Cybercrime, Media Literacy and Online Safety
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Media encompasses only digital channels of communication, excluding printed materials.

False (B)

Cybercrime strictly involves damaging computer hardware, like physically breaking a computer.

False (B)

New media presents only challenges to students, with no opportunities for growth or learning.

False (B)

Grooming, in the context of cybercrime, refers to making sexual advances exclusively to adults online.

<p>False (B)</p> Signup and view all the answers

The 'Marilag' issue, as presented, is an example of how media can be used to amplify and spread personal conflicts publicly.

<p>True (A)</p> Signup and view all the answers

Exploiting a weakness in a computer system to gain unauthorized access is always considered a malicious activity.

<p>False (B)</p> Signup and view all the answers

A program that disguises itself as a useful application but performs malicious actions is known as spyware.

<p>False (B)</p> Signup and view all the answers

Ransomware restricts access to a computer system and demands payment to restore access.

<p>True (A)</p> Signup and view all the answers

Phishing involves impersonating a legitimate entity to trick individuals into divulging sensitive information.

<p>True (A)</p> Signup and view all the answers

Identity theft can only occur through online activities; physical theft of documents is not considered identity theft.

<p>False (B)</p> Signup and view all the answers

Flashcards

Media

All channels of communication, from print to digital.

Cybercrime

Criminal activity that involves the internet or computers.

Opportunities of Media

Benefits provided by new media in education and communication.

Challenges of Media

Difficulties faced due to misinformation and misuse.

Signup and view all the flashcards

Risks of Media

Potential threats to safety and security from media use.

Signup and view all the flashcards

Hacking

The act of exploiting weaknesses in a system to gain unauthorized access.

Signup and view all the flashcards

Phishing

A cybercrime where targets are deceived into revealing sensitive data by false representations.

Signup and view all the flashcards

Identity Theft

When criminals steal personal information to impersonate someone for fraud.

Signup and view all the flashcards

Sextortion

A crime involving blackmail related to sexual content or relationships, often targeting youngsters.

Signup and view all the flashcards

Malware

Malicious software designed to damage or gain unauthorized access to computers.

Signup and view all the flashcards

Study Notes

Media and Information Literacy (MIL) - Lesson 8

  • The lesson focuses on the opportunities, challenges, and the power of media and information.
  • Key areas covered include economics, education, social, and political aspects.
  • Another area covers threats, risks, abuse, and misuse.
  • A formative assessment review reviews the definition of media.

Formative Assessment

  • Media encompasses all communication forms, from print to digital data.

Cartoon Analysis

  • The analysis of a cartoon reveals the concept of media and political pressure impacting the truth.

Student Challenges and Opportunities

  • Students face challenges and opportunities presented by new media.

Cybercrime

  • Cybercrime is the use of computing as an instrument for illegal activity.
  • This includes criminal activity involving computers, the internet, or computer technology.
  • Examples include hate and terrorism incitement; distribution of child pornography; grooming; and sexual advances to minors.

Current Issue: "Marilag" Vs. Maris & Anthony

  • A lawyer from the University of the Philippines Diliman, Jesús Falcis, emphasized that "cheaters have human rights", referencing a 2020 NPC advisory.
  • This issue involves social media discussions concerning the legal implications of private conversations.

Common Cybercrimes

  • This section likely presents a list of common forms of cybercrime.

Hacking

  • Hacking is the process of identifying and exploiting computer system or network weaknesses, often for unauthorized access to data.
  • While not always malicious, hacking is frequently associated with cybercrime.

Examples of Malware

  • Malware includes viruses that copy and spread to other devices.
  • Spyware collects information without user knowledge.
  • Adware displays advertisements automatically
  • Trojan horses mimic legitimate applications but harm computers, stealing data.
  • Ransomware locks computers to demand payment for unlocking.

Phishing

  • Phishing is a cybercrime that involves attempting to lure individuals into providing sensitive data by impersonating legitimate institutions.
  • This often involves email, phone, or text message communications.
  • The goal is to gain access to important accounts, resulting in identity theft and financial loss.

Identity Theft

  • Identity theft occurs when criminals steal personal information to commit criminal acts.
  • The stolen information is used to assume the victim's identity and execute fraudulent activities.

Sextortion

  • Sextortion is a crime where perpetrators gain or threaten to expose sexual images/videos.
  • It sometimes involves manipulation and coercion to gain further sexual materials
  • This can happen on various platforms like messaging apps or online games.

Threats to expose sexual images to make a person do something

  • 45% of perpetrators have carried out threats to expose images.
  • 60% of perpetrators knew victims before.
  • 40% met victims online.

Punishments for Violating Anti-Voyeurism Act

  • Penalties for violating the Anti-Voyeurism Act consist of imprisonment for a minimum of 3 years, up to a maximum of 7 years and a fine.
  • The fine amount is between 100,000 to 500,000 pesos.
  • Juridical (corporate) violators face license revocation.
  • Penalties and responsibilities are outlined for public officials, professionals, and aliens.

Cybercrime Prevention Act of 2012

  • This act is intended to combat cybercrime in the digital age.
  • It sets up laws and frameworks to detect, investigate, and prosecute cybercrimes.
  • Key offenses include those against computer systems and data; computer-related crimes; content-related violations, such as child pornography, cybersex or unsolicited communications; and cyber-libel.

Regulatory Bodies

  • The law outlines government bodies to implement the act.
  • An Office of Cybercrime is created within the Department of Justice.
  • This office handles, investigates, and prosecutes cybercrimes.

Performance Task: Creating Infographics

  • The assignment requires creating infographics, showing media opportunities and challenges.
  • Students will use various materials, including colored paper, magazines, etc.

Performance Task: Written Work

  • Research a news article concerning media impact on an event that took place from 2015 to present.
  • The event should show how media influenced change.
  • The assignment requires students to: copy/paste the article; cite the article (using APA style); write a summary (4-6 sentences); and write a reaction (5-7 sentences) to the article.
  • Guide questions are included to assist in writing the reaction.

References

  • Provide lists of references, including documents like the Media and Information Literacy Curriculum Guide by DepEd and other relevant texts.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This material covers crucial aspects of cybercrime, media literacy, and online safety. It discusses digital communication, cybercrime definitions, new media's impact, grooming, media's role in conflict, system exploitation, malware types (spyware, ransomware), phishing, and identity theft.

More Like This

Cybercrime Quiz
8 questions

Cybercrime Quiz

AccomplishedStream3784 avatar
AccomplishedStream3784
Cybercrime Study Notes Quiz
10 questions
Cybercrime and Digital Safety Quiz
53 questions
Use Quizgecko on...
Browser
Browser