Podcast
Questions and Answers
Media encompasses only digital channels of communication, excluding printed materials.
Media encompasses only digital channels of communication, excluding printed materials.
False (B)
Cybercrime strictly involves damaging computer hardware, like physically breaking a computer.
Cybercrime strictly involves damaging computer hardware, like physically breaking a computer.
False (B)
New media presents only challenges to students, with no opportunities for growth or learning.
New media presents only challenges to students, with no opportunities for growth or learning.
False (B)
Grooming, in the context of cybercrime, refers to making sexual advances exclusively to adults online.
Grooming, in the context of cybercrime, refers to making sexual advances exclusively to adults online.
The 'Marilag' issue, as presented, is an example of how media can be used to amplify and spread personal conflicts publicly.
The 'Marilag' issue, as presented, is an example of how media can be used to amplify and spread personal conflicts publicly.
Exploiting a weakness in a computer system to gain unauthorized access is always considered a malicious activity.
Exploiting a weakness in a computer system to gain unauthorized access is always considered a malicious activity.
A program that disguises itself as a useful application but performs malicious actions is known as spyware.
A program that disguises itself as a useful application but performs malicious actions is known as spyware.
Ransomware restricts access to a computer system and demands payment to restore access.
Ransomware restricts access to a computer system and demands payment to restore access.
Phishing involves impersonating a legitimate entity to trick individuals into divulging sensitive information.
Phishing involves impersonating a legitimate entity to trick individuals into divulging sensitive information.
Identity theft can only occur through online activities; physical theft of documents is not considered identity theft.
Identity theft can only occur through online activities; physical theft of documents is not considered identity theft.
Flashcards
Media
Media
All channels of communication, from print to digital.
Cybercrime
Cybercrime
Criminal activity that involves the internet or computers.
Opportunities of Media
Opportunities of Media
Benefits provided by new media in education and communication.
Challenges of Media
Challenges of Media
Signup and view all the flashcards
Risks of Media
Risks of Media
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
Sextortion
Sextortion
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Study Notes
Media and Information Literacy (MIL) - Lesson 8
- The lesson focuses on the opportunities, challenges, and the power of media and information.
- Key areas covered include economics, education, social, and political aspects.
- Another area covers threats, risks, abuse, and misuse.
- A formative assessment review reviews the definition of media.
Formative Assessment
- Media encompasses all communication forms, from print to digital data.
Cartoon Analysis
- The analysis of a cartoon reveals the concept of media and political pressure impacting the truth.
Student Challenges and Opportunities
- Students face challenges and opportunities presented by new media.
Cybercrime
- Cybercrime is the use of computing as an instrument for illegal activity.
- This includes criminal activity involving computers, the internet, or computer technology.
- Examples include hate and terrorism incitement; distribution of child pornography; grooming; and sexual advances to minors.
Current Issue: "Marilag" Vs. Maris & Anthony
- A lawyer from the University of the Philippines Diliman, Jesús Falcis, emphasized that "cheaters have human rights", referencing a 2020 NPC advisory.
- This issue involves social media discussions concerning the legal implications of private conversations.
Common Cybercrimes
- This section likely presents a list of common forms of cybercrime.
Hacking
- Hacking is the process of identifying and exploiting computer system or network weaknesses, often for unauthorized access to data.
- While not always malicious, hacking is frequently associated with cybercrime.
Examples of Malware
- Malware includes viruses that copy and spread to other devices.
- Spyware collects information without user knowledge.
- Adware displays advertisements automatically
- Trojan horses mimic legitimate applications but harm computers, stealing data.
- Ransomware locks computers to demand payment for unlocking.
Phishing
- Phishing is a cybercrime that involves attempting to lure individuals into providing sensitive data by impersonating legitimate institutions.
- This often involves email, phone, or text message communications.
- The goal is to gain access to important accounts, resulting in identity theft and financial loss.
Identity Theft
- Identity theft occurs when criminals steal personal information to commit criminal acts.
- The stolen information is used to assume the victim's identity and execute fraudulent activities.
Sextortion
- Sextortion is a crime where perpetrators gain or threaten to expose sexual images/videos.
- It sometimes involves manipulation and coercion to gain further sexual materials
- This can happen on various platforms like messaging apps or online games.
Threats to expose sexual images to make a person do something
- 45% of perpetrators have carried out threats to expose images.
- 60% of perpetrators knew victims before.
- 40% met victims online.
Punishments for Violating Anti-Voyeurism Act
- Penalties for violating the Anti-Voyeurism Act consist of imprisonment for a minimum of 3 years, up to a maximum of 7 years and a fine.
- The fine amount is between 100,000 to 500,000 pesos.
- Juridical (corporate) violators face license revocation.
- Penalties and responsibilities are outlined for public officials, professionals, and aliens.
Cybercrime Prevention Act of 2012
- This act is intended to combat cybercrime in the digital age.
- It sets up laws and frameworks to detect, investigate, and prosecute cybercrimes.
- Key offenses include those against computer systems and data; computer-related crimes; content-related violations, such as child pornography, cybersex or unsolicited communications; and cyber-libel.
Regulatory Bodies
- The law outlines government bodies to implement the act.
- An Office of Cybercrime is created within the Department of Justice.
- This office handles, investigates, and prosecutes cybercrimes.
Performance Task: Creating Infographics
- The assignment requires creating infographics, showing media opportunities and challenges.
- Students will use various materials, including colored paper, magazines, etc.
Performance Task: Written Work
- Research a news article concerning media impact on an event that took place from 2015 to present.
- The event should show how media influenced change.
- The assignment requires students to: copy/paste the article; cite the article (using APA style); write a summary (4-6 sentences); and write a reaction (5-7 sentences) to the article.
- Guide questions are included to assist in writing the reaction.
References
- Provide lists of references, including documents like the Media and Information Literacy Curriculum Guide by DepEd and other relevant texts.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This material covers crucial aspects of cybercrime, media literacy, and online safety. It discusses digital communication, cybercrime definitions, new media's impact, grooming, media's role in conflict, system exploitation, malware types (spyware, ransomware), phishing, and identity theft.