Podcast
Questions and Answers
What refers to the ability of an individual or group to seclude themselves or information selectively?
What refers to the ability of an individual or group to seclude themselves or information selectively?
Which term describes the monitoring of behavior, activities, or information for the purpose of information gathering?
Which term describes the monitoring of behavior, activities, or information for the purpose of information gathering?
Which act mandates all elementary and secondary schools to adopt policies to prevent and address acts of bullying?
Which act mandates all elementary and secondary schools to adopt policies to prevent and address acts of bullying?
What is the right to keep sensitive data and information produced as a result of using the web private?
What is the right to keep sensitive data and information produced as a result of using the web private?
Signup and view all the answers
What refers to security measures at the application level aiming to prevent data or code within an app from being stolen?
What refers to security measures at the application level aiming to prevent data or code within an app from being stolen?
Signup and view all the answers
What is the primary motivation behind selective exposure?
What is the primary motivation behind selective exposure?
Signup and view all the answers
Which term describes bullying that takes place over digital platforms like computers and tablets?
Which term describes bullying that takes place over digital platforms like computers and tablets?
Signup and view all the answers
Which theory suggests that people strive for cognitive equilibrium when consuming information?
Which theory suggests that people strive for cognitive equilibrium when consuming information?
Signup and view all the answers
What is the primary consequence of political polarization?
What is the primary consequence of political polarization?
Signup and view all the answers
What is the primary function of social capital?
What is the primary function of social capital?
Signup and view all the answers
Which of the following is instrumental to democracy, according to the text?
Which of the following is instrumental to democracy, according to the text?
Signup and view all the answers
What is the primary focus of the Selective Exposure Theory?
What is the primary focus of the Selective Exposure Theory?
Signup and view all the answers
Which of the following best describes the concept of selective exposure?
Which of the following best describes the concept of selective exposure?
Signup and view all the answers
Which of the following is not a type of civic engagement described in the text?
Which of the following is not a type of civic engagement described in the text?
Signup and view all the answers
Which of the following is a type of data breach that involves tricking individuals into revealing sensitive information?
Which of the following is a type of data breach that involves tricking individuals into revealing sensitive information?
Signup and view all the answers
Which of the following is a key aspect of the cognitive dissonance theory as described in the text?
Which of the following is a key aspect of the cognitive dissonance theory as described in the text?
Signup and view all the answers
Which of the following is not a type of data breach mentioned in the text?
Which of the following is not a type of data breach mentioned in the text?
Signup and view all the answers
Which of the following best describes the concept of selective perception?
Which of the following best describes the concept of selective perception?
Signup and view all the answers
Study Notes
Privacy and Surveillance
- Privacy is the ability to selectively seclude oneself or information from others.
- Surveillance is the monitoring of behavior, activities, or information for various purposes, including information gathering and influencing.
Data Breach and Application Security
- A data breach is an incident where information is stolen or taken from a system without authorization.
- Application security measures aim to prevent data or code from being stolen or hijacked.
Internet Privacy and Cyberbullying
- Internet privacy is the right to keep sensitive data and information produced while using the web private.
- Cyberbullying is bullying that takes place over digital platforms, such as computers, tablets, and SMS.
Republic Act 10627 (Anti-Bullying Act of 2013)
- Signed by President Benigno Aquino III, the Act mandates schools to adopt policies to prevent and address bullying.
Civic Engagement and Goals
- The goal of civic engagement is to address public concerns and promote quality of life in the community.
- Civic engagement involves participating in activities intended to improve the quality of life in one's community.
Selective Exposure and Cognitive Dissonance
- Selective exposure is the motivated selection of messages that match one's beliefs.
- Selective exposure theory suggests that people favor information that reinforces their views and avoid contradictory information.
- Cognitive dissonance theory proposes that people strive for cognitive equilibrium and may reinterpret information or select information that aligns with their views.
Political Polarization and Social Capital
- Political polarization refers to cases where an individual's stance on an issue is strictly defined by their political party identification.
- Social capital is the network of relationships among people in a society that enables it to function effectively.
Types of Civic Engagement
- Electoral participation: citizens participating in the formation and procedures of their government through electoral processes.
- Volunteerism: involvement of volunteer labor, especially in community services.
- Activism and advocacy: working to bring about political or social change through increasing public awareness and support for particular causes or policies.
Types of Data Breaches
- Stealing information: stealing something without the owner's knowledge or consent.
- Ransomware: software that holds data in exchange for money.
- Password guessing: cracking passwords for malicious purposes.
- Keyloggers: software that tracks every keystroke or key press.
- Phishing: emails or websites that pretend to be authentic but are actually malicious.
- Computer viruses: programs that manipulate computers while replicating themselves.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on Selective Exposure Theory, which focuses on favoring information that aligns with pre-existing beliefs, and Cognitive Dissonance Theory, which discusses the discomfort of holding conflicting views. Explore how these concepts impact decision-making and information consumption.