Professional Documents
Culture Documents
Mil-Week1-2nd Qtr-S.y. 2020-2021
Mil-Week1-2nd Qtr-S.y. 2020-2021
I. LEARNING COMPETENCY
3. Power – The mass media is powerful because audiences tend to trust them all the time. The following examples
are:
Influence
Information Dissemination
Business Strategy
1. Threats
Social Engineering – one of the most prevalent in social media threats and also the most popular tactic for
cyber criminals. Social media platforms allow attackers to find personal information that can be used to target
specific individuals.
Targeted Phishing Account - threats are an elevated form of phishing virus attacks that use social
engineering to get a specific person to reveal sensitive information.
2. Risks
Request from fake profiles – On social media websites like Facebook and Twitter, there are users who create
fake accounts and with the help of these, they try making spams. These fake account users also lead to
dangerous and harmful viruses being let into your computer devices. To avoid these serious issues, one must
stay alert while using social media websites.
Brand Impersonation – Today, businesses are also falling prey to brand impersonation as most of the
hackers or even competitors may promote false things on duplicate profiles of your business. Your social
media profile may represents your company and any false activities conducted on this profile will send the
wrong message to your costumers and it will create serious harm to your brand.
4. Misuse
Loss of Privacy – One basic problem that can come with the use use of socila networking sites is the loss of
individual privacy. This is because all social networking sites involve placing personal information on the
internet, and it’s possible for people in almost all corners of the world to see that information.
Sexual Predators – A very serious problem which is related to loss of privacy is sexual predation. Bceause
they don’t always think before they post, students sometimes upload scandalous pictires of themselves onto
their profiles. These cound then be viewed by sexual predators.
III. ACTIVITY
Assessment:
A. Identify if the following examples are opportunity, challenge, or power.
1. copyright infringement
2. education
3. freedom of expression
4. distribution of information
5. cybercrime
References: Opportunities, Challenges and Power of Media and Information by Marielie Noran (Youtube Channel)
Opportunities, Challenges and Power of Media and Information by Media and Information Literacy (Youtube Channel)
“You only fail when you stop trying.” - Anonymous