Podcast
Questions and Answers
Which of the following is NOT a cause of information disorder?
Which of the following is NOT a cause of information disorder?
Deep fake technology can be used to manipulate media content.
Deep fake technology can be used to manipulate media content.
True
What role do community-level fake account operators play in information disorder?
What role do community-level fake account operators play in information disorder?
They create scripted disinformation by posting content and initiating bandwagon effects.
_________ skills are essential for preventing information disorder.
_________ skills are essential for preventing information disorder.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
Which trend is associated with information disorder?
Which trend is associated with information disorder?
Signup and view all the answers
Financial incentives are a contributing factor to information disorder.
Financial incentives are a contributing factor to information disorder.
Signup and view all the answers
Name one influence of information disorder on society.
Name one influence of information disorder on society.
Signup and view all the answers
What does the 'R' in the CRAAP Test stand for?
What does the 'R' in the CRAAP Test stand for?
Signup and view all the answers
New sources are always more reliable than older sources.
New sources are always more reliable than older sources.
Signup and view all the answers
Name one criterion of the CRAAP Test.
Name one criterion of the CRAAP Test.
Signup and view all the answers
The _____ of a source is important to determine its reliability.
The _____ of a source is important to determine its reliability.
Signup and view all the answers
Match the following CRAAP Test criteria with their descriptions:
Match the following CRAAP Test criteria with their descriptions:
Signup and view all the answers
Which of the following is a reason to check the age of your source?
Which of the following is a reason to check the age of your source?
Signup and view all the answers
Primary sources are generally considered to have more credibility than secondary sources.
Primary sources are generally considered to have more credibility than secondary sources.
Signup and view all the answers
What does a double blind review involve?
What does a double blind review involve?
Signup and view all the answers
What should you ensure when quoting information?
What should you ensure when quoting information?
Signup and view all the answers
A sponsored article is more likely to provide critical perspectives on its sponsor.
A sponsored article is more likely to provide critical perspectives on its sponsor.
Signup and view all the answers
What is the benefit of citing reputable sources?
What is the benefit of citing reputable sources?
Signup and view all the answers
To avoid confirmation bias, one should read texts from a variety of _______.
To avoid confirmation bias, one should read texts from a variety of _______.
Signup and view all the answers
Which type of bias includes selectively using data to support arguments?
Which type of bias includes selectively using data to support arguments?
Signup and view all the answers
Match the verification method to its purpose:
Match the verification method to its purpose:
Signup and view all the answers
Poor spelling and grammar can indicate high-quality content.
Poor spelling and grammar can indicate high-quality content.
Signup and view all the answers
Why is it important to verify the intent to persuade in a text?
Why is it important to verify the intent to persuade in a text?
Signup and view all the answers
What can you use to limit the number of advertisements you see online?
What can you use to limit the number of advertisements you see online?
Signup and view all the answers
Digital citizenship includes the understanding of how to stay safe online.
Digital citizenship includes the understanding of how to stay safe online.
Signup and view all the answers
What is a recommended action before bedtime to promote good digital hygiene?
What is a recommended action before bedtime to promote good digital hygiene?
Signup and view all the answers
To protect against identity fraud, it’s important to maintain your ____.
To protect against identity fraud, it’s important to maintain your ____.
Signup and view all the answers
Match the following concepts with their descriptions:
Match the following concepts with their descriptions:
Signup and view all the answers
Which of the following is considered a social networking site?
Which of the following is considered a social networking site?
Signup and view all the answers
Social media is primarily about maintaining a solitary online presence.
Social media is primarily about maintaining a solitary online presence.
Signup and view all the answers
Name one fundamental principle of social media.
Name one fundamental principle of social media.
Signup and view all the answers
Platforms like Snapchat and Instagram that feature __________ content allow users to share temporary media.
Platforms like Snapchat and Instagram that feature __________ content allow users to share temporary media.
Signup and view all the answers
Match the following types of social media with their examples:
Match the following types of social media with their examples:
Signup and view all the answers
Which of these is NOT a type of social media mentioned?
Which of these is NOT a type of social media mentioned?
Signup and view all the answers
Users cannot respond to what others say about them on social media.
Users cannot respond to what others say about them on social media.
Signup and view all the answers
Which of the following is NOT one of the 9 elements of digital citizenship?
Which of the following is NOT one of the 9 elements of digital citizenship?
Signup and view all the answers
Give an example of a social messaging app.
Give an example of a social messaging app.
Signup and view all the answers
The Data Privacy Act of 2012 is also known as Republic Act 10173.
The Data Privacy Act of 2012 is also known as Republic Act 10173.
Signup and view all the answers
List two responsibilities of a responsible social media user.
List two responsibilities of a responsible social media user.
Signup and view all the answers
The law that aims to prevent cybercrime is known as the ___ Prevention Act of 2012.
The law that aims to prevent cybercrime is known as the ___ Prevention Act of 2012.
Signup and view all the answers
Match the following Republic Acts with their focus:
Match the following Republic Acts with their focus:
Signup and view all the answers
Which of the following is an example of digital etiquette?
Which of the following is an example of digital etiquette?
Signup and view all the answers
It is safe to assume that anything posted online is private and cannot be shared.
It is safe to assume that anything posted online is private and cannot be shared.
Signup and view all the answers
Being ___ of friend requests is one of the responsible uses of social media.
Being ___ of friend requests is one of the responsible uses of social media.
Signup and view all the answers
Study Notes
Social Media
- Social media are websites and computer programs that allow people to communicate and share information online using a computer or cell phone.
- It is a form of electronic communication encompassing social networking and microblogging.
- Social media platforms allow users to converse, share information, and create web content.
Fundamental Principles of Social Media
- Social media is about relationships, community, interacting with the audience, and having dialogues.
- Integrity, openness, and authenticity are essential.
- Users can respond to what others are saying on social media and hear what they are saying.
- Content should be interesting, relevant, valuable, and captivating.
Common Types of Social Media
- Social networking sites: Facebook, LinkedIn, Instagram, Twitter, TikTok, and Snapchat
- Photo and image-sharing sites: Instagram, Snapchat, Pinterest, and Imgur
- Video sharing sites: YouTube, TikTok, and Vimeo
- Audio sharing sites: Clubhouse, Twitter Spaces, and Facebook Live Audio Rooms
- Live streaming apps: YouTube Live, Facebook Live, Twitch, and UStream
- Social messaging apps: Facebook Messenger, Twitter DMs, Google Business Messenger, WhatsApp, and WeChat
- Disappearing content apps: Snapchat, Instagram Stories, and Facebook Stories
- Social shopping networks: Facebook for Business, Shopify x TikTok, Instagram Shop, and Pinterest Shoppable Pins
- Interactive social media apps: Instagram Stories, Snapchat, TikTok, Tumblr, and Weibo
- Discussion forums: Reddit, Quora, and Stack Overflow
- Microblogging platforms: Twitter, Tumblr, Pinterest, and LinkedIn
- Community blogging sites: Medium, Growth Hackers, BlogEngage, and DoSplash
- Social review sites: Google Business Profile, Amazon, Yelp, and Facebook
- Social curation and bookmarking sites: Pocket, Digg, Pinterest, and Mix
Benefits of Social Media
- Communication and collaboration: Enables communication and interaction.
- Access to information: Makes information easily accessible.
- Networking: Allows development of connections.
- Personal branding: Builds personal brand.
- Entertainment, inspiration, and creative expression: Provides avenues for entertainment, creativity, and self-expression.
- Experience global exposure: Offers exposure to different parts of the world.
- Employment opportunities: Creates opportunities for employment.
- Social media marketing: Utilizes social media for marketing.
Risks of Social Media
- Inadequacy about life or appearance
- Fear of missing out (FOMO) and social media addiction
- Isolation
- Depression and anxiety
- Cyberbullying
- Self-absorption
Other Causes of Unhealthy Social Media Use
- Many use social media as a "security blanket."
- Heavy use can mask underlying problems like stress, depression, or boredom.
Indicators of Social Media Impact on Mental Health
- Spending more time on social media than with real-world friends.
- Comparing oneself unfavorably to others on social media.
- Experiencing cyberbullying.
- Being distracted at school or work.
- Lack of time for self-reflection.
- Engaging in risky behavior to gain likes, shares, or positive reactions.
- Suffering from sleep problems.
- Worsening symptoms of anxiety or depression.
Information Disorder
- Information disorder is a term introduced by Wardle and Derakhshan in 2017.
- It encompasses all phenomena in the information universe, divided into three categories: misinformation, disinformation, and malinformation.
- Information disorder syndrome is the sharing or development of false information, whether or not it intends harm. These can be categorized as misinformation, disinformation, and malinformation.
Types of Misinformation, Disinformation and Malinformation
- Misinformation: Unintentional mistakes such as inaccurate captions, dates, statistics, translations.
- Disinformation: Fabricated or manipulated audio-visual content to intentionally create conspiracy theories or rumors.
- Malinformation: Deliberate publication of private information for personal or corporate gain rather than public interest, such as revenge porn or altering the context, date, or time of genuine content.
Types of Mis- and Disinformation
- Satire or parody: Humor used to spread lies or rumors.
- False connection/clickbait: Sensational headlines that don't match the actual story.
- Misleading content: Altering information to support a viewpoint.
- False context: Genuine content presented in a misleading way.
- Imposter content: Content that imitates trusted sources, like news channels, people, etc.
- Manipulated content: Modifying genuine content (images or videos).
- Fabricated content: Creating 100% false content.
Causes of Information Disorder
- Digital technologies
- Lack of media literacy
- Confirmation bias
- Partisan politics
- Financial incentives
- Foreign interference
Trends in Information Disorder
- Increasing polarization
- Amplification of conspiracy theories
- Misinformation and disinformation during crises
- Use of deep fakes and other manipulated media
- Influence operations by foreign entities
Influences of Information Disorder
- Public health
- Political processes
- Social cohesion
- Economic impacts
- National security
- Individual behavior
Preventing Information Disorder
- Develop media literacy skills
- Fact-checking and verification
- Promote digital literacy and responsible social media use
- Encourage transparency and accountability
- Combat foreign interference
- Better technology solutions
- Support quality journalism
Community-Level Fake Account Operators
- Follow scripts for disinformation
- Post a prescribed number of posts on various platforms
- Responsible for maintaining activity and initiating bandwagon effects
Trolls and Deep Fake Technology
- A troll is someone who intentionally tries to instigate conflict in online communities.
- Trolling is purposely disruptive online behavior.
Types of Trolls
- The "Why is this news?" troll: Argues that the topic isn't newsworthy.
- The do-no-harm troll: Makes confusing but not harmful comments.
- The high-brow troll: Puts others in their place while bragging.
- The wet blanket troll: Ruins discussions no matter the subject.
- The meme-reliant troll: Hides their commentary behind memes.
- The friendship troll: Gives their friends FOMO.
- The broken record troll: Repeats the same troll tactic.
- The existential void troll: Enigmatic, bleak conversations, often appear hopeless.
- The brand troll: Attempts to damage brands.
- Bad people: Give trolls a bad name through excessive trolling
Anonymity
- Anonymity online makes trolling easier because there's often no accountability.
Tribalism
- Humans are social creatures with an innate desire to be part of groups.
Individual Factors Contributing to Trolling
- Personality
- Ideologically-possessed beliefs
- Conditioning
How to Combat Trolls
- Don't feed the trolls.
- Be the boss; no trolls allowed
What is a Bot?
- An internet bot is software that runs automated tasks through scripts on the internet.
Types of Bots
- Chatbots
- Web crawlers
- Social bots
- Malicious bots
Role of Bots in Social Media
- Artificially amplifying the popularity of people or movements.
- Influencing elections.
- Manipulating financial markets.
- Amplifying phishing attacks.
- Spreading spam.
- Shutting down free speech.
Tips for Spotting Bots on Social Media
- Profile information
- Activity
- Network
- Content quality
How to Combat Bots on Social Media
- Don't overshare non-essential information.
- Don't disclose personal details.
- Don't spread false information.
Deep Fake Technology
- "Deepfake" is AI-created content that mimics someone's facial expressions, body language, and even speech.
Key Indicators of DeepFake Photos
- Quality of the image
- Facial expressions
- Signs of photoshopping
Deepfake Video
- Identifying poorly made deepfakes is easier than identifying higher-quality deepfakes.
How to Spot a Deepfake Video
- Unnatural eye movement
- Unnatural facial expressions
- Awkward facial-feature positioning
- Lack of emotion
- Awkward-looking body posture or body shape
- Unnatural body movement
- Unnatural coloring
- Hair that doesn't look real
- Teeth that don't look real
- Blurring or misalignment
- Inconsistent noise or audio.
- Images that look unnatural when slowed down.
- Hashtag discrepancies
- Digital fingerprints
- Reverse image searches
- Video glitches and flickers
Combating Deepfakes
- Social media rules
- Verification programs
- Research lab technologies
- Deepfake detection challenge
- Emerging detection programs
- Filtering programs
- Corporate best practices
- U.S. Defense Advanced Research Projects Agency
- Legislation
Fact-Checking on Social Media
- Fact-checking is crucial due to the speed and ease of online information sharing.
- Mechanisms are essential to confirm accuracy.
The CRAAP Test
- A set of criteria (Currency, Relevance, Authority, Accuracy, Purpose) to assess information source reliability.
On Currency
- Check the age of the source; recent sources are often preferred.
- Evergreen subjects may be outdated, but still valuable.
On Relevance
- Context is crucial. Ensure quotes and information are placed correctly.
- Primary sources are often more credible than secondary sources/articles.
On Authority
- Verify author's credentials and experience.
- Reputable organizations (news outlets, universities) are more credible.
- Look for verifiable gatekeepers (editors, peer reviewers) of sources.
On Accuracy
- Verify content accuracy and sufficient evidence.
- Review language, imagery, and tone.
- Check for indications of bias.
On Purpose
- Know the information source's intention.
- Identify potential biases; Be wary of advertisements.
Tools and Platforms for Information Disorder, Bots, and Deepfakes
- FactCheck.org, PolitiFact, Snopes
- Media Bias/Fact Check, Bot Sentinel, Botometer
- Credibility Coalition, ProTruth Pledge, JTI Journalism Trust Initiative, The Trust Project, IFCN (International Fact-Checking Network), Public Editor, ClaimReview, etc
Staying Safe Online
- Keep security systems up-to-date.
- Check bank statements regularly.
- Shop only on secure sites.
- Back up everything important.
- Educate yourself about ransomware and improve passwords.
- Never share passwords. Keep passwords secure.
- Learn what actions to take in a data breach.
- Use public computers very carefully.
- Avoid phishing scams.
- Protect your devices.
- Manage your and other's privacy;
- Think before you click. (e.,g., share with care)
Social Media Etiquettes
- Remember the human aspect.
- Be ethical.
- Be mindful of the situation.
- Respect other people's time & follow data limits.
- Make good impressions online.
- Share expert knowledge
- Keep disagreements healthy.
- Respect other people's privacy.
Digital Hygiene
- Digital hygiene, or cyber hygiene, is a routine to protect identity & sensitive information.
Digital Footprints
- Digital footprints are created whenever someone interacts online; they can be helpful or harmful.
- Think before posting or sharing online.
Digital Hygiene Procedures
- Limit the information shared online.
- Review privacy settings on social media sites.
- Disable ad ID tracking.
- Use throwaway email addresses when registering for user accounts or mailing lists.
- Reduce advertisement viewership.
- Limit digital gadget use.
Social Media Hygiene Strategies
- Put your phone or device away before bed.
- Put away your phone when interacting with friends, family, and loved ones.
- Set reasonable limits on social media intake.
ICT Social & Ethical Issues: Privacy, Autonomy, Safety, and Human Dignity
- Privacy: Smart technology, pervasive monitoring, privacy enhancing versus losing control of sensitive information.
- Autonomy: Man out of the loop - "from in-the-loop to on-the-loop to out-of-the-loop," Filtering versus freedom of expression.
- Safety: Identity fraud, Psychological damage in virtual worlds.
- Human dignity: Unlearn moral skills; Desocialization and alienation.
ICT Social & Ethical Issues: Specific Issues
- Computer Crime: Actions performed by knowledgeable computer users (hackers).
- Copyright: Protection of published works from unauthorized use.
- Digital divide: Inequality in using technology.
- Etiquette: Proper behavior in online interactions.
- Fair Use: Limited use of copyrighted material.
- Information Rights: Access details provided by others.
- Plagiarism: Presenting someone else's work as your own.
- Privacy: Information sharing policies and user tracking.
- Software License: Agreements between software users and developers.
- Software Privacy: Protecting individual information and preventing misuse by software companies.
- Trademark: Distinguishing logos or symbols to identify companies or brands.
Digital Citizenship
- The appropriate and responsible use of digital technologies..
- Includes understanding of ethics, laws, online safety, etiquette and digital literacy.
9 Elements of Digital Citizenship
- Digital Access
- Digital Commerce
- Digital Communication
- Digital Literacy
- Digital Etiquette
- Digital Law
- Digital Rights and Responsibilities
- Digital Health and Wellness
- Digital Security
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of information disorder and its impact on society with this quiz. Explore concepts like the CRAAP Test, the role of technology, and the credibility of sources. Learn to differentiate between reliable and unreliable information to foster better media literacy.