Podcast
Questions and Answers
Which of the following is a recommended practice to protect your privacy online?
Which of the following is a recommended practice to protect your privacy online?
- Avoid using ad blockers.
- Use throwaway email addresses for accounts and mailing lists. (correct)
- Always share your personal information online.
- Register with your primary email address.
It is encouraged to keep your phone away 30 minutes before bedtime.
It is encouraged to keep your phone away 30 minutes before bedtime.
True (A)
What is digital citizenship?
What is digital citizenship?
An acceptance and upholding of the norms of appropriate, responsible behaviour with regard to the use of digital technologies.
Using ad blockers helps reduce the quantity of ____ you view online.
Using ad blockers helps reduce the quantity of ____ you view online.
Match the concepts with their descriptions:
Match the concepts with their descriptions:
What is the primary purpose of internet bots?
What is the primary purpose of internet bots?
All bots on the internet are harmful.
All bots on the internet are harmful.
What type of technology is used to create deepfake videos?
What type of technology is used to create deepfake videos?
Malicious social media bots can influence __________ and manipulate financial markets.
Malicious social media bots can influence __________ and manipulate financial markets.
Match the types of bots with their functions:
Match the types of bots with their functions:
Which action is recommended to combat bots on social media?
Which action is recommended to combat bots on social media?
Deepfake technology was first introduced in 2017.
Deepfake technology was first introduced in 2017.
What is an example of 'false connection' in news?
What is an example of 'false connection' in news?
What can malicious social media bots amplify?
What can malicious social media bots amplify?
Imposter content refers to genuine content that has been reframed in dangerous ways.
Imposter content refers to genuine content that has been reframed in dangerous ways.
What is manipulated content?
What is manipulated content?
Fabricated content is considered ________ percent false.
Fabricated content is considered ________ percent false.
Which of the following describes false context?
Which of the following describes false context?
Clickbait is a method used to provide news that adds value.
Clickbait is a method used to provide news that adds value.
What role do heuristics play in information credibility?
What role do heuristics play in information credibility?
Match the types of information disorder with their definitions:
Match the types of information disorder with their definitions:
Which of the following is NOT one of the criteria in the CRAAP Test?
Which of the following is NOT one of the criteria in the CRAAP Test?
A primary source is generally considered to have less credibility than a secondary source.
A primary source is generally considered to have less credibility than a secondary source.
What should you consider when checking the currency of a source?
What should you consider when checking the currency of a source?
The reliability of information sources can be assessed using the _____ Test.
The reliability of information sources can be assessed using the _____ Test.
Match the criteria of the CRAAP test with their definitions:
Match the criteria of the CRAAP test with their definitions:
Why might older sources still be considered valuable?
Why might older sources still be considered valuable?
It's important to place quotes in proper context to ensure accuracy in interpretation.
It's important to place quotes in proper context to ensure accuracy in interpretation.
What is one reason to examine more recent sources?
What is one reason to examine more recent sources?
What can be a common characteristic of entertaining sources?
What can be a common characteristic of entertaining sources?
Phishing scams are harmless and often do not compromise online security.
Phishing scams are harmless and often do not compromise online security.
What is one effective way to manage your digital footprint?
What is one effective way to manage your digital footprint?
It is recommended to never share your ______.
It is recommended to never share your ______.
Which of the following is NOT one of the 9 elements of digital citizenship?
Which of the following is NOT one of the 9 elements of digital citizenship?
Match the social media etiquette with its description:
Match the social media etiquette with its description:
The Cybercrime Prevention Act of 2012 is also known as Republic Act 10173.
The Cybercrime Prevention Act of 2012 is also known as Republic Act 10173.
Which of the following is a recommended digital hygiene procedure?
Which of the following is a recommended digital hygiene procedure?
What should you always use to enhance your online security?
What should you always use to enhance your online security?
Ransomware is a type of malicious software that encrypts your files and demands payment to access them.
Ransomware is a type of malicious software that encrypts your files and demands payment to access them.
Using public computers should be done very ______.
Using public computers should be done very ______.
The ______ Act of 2015 establishes the Department of Information and Communications Technology.
The ______ Act of 2015 establishes the Department of Information and Communications Technology.
Match the Republic Acts with their purpose:
Match the Republic Acts with their purpose:
Which element emphasizes the importance of being respectful and responsible while communicating online?
Which element emphasizes the importance of being respectful and responsible while communicating online?
Oversharing personal information online can increase the risk of identity theft.
Oversharing personal information online can increase the risk of identity theft.
Identify one question to ask yourself before sharing a post on social media.
Identify one question to ask yourself before sharing a post on social media.
Flashcards
False Connection
False Connection
Headlines use sensational language to attract clicks, but the content doesn't match the hype. It's like pollution because it clogs up the internet with irrelevant content.
Misleading Content
Misleading Content
Presenting information in a way that distorts the truth. It can involve altering headlines, using selective quotes, or manipulating statistics.
False Context
False Context
Genuine content presented in a harmful, misleading way to change its meaning. It can involve taking something out of context or altering its original purpose.
Imposter Content
Imposter Content
Signup and view all the flashcards
Manipulated Content
Manipulated Content
Signup and view all the flashcards
Fabricated Content
Fabricated Content
Signup and view all the flashcards
Satire
Satire
Signup and view all the flashcards
Parody
Parody
Signup and view all the flashcards
What is a Bot?
What is a Bot?
Signup and view all the flashcards
Types of Bots
Types of Bots
Signup and view all the flashcards
Role of Bots in Social Media
Role of Bots in Social Media
Signup and view all the flashcards
How to Spot a Bot on Social Media
How to Spot a Bot on Social Media
Signup and view all the flashcards
Combating Bots on Social Media
Combating Bots on Social Media
Signup and view all the flashcards
What is Deepfake Technology?
What is Deepfake Technology?
Signup and view all the flashcards
Deepfake Audio
Deepfake Audio
Signup and view all the flashcards
Steps in Creating Deepfakes
Steps in Creating Deepfakes
Signup and view all the flashcards
Digital Hygiene
Digital Hygiene
Signup and view all the flashcards
Throwaway Email
Throwaway Email
Signup and view all the flashcards
Ad Blocker
Ad Blocker
Signup and view all the flashcards
Digital Detox
Digital Detox
Signup and view all the flashcards
Digital Citizenship
Digital Citizenship
Signup and view all the flashcards
Digital Footprint
Digital Footprint
Signup and view all the flashcards
Privacy Settings
Privacy Settings
Signup and view all the flashcards
Social Media Etiquette
Social Media Etiquette
Signup and view all the flashcards
Disinformation
Disinformation
Signup and view all the flashcards
Staying Safe Online
Staying Safe Online
Signup and view all the flashcards
Cyber Hygiene
Cyber Hygiene
Signup and view all the flashcards
Bot/Spam Detection
Bot/Spam Detection
Signup and view all the flashcards
Information Disorder
Information Disorder
Signup and view all the flashcards
Digital Law
Digital Law
Signup and view all the flashcards
Data Privacy Act of 2012 (RA 10173)
Data Privacy Act of 2012 (RA 10173)
Signup and view all the flashcards
Cybercrime Prevention Act of 2012 (RA 10175)
Cybercrime Prevention Act of 2012 (RA 10175)
Signup and view all the flashcards
eCommerce Act of 2000 (RA 8792)
eCommerce Act of 2000 (RA 8792)
Signup and view all the flashcards
Philippine Innovation Act (RA 11293)
Philippine Innovation Act (RA 11293)
Signup and view all the flashcards
Department of Information and Communications Technology Act of 2015 (RA 10844)
Department of Information and Communications Technology Act of 2015 (RA 10844)
Signup and view all the flashcards
Safe Spaces Act of 2018 (RA 11313)
Safe Spaces Act of 2018 (RA 11313)
Signup and view all the flashcards
Digital Rights and Responsibilities
Digital Rights and Responsibilities
Signup and view all the flashcards
Study Notes
Social Media
- Social media are computer programs and websites that allow people to share and communicate online using phones or computers.
- It's a form of electronic communication, used for social networking and microblogging.
- Social media is about building relationships, community, interacting with audiences, and holding conversations.
- Integrity, openness, and authenticity are crucial aspects.
- Responding to comments and listening to feedback on social media is important.
- Being interesting, relevant, credible, and captivating is key.
Common Types of Social Media
- Social networking sites: Examples: Facebook, LinkedIn, Instagram, Twitter, TikTok, Snapchat
- Photo and image-sharing sites: Examples: Instagram, Snapchat, Pinterest, Imgur
- Video sharing sites: Examples: YouTube, TikTok, Vimeo
- Audio sharing sites: Examples: Clubhouse, Twitter Spaces, Facebook Live Audio Rooms
- Live streaming apps: Examples: YouTube Live, Facebook Live, Twitch, UStream
- Social messaging apps: Examples: Facebook Messenger, Twitter DMs, Google Business Messenger, WhatsApp, WeChat
- Disappearing content apps: Examples: Snapchat, Instagram Stories, Facebook Stories
- Social shopping networks: Examples: Facebook for Business, Shopify x TikTok, Instagram Shop, Pinterest Shoppable Pins
- Interactive social media apps: Examples: Instagram Stories, Snapchat, TikTok, Tumblr, Weibo
- Discussion forums: Examples: Reddit, Quora, Stack Overflow
- Microblogging platforms: Examples: Twitter, Tumblr, Pinterest, LinkedIn
- Community blogging sites: Examples: Medium, Growth Hackers, BlogEngage, DoSplash
- Social review sites: Examples: Google Business Profile, Amazon, Yelp, Facebook
- Social curation and bookmarking sites: Examples: Pocket, Digg, Pinterest, Mix
Benefits of Social Media among Students
- Communication and collaboration
- Access to information
- Networking
- Personal branding
- Entertainment, inspiration, and creative expression
- Experience global exposure
- Employment opportunities
- Social media marketing
Risks of Social Media
- Inadequacy about your life or appearance
- Fear of missing out (FOMO) and social media addiction
- Isolation
- Depression and anxiety
- Cyberbullying
- Self-absorption
Other Causes of Unhealthy Social Media Use
- Social media use as a "security blanket"
- Heavy social media use masking underlying problems like stress, depression, or boredom
Other Indicators of Social Media Impacting Mental Health
- Spending more time on social media than with real-world friends
- Comparing yourself unfavorably with others on social media
- Experiencing cyberbullying
- Being distracted at school or work
- Having no time for self-reflection
- Engaging in risky behavior to gain likes, shares, or positive reactions
- Suffering from sleep problems
- Worsening symptoms of anxiety or depression
Information Disorder
- Information disorder is a term for understanding phenomena in the information universe.
- It's divided into three categories: misinformation, disinformation, and malinformation.
- Information disorder syndrome involves sharing or developing false information, with or without the intent to harm.
- Misinformation is unintentional mistakes, like inaccurate captions, dates, statistics, or when satire is taken seriously.
- Disinformation is fabricated or manipulated content, often including conspiracy theories or rumors.
- Malinformation is deliberate publication of private information for personal or corporate rather than public interest purposes, often involving changing context, date, or time of genuine content.
Types of Mis- & Disinformation
- Satire or parody: No intention to harm, but can deceive.
- False connection: Misleading headlines or visuals that don't match the story.
- Misleading content: Manipulation of headlines, quotes, or statistics to support a specific view.
- False context: Genuine content is shared in a misleading or harmful context.
- Imposter content: Impersonation of legitimate sources.
- Manipulated content: Altering genuine photos or videos.
- Fabricated content: Content is 100% false, made to deceive or harm.
Causes of Information Disorder
- Digital technologies
- Lack of media literacy
- Confirmation bias
- Partisan politics
- Financial incentives
- Foreign interference
Trends in Information Disorder
- Increasing polarization
- Amplification of conspiracy theories
- Misinformation and disinformation during crises
- Use of deep fakes and other manipulated media
- Influence operations by foreign entities
Influences of Information Disorder
- Public health
- Political processes
- Social cohesion
- Economic impacts
- National security
- Individual behavior
Preventing Information Disorder
- Develop media literacy skills
- Fact-checking and verification
- Promote digital literacy and responsible social media use
- Encourage transparency and accountability
- Combat foreign interference
- Better technology solutions
Community-Level Fake Account Operators
- Follow a script to spread disinformation through written or visual content on social media.
- Post a set number of comments or posts daily on various sites, including Facebook, to maintain activity.
- Initiate bandwagon effects by spreading positive messages about a subject to promote wide support.
Trolls and Deep Fake Technology
- Trolls are intentionally disruptive in online communities.
- Deepfakes are AI-created videos that mimic real people.
Anonymity
- Online anonymity allows for easier trolling due to the illusion of no accountability.
Tribalism
- Humans are social creatures and have a desire to belong to groups, which can be used to spread disinformation.
Individual Factors Contributing to Trolling
- Personality
- Ideologically possessed beliefs
- Conditioning
How to Combat Trolls
- Don't feed the trolls
- Be supportive against trolls by keeping up morale
- Add moderators
- Challenge with facts and sources
- Kill them with kindness
- Disarm with humor
- Have Friend-Only Social Profiles
- Block, ban, or report trolls
- Decompress before you reply
- Stay professional
What is a Bot?
- An internet bot is software that runs automated tasks online.
- Bots can be benign or malicious, with malicious bots potentially performing harmful actions.
Types of Bots
- Chatbots
- Web crawlers
- Social bots
- Malicious bots
Role of Bots in Social Media
- Amplify popularity
- Influence elections
- Manipulate markets
- Amplify phishing attacks
- Spread spam
- Shutdown free speech
Tips for Spotting Bots on Social Media
- Profile information
- Activity
- Network
- Content quality
How to Combat Bots on Social Media
- Don't overshare
- Don't divulge non-essential personal information
- Avoid spreading false information
Deep Fake Technology
- Deepfakes are AI-generated videos that can perfectly mimic people.
- The technology is still improving and making detection more difficult.
Deepfake Photo
- Key indicators of deepfakes in photos include image quality, facial expressions, and any signs of photoshopping.
Deepfake Video
- Spotting deepfake videos can be challenging, as poorly made deepfakes are noticeable, while high-quality ones are more difficult to identify.
How to Spot a Deepfake Video
- Unnatural eye movements
- Unnatural facial expressions
- Awkward facial-feature positioning
- Lack of emotion
- Awkward-looking body posture
- Unnatural body movement or body shape
- Unnatural coloring
- Hair that doesn't look real
- Teeth that don't look real
- Blurring or misalignment
- \ Inconsistent noise or audio.
- Images that look unnatural when slowed down.
- Hashtag discrepancies
- Digital fingerprints
- Reverse image searches
- Video glitches and flickers
Combating Deepfakes
- Social media rules
- Verification programs
- Research lab technologies
- Deepfake Detection Challenge
- Emerging detection programs
- Filtering programs
- Corporate best practices
- U.S. Defense Advanced Research Projects Agency
- U.S. legislation
Fact-Checking on Social Media
- Fact-checking is crucial.
- Mechanistic approach is needed to identify accurate information online to verify claims.
The CRAAP Test
- A test to confirm the accuracy and credibility of information sources using criteria like currency, relevance, authority, accuracy, and purpose.
On Currency
- Check the age of the source.
- Use most recent sources if the information is time-sensitive.
- For evergreen topics, older resources can still be valuable even if outdated.
On Relevance
- Context matters.
- Verify if material is placed in the correct context.
- Consider target audience.
On Authority
- Verify the author's expertise and credentials.
- Identify and investigate the source's publisher.
- Investigate gatekeepers such as editors and peer reviewers.
- Look for verifiable images that show first hand knowledge.
On Accuracy
- Verify the references and sources.
- Evaluate the data, looking at supporting information, such as statistics and first-person accounts.
- Evaluate the potential bias in writing.
- Review the source, seeking multiple viewpoints.
On Purpose
- Evaluate the author's intent and reason for creating the information.
- Check for potential bias.
- Evaluate if the information is only promoting an agenda.
- Evaluate commercial intent.
- Evaluate and check for any entertainment intent.
Tools & Platforms to Combat Information Disorder
- FactCheck.org
- PolitiFact
- Snopes
- Duke Reporters' Lab
- Media Bias/Fact Check
Bot/Spam Detection Tools
- Bot Sentinel
- Botometer
Codes & Standards
- Credibility Coalition
- ProTruth Pledge
- Journalism Trust Initiative (JTI)
- The Trust Project
- Global Disinformation Index (GDI)
- Public Editor
- ClaimReview
- Know News
Disinformation Tracking Tools
- Ad Observer
- TwitterTrails
- Iffy Quotient
- Hamilton 2.0 Dashboard
Education/Training Resources
- Project Look Sharp
- Bad News
- Digital Resource Center
- Civic Online Reasoning (CORE)
- IREX
- PolitiTruth
- Newseum
- Coursera
- Mozilla Project
- Truth Goggles
- Checkology
- Google Interland
- Ruff Ruffman
- First Draft
Multimedia Platforms & Tools
- NewsGuard
- Google News Initiative
Whitelisting Methods
- ABP Addblock Plus
- Whitelist Manager
- Website Whitelist
- Domain whitelist
Mobile Applications
- The Factual
- FactMata
- First Draft
Staying Safe Online
- Keep security systems updated.
- Check bank statements frequently.
- Only shop on secure websites.
- Back up everything.
- Get informed about ransomware.
- Improve your passwords.
- Never share passwords.
- Keep your passwords safe.
- Learn how to respond to a data breach.
- Use public computers cautiously.
- Avoid phishing scams.
- Protect your devices
Social Media Etiquettes
- Remember the Human.
- Be ethical.
- Know where you are.
- Respect other people's time and data limits.
- Make yourself look good online.
- Share expert knowledge
- Keep disagreements healthy
- Respect other people's privacy
Digital Hygiene in Social Media
- Essential for protecting information and online security.
Digital Footprints
- Online presence leaves traces.
- Footprints can be helpful or harmful to a digital reputation.
- Be mindful that digital footprints can stay forever.
Digital Hygiene Procedures
- Limit the information shared on social networking sites.
- Review privacy settings on major social media accounts (Facebook, Twitter, LinkedIn, etc.).
- Disable ad ID tracking on mobile devices.
- Use throwaway email addresses.
- Reduce the amount of advertisements seen online.
- Limit the use of digital gadgets.
Social Media Hygiene Strategies
- Put away electronic devices before bed.
- Put away electronic devices while meeting with people in person.
- Set limits on social media use.
ICT Social & Ethical Issues - Privacy
- Smart technology at home and pervasive monitoring.
- Privacy enhancing versus losing control of sensitive information.
ICT Social & Ethical Issues - Autonomy
- Man out-of-the-loop
- Filtering versus freedom of expression
ICT Social & Ethical Issues - Safety
- Identity fraud
- Psychological damage in virtual worlds
ICT Social & Ethical Issues - Human Dignity
- Unlearning moral skills
- Social alienation and desocialization
ICT Social & Ethical Issues - Other Issues
- Computer crime
- Copyright infringement
- Digital divide
- Etiquette
- Fair use (of content)
- Information rights
- Plagiarism
- Privacy in the digital realm
- Software license
- Software privacy
Digital Citizenship
- Acceptance and upholding of norms for appropriate digital behavior
- Digital etiquette, literacy, ethics, understanding of related laws, how to stay safe online, safety issues, and permanence of data.
Elements of Digital Citizenship
- Digital Access
- Digital Commerce
- Digital Communications
- Digital Literacy
- Digital Etiquette
- Digital Law
- Digital Rights and Responsibilities
- Digital Health and Wellness
- Digital Security
Digital Law
- Republic Act 10173 (Data Privacy Act of 2012)
- Republic Act 10175 (Cybercrime Prevention Act of 2012)
- Republic Act 8792 (eCommerce Act of 2000)
- Republic Act 11293 (Philippine Innovation Act)
- Republic Act 10844 (Department of Information and Communications Technology Act of 2015)
- Republic Act 11313 (Safe Spaces Act of 2018)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the essential concepts of digital citizenship and best practices for online privacy in this quiz. Test your knowledge on internet bots, deepfake technology, and how to recognize malicious content online. Enhance your understanding of protecting yourself in the digital age.