Fighting Information Disorder on Social Media PDF
Document Details
Uploaded by UnbiasedCalcite
University of Rizal System, Binangonan
Tags
Related
- Boca Raton Police Services Department Social Media Policy PDF
- TikTok Ban Debate: Poor Media Literacy in the Social Media Age (Apr 2024)
- Opportunities, Challenges, and Power of Media and Information PDF
- Social Media Marketing - Network Structure & Group Influences PDF
- Social Media Apps & Sites for Children & Teens (PDF)
- Fighting Information Disorder on Social Media PDF
Summary
This document discusses fighting information disorder on social media, examining various types of social media, their potential benefits, and associated risks. It also covers several important topics relating to online safety and how to identify different types of harmful content.
Full Transcript
FIGHTING INFORMATION DISORDER ON Social Media Social Media Social media “are websites and computer programs that allow people to communicate and share information on the internet using a computer or cell phone” (Cambridge Dictionary, n.d.). According to (Merriam-Webster Dictiona...
FIGHTING INFORMATION DISORDER ON Social Media Social Media Social media “are websites and computer programs that allow people to communicate and share information on the internet using a computer or cell phone” (Cambridge Dictionary, n.d.). According to (Merriam-Webster Dictionary, n.d.), it is a “form of electronic communication (such as websites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos).” Social media platforms allow users to converse, share information, and create web content (University of South Florida, 2023). Some of the fundamental principles of social media include (Tufts University, 2013): 1. Social media is all about relationships, community, interacting with your audience, and having dialogues. 2. Integrity, openness, and authenticity are essential. 3. You can respond to what people are saying about you on social media and hear what they are saying. 4. Be interesting, relevant, valuable, and captivating. Common Types of Social Media 1. Social networking sites Examples: Facebook, LinkedIn, Instagram, Twitter, TikTok, and Snapchat 2. Photo and image-sharing sites Examples: Instagram, Snapchat, Pinterest, and Imgur 3. Video Sharing sites Examples: YouTube, TikTok, and Vimeo 4. Audio sharing sites Examples: Clubhouse, Twitter Spaces, and Facebook Live Audio Rooms Common Types of Social Media 5. Live Streaming Apps Examples: YouTube Live, Facebook Live, Twitch, and UStream 6. Social messaging apps Examples: Facebook Messenger, Twitter DMs, Google Business Messenger, WhatsApp, and WeChat 7. Disappearing Content App Examples: Snapchat, Instagram Stories and Facebook Stories 8. Social Shopping Network Examples: Facebook for Business, Shopify x TikTok, Instagram Shop, and Pinterest Shoppable Pins Common Types of Social Media 9. Interactive social media apps Examples: Instagram Stories, Snapchat, TikTok, Tumblr, and Weibo 10. Discussion Forums Examples: Reddit, Quora, and Stack Overflow 11. Microblogging Platforms Examples: Twitter, Tumblr, Pinterest, and LinkedIn 12. Community blogging sites Examples: Medium, GrowthHackers, BlogEngage, and DoSplash Common Types of Social Media 13. Social review sites Examples: Google Business Profile, Amazon, Yelp, and Facebook 14. Social curation and bookmarking sites Examples: Pocket, Digg, Pinterest, and Mix BENEFITS OF SOCIAL MEDIA AMONG STUDENTS COMMUNICATION AND COLLABORATION ACCESS TO INFORMATION NETWORKING PERSONAL BRANDING ENTERTAINMENT, INSPIRATION, AND CREATIVE EXPRESSION EXPERIENCE GLOBAL EXPOSURE EMPLOYMENT OPPORTUNITIES SOCIAL MEDIA MARKETING RISKS OF SOCIAL MEDIA Inadequacy about your life or appearance. Fear of missing out (FOMO) and social media addiction. Isolation. Depression and anxiety. Cyberbullying. Self-absorption. Other causes of unhealthy social media use (Robinson & Smith, 2022), includes: Many of us use social media as a “security blanket.” Heavy social media use could mask other underlying problems, such as stress, depression, or boredom. Other indicators that social media is impacting your mental health include (Robinson & Smith, 2022) Spending more time on social media than with real- world friends Comparing yourself unfavorably with others on social media Experiencing cyber bullying Being distracted at school or work Having no time for self-reflection Engaging in risky behavior to gain likes, shares, or positive reactions on social media Other indicators that social media is impacting your mental health include (Robinson & Smith, 2022) Suffering from sleep problems Worsening symptoms of anxiety or depression Information Disorder Information disorder is a term studied and presented by Claire Wardle and Hossein Derakhshan in 2017: Information Disorder: toward a multidisciplinary framework for research and policy- making. The term understanding all phenomena in the information universe is divided into three categories: misinformation, disinformation, and mal-information (Boarini, 2022). Information disorder syndrome is the sharing or developing of false information with or without the intent of harming, and they are categorized as misinformation, disinformation, and malinformation (Kandel, 2020). Image from (NTCenter, 2018) TYPES OF INFORMATION DISORDER The following section, including the images, is lifted from (Wardle, 2020). TYPES OF INFORMATION DISORDER 1) Satire or parody Satire is a type of humor that pokes fun at people or situations to make a point. But sometimes, people use satire to spread lies or rumors on purpose. This can be a problem because as the satire gets shared, more and more people might not realize it's supposed to be a joke. SATIRE OR PARODY SATIRE OR PARODY TYPES OF INFORMATION DISORDER 2) False connection In the world of news, there's a problem called "false connection" or clickbait. This happens when a headline uses sensational language to get people to click on a story, but then the actual story doesn't live up to the hype. It's like pollution because it clogs up the internet with content that doesn't really add value. TYPES OF INFORMATION DISORDER 3) Misleading content It can involve changing headlines, using partial quotes, or manipulating statistics to support a particular viewpoint. Misleading information can be presented in many ways, and sometimes even visual aids can be deceptive. MISLEADING CONTENT TYPES OF INFORMATION DISORDER 4) False context This category describes genuine content that has been reframed in dangerous ways. FALSE CONTEXT This photo depicting a child in a cage was staged as part of a protest against immigration policies. FALSE CONTEXT TYPES OF INFORMATION DISORDER 5) Imposter content Our brains are always looking for heuristics to understand information credibility. Heuristics are mental shortcuts that help us make sense of the world—seeing a brand we already know is a very powerful heuristic. For this reason, we’re seeing an increase in imposter content — false or misleading content that uses well-known logos or the news from established figures or journalists. IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT IMPOSTER CONTENT TYPES OF INFORMATION DISORDER 6) Manipulated content Manipulated media is when an aspect of genuine content is altered. This relates most often to photos or videos. MANIPULATED CONTENT MANIPULATED CONTENT TYPES OF INFORMATION DISORDER 7) Fabricated content Fabricated content is that which is 100 percent false. FABRICATED CONTENT CAUSES OF INFORMATION DISORDER DIGITAL TECHNOLOGIES LACK OF MEDIA LITERACY CONFIRMATION BIAS PARTISAN POLITICS FINANCIAL INCENTIVES FOREIGN INTERFERENCE TRENDS IN INFORMATION DISORDER Increasing polarization Amplification of conspiracy theories Misinformation and disinformation during crises Use of deep fakes and other manipulated media Influence operations by foreign entities Influence operations by foreign entities INFLUENCES OF INFORMATION DISORDER PUBLIC HEALTH POLITICAL PROCESSES SOCIAL COHESION ECONOMIC IMPACTS NATIONAL SECURITY INDIVIDUAL BEHAVIOR PREVENTING INFORMATION DISORDER DEVELOP MEDIA LITERACY SKILLS FACT-CHECKING AND VERIFICATION PROMOTE DIGITAL LITERACY AND RESPONSIBLE SOCIAL MEDIA USE ENCOURAGE COMBAT FOREIGN BETTER TECHNOLOGY SUPPORT QUALITY TRANSPARENCY AND INTERFERENCE SOLUTIONS JOURNALISM ACCOUNTABILITY Community-Level Fake Account Operators follow what we call script-based disinformation work, which consists of posting written and/or visual content post a prescribed number of posts or comments on Facebook community groups, news sites, or rival politicians’ pages per day responsible for maintaining activity and initiating bandwagon effects Community-Level Fake Account Operators post positive messages of support for the politician and agree publicly with favorable news articles initiate quarrels with supporters of rival politicians by using ad hominem attacks or making fun of other people’s bad grammar as a way of shutting down an opponent’s argument Trolls and Deep Fake Technology A troll is a being in Nordic folklore, including Norse mythology. A troll is Internet slang for a person who intentionally tries to instigate conflict, hostility, or arguments in an online social community. (What is Trolling?, 2023) Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion. HOW TO SPOT TROLLS? Blindness to evidence Name-calling Topic redirects Condescending tone Overexaggerating DIFFERENT TYPES OF TROLLS 1. The "Why is this news?" troll This troll's objective is to say that the thing you're talking about is not worth talking about. 2. The do-no-harm troll The do-noharm troll's comments are confusing, but not harmful; weird, but not dangerous. DIFFERENT TYPES OF TROLLS 3. The high-brow troll The high-brow troll essentially exists to put people in their place while also humble bragging. 4. The wet blanket troll These trolls will stop at nothing to ruin a pleasant discussion, no matter the subject matter. DIFFERENT TYPES OF TROLLS 5. The meme-reliant troll The meme-reliant trolls of the world are a unique bunch. While they have a lot of opinions and aren't necessarily afraid to share them, they only feel comfortable trolling if they can hide their social commentary behind the lighthearted veil of a meme. 6. The friendship troll Friendship trolls take it upon themselves to give their pals Fear of Missing Out (FOMO) whenever possible. DIFFERENT TYPES OF TROLLS 7. The broken record troll The broken record troll has almost zero range in trolling. They come up with one good troll, think they've mastered the game, and keep it in their back pocket just waiting to whip it out whenever the opportunity presents itself. 8. The existential void troll Ever encountered someone online who carries on endlessly bleak conversations, often appears hopeless, and seems angry at the world? DIFFERENT TYPES OF TROLLS 9. The brand troll Brand trolls are extremely hit or miss. When they’re good (it's rare,) they set brands apart from the competition. 10. Bad people These are the trolls who give trolls a bad name. Well, trolling already has a bad name, but it's these people's fault. Anonymity If a person engages anonymously online, then it’s like the online disinhibition effect has just taken steroids. It is easier to troll with the illusion of no accountability and no connection to one’s life off-line. Tribalism The power of the group can add more fuel to the fire. Like a pack of wolves, humans are social creatures and have an innate desire to be part of a group. INDIVIDUAL FACTORS THAT CONTRIBUTE TO TROLLING PERSONALITY IDEOLOGICALLY POSSESSED BELIEFS CONDITIONING HOW TO COMBAT TROLLS 1. Don’t Feed the Trolls 2. Be the Boss! No Trolls Allowed 3. Add Moderators to Your Roster 4. If You Can’t Ignore the Trolls, Challenge them with facts and sources 5. Kill Them with Kindness 6. Disarm Them with Humor 7. Have Friends-Only Social Profiles 8. Block, Ban, or Report Trolls 9. Decompress Before You Reply 10. Stay Professional What is a Bot? An internet bot is a software application that performs automated tasks by running scripts over the internet. Bots perform simple, structurally repetitive tasks much more quickly than is humanly possible. Most bots are harmless and crucial for making the internet valuable and useful, but bots can also be malignant and destructive when they are deployed by cybercriminals. (Knecht, 2021) TYPES OF BOTS CHATBOTS WEB CRAWLERS SOCIAL BOTS MALICIOUS BOTS ROLE OF BOTS IN SOCIAL MEDIA Malicious social media bots can be used for a number of purposes: Artificially amplifying the popularity of a person or movement Influencing elections Manipulating financial markets Amplify phishing attacks Spreading spam Shutting down free speech TIPS FOR SPOTTING A BOTS ON SOCIAL MEDIA PROFILE CONTENT ACTIVITY NETWORK INFORMATION QUALITY HOW TO COMBAT BOTS ON SOCIAL MEDIA 1. Don’t overshare 2. Don’t divulge non-essential personal details with social media sites 3. Don’t spread false information Deep Fake Technology The term “deepfake” was first coined in late 2017 by a Reddit user of the same name. This user created a space on the online news and aggregation site, where they shared pornographic videos that used open source face-swapping technology (Somers, 2020). A deepfake is a type of AI-created video that can convincingly mimic a person’s facial expressions, body language, and even speech. They are often used to create pornography and jokes, but they have also been used to distort political speeches and mock news reporters. Deep Fake Technology Another definition from Techtarget: Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing images, audio and video hoaxes. The term, which describes both the technology and the resulting bogus content, is a portmanteau of deep learning and fake. (Barney & Wigmore, 2023) DEEPFAKE AUDIO Deep fake audio is synthetic audio that is meant to mimic the voice of an actual person. There are various ways of creating synthetic audio, and just like deep fake video, the technology continues to improve all the time. Steps in Creating Deepfakes (Reuters, 2023) 1. Imagery of the subject is fed to machine-learning software 2. This ‘generator’ network then creates new imagery 3. Meanwhile, a second ‘discriminator’ neural network is trained using real imagery 4. Generated content that does not match the characteristics learnt by the discriminator is rejected until the generated content is so authentic-looking that it ‘tricks’ the discriminator into accepting it Example Deepfake Apps and Software FaceApp Zao Avatarify Reface Voilà AI Artist SpeakPic DeepFaceLab FakeApp Wombo Deepfakes Web Instagram DeepFake Bot Deepfake Studio DEEPFAKE PHOTO Key Indicators: Quality of the image Facial expressions in the image Signs of photoshopping in the image DEEPFAKE VIDEO Is it possible to spot a deepfake video? How will you know if the media that you’re watching or listening to is real? Poorly made deepfake videos may be easy to identify but spotting higher-quality deepfakes can be challenging. Continuous advances in technology make detection infinitely more difficult (Johansen, 2020). HOW TO SPOT A DEEPFAKE VIDEO? 1. Unnatural eye movement 8. Hair that doesn’t look real 2. Unnatural facial expressions 9. Teeth that don’t look real 3. Awkward facial-feature 10. Blurring or misalignment positioning 11. Inconsistent noise or audio 4. A lack of emotion 12. Images that look unnatural 5. Awkward-looking body or when slowed down posture 13. Hashtag discrepancies 6. Unnatural body movement or 14. Digital fingerprints body shape 15. Reverse image searches 7. Unnatural coloring 16. Video glitches and flickers COMBATING DEEPFAKES 1. Social media rules 2. Verification programs 3. Research lab technologies 4. Deepfake Detection Challenge 5. Emerging detection programs 6. Filtering programs 7. Corporate best practices 8. U.S. Defense Advanced Research Projects Agency 9. U.S. legislation Fact-Checking on Social Media Fact-checking is more crucial than ever due to the growth of digital media and the speed at which information can be shared (Gottfried & Shearer, 2016). It is essential to have a mechanism to confirm the accuracy of the information being shared and consumed due to the ease with which incorrect or misleading information can be spread online (Woolley & Howard, 2016). THE SCONUL SEVEN PILLARS OF INFORMATION LITERACY: CORE MODEL THE CRAAP TEST The CRAAP Test: This is a set of standards for assessing the reliability of information sources, and it includes criteria like Currency (the timeliness of the information), Relevance (the relevance of the information to your needs), Authority (the source of the information), Accuracy (the accuracy of the information), and Purpose (the purpose of the information) (Meriam Library, n.d.). THE CRAAP TEST THE CRAAP TEST THE CRAAP TEST THE CRAAP TEST THE CRAAP TEST THE CRAAP TEST ON CURRENCY Check the age of the source You might need the most recent sources available if the information is time-sensitive. Students who mention works that are less than ten years old are typically preferred in the academe. You might need to examine more recent sources if the source is outdated to determine if the data has changed. Evergreen subjects that do not change may be outdated, but they are nonetheless important. Keep in mind that a source's newness is not what is important coz some are new, but they may be unreliable. ON CURRENCY Locating important sources Despite being outdated, sources are nonetheless valuable. For instance, if a foundational work is still relevant, it may be worthwhile to examine it, such as the earliest writings of a philosopher or the Bible. Modern or culturally relevant critiques of seminal materials may be offered by new sources. ON CURRENCY How to determine dates update An older document that has recently been modified might still contain the most recent data and analysis. ON RELEVANCE Identifying Context There are occasions when something seems important but is out of context. Make sure all quotes are placed in their proper context to avoid reading anything that has been taken out of its proper context. ON RELEVANCE Identifying the source type In general, a primary source will have more credibility than a secondary source. We can assume that an article has less accuracy the further it is from the original source ON RELEVANCE Choosing the right audience Even if a source may be talking about the subject you are interested in, it might be intended for kids or a specific segment of the population, so the information may not be directly applicable to you. ON AUTHORITY Verifying the Credentials of the Author Journalists are expected to uphold journalistic ethics, particularly if they work for reputable media outlets. Academics must follow the norms in which they have been educated. We may view an author as more credible if they have first- hand experience. ON AUTHORITY Verifying the Author's authority on the subject We may trust an author more if they are a licensed professional in the subject matter they are discussing. An somebody could be an authority, but they also need to be a specialist in their subject. ✔ Inaccurate information may be hidden by making appeals to authority (known as the appeal to authority fallacy). ON AUTHORITY Investigating the publisher Quality and reputable publishers also establish authority. It might be more reliable than a blog if you are on a news website with a transparent editorial policy Publishers from universities with.edu domains will be more reputable than most websites with.com extensions. ON AUTHORITY Verifying the Gatekeepers Editors, peer reviewers, and publishing companies are examples of gatekeepers. These editors can stop the publication of unreliable or subpar content. Because there are no gatekeepers on social media platforms like Twitter and blogs, their dependability may be reduced. ON AUTHORITY Verifying peer review Peer review occurs when the content is read, evaluated, and factchecked by another reliable source. This promotes high standards. Double blind reviews are ones that are written by specialists who are not connected to the original content's author. ON AUTHORITY Verifying images Original images can be used to demonstrate first-hand knowledge rather than stock photos or images created by other people. For instance, if there are images of the reviewer actually using the product, the review may be more well-received. ON AUTHORITY Verifying images Peer review occurs when the content is read, evaluated, and fact checked by another reliable source. This promotes high standards. Double blind reviews are ones that are written by specialists who are not connected to the original content's author. ON AUTHORITY Verifying Content Sponsorship A sponsored article or film may be less likely to criticize the sponsor, which could reduce the authority of the source. ON ACCURACY Verifying the references Citations of sources make it easier for readers to verify the veracity of content. Also, it promotes transparency. The references will be more trustworthy if they are drawn from reputable original sources, academic texts, or other primary sources. ON ACCURACY Verifying the data Citing supporting information, such as statistics and first- person accounts, helps show that the data are accurate. ON ACCURACY Verifying author bias Media-savvy readers are alert for bias in writing. Bias comes in various forms, including cultural, political, and framing bias. It's possible for authors to selectively utilize data to promote their arguments, so be sure to monitor the sources and evaluate their bias. ON ACCURACY Examining Individual Biases To prevent falling victim to confirmation bias by just reading writings that support your beliefs, make sure you read texts from a variety of sources. ON ACCURACY Understanding Fallacies Numerous librarians would advise reviewing a source's spelling and grammar on the grounds that poor grammar and spelling are indicators of low-quality content. ON ACCURACY Independently verifying the facts By triangulating against several sources, including sources from media outlets with various potential biases, you can verify shaky statements. ON ACCURACY Verifying The Presence Of Multiple Viewpoints An article that examines various viewpoints, opposing viewpoints, and flaws in their own arguments shows reflection, which may indicate trustworthy and competent reporting. ON PURPOSE Verifying the Right to Respond For reasons of journalistic ethics, a text that criticizes someone but has also asked them for remark or given them the opportunity to respond may be respected. ON PURPOSE Verifying the Intent to Persuade Consider whether the language is trying to be persuasive or objective. It may not be telling the whole story if the writing is arguing for a specific point of view. ON PURPOSE Evaluating Commercial Intent The source may be biased if it is trying to market a good or service due to financial conflicts of interest. ON PURPOSE Checking For Entertainment Intent An entertaining source might be more likely to stretch the truth or use hyperbole, exaggeration, or sarcasm. Tools and Platforms to Stop Information Disorder on Social Media BOT/SPAM DETECTION CODES AND STANDARDS CODES AND STANDARDS DISINFORMATION TRACKING EDUCATION/TRAINING EDUCATION/TRAINING EDUCATION/TRAINING MULTIMEDIA PLATFORMS AND TOOLS WHITELISTING MOBILE APPLICATIONS Staying Safe Online Keep security Check your bank Only shop on systems up to date statements secure sites frequently STAYING SAFE ONLINE Back everything up Get informed about Improve your ransomware passwords STAYING SAFE ONLINE Never share Keep your Learn what to do in passwords passwords safe case of a data breach STAYING SAFE ONLINE Use public Don’t fall for a Protect your computers very phishing scam devices carefully STAYING SAFE ONLINE Manage your – Think before you Share with care and others’ – click privacy Social Media Etiquettes Remember the Be ethical Know where you Human are SOCIAL MEDIA ETIQUETTES Respect other Make yourself look Share expert people’s time and good online knowledge data limits SOCIAL MEDIA ETIQUETTES Keep Respect other disagreements people’s privacy healthy SOCIAL MEDIA ETIQUETTES Do not abuse your Be forgiving of power other people’s mistakes Digital Hygiene in Social Media Digital hygiene also known as cyber hygiene comprises the behaviors and actions that online users take to preserve information system health and enhance online security. These procedures are frequently included in a routine to protect identity and other information that might be stolen or tampered with. DIGITAL HYGIENE PROCEDURES ZHAFRI & HAQUE, 2022 1. By limiting the kind of information you post on social networking sites, you can reduce your digital footprint. 2. On well-known social networking sites like Google, Facebook, Twitter, and LinkedIn, review your privacy settings. 3. To make it more difficult for advertisers and hackers to monitor and profile you online, disable the ad ID tracking on your mobile devices. DIGITAL HYGIENE PROCEDURES ZHAFRI & HAQUE, 2022 4. When registering for user accounts or mailing lists, utilize throwaway email addresses. 5. Reduce the quantity of adverts you view and the amount of time marketers may track you online by using ad blockers like Adblock Plus and Disconnect. 6. Limiting your use of digital gadgets is another aspect of good digital hygiene. SOCIAL MEDIA HYGIENE STRATEGIES BAENA, 2021 1. Put your phone or device away 30 minutes before bedtime. 2. Put away your phone when hanging out with friends, family, and loved ones. 3. Set limits on your social media intake ICT Social & Ethical Issues PRIVACY Smart Technology at Home Pervasive monitoring Privacy enhancing versus losing control of sensitive information ICT Social & Ethical Issues AUTONOMY Man out-of-the-loop - “from in-the-loop to on-the-loop to out-of-the-loop” Filtering versus freedom of expression ICT Social & Ethical Issues SAFETY Identity fraud Psychological damage in virtual worlds ICT Social & Ethical Issues HUMAN DIGNITY Unlearn moral skills Desocialization and alienation ICT Social & Ethical Issues ICT Social & Ethical Issues Digital Citizenship Digital citizenship is “an acceptance and upholding of the norms of appropriate, responsible behaviour with regard to the use of digital technologies. Digital citizenship includes appropriate online etiquette, literacy in how digital technologies work and how to use them, an understanding of ethics and related law, knowing how to stay safe online, and advice on related health and safety issues such as predators and the permanence of data” (The Australian Curriculum, n.d.). DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP 9 ELEMENTS OF DIGITAL CITIZENSHIP (ROUTLEDGE TAYLOR & FRANCIS GROUP, 2022) Digital Access Digital Commerce Digital Communication 9 ELEMENTS OF DIGITAL CITIZENSHIP (ROUTLEDGE TAYLOR & FRANCIS GROUP, 2022) Digital Literacy Digital Etiquette Digital Law DIGITAL LAW Republic Act 10173 – Data Privacy Act of 2012 Republic Act 10175 – Cybercrime Prevention Act of 2012 Republic Act 8792 – eCommerce Act of 2000 Republic Act 11293 – Philippine Innovation Act Republic Act 10844 – Department of Information and Communications Technology Act of 2015 Republic Act 11313 – Safe Spaces Act of 2018 9 ELEMENTS OF DIGITAL CITIZENSHIP (ROUTLEDGE TAYLOR & FRANCIS GROUP, 2022) Digital Rights and Digital Health and Digital Security Responsibilities Wellness 10 WAYS IN BECOMING A RESPONSIBLE SOCIAL MEDIA USER Read thoroughly the privacy policies of the social media. Being selective of friend requests is one of the responsible uses of social media. Always use a strong password. Be accountable. Be reminded that there is no such thing as 100% private online. Be wary of oversharing; remember that digital footprints stay forever. 10 WAYS IN BECOMING A RESPONSIBLE SOCIAL MEDIA USER Don’t post videos that are “disruptive, threatening, profane, abusive, harassing, embarrassing, tortuous, defamatory, obscene, libelous, or is an invasion of another’s privacy.” Don’t reveal sensitive personal information such as home address, bank account information, phone number. The more you post, the easier it is to have your identity stolen. 10 WAYS IN BECOMING A RESPONSIBLE SOCIAL MEDIA USER Social media is not a platform to complain, protest, criticize, or vent your frustrations. Don’t express concerns about others, even if you think you are anonymous. Always remember to THINK about what you are going to post. 10 WAYS IN BECOMING A RESPONSIBLE SOCIAL MEDIA USER Ask yourself about these questions before sharing: Is the post TRUE or a rumor? Is the post HELPFUL or harmful? Is the post INFORMATIONAL or gossip? Is the post NEEDED or irrelevant? Is the post KIND or harsh? REFERENCE Siliman University. (2023). Development of an Open Courseware with Animation and Gamification on Fighting Information Disorder on Social Media. Documents posted in OURSOUL OER online classroom, archived at https://oursoul.su.edu.ph/lms/