Publicité
Publicité

Contenu connexe

Publicité

cot-2022.pptx

  1. MEDIAAND INFORMATION TECHNOLOGY MODULE 9 MEDIAAND INFORMATION LITERATE INDIVIDUAL
  2. LEARNING OUTCOME Able to know the importance of media and information to an individual and the society; Able to outline pros and cons of the social media.; Able to differentiate between fact and opinion; and Able to give a brief summary of the different crimes committed on the internet.
  3. MEDIAAND INFORMATION LITERACY "Media and Information Literacy consists of the knowledge, the attitudes, and the sum of the skills needed to know when and what information is needed; where and how to obtain that information; how to evaluate it critically and organize it once it is found; and how to use it in an ethical way.
  4. IMPORTANCE OF MEDIA LITERACY Media literacy is essential because it helps people understand the messages that are being communicated to them. With so many sources of information today, media literacy can help people identify reliable sources and filter through the noise to get at the truth.
  5. MEDIAAND INFORMATION LITERATE INDIVIDUAL Media and information literate individuals have the ability to find, evaluate, and use reliable information, and communicate it through various formats and media. Such literacy is important for learning, making sound decisions and solving problems.
  6. THE INTERNET As defined in the Oxford Dictionary, the Internet is “a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.”
  7. SOCIAL MEDIA Social media refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks. Sample forms of social medias are Facebook, Twitter, Instagram, LinkedIn and YouTube.
  8. Observable that social media present enormous risks for individuals, communities, firms, and even for. society as a whole. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, fake news, and privacy abuse.
  9. vs FACT Opinion
  10. FACT Opinion vs
  11. Opinion vs FACT
  12. FAKE NEWS Wikipedia states that "fake news is a type of yellow journalism or propaganda that consists of deliberate misinformation or hoaxes spread via traditional print and broadcast news media or online social media. Fake news is written and published with the intent to mislead in order to gain financially or politically, often with sensationalist, exaggerated, or patently false headlines that grab attention.
  13. CASE # 1 - ENCHONG DEE VS CLAUDINE BAUTISTA- LIM
  14. Most common among internet crimes are fraud, sexual abuse and exploitation, bullying, and identity theft. Before the COVID-19 pandemic, the country already saw a rise in cybercrime cases, as the Philippine National Police (PNP) recorded only 42 cases of online scam in 2013, compared to 550 in June 2019.
  15. The Internet is a useful way to reach a mass audience without spending a lot of time or money. Crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person of property or any interest, estate, or right by a false representation of a matter of fact, whether by providing misleading information or by concealment of information
  16. PHISHING EMAIL SCAMS Phishing scams are based on communication made via email or on social networks. In many cases, cyber criminals will send users messages/emails by trying to trick them into providing them valuable and sensitive data ( login credentials – from bank account, social network, work account, cloud storage) that can prove to be valuable for them.
  17. THE NIGERIAN SCAM A typical Nigerian scam involves an emotional email, letter, text message or social networking message coming from a scammer (which can be an official government member, a businessman or a member of a very wealthy family member – usually a woman) who asks you to give help in retrieving a large sum of money from a bank, paying initially small fees for papers and legal matters. In exchange for your help, they promise you a very large sum of money. They will be persistent and ask you to pay more and more money for additional services, such as transactions or transfer costs
  18. LOTTERY SCAM A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.
  19. LOTTERY SCAM A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.
  20. HITMAN SCAM Cybercriminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers. To create the appearance of real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.
  21. HITMAN SCAM Cybercriminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers. To create the appearance of real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.
  22. ONLINE DATING (ROMANCE) SCAMS A romance scam usually takes place on social dating networks, like Facebook, or by sending a simple email to the potential target, and affects thousands of victims from all over the world.
  23. FAKE ANTIVIRUS SOFTWARE Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product. If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.
  24. FAKE ANTIVIRUS SOFTWARE Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product. If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.
  25. MAKE MONEY FAST SCAMS (ECONOMIC SCAMS) This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non- existent jobs for a variety of positions is part of the online criminals’ arsenal. Using various job types, such as work-at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well-paid job that will bring lots of money in a very short period of time.
  26. MAKE MONEY FAST SCAMS (ECONOMIC SCAMS) This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non- existent jobs for a variety of positions is part of the online criminals’ arsenal. Using various job types, such as work- at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well-paid job that will bring lots of money in a very short period of time.
  27. PONZI SCHEMES A Ponzi scheme is an investment fraud that pays existing investors with funds collected from new investors. Ponzi schemes are named after Charles Ponzi. In the 1920s, Ponzi promised investors a 50% return within a few months for what he claimed was an investment in international mail coupons.
  28. FAKE SHOPPING WEBSITES There are thousands of websites out there that provide false information and might redirect you to malicious links, giving hackers access to your most valuable data. If you spot a great online offer which is “too good to be true”, you might be tempted to say “yes” instantly, but you need to learn how to spot a fake shopping site so you don’t get scammed.
  29. FAKE SHOPPING WEBSITES There are thousands of websites out there that provide false information and might redirect you to malicious links, giving hackers access to your most valuable data. If you spot a great online offer which is “too good to be true”, you might be tempted to say “yes” instantly, but you need to learn how to spot a fake shopping site so you don’t get scammed.
  30. JOB OFFER SCAMS • They use fake and “attractive” job opportunities to trick people. It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you.
  31. JOB OFFER SCAMS • They use fake and “attractive” job opportunities to trick people. It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you.
  32. SMS SCAMMING (SMSHING) Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims. How does this happen? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information or other online banking information.
  33. SMS SCAMMING (SMSHING) Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims. How does this happen? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information or other online banking information.
  34. POVERTY PORN A form of exploitation that has been defined as "any type of media, be it written, photographed or filmed, which exploits the poor's condition in order to generate the necessary sympathy for selling newspapers, increasing charitable donations, or support for a given cause". It also suggests that the viewer of the exploited protagonists is motivated by gratification of base instincts. It is also a term of criticism applied to films that objectify people in poverty for the sake of entertaining a privileged audience
  35. SEXUAL ABUSE Sexual abuse is unwanted sexual activity, with perpetrators using force, making threats or taking advantage of victims not able to give consent. Most victims and perpetrators know each other. Immediate reactions to sexual abuse include shock, fear or disbelief.
  36. SEXUAL EXPLOITATION Sexual exploitation is defined as an actual or attempted abuse of someone's position of vulnerability (such as a person depending on you for survival, food rations, school, books, transport or other services), differential power or trust, to obtain sexual favours, including but not only, by offering money or other social, economic or political advantages. It includes trafficking and prostitution.
  37. CASE # 2 – IVANAALAWI
  38. CASE # 2 – IVANAALAWI
  39. CASE # 2 – IVANAALAWI
  40. CASE # 2 – IVANAALAWI
  41. ONLINE HARASSMENT Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).
  42. CYBERSTALKING The use of the Internet, email, or other electronic communications to stalk; generally refers to a pattern of threatening or malicious behaviors, including communicating a credible threat of harm.
  43. CYBERBULLYING Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
  44. CYBERBULLYING Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
  45. CASE #3 - FREDRICK MARK BICO ALBA
  46. CASE #3 - FREDRICK MARK BICO ALBA
  47. CASE #3 - FREDRICK MARK BICO ALBA
  48. CASE #3 - FREDRICK MARK BICO ALBA
  49. IDENTITY THEFT From a legal perspective, identity theft means that someone has stolen your personal information. This could be personal information like your name, address, date of birth, Social Security number, credit card number, etc. They are stealing your personally identifiable information, and using it (typically) for financial gain.
  50. IMPERSONATION is when someone pretends to be someone else. A person could pretend to be you to do a job, or to get information. However, impersonation does not always involve your identity being stolen.
  51. CASE #4 - HUGO WRAY
  52. CASE #4 - Hugo Wray
  53. CASE #4 - HUGO WRAY
  54. TAKE AWAY LESSON Media and information literate individuals have the ability to interpret and make informed judgments as users of information and media, as well as to become skillful creators and producers of information and media messages in their own right. And aware of the different crimes that exist within the internet to avoid being targeted by these illegal acts.

Notes de l'éditeur

  1. What is MIL
  2. Importance of learning MIL - Media literacy is the ability to think critically about what you are seeing, reading, and hearing. It helps us to analyse information from a variety of viewpoints. With so many sources of information today, critical thinking skills can help people identify reliable sources and filter through the noise to get at the truth. For example, we may spot fake news faster or understand why certain products are advertised more than others on social media sites like Facebook or Instagram. We might also notice that content shared on those platforms often comes with an agenda – such as promoting an organisation’s political ideology or persuading someone to buy something they don’t need.
  3. What is MI Literate Individual
  4. The internet
  5. The dark side of social media
  6. Facts and Opinion
  7. Facts and Opinion
  8. Facts and Opinion
  9. Case number 1
  10. Facts and opinion
Publicité