Digital Self Part II

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

DIGITAL SELF

SOCIAL
NETWORKING IN
THE PHILIPPINES
Social
networking is the
use of websites
such as
Facebook and
twitter to interact
with other users.
Social Networking in the Philippines

The Philippines has the fastest growing Majority of the Filipinos use the internet
internet population in Southeast Asia primarily for social networking
Social Networking in the Philippines

The Filipino youth are the biggest users of They mostly use social networking for
social networking in the past few years. communication, information and
entertainment.
Online Disinhibition

lack of restraint one feels


when communicating online.
Online Disinhibitions

Benign Disinhibition Toxic Disinhibition


• Speaking about emotions, fears, & • Rude language, harsh criticism,
wishes anger, hatred, and threats
• Showing kindness and helping • Pornography and violence
others • Cyberbullying
• Combating loneliness through • Threatening, humiliating, spreading
online interactions rumors, making fun of others
• Finding emotional support • Cyber harassment or exploitation.
Socialmedia is also a platform used for
people to present their selves in a more
favorable light. This is what we call as
“Self-Presentation”
Types of Self-Presentation

Self-Promotion
 We try to show that we are better or capable than others so others will admire
us or they would think highly of us.
Types of Self-Presentation

Ingratiation
You only want people to like you because you crave for attention.
Types of Self-Presentation
Exemplification
 Intentions to make others bad or make feel not good enough.
Types of Self-Presentation

Intimidation
 Instilling fear to other people because you want them to think that you are dangerous.
Types of Self-Presentation
Supplication
You want people to show mercy and you want people to take good care of
you. But for some there are reasons behind it (e.g. they might need help).
Others do this to get attention.
Social Networking in the Philippines

Hechanova and Ortega-Go


(2014) found that the use of
internet has both positive and
negative outcomes.
It can improve one’s relationships

Positive It can be an important facility for


debates on current issues in the
Outcomes: country such as political issues

It can also be a facility to express


the opinions, needs and concerns
of the people
Negative Outcomes:

IT IS ALSO THROUGH SOCIAL NETWORKING THAT


THE USE OF INTERNET CAN BE AN ADDICTIVE ELEMENT OR IDENTITY THEFT, FALSE INFORMATION, AND FAKE
THE COMPULSION TO CONSTANTLY CHECK INFORMATION NEWS CIRCULATE.
OF THOSE IN THEIR SOCIAL NETWORK
Social Networking in the Philippines

They usually post pictures, videos


of themselves, their friends and
family.
Thus, adolescents are particularly
susceptible to cyberbullying,
gossips and stalking.
Social Networking in the Philippines

The Church, schools and


government in the Philippines
make efforts to prevent and
effectively manage the spread of
identity theft, false information
and fake news in the country.
TYPES OF CYBERCRIMES
Online Scams: Phishing & Theft

Theft - The aim of internet theft is to steal


your personal information and use it to
then steal money out of your bank
account or make purchases using your
details.

Phishing scams are attempts by


scammers to trick you into giving out your
personal information such as bank account
numbers, passwords and credit card
numbers.
Malware/Virus Dissemination Email Bombing
Malware is often done through a range of Email bombing is an overload of emails
viruses that will get into your computer to directed to one email address, this will cause
cause havoc, by damaging your computer, the person receiving the emails server to
tablet, or phones. become sluggish or even crash
 Social Media Hack & Spamming
Social media spamming comes when a person makes
a fake account and becomes friends or followed by
the average person.
 Sales & Investment Fraud Eavesdropping & Surveillance/Cyber Stalking
Eavesdropping without the consent of the parties is a
By sourcing the contact details and available
crime and can be done online or over the phone.
account information for savings or investment
account holders, fraudsters can adopt the
persona of an investment broker.
Software Piracy Data Diddling
The unauthorized use and distribution The action of skewing data
of computer software. entries in the user’s system.
Identity Theft Child Soliciting & Abuse

Criminals usually steal identity information of Child soliciting and abuse online is a type of
others such as credit card information, cybercrime where criminals solicit children via
addresses, email addresses and more. With chat rooms for the purpose of pornography.
this information they can pretend to be
someone else and create new bank accounts.
ELECTRONIC LIBEL &
CYBERCRIME PREVENTION
ACT OF 2012
Republic Act of 10175: Cybercrime
Law
 The State also recognizes the importance of providing an environment
conducive to the development, acceleration, and rational application and
exploitation of information and communications technology (ICT) to attain
free, easy, and intelligible access to exchange and/or delivery of
information; and the need to protect and safeguard the integrity of
computer, computer and communications systems, networks, and
databases, and the confidentiality, integrity, and availability of information
and data stored therein, from all forms of misuse, abuse, and illegal access
by making punishable under the law such conduct or conducts
Social Networking
in the Philippines

 Privacy and confidentiality


should be a major concern,
especially for adolescents
who may not be entirely
aware about the
consequences of sharing
private information to the
public.
DATA PRIVACY
ACT
Republic Act
10173,
otherwise
known as the
Data Privacy
Act of 2012
Republic Act 10173

It was created to protect people


from invasion of privacy
Data Privacy
Act
 The Act states that “It is
the policy of the State
to protect the
fundamental human
right of privacy of
communication while
ensuring free flow of
information to promote
innovation and growth.”
 The State recognizes the vital role of
information and communications
technology in nation-building and its
Data Privacy inherent obligation to ensure that
Act personal information in information and
communications systems in the
government and in the private sector
are secured and protected.
Data Privacy Act

 Personal information refers to any information


whether recorded in a material form or not,
from which the identity of an individual is
apparent or can be reasonably and directly
ascertained by the entity holding the
information, or when put together with other
information would directly and certainly identify
an individual.
Conclusion: BE CAREFUL

 Cyber criminals are out there and will do


anything to make money and steal useful
information . As we are becoming more digital,
we are opening ourselves up to more and more
types of cyber crime.

You might also like