Information Disorder and Media Literacy
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a cause of information disorder?

  • Lack of media literacy
  • Partisan politics
  • Increased online shopping (correct)
  • Digital technologies
  • Deep fake technology can be used to manipulate media content.

    True

    What role do community-level fake account operators play in information disorder?

    They create scripted disinformation by posting content and initiating bandwagon effects.

    _________ skills are essential for preventing information disorder.

    <p>Media literacy</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Troll = Someone who instigates conflict online Confirmation bias = The tendency to favor information that confirms one's existing beliefs Disinformation = False information spread with the intent to deceive Fact-checking = Verifying the accuracy of claims or information</p> Signup and view all the answers

    Which trend is associated with information disorder?

    <p>Amplification of conspiracy theories</p> Signup and view all the answers

    Financial incentives are a contributing factor to information disorder.

    <p>True</p> Signup and view all the answers

    Name one influence of information disorder on society.

    <p>Social cohesion</p> Signup and view all the answers

    What does the 'R' in the CRAAP Test stand for?

    <p>Relevance</p> Signup and view all the answers

    New sources are always more reliable than older sources.

    <p>False</p> Signup and view all the answers

    Name one criterion of the CRAAP Test.

    <p>Currency, Relevance, Authority, Accuracy, or Purpose.</p> Signup and view all the answers

    The _____ of a source is important to determine its reliability.

    <p>authority</p> Signup and view all the answers

    Match the following CRAAP Test criteria with their descriptions:

    <p>Currency = The timeliness of the information Relevance = The importance of the information for your needs Authority = The source of the information Accuracy = The correctness of the information Purpose = The reason the information exists</p> Signup and view all the answers

    Which of the following is a reason to check the age of your source?

    <p>To ensure information is timely when needed</p> Signup and view all the answers

    Primary sources are generally considered to have more credibility than secondary sources.

    <p>True</p> Signup and view all the answers

    What does a double blind review involve?

    <p>Specialists without connections to the author reviewing the work</p> Signup and view all the answers

    What should you ensure when quoting information?

    <p>All quotes should be placed in their proper context.</p> Signup and view all the answers

    A sponsored article is more likely to provide critical perspectives on its sponsor.

    <p>False</p> Signup and view all the answers

    What is the benefit of citing reputable sources?

    <p>It promotes transparency and allows readers to verify content.</p> Signup and view all the answers

    To avoid confirmation bias, one should read texts from a variety of _______.

    <p>sources</p> Signup and view all the answers

    Which type of bias includes selectively using data to support arguments?

    <p>Author bias</p> Signup and view all the answers

    Match the verification method to its purpose:

    <p>Verifying Author Bias = Identify personal influences on writing Independently Verifying Facts = Cross-check information from multiple sources Verifying Commercial Intent = Assess financial motives behind content Verifying Multiple Viewpoints = Encourage reflective reporting</p> Signup and view all the answers

    Poor spelling and grammar can indicate high-quality content.

    <p>False</p> Signup and view all the answers

    Why is it important to verify the intent to persuade in a text?

    <p>To determine if the writing is objective and provides a complete story.</p> Signup and view all the answers

    What can you use to limit the number of advertisements you see online?

    <p>Ad blockers</p> Signup and view all the answers

    Digital citizenship includes the understanding of how to stay safe online.

    <p>True</p> Signup and view all the answers

    What is a recommended action before bedtime to promote good digital hygiene?

    <p>Put your phone or device away for 30 minutes.</p> Signup and view all the answers

    To protect against identity fraud, it’s important to maintain your ____.

    <p>privacy</p> Signup and view all the answers

    Match the following concepts with their descriptions:

    <p>Digital Citizenship = Responsible behavior with digital technologies Ad ID Tracking = Monitoring for personalized advertisements Throwaway Email = Temporary email for one-time use Pervasive Monitoring = Constant surveillance through technology</p> Signup and view all the answers

    Which of the following is considered a social networking site?

    <p>Facebook</p> Signup and view all the answers

    Social media is primarily about maintaining a solitary online presence.

    <p>False</p> Signup and view all the answers

    Name one fundamental principle of social media.

    <p>Integrity, openness, and authenticity are essential.</p> Signup and view all the answers

    Platforms like Snapchat and Instagram that feature __________ content allow users to share temporary media.

    <p>disappearing</p> Signup and view all the answers

    Match the following types of social media with their examples:

    <p>Discussion Forums = Reddit, Quora, Stack Overflow Video Sharing = YouTube, TikTok, Vimeo Photo Sharing = Instagram, Snapchat, Pinterest Microblogging = Twitter, Tumblr</p> Signup and view all the answers

    Which of these is NOT a type of social media mentioned?

    <p>Online Auction Sites</p> Signup and view all the answers

    Users cannot respond to what others say about them on social media.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT one of the 9 elements of digital citizenship?

    <p>Digital Architecture</p> Signup and view all the answers

    Give an example of a social messaging app.

    <p>WhatsApp</p> Signup and view all the answers

    The Data Privacy Act of 2012 is also known as Republic Act 10173.

    <p>True</p> Signup and view all the answers

    List two responsibilities of a responsible social media user.

    <p>Read privacy policies, use a strong password.</p> Signup and view all the answers

    The law that aims to prevent cybercrime is known as the ___ Prevention Act of 2012.

    <p>Cybercrime</p> Signup and view all the answers

    Match the following Republic Acts with their focus:

    <p>Republic Act 10175 = Cybercrime Prevention Republic Act 8792 = eCommerce Republic Act 11293 = Innovation Republic Act 10844 = Information and Communications Technology</p> Signup and view all the answers

    Which of the following is an example of digital etiquette?

    <p>Respecting others' opinions online</p> Signup and view all the answers

    It is safe to assume that anything posted online is private and cannot be shared.

    <p>False</p> Signup and view all the answers

    Being ___ of friend requests is one of the responsible uses of social media.

    <p>selective</p> Signup and view all the answers

    Study Notes

    Social Media

    • Social media are websites and computer programs that allow people to communicate and share information online using a computer or cell phone.
    • It is a form of electronic communication encompassing social networking and microblogging. 
    • Social media platforms allow users to converse, share information, and create web content.

    Fundamental Principles of Social Media

    • Social media is about relationships, community, interacting with the audience, and having dialogues.
    • Integrity, openness, and authenticity are essential.
    • Users can respond to what others are saying on social media and hear what they are saying.
    • Content should be interesting, relevant, valuable, and captivating.

    Common Types of Social Media

    • Social networking sites: Facebook, LinkedIn, Instagram, Twitter, TikTok, and Snapchat
    • Photo and image-sharing sites: Instagram, Snapchat, Pinterest, and Imgur
    • Video sharing sites: YouTube, TikTok, and Vimeo
    • Audio sharing sites: Clubhouse, Twitter Spaces, and Facebook Live Audio Rooms
    • Live streaming apps: YouTube Live, Facebook Live, Twitch, and UStream
    • Social messaging apps: Facebook Messenger, Twitter DMs, Google Business Messenger, WhatsApp, and WeChat
    • Disappearing content apps: Snapchat, Instagram Stories, and Facebook Stories
    • Social shopping networks: Facebook for Business, Shopify x TikTok, Instagram Shop, and Pinterest Shoppable Pins
    • Interactive social media apps: Instagram Stories, Snapchat, TikTok, Tumblr, and Weibo
    • Discussion forums: Reddit, Quora, and Stack Overflow
    • Microblogging platforms: Twitter, Tumblr, Pinterest, and LinkedIn
    • Community blogging sites: Medium, Growth Hackers, BlogEngage, and DoSplash
    • Social review sites: Google Business Profile, Amazon, Yelp, and Facebook
    • Social curation and bookmarking sites: Pocket, Digg, Pinterest, and Mix

    Benefits of Social Media

    • Communication and collaboration: Enables communication and interaction.
    • Access to information: Makes information easily accessible.
    • Networking: Allows development of connections.
    • Personal branding: Builds personal brand.
    • Entertainment, inspiration, and creative expression: Provides avenues for entertainment, creativity, and self-expression.
    • Experience global exposure: Offers exposure to different parts of the world.
    • Employment opportunities: Creates opportunities for employment.
    • Social media marketing: Utilizes social media for marketing.

    Risks of Social Media

    • Inadequacy about life or appearance
    • Fear of missing out (FOMO) and social media addiction
    • Isolation
    • Depression and anxiety
    • Cyberbullying
    • Self-absorption

    Other Causes of Unhealthy Social Media Use

    • Many use social media as a "security blanket."
    • Heavy use can mask underlying problems like stress, depression, or boredom.

    Indicators of Social Media Impact on Mental Health

    • Spending more time on social media than with real-world friends.
    • Comparing oneself unfavorably to others on social media.
    • Experiencing cyberbullying.
    • Being distracted at school or work.
    • Lack of time for self-reflection.
    • Engaging in risky behavior to gain likes, shares, or positive reactions.
    • Suffering from sleep problems.
    • Worsening symptoms of anxiety or depression.

    Information Disorder

    • Information disorder is a term introduced by Wardle and Derakhshan in 2017.
    • It encompasses all phenomena in the information universe, divided into three categories: misinformation, disinformation, and malinformation.
    • Information disorder syndrome is the sharing or development of false information, whether or not it intends harm. These can be categorized as misinformation, disinformation, and malinformation.

    Types of Misinformation, Disinformation and Malinformation

    • Misinformation: Unintentional mistakes such as inaccurate captions, dates, statistics, translations.
    • Disinformation: Fabricated or manipulated audio-visual content to intentionally create conspiracy theories or rumors.
    • Malinformation: Deliberate publication of private information for personal or corporate gain rather than public interest, such as revenge porn or altering the context, date, or time of genuine content.

    Types of Mis- and Disinformation

    • Satire or parody: Humor used to spread lies or rumors.
    • False connection/clickbait: Sensational headlines that don't match the actual story.
    • Misleading content: Altering information to support a viewpoint.
    • False context: Genuine content presented in a misleading way.
    • Imposter content: Content that imitates trusted sources, like news channels, people, etc.
    • Manipulated content: Modifying genuine content (images or videos).
    • Fabricated content: Creating 100% false content.

    Causes of Information Disorder

    • Digital technologies
    • Lack of media literacy
    • Confirmation bias
    • Partisan politics
    • Financial incentives
    • Foreign interference
    • Increasing polarization
    • Amplification of conspiracy theories
    • Misinformation and disinformation during crises
    • Use of deep fakes and other manipulated media
    • Influence operations by foreign entities

    Influences of Information Disorder

    • Public health
    • Political processes
    • Social cohesion
    • Economic impacts
    • National security
    • Individual behavior

    Preventing Information Disorder

    • Develop media literacy skills
    • Fact-checking and verification
    • Promote digital literacy and responsible social media use
    • Encourage transparency and accountability
    • Combat foreign interference
    • Better technology solutions
    • Support quality journalism

    Community-Level Fake Account Operators

    • Follow scripts for disinformation
    • Post a prescribed number of posts on various platforms
    • Responsible for maintaining activity and initiating bandwagon effects

    Trolls and Deep Fake Technology

    • A troll is someone who intentionally tries to instigate conflict in online communities.
    • Trolling is purposely disruptive online behavior.

    Types of Trolls

    • The "Why is this news?" troll: Argues that the topic isn't newsworthy.
    • The do-no-harm troll: Makes confusing but not harmful comments.
    • The high-brow troll: Puts others in their place while bragging.
    • The wet blanket troll: Ruins discussions no matter the subject.
    • The meme-reliant troll: Hides their commentary behind memes.
    • The friendship troll: Gives their friends FOMO.
    • The broken record troll: Repeats the same troll tactic.
    • The existential void troll: Enigmatic, bleak conversations, often appear hopeless.
    • The brand troll: Attempts to damage brands.
    • Bad people: Give trolls a bad name through excessive trolling

    Anonymity

    • Anonymity online makes trolling easier because there's often no accountability.

    Tribalism

    • Humans are social creatures with an innate desire to be part of groups.

    Individual Factors Contributing to Trolling

    • Personality
    • Ideologically-possessed beliefs
    • Conditioning

    How to Combat Trolls

    • Don't feed the trolls.
    • Be the boss; no trolls allowed

    What is a Bot?

    • An internet bot is software that runs automated tasks through scripts on the internet.

    Types of Bots

    • Chatbots
    • Web crawlers
    • Social bots
    • Malicious bots

    Role of Bots in Social Media

    • Artificially amplifying the popularity of people or movements.
    • Influencing elections.
    • Manipulating financial markets.
    • Amplifying phishing attacks.
    • Spreading spam.
    • Shutting down free speech.

    Tips for Spotting Bots on Social Media

    • Profile information
    • Activity
    • Network
    • Content quality

    How to Combat Bots on Social Media

    • Don't overshare non-essential information.
    • Don't disclose personal details.
    • Don't spread false information.

    Deep Fake Technology

    • "Deepfake" is AI-created content that mimics someone's facial expressions, body language, and even speech.

    Key Indicators of DeepFake Photos

    • Quality of the image
    • Facial expressions
    • Signs of photoshopping

    Deepfake Video

    • Identifying poorly made deepfakes is easier than identifying higher-quality deepfakes.

    How to Spot a Deepfake Video

    • Unnatural eye movement
    • Unnatural facial expressions
    • Awkward facial-feature positioning
    • Lack of emotion
    • Awkward-looking body posture or body shape
    • Unnatural body movement
    • Unnatural coloring
    • Hair that doesn't look real
    • Teeth that don't look real
    • Blurring or misalignment
    • Inconsistent noise or audio.
    • Images that look unnatural when slowed down.
    • Hashtag discrepancies
    • Digital fingerprints
    • Reverse image searches
    • Video glitches and flickers

    Combating Deepfakes

    • Social media rules
    • Verification programs
    • Research lab technologies
    • Deepfake detection challenge
    • Emerging detection programs
    • Filtering programs
    • Corporate best practices
    • U.S. Defense Advanced Research Projects Agency
    • Legislation

    Fact-Checking on Social Media

    • Fact-checking is crucial due to the speed and ease of online information sharing.
    •  Mechanisms are essential to confirm accuracy.

    The CRAAP Test

    • A set of criteria (Currency, Relevance, Authority, Accuracy, Purpose) to assess information source reliability.

    On Currency

    • Check the age of the source; recent sources are often preferred.
    • Evergreen subjects may be outdated, but still valuable.

    On Relevance

    • Context is crucial. Ensure quotes and information are placed correctly.
    • Primary sources are often more credible than secondary sources/articles.

    On Authority

    • Verify author's credentials and experience.
    • Reputable organizations (news outlets, universities) are more credible.
    • Look for verifiable gatekeepers (editors, peer reviewers) of sources.

    On Accuracy

    • Verify content accuracy and sufficient evidence.
    • Review language, imagery, and tone.
    • Check for indications of bias.

    On Purpose

    • Know the information source's intention.
    • Identify potential biases; Be wary of advertisements.

    Tools and Platforms for Information Disorder, Bots, and Deepfakes

    • FactCheck.org, PolitiFact, Snopes
    • Media Bias/Fact Check, Bot Sentinel, Botometer
    • Credibility Coalition, ProTruth Pledge, JTI Journalism Trust Initiative, The Trust Project, IFCN (International Fact-Checking Network), Public Editor, ClaimReview, etc

    Staying Safe Online

    • Keep security systems up-to-date.
    • Check bank statements regularly.
    • Shop only on secure sites.
    • Back up everything important.
    • Educate yourself about ransomware and improve passwords.
    • Never share passwords. Keep passwords secure.
    • Learn what actions to take in a data breach.
    • Use public computers very carefully.
    • Avoid phishing scams.
    • Protect your devices.
    • Manage your and other's privacy;
    • Think before you click. (e.,g., share with care)

    Social Media Etiquettes

    • Remember the human aspect.
    • Be ethical.
    • Be mindful of the situation.
    • Respect other people's time & follow data limits.
    • Make good impressions online.
    • Share expert knowledge
    • Keep disagreements healthy.
    • Respect other people's privacy.

    Digital Hygiene

    • Digital hygiene, or cyber hygiene, is a routine to protect identity & sensitive information.

    Digital Footprints

    • Digital footprints are created whenever someone interacts online; they can be helpful or harmful.
    • Think before posting or sharing online.

    Digital Hygiene Procedures

    • Limit the information shared online.
    • Review privacy settings on social media sites.
    • Disable ad ID tracking.
    • Use throwaway email addresses when registering for user accounts or mailing lists.
    • Reduce advertisement viewership.
    • Limit digital gadget use.

    Social Media Hygiene Strategies

    • Put your phone or device away before bed.
    • Put away your phone when interacting with friends, family, and loved ones.
    • Set reasonable limits on social media intake.

    ICT Social & Ethical Issues: Privacy, Autonomy, Safety, and Human Dignity

    • Privacy: Smart technology, pervasive monitoring, privacy enhancing versus losing control of sensitive information.
    • Autonomy: Man out of the loop - "from in-the-loop to on-the-loop to out-of-the-loop," Filtering versus freedom of expression.
    • Safety: Identity fraud, Psychological damage in virtual worlds.
    • Human dignity: Unlearn moral skills; Desocialization and alienation.

    ICT Social & Ethical Issues: Specific Issues

    • Computer Crime: Actions performed by knowledgeable computer users (hackers).
    • Copyright: Protection of published works from unauthorized use.
    • Digital divide: Inequality in using technology.
    • Etiquette: Proper behavior in online interactions.
    • Fair Use: Limited use of copyrighted material.
    • Information Rights: Access details provided by others.
    • Plagiarism: Presenting someone else's work as your own.
    • Privacy: Information sharing policies and user tracking.
    • Software License: Agreements between software users and developers.
    • Software Privacy: Protecting individual information and preventing misuse by software companies.
    • Trademark: Distinguishing logos or symbols to identify companies or brands.

    Digital Citizenship

    • The appropriate and responsible use of digital technologies..
    • Includes understanding of ethics, laws, online safety, etiquette and digital literacy.

    9 Elements of Digital Citizenship

    • Digital Access
    • Digital Commerce
    • Digital Communication
    • Digital Literacy
    • Digital Etiquette
    • Digital Law
    • Digital Rights and Responsibilities
    • Digital Health and Wellness
    • Digital Security

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your understanding of information disorder and its impact on society with this quiz. Explore concepts like the CRAAP Test, the role of technology, and the credibility of sources. Learn to differentiate between reliable and unreliable information to foster better media literacy.

    More Like This

    Use Quizgecko on...
    Browser
    Browser