Podcast
Questions and Answers
Companies use social media to only address customer satisfaction issues.
Companies use social media to only address customer satisfaction issues.
False (B)
Public access to information means access only for commercial organizations.
Public access to information means access only for commercial organizations.
False (B)
The internet provides complete anonymity to its users.
The internet provides complete anonymity to its users.
False (B)
Personal data only includes sensitive information.
Personal data only includes sensitive information.
Companies use social media to report all uses of their organization's names.
Companies use social media to report all uses of their organization's names.
Information access is only available for commercial purposes.
Information access is only available for commercial purposes.
Personal information is completely secure on the internet.
Personal information is completely secure on the internet.
Public access to information is limited to internet access only.
Public access to information is limited to internet access only.
Online fraud is a type of cybercrime that takes place offline.
Online fraud is a type of cybercrime that takes place offline.
Cyberbullying is a type of bullying that only takes place on social media.
Cyberbullying is a type of bullying that only takes place on social media.
A black market is a legal online transaction platform.
A black market is a legal online transaction platform.
Malaysia has never suffered any losses due to cybercrime and fraud.
Malaysia has never suffered any losses due to cybercrime and fraud.
Removing unused social media apps from your phone is a recommended way to overcome social media addiction.
Removing unused social media apps from your phone is a recommended way to overcome social media addiction.
Spending more time on social media than interacting with people in real life is a sign of social media addiction.
Spending more time on social media than interacting with people in real life is a sign of social media addiction.
Social engineering is a type of hacking activity.
Social engineering is a type of hacking activity.
Checking social media only after achieving something or doing something productive is a recommended strategy to overcome social media addiction.
Checking social media only after achieving something or doing something productive is a recommended strategy to overcome social media addiction.
Cyberstalking is a type of online fraud.
Cyberstalking is a type of online fraud.
Phishing is a type of cyberbullying.
Phishing is a type of cyberbullying.
Picking up a new hobby is not a recommended way to overcome social media addiction.
Picking up a new hobby is not a recommended way to overcome social media addiction.
Staying connected with friends and family only through social media is a recommended way to overcome social media addiction.
Staying connected with friends and family only through social media is a recommended way to overcome social media addiction.
Identity theft is a type of social engineering.
Identity theft is a type of social engineering.
Going cold turkey and taking a break from social media is a recommended strategy to overcome social media addiction.
Going cold turkey and taking a break from social media is a recommended strategy to overcome social media addiction.
Checking social media as soon as you wake up is a recommended way to overcome social media addiction.
Checking social media as soon as you wake up is a recommended way to overcome social media addiction.
Using social media to keep up-to-date with friends' and family members' lives is a recommended way to overcome social media addiction.
Using social media to keep up-to-date with friends' and family members' lives is a recommended way to overcome social media addiction.
When engaging in online interactions, it is acceptable to use disrespectful language.
When engaging in online interactions, it is acceptable to use disrespectful language.
It is essential to fact-check information before sharing it online.
It is essential to fact-check information before sharing it online.
Prompt responses to online postings or emails are not necessary.
Prompt responses to online postings or emails are not necessary.
Netiquette rules are different from the standards of behavior we follow in offline life.
Netiquette rules are different from the standards of behavior we follow in offline life.
The Golden Rule is irrelevant in online interactions.
The Golden Rule is irrelevant in online interactions.
Sharing positive and beneficial knowledge is discouraged in online interactions.
Sharing positive and beneficial knowledge is discouraged in online interactions.
Netizens should not be concerned with acting within the laws and ethical standards of society online.
Netizens should not be concerned with acting within the laws and ethical standards of society online.
Online interactions require a different set of values than those used in offline life.
Online interactions require a different set of values than those used in offline life.
Privacy is the duty to ensure information is kept secret.
Privacy is the duty to ensure information is kept secret.
Confidentiality protects personal information according to the Privacy Act.
Confidentiality protects personal information according to the Privacy Act.
Ownership of copyright to a video or image is determined by who appears in it.
Ownership of copyright to a video or image is determined by who appears in it.
Uploading a video or image without permission is a violation of copyright.
Uploading a video or image without permission is a violation of copyright.
Privacy and confidentiality are interchangeable terms.
Privacy and confidentiality are interchangeable terms.
The protection provided by privacy and confidentiality is the same.
The protection provided by privacy and confidentiality is the same.
Filing a privacy complaint is a way to resolve copyright issues.
Filing a privacy complaint is a way to resolve copyright issues.
Privacy and confidentiality are only applicable to personal information.
Privacy and confidentiality are only applicable to personal information.
Study Notes
Social Media and Internet Risks
- Some companies monitor their online presence to address customer and employee satisfaction issues.
Public Access to Information
- Information access is the ability to identify, obtain, and use information effectively.
- Public access means access to information by non-commercial organizations, groups, or individuals on a non-discriminatory basis.
- The internet provides access to various types of information, including entertainment, financial services, and products.
Protecting Personal Information
- Personal data is information that relates directly or indirectly to an identifiable individual.
- Personal data includes sensitive information and opinions about the individual.
- It is essential to protect personal information from being accessed or used without consent.
Overcoming Social Media Addiction
- Find a new hobby to replace social media use and learn a new skill.
- Delete unused social media apps to remove temptations and notifications.
- Use social media as a treat, only allowing yourself screen time after achieving something productive.
- Consider taking a holiday from social media to do a reality check.
Social Media Crimes
- Online/Internet Fraud involves using online services to defraud or take advantage of victims.
- Online Black Markets/Shadow Markets are illegal transaction platforms where goods or services are exchanged illegally.
- Cyberbullying is bullying that takes place over digital devices, including social media, texts, and apps.
- Social Engineering is the manipulation of people to give up confidential information.
Netiquette
- Use respectful language online.
- Choose your online circle wisely.
- Respond promptly to online postings and emails.
- Share positive and beneficial knowledge and expertise.
- Apply the same values of courtesy, kindness, and respect online as you would offline.
- Practice the Golden Rule: Do unto others as you would have others do unto you.
Privacy and Confidentiality
- Privacy is the right to control how personal information is collected, used, and disclosed.
- Confidentiality is the duty to keep information secret to the extent possible.
- The main difference between privacy and confidentiality is the type of information they protect.
- Privacy and confidentiality differ in their enforcement and scope.
Copyright vs. Privacy
- Copyright protection applies to creative works, such as videos, images, and audio recordings.
- Just because you appear in a recording does not mean you own the copyright.
- If someone uploads a recording of you without permission, you may file a privacy complaint.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the risks associated with social media, internet usage, and public access to information. Topics include company monitoring, customer satisfaction, and non-discriminatory access to information.