Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 62

MEDIA AND

INFORMATION
LITERACY
Mark Angelo Soriano
Let’s Play Logo Quiz
Game !
WITT
ERT
TWIT
TER
KOTK
IT
TIKT
OK
TOYB
ETU
YOUT
UBE
MARGAT
SNI
INSTAGR
AM
KOOBEC
AF
FACEBO
OK
SPLENDID ! YOU
GUESSED EVERY LOGO.
BUT DID YOU KNOW
THAT THERE IS A DARK
SIDE OF THESE APPS.
The Dark Side of Internet and
Social Media
Learning Outcome

Able to know the Able to give a brief


importance of media and Able to outline pros and Able to differentiate summary of the different
information to an cons of the social media between fact and opinion crimes committed on the
individual and the society internet
Learning Outcome

Able to know the


importance of media and
information to an
individual and the society
Able to give a brief
Able to outline pros and Able to differentiate summary of the different
cons of the social media between fact and opinion crimes committed on the
internet
Learning Outcome

Able to know the


importance of media and Able to outline pros and
information to an cons of the social media
individual and the society
Able to give a brief
Able to differentiate summary of the different
between fact and opinion crimes committed on the
internet
Learning Outcome

Able to know the


importance of media and Able to outline pros and Able to differentiate
information to an cons of the social media between fact and opinion
individual and the society
Able to give a brief
summary of the different
crimes committed on the
internet
Learning Outcome

Able to know the Able to give a brief


importance of media and Able to outline pros and Able to differentiate summary of the different
information to an cons of the social media between fact and opinion crimes committed on the
individual and the society internet
We define Media and
Information Literacy from
our previous topic as ….
Is consists of the knowledge, the
attitudes, and the sum of the skills
needed to know when and what
information is needed; where and how
to obtain that information; how to
evaluate it critically and organize it once
it is found; and how to use it in an
ethical way. 
Oxford Dictionary defined
INTERNET as ….
“a global computer network providing a
variety of information and communication
facilities, consisting of interconnected
networks using standardized
communication protocols.”
Internet and Social media
Crimes
Social media is defined as

Social media refers to the means of
interactions among people in which they
create, share, and/or exchange
information and ideas in virtual
communities and networks.
social media, just like a coin with two sides,
one for the good things it can offer and the
other is for the bad things it offers in this lesson
we are going to define the negative and crimes
committed on internet and social media.
Observable that social media present enormous
risks for individuals, communities, firms, and even
for. society as a whole. Examples for this “dark
side” of social media include cyberbullying,
addictive use, trolling, fake news, and privacy abuse
First on our list is FAKE
NEWS
is a type of yellow journalism or
propaganda that consists of deliberate
misinformation or hoaxes spread via
traditional print and broadcast news media
or online social media. Fake news is
written and published with the intent to
mislead in order to gain financially or
politically, often with sensationalist,
exaggerated, or patently false headlines
that grab attention
Fact or Opinion.
Time for Case Analysis !
- Does the Tweet fact or opinion?
- Would you tweet the same comment as
Echong based on our story?
- What do you think “think before you
click” means?
Internet Crimes
The Internet is a useful way to reach a mass
audience without spending a lot of time or money.
Crime in which the perpetrator develops a scheme
using one or more elements of the Internet to
deprive a person of property or any interest, estate,
or right by a false representation of a matter of
fact, whether by providing misleading information
or by concealment of information
Identity theft
From a legal perspective, identity theft means
that someone has stolen your personal
information. This could be personal information
like your name, address, date of birth, Social
Security number, credit card number, etc. They
are stealing your personally identifiable
information, and using it (typically) for financial
gain.
Impersonation
is when someone pretends to be someone
else. A person could pretend to be you to
do a job, or to get information. However,
impersonation does not always involve
your identity being stolen.
Phishing scams are based on
communication made via email or on
social networks. In many cases, cyber
criminals will send users messages/emails
by trying to trick them into providing them
valuable and sensitive data ( login
credentials – from bank account, social
network, work account, cloud storage) that
can prove to be valuable for them.
Lottery scam
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
Hitman scam
Cybercriminals will send you an email
threatening to extort money from you. This type
of online scam may come in various forms, such
as the one threatening that they will kidnap a
family member unless a ransom is paid in a time
frame provided by the scammers. To create the
appearance of real danger, the message is filled
with details from the victim’s life, collected
from an online account, a personal blog or from
a social network account.
Online dating
(romance) scams
A romance scam usually takes
place on social dating
networks, like Facebook, or
by sending a simple email to
the potential target, and
affects thousands of victims
from all over the world.
Fake antivirus software
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
Ponzi schemes
A Ponzi scheme is an
investment fraud that pays
existing investors with funds
collected from new investors.
Ponzi schemes are named after
Charles Ponzi. In the 1920s,
Ponzi promised investors a 50%
return within a few months for
what he claimed was an
investment in international mail
coupons.
Fake shopping
websites
There are thousands of websites out
there that provide false information
and might redirect you to malicious
links, giving hackers access to your
most valuable data. If you spot a
great online offer which is “too
good to be true”, you might be
tempted to say “yes” instantly, but
you need to learn 
how to spot a fake shopping site
 so you don’t get scammed.
Fake shopping
websites
There are thousands of websites out
there that provide false information
and might redirect you to malicious
links, giving hackers access to your
most valuable data. If you spot a
great online offer which is “too
good to be true”, you might be
tempted to say “yes” instantly, but
you need to learn 
how to spot a fake shopping site
 so you don’t get scammed.
Job offer scams
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct
message on LinkedIn) from someone
claiming to be a recruiter from a
well-known company who saw your
CV and saying they are interested in
hiring you.
SMS Scamming (Smshing)

Smishing (using SMS text messages) is a


similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
Sexual Abuse
Sexual abuse is unwanted sexual activity, with
perpetrators using force, making threats or
taking advantage of victims not able to give
consent. Most victims and perpetrators know
each other. Immediate reactions to sexual abuse
include shock, fear or disbelief.
Sexual Exploitation
Sexual exploitation is defined as an actual or
attempted abuse of someone's position of
vulnerability (such as a person depending on you for
survival, food rations, school, books, transport or
other services), differential power or trust, to obtain
sexual favours, including but not only, by offering
money or other social, economic or political
advantages. It includes trafficking and prostitution.
Online harassment
Cyber Harassment is the use of Information and
Communications Technology (ICT) to harass, control,
manipulate or habitually disparage a child, adult, business or
group without a direct or implied threat of physical harm.
Unlike physical harassment involving face-to-face contact,
cyber harassment requires the use of ICT and is verbal,
sexual, emotional or social abuse of a person, group or
organization. The cyber harasser’s primary goal is to exert
power and control over the targeted victim(s).
is the use of Information and
Communications Technology
Cyberbullying 
between minors to humiliate, taunt
and disparage one another.
Cyberbullying is intended to tease,
embarrass, deprecate & defame a
targeted minor with the assailant’s
developmental needs for peer
acceptance and recognition.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for information
Cyberstalking 
The use of the Internet, email, or other electronic
communications to stalk; generally refers to a
pattern of threatening or malicious behaviors,
including communicating a credible threat of
harm.
Take away lesson
Media and information literate individuals have the ability to
interpret and make informed judgments as users of information
and media, as well as to become skillful creators and producers
of information and media messages in their own right. And
aware of the different crimes that exist within the internet to
avoid being targeted by these illegal acts.
Assignment
Case number 2: Hugo Wray, will be uploaded on or Group Chat.

You might also like