SlideShare a Scribd company logo
1 of 3
CHAPTER 8
OPPORTUNITIES, CHALLENGES, AND
POWER OF MEDIA AND INFORMATION
Media Information gives the following
1. Inspiration
2. Politics and publicity
3. OPPORTUNITY
• Job Hiring
• Freedom of expression
• Informing and keeping the mass up to date
• Inspire
• Empower Citizen
• Faster and free communication
4. CHALLENGE
• Fake news
• Unreliable sources
5. POWER
• Influence
• Distributionof information
• Avail names
6. ECONOMIC IMPACT
Examples
 news industry
 film production
 broadcast
 mobile communications
7. EDUCATIONAL
Examples
• APPLICATIONS
• VIDEOS or video tutorials
• SOCIAL
• SOCIAL NETWORKS: sites that allow users to connect
and share with people who have similar interests and
backgrounds. Example: Facebook.
• BOOKMARKING SITES: sites that allow users to save and
organize links to any number of online resources and
websites. Example: Stumble Upon.
• SOCIAL NEWS: sites that allow users to post news links
and other items to outside articles. Example: Reddit.
• MEDIA SHARING: sites that allow users to share
different types of media, such as pictures and video.
Example: YouTube.
• MICROBLOGGING: sites that allow users to submit
short written entries, which can include links to
products and service sites as well as links to other social
media sites. Example: Twitter.
• BLOG COMMENTS AND FORUMS: sites that let users
engage in conversations by posting and responding to
community messages.
• ELECTRONIC TECHNOLOGY includes devices and
equipment such as cell phones, computers, and tablets
as well as communication tools including social media
sites, text messages, chat, and websites.
• CYBERBULLYING is bullying that takes place using
electronic technology.
DIFFERENT TYPES OF BULLYING
1. Flaming: Online fights using electronic messages with
angry and vulgar language
2. Harrassment and stalking: Repeatedly sending cruel,
vicious and/or threatening messages
3. Denigration: Sending or posting gossip or rumors
about a person to damage his or her reputation or
friendships
4. Impersonation: Breaking into someone's email account
and using it to send vicious or embarrassing material to
others
5. Outing and trickery: Engaging someone in instant
messaging, tricking him or her into revealing sensitive
information, and forwarding that information to others
6. Exclusion: Intentionally excluding someone from an
online group
7. Cyberstalking: Repeated, intense harassment and
denigration that includes threats or creates significant
fear.
CYBERSEX
 can be defined as those sexual acts that are derived
from surfing electronic media sites that would titillate the
sexual mind and that satisfies the erotic needs of an
individual, who constantly watches explicit sexual sites.
FIVE TYPES OF CYBERSEX ADDICTED USERS
1. Recreational (appropriate) are generally the users that
use cybersex as an enhancement to their real life sexual
lives and are very seldom users.
2. Recreational (inappropriate) users are those that find it
amusing to show sexual images to others and may
sometimes unintentionally embarrass someone with
their antics.
3. Problematic (discovery )the users in the discovery
group are people who compulsively visit adult dating
sites in the hope of meeting a partner, while avoiding
real-life opportunities to meet people or have multiple
partners in a manipulative or in dishonest way.
4. Problematic Users (Predisposed Group)- the user
accessing internet-based sexual material. They might
have thought about going to strip clubs or seeing
prostitutes for sex, but not taken any action to do so,
perhaps for fear of recognition or other consequences.
5. Problematic Users – (Lifelong Sexually Compulsive
Group) Their sexual acting out occurs with or without
access to the internet - the online world simply adds
another avenue to explore sexually inappropriate
material.
TYPE OF CYBERCRIME
1. Computer Fraud: Intentional deception for personal
gain via the use of computer systems.
2. Privacy violation: Exposing personal information such as
email addresses, phone number, account details, etc. on
social media, websites, etc.
3. Identity Theft: Stealing personal information from
somebody and impersonating that person.
4. Sharing copyrighted files/information: This involves
distributing copyright protected files such as eBooks
and computer programs etc.
5. Electronic funds transfer: This involves gaining an un-
authorized access to bank computer networks and
making illegal fund transfers.
6. Electronic money laundering: This involves the use of
the computer to launder money.
7. ATM Fraud: This involves intercepting ATM card
details such as account number and PIN numbers.
These details are then used to withdraw funds from the
intercepted accounts.
8. Denial of Service Attacks: This involves the use of
computers in multiple locations to attack servers with a
view of shutting them down.
9. Spam: Sending unauthorized emails. These emails
usually contain advertisements.
WHAT IS A COPYRIGHT ? copyright is a law that gives
you ownership over the things you create
 The right to reproduce the work
 to prepare derivative works
 to distribute copies
 to perform the work
 and to display the work publicly
COPYRIGHT LAW OF THE PHILIPPINES
 Republic Act No. 8293 or the Intellectual Property
Code of the Philippines which took effect on January 1,
1998, under the presidency of Fidel V. Ramos.
PLAGIARISM is the "wrongful appropriation" and "stealing
and publication" of another author's "language, thoughts,
ideas, or expressions" and the representation of them as
one's own original work.
COPYRIGHT INFRINGEMENT is the use of works protected
by copyright law without permission, infringing certain
exclusive rights granted to the copyright holder, such as the
right to reproduce, distribute, display or perform the
protected work, or to make derivative works.
MORAL RIGHTS are a set of rights that are separate from
the author’s copyright on a piece.
--As defined by the Berne Convention, the moral rights of
an author are as follows:
 The right to claim authorship of the work
 The right to object to any distortion, mutilation or
modification of the work
 The right to object to any derogatory action that may
damage the authors honor or reputation.
A HACKER is a person who finds and exploits the weakness
in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
TECHNIQUES IN HACKING
1. Vulnerability scanner: checks computers on networks
for known weaknesses
2. Password cracking: the process of recovering passwords
from data stored or transmitted by computer systems
3. Packet sniffer: applications that capture data packets in
order to view data and passwords in transit over
networks
4. Spoofing attack: involves websites which falsify data by
mimicking legitimate sites, and they are therefore
treated as trusted sites by users or other programs
5. Root kit: represents a set of programs which work to
subvert control of an operating system from legitimate
operators
6. Trojan horse: serves as a back door in a computer
system to allow an intruder to gain access to the
system later
7. Viruses: self-replicating programs that spread by
inserting copies of themselves into other executable
code files or documents
8. Key loggers: tools designed to record every keystroke
on the affected machine for later retrieval.
CLASSIFICATION OF HACKERS ACCORDING
TO THEIR INTENTION.
1. Ethical Hacker (White hat): A hacker who gains access
to systems with a view to fix the identified weaknesses.
They may also perform penetrationTesting and
vulnerability assessments.
2. Cracker (Black hat): A hacker who gains unauthorized
access to computer systems for personal gain. The intent
is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
3. Grey hat: A hacker who is in between ethical and black
hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and
reveal them to the system owner.
4. Script kiddies: A non-skilled person who gains access to
computer systems using already made tools.
5. Hacktivist: A hacker who use hacking to send social,
religious, and political, etc. messages. This is usually done
by hijacking websites and leaving the message on the
hijacked website.
6. Phreaker: A hacker who identifies and exploits
weaknesses in telephones instead of computers.
What is Ethical Hacking?
ETHICAL HACKING is identifying weakness in computer
systems and/or computer networks and coming with
countermeasures that protect the weaknesses. Ethical
hackers must abide by the following rules.
 Get written permission from the owner of the
computer system and/or computer network before
hacking.
 Protect the privacy of the organization been hacked.
 Transparently report all the identified weaknesses in
the computer system to the organization.
 Inform hardware and software vendors of the identified
weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an
organization. Keeping information secure can protect an
organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that
deal in finance such as PayPal. Ethical hacking puts them a
step ahead of the cyber criminals who would otherwise lead
to loss of business.
Legality of Ethical Hacking
ETHICAL HACKING is legal if the hacker abides by the rules
stipulated in the above section on the definition of ethical
hacking. The International Council of E-Commerce
Consultants (EC-Council) provides a certification program
that tests individual’s skills. Those who pass the examination
are awarded with certificates. The certificates are supposed
to be renewed after some time.

More Related Content

What's hot

Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 

What's hot (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Computer virus
Computer virusComputer virus
Computer virus
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
C 7
C 7C 7
C 7
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 

Similar to Media Info Opportunities, Challenges & Power

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical HackingKevin Chakre
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 

Similar to Media Info Opportunities, Challenges & Power (20)

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

More from ICCT foundation inc (20)

Hm122 prelim exam-media
Hm122 prelim exam-mediaHm122 prelim exam-media
Hm122 prelim exam-media
 
Hm122 midterm-exam-media
Hm122 midterm-exam-mediaHm122 midterm-exam-media
Hm122 midterm-exam-media
 
Chapter 2-types of media
Chapter 2-types of mediaChapter 2-types of media
Chapter 2-types of media
 
Chapter 6 media codes and convention
Chapter 6 media  codes and conventionChapter 6 media  codes and convention
Chapter 6 media codes and convention
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 9 current trends
Chapter 9 current trendsChapter 9 current trends
Chapter 9 current trends
 
Chapter 11 people media
Chapter 11 people mediaChapter 11 people media
Chapter 11 people media
 
quiz 100 items
quiz 100 itemsquiz 100 items
quiz 100 items
 
Chapter 10 meida
Chapter 10 meida Chapter 10 meida
Chapter 10 meida
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 
Comic sample
Comic sampleComic sample
Comic sample
 
Shooting star
Shooting starShooting star
Shooting star
 
Ppt animation-trigger
Ppt animation-triggerPpt animation-trigger
Ppt animation-trigger
 
Pairs2
Pairs2Pairs2
Pairs2
 
A long quiz
A long quizA long quiz
A long quiz
 
Q1= anwer key
Q1= anwer keyQ1= anwer key
Q1= anwer key
 
Activities
ActivitiesActivities
Activities
 
Hand out of lesson
Hand out of lessonHand out of lesson
Hand out of lesson
 
A long quiz
A long quizA long quiz
A long quiz
 
Custom animation
Custom animationCustom animation
Custom animation
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Media Info Opportunities, Challenges & Power

  • 1. CHAPTER 8 OPPORTUNITIES, CHALLENGES, AND POWER OF MEDIA AND INFORMATION Media Information gives the following 1. Inspiration 2. Politics and publicity 3. OPPORTUNITY • Job Hiring • Freedom of expression • Informing and keeping the mass up to date • Inspire • Empower Citizen • Faster and free communication 4. CHALLENGE • Fake news • Unreliable sources 5. POWER • Influence • Distributionof information • Avail names 6. ECONOMIC IMPACT Examples  news industry  film production  broadcast  mobile communications 7. EDUCATIONAL Examples • APPLICATIONS • VIDEOS or video tutorials • SOCIAL • SOCIAL NETWORKS: sites that allow users to connect and share with people who have similar interests and backgrounds. Example: Facebook. • BOOKMARKING SITES: sites that allow users to save and organize links to any number of online resources and websites. Example: Stumble Upon. • SOCIAL NEWS: sites that allow users to post news links and other items to outside articles. Example: Reddit. • MEDIA SHARING: sites that allow users to share different types of media, such as pictures and video. Example: YouTube. • MICROBLOGGING: sites that allow users to submit short written entries, which can include links to products and service sites as well as links to other social media sites. Example: Twitter. • BLOG COMMENTS AND FORUMS: sites that let users engage in conversations by posting and responding to community messages. • ELECTRONIC TECHNOLOGY includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. • CYBERBULLYING is bullying that takes place using electronic technology. DIFFERENT TYPES OF BULLYING 1. Flaming: Online fights using electronic messages with angry and vulgar language 2. Harrassment and stalking: Repeatedly sending cruel, vicious and/or threatening messages 3. Denigration: Sending or posting gossip or rumors about a person to damage his or her reputation or friendships 4. Impersonation: Breaking into someone's email account and using it to send vicious or embarrassing material to others 5. Outing and trickery: Engaging someone in instant messaging, tricking him or her into revealing sensitive information, and forwarding that information to others 6. Exclusion: Intentionally excluding someone from an online group 7. Cyberstalking: Repeated, intense harassment and denigration that includes threats or creates significant fear. CYBERSEX  can be defined as those sexual acts that are derived from surfing electronic media sites that would titillate the sexual mind and that satisfies the erotic needs of an individual, who constantly watches explicit sexual sites.
  • 2. FIVE TYPES OF CYBERSEX ADDICTED USERS 1. Recreational (appropriate) are generally the users that use cybersex as an enhancement to their real life sexual lives and are very seldom users. 2. Recreational (inappropriate) users are those that find it amusing to show sexual images to others and may sometimes unintentionally embarrass someone with their antics. 3. Problematic (discovery )the users in the discovery group are people who compulsively visit adult dating sites in the hope of meeting a partner, while avoiding real-life opportunities to meet people or have multiple partners in a manipulative or in dishonest way. 4. Problematic Users (Predisposed Group)- the user accessing internet-based sexual material. They might have thought about going to strip clubs or seeing prostitutes for sex, but not taken any action to do so, perhaps for fear of recognition or other consequences. 5. Problematic Users – (Lifelong Sexually Compulsive Group) Their sexual acting out occurs with or without access to the internet - the online world simply adds another avenue to explore sexually inappropriate material. TYPE OF CYBERCRIME 1. Computer Fraud: Intentional deception for personal gain via the use of computer systems. 2. Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc. 3. Identity Theft: Stealing personal information from somebody and impersonating that person. 4. Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc. 5. Electronic funds transfer: This involves gaining an un- authorized access to bank computer networks and making illegal fund transfers. 6. Electronic money laundering: This involves the use of the computer to launder money. 7. ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts. 8. Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down. 9. Spam: Sending unauthorized emails. These emails usually contain advertisements. WHAT IS A COPYRIGHT ? copyright is a law that gives you ownership over the things you create  The right to reproduce the work  to prepare derivative works  to distribute copies  to perform the work  and to display the work publicly COPYRIGHT LAW OF THE PHILIPPINES  Republic Act No. 8293 or the Intellectual Property Code of the Philippines which took effect on January 1, 1998, under the presidency of Fidel V. Ramos. PLAGIARISM is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work. COPYRIGHT INFRINGEMENT is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. MORAL RIGHTS are a set of rights that are separate from the author’s copyright on a piece. --As defined by the Berne Convention, the moral rights of an author are as follows:  The right to claim authorship of the work  The right to object to any distortion, mutilation or modification of the work  The right to object to any derogatory action that may damage the authors honor or reputation. A HACKER is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. TECHNIQUES IN HACKING 1. Vulnerability scanner: checks computers on networks for known weaknesses 2. Password cracking: the process of recovering passwords from data stored or transmitted by computer systems 3. Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks 4. Spoofing attack: involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs
  • 3. 5. Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators 6. Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later 7. Viruses: self-replicating programs that spread by inserting copies of themselves into other executable code files or documents 8. Key loggers: tools designed to record every keystroke on the affected machine for later retrieval. CLASSIFICATION OF HACKERS ACCORDING TO THEIR INTENTION. 1. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetrationTesting and vulnerability assessments. 2. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. 3. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. 4. Script kiddies: A non-skilled person who gains access to computer systems using already made tools. 5. Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website. 6. Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers. What is Ethical Hacking? ETHICAL HACKING is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.  Get written permission from the owner of the computer system and/or computer network before hacking.  Protect the privacy of the organization been hacked.  Transparently report all the identified weaknesses in the computer system to the organization.  Inform hardware and software vendors of the identified weaknesses. Why Ethical Hacking? Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business. Legality of Ethical Hacking ETHICAL HACKING is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.