Podcast
Questions and Answers
Companies use social media to only address customer satisfaction issues.
Companies use social media to only address customer satisfaction issues.
False
Public access to information means access only for commercial organizations.
Public access to information means access only for commercial organizations.
False
The internet provides complete anonymity to its users.
The internet provides complete anonymity to its users.
False
Personal data only includes sensitive information.
Personal data only includes sensitive information.
Signup and view all the answers
Companies use social media to report all uses of their organization's names.
Companies use social media to report all uses of their organization's names.
Signup and view all the answers
Information access is only available for commercial purposes.
Information access is only available for commercial purposes.
Signup and view all the answers
Personal information is completely secure on the internet.
Personal information is completely secure on the internet.
Signup and view all the answers
Public access to information is limited to internet access only.
Public access to information is limited to internet access only.
Signup and view all the answers
Online fraud is a type of cybercrime that takes place offline.
Online fraud is a type of cybercrime that takes place offline.
Signup and view all the answers
Cyberbullying is a type of bullying that only takes place on social media.
Cyberbullying is a type of bullying that only takes place on social media.
Signup and view all the answers
A black market is a legal online transaction platform.
A black market is a legal online transaction platform.
Signup and view all the answers
Malaysia has never suffered any losses due to cybercrime and fraud.
Malaysia has never suffered any losses due to cybercrime and fraud.
Signup and view all the answers
Removing unused social media apps from your phone is a recommended way to overcome social media addiction.
Removing unused social media apps from your phone is a recommended way to overcome social media addiction.
Signup and view all the answers
Spending more time on social media than interacting with people in real life is a sign of social media addiction.
Spending more time on social media than interacting with people in real life is a sign of social media addiction.
Signup and view all the answers
Social engineering is a type of hacking activity.
Social engineering is a type of hacking activity.
Signup and view all the answers
Checking social media only after achieving something or doing something productive is a recommended strategy to overcome social media addiction.
Checking social media only after achieving something or doing something productive is a recommended strategy to overcome social media addiction.
Signup and view all the answers
Cyberstalking is a type of online fraud.
Cyberstalking is a type of online fraud.
Signup and view all the answers
Phishing is a type of cyberbullying.
Phishing is a type of cyberbullying.
Signup and view all the answers
Picking up a new hobby is not a recommended way to overcome social media addiction.
Picking up a new hobby is not a recommended way to overcome social media addiction.
Signup and view all the answers
Staying connected with friends and family only through social media is a recommended way to overcome social media addiction.
Staying connected with friends and family only through social media is a recommended way to overcome social media addiction.
Signup and view all the answers
Identity theft is a type of social engineering.
Identity theft is a type of social engineering.
Signup and view all the answers
Going cold turkey and taking a break from social media is a recommended strategy to overcome social media addiction.
Going cold turkey and taking a break from social media is a recommended strategy to overcome social media addiction.
Signup and view all the answers
Checking social media as soon as you wake up is a recommended way to overcome social media addiction.
Checking social media as soon as you wake up is a recommended way to overcome social media addiction.
Signup and view all the answers
Using social media to keep up-to-date with friends' and family members' lives is a recommended way to overcome social media addiction.
Using social media to keep up-to-date with friends' and family members' lives is a recommended way to overcome social media addiction.
Signup and view all the answers
When engaging in online interactions, it is acceptable to use disrespectful language.
When engaging in online interactions, it is acceptable to use disrespectful language.
Signup and view all the answers
It is essential to fact-check information before sharing it online.
It is essential to fact-check information before sharing it online.
Signup and view all the answers
Prompt responses to online postings or emails are not necessary.
Prompt responses to online postings or emails are not necessary.
Signup and view all the answers
Netiquette rules are different from the standards of behavior we follow in offline life.
Netiquette rules are different from the standards of behavior we follow in offline life.
Signup and view all the answers
The Golden Rule is irrelevant in online interactions.
The Golden Rule is irrelevant in online interactions.
Signup and view all the answers
Sharing positive and beneficial knowledge is discouraged in online interactions.
Sharing positive and beneficial knowledge is discouraged in online interactions.
Signup and view all the answers
Netizens should not be concerned with acting within the laws and ethical standards of society online.
Netizens should not be concerned with acting within the laws and ethical standards of society online.
Signup and view all the answers
Online interactions require a different set of values than those used in offline life.
Online interactions require a different set of values than those used in offline life.
Signup and view all the answers
Privacy is the duty to ensure information is kept secret.
Privacy is the duty to ensure information is kept secret.
Signup and view all the answers
Confidentiality protects personal information according to the Privacy Act.
Confidentiality protects personal information according to the Privacy Act.
Signup and view all the answers
Ownership of copyright to a video or image is determined by who appears in it.
Ownership of copyright to a video or image is determined by who appears in it.
Signup and view all the answers
Uploading a video or image without permission is a violation of copyright.
Uploading a video or image without permission is a violation of copyright.
Signup and view all the answers
Privacy and confidentiality are interchangeable terms.
Privacy and confidentiality are interchangeable terms.
Signup and view all the answers
The protection provided by privacy and confidentiality is the same.
The protection provided by privacy and confidentiality is the same.
Signup and view all the answers
Filing a privacy complaint is a way to resolve copyright issues.
Filing a privacy complaint is a way to resolve copyright issues.
Signup and view all the answers
Privacy and confidentiality are only applicable to personal information.
Privacy and confidentiality are only applicable to personal information.
Signup and view all the answers
Study Notes
Social Media and Internet Risks
- Some companies monitor their online presence to address customer and employee satisfaction issues.
Public Access to Information
- Information access is the ability to identify, obtain, and use information effectively.
- Public access means access to information by non-commercial organizations, groups, or individuals on a non-discriminatory basis.
- The internet provides access to various types of information, including entertainment, financial services, and products.
Protecting Personal Information
- Personal data is information that relates directly or indirectly to an identifiable individual.
- Personal data includes sensitive information and opinions about the individual.
- It is essential to protect personal information from being accessed or used without consent.
Overcoming Social Media Addiction
- Find a new hobby to replace social media use and learn a new skill.
- Delete unused social media apps to remove temptations and notifications.
- Use social media as a treat, only allowing yourself screen time after achieving something productive.
- Consider taking a holiday from social media to do a reality check.
Social Media Crimes
- Online/Internet Fraud involves using online services to defraud or take advantage of victims.
- Online Black Markets/Shadow Markets are illegal transaction platforms where goods or services are exchanged illegally.
- Cyberbullying is bullying that takes place over digital devices, including social media, texts, and apps.
- Social Engineering is the manipulation of people to give up confidential information.
Netiquette
- Use respectful language online.
- Choose your online circle wisely.
- Respond promptly to online postings and emails.
- Share positive and beneficial knowledge and expertise.
- Apply the same values of courtesy, kindness, and respect online as you would offline.
- Practice the Golden Rule: Do unto others as you would have others do unto you.
Privacy and Confidentiality
- Privacy is the right to control how personal information is collected, used, and disclosed.
- Confidentiality is the duty to keep information secret to the extent possible.
- The main difference between privacy and confidentiality is the type of information they protect.
- Privacy and confidentiality differ in their enforcement and scope.
Copyright vs. Privacy
- Copyright protection applies to creative works, such as videos, images, and audio recordings.
- Just because you appear in a recording does not mean you own the copyright.
- If someone uploads a recording of you without permission, you may file a privacy complaint.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the risks associated with social media, internet usage, and public access to information. Topics include company monitoring, customer satisfaction, and non-discriminatory access to information.