and ethics Internet threats Protecting reputations online Copyright Contextualized online search and research skills Objectives 1. Know the appropriate and inappropriate online behavior; 2. Identify deceptive information and wrongly evaluated data; and 3. Understand the importance of making judgment calls on possible implications and consequences of making certain information public. Media vs Digital Media
Media is the main means of mass communication
(broadcasting, publishing, and the Internet), regarded collectively.
Digital media and technologies are electronic devices and
media platforms such as computers, cell phones, digital video, social networking sites, the Internet, video games, and virtual worlds, which allow users to create, communicate and interact with one another or with the device or application themselves. Digital Life 101 How does your digital media life look like? • My media life is like a _________ , because ______________. • This statement is a simile, a literary device for comparing two unlike things. • For instance, someone who does not use much media might say that her media life is like a desert, because there is little life there. • Someone might say that his media life is like a track meet, because he is exhausted at the end of the day. Internet
(sometimes with a capital) the internet, the single worldwide
computer network that interconnects other computer networks, on which end-user services, such as World Wide Web sites or data archives, are located, enabling data and other information to be exchanged. Also known as the Net.
Source: internet. (n.d.). Collins English Dictionary - Complete &
Unabridged 10th Edition. Retrieved November 21, 2016 from Dictionary.com website http://www.dictionary.com/browse/internet Language in the Digital Media Netizen - a term used to describe people who avidly use the Internet Digital citizen - has grown in use amid concerns that more people, especially young people, need to learn how to safely and effectively navigate the Internet. Netiquette - the rules of etiquette for communicating online Web – World Wide Web IM – instant message email, e-learning, e-wallet, e-signature, and e-commerce Surfed the web, browse or search the web An SMS, or text message, is a short message of fewer than 160 characters sent from a cell phone. An MMS is a text message that contains an attached multimedia file, such as a picture or song. Language in the Digital Media Avatar – a two- or three-dimensional icon that represents a computer user or a gamer. It can be a cartoonish graphic, a photograph, a screen name, or a fully-developed character. Mash-up - a remix or blend of multiple songs, videos, or other media content into one product. Fan fiction writing is one form of a mash- up, as writers take characters from a well-known video game, movie, or book, and rewrite their actions or relationships. P2P or Peer-to-Peer network- allows sharing of mp3s, videos, and other digital files by transferring information directly between two computers rather than by going through a central server. Ex. Skype Podcast – a downloadable video or audio file. Podcasts can be verbal, based on a certain topic, or can include music, video and commentary. Language in the Digital Media Aggregator - a website or Web application where headlines and other content are collected for easy viewing. Aggregators such as Google News compile news articles and posts. Blog, from the term “weblog, ” - a type of website usually updated by an individual or a group of bloggers. Some blogs provide news or opinions on a specific subject, while others are more like online journals. Most blogs allow readers to leave comments on blog posts. Flaming - the act of saying mean things online, usually in ALL CAPS, and often in a public forum with the intention to humiliate. Flame wars can occur easily online, as it can be difficult to figure out people’s intentions or emotions online. Massively multiplayer online game (MMOG) - usually an online virtual world that multiple players navigate and play in together. While in this virtual world, their avatars chat, cooperate, and quest together, oftentimes towards a goal. Take the quiz! 1. 82% of teens say that they own which of the following? a) cell phone b) smartphone c) iPod Touch or similar device d) iPad or similar device 2. What percent of teens describe themselves as “addicted” to their cell phones? a) 11% b) 27% c) 41% d) 63% Take the quiz! 3. 68% of teens say they do which of the following at least once a day? a) text b) visit a social network c) instant message (IM) d) use email 4. How many characters (letters, punctuation marks, symbols, and spaces) can you send in a regular text message? a) 110 b) 140 c) 200 d) 250 Take the quiz! 5. How often do 34% of teens visit social networking sites? a) at least once a day b) several times a day c) once a week or less d) never 6. What percent of teens say that they don’t understand their social networking site’s privacy policies? a) 24% b) 35% c) 46% d) 61% Take the quiz! 7. What percent of teens still prefer face-to-face communication with their friends over communication online or via texting? a) 22% b) 36% c) 49% d) 61% 8. What percent of teens say they have said something bad about someone online that they wouldn’t have said in person? a) 33% b) 67% c) 49% d) 25% Take the quiz! 9. What percent of teens say that social networking helps them connect with people who share a common interest? a) 35% b) 42% c) 57% d) 66% 10. What percent of teens agreed they wish they could “unplug” for a while? a) 13% b) 27% c) 29% d) 43% Answers to the quiz! 1. a 2. c 3. a 4. b 5. b 6. a 7. c 8. d 9. c 10. d Type of Information and its related risk 1. First name – a hacker may already know plenty of stuff about you even if you only give out your first name. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with. 2. Last name – vulnerable to being searched for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft. 3. Middle name – most risky 4. Current and previous school(s) – most people who steal identities study their subject. They can use this information for verification purposes. Type of Information and its related risk 5. Your cellphone number – should never be posted over the Internet. The Internet is a public place (information superhighway). You would not want random strangers to text or call you, or worse, pretend that they are someone else. 6. The name of your mother and father – risky (posting their full names). You encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password. 7. The name of your siblings – strangers may pretend or use their identity to dupe you. Type of Information and its related risk 8. Your address – easier for criminals to find you. 9. Your home phone number – scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. 10. Your birthday – if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
You may not experience the threat now, whatever information
we share today could affect our future. Watch: Dangers of Oversharing on the Internet Watch: Online Safety, Security, Ethics, and Etiquette 8. Your address – easier for criminals to find you. 9. Your home phone number – scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. 10. Your birthday – if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
You may not experience the threat now, whatever information
we share today could affect our future. Internet Threats 1. Malware – malicious software a) Virus – replicate it self and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs b) Worm – transfer from one computer to another by any type of means. Often, it uses a computer network to spread it self. Ex. ILOVEYOU worm (Love Bug Worm) c) Trojan – disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Internet Threats d) Spyware – runs in the background without knowing it (“spy”). It has the ability to monitor what you are currently doing and typing through keylogging. *Keyloggers – used to record the keystroke done by the users. This is done to steal their passwords or any other sensitive information. It can record email, messages, or any information you type using your keyboard. e) Adware – send you advertisements, mostly as pop-ups. 2. Spam – unwanted email mostly from advertisers. It can be used to send malware. Internet Threats 3. Phishing – acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card details, or personal information. *Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private”. In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as in appropriate.