading, and hearing. It helps us to analyse information from a variety of viewpoints. With so many sources of information today, critical thinking skills can help people identify reliable sources and filter through the noise to get at the truth. For example, we may spot fake news faster or understand why certain products are advertised more than others on social media sites like Facebook or Instagram. We might also notice that content shared on those platforms often comes with an agenda – such as promoting an organisation’s political ideology or persuading someone to buy something they don’t need.