This document discusses opportunities, challenges, and the power of media and information. It provides examples of how media can inspire people and empower citizens through faster communication, while also discussing challenges like fake news and unreliable sources. The document also explores the economic impact of industries like news and film production, and how media can be used for educational purposes through applications and social networks that allow sharing information.
1. CHAPTER 8
OPPORTUNITIES, CHALLENGES, AND
POWER OF MEDIA AND INFORMATION
Media Information gives the following
1. Inspiration
2. Politics and publicity
3. OPPORTUNITY
• Job Hiring
• Freedom of expression
• Informing and keeping the mass up to date
• Inspire
• Empower Citizen
• Faster and free communication
4. CHALLENGE
• Fake news
• Unreliable sources
5. POWER
• Influence
• Distributionof information
• Avail names
6. ECONOMIC IMPACT
Examples
news industry
film production
broadcast
mobile communications
7. EDUCATIONAL
Examples
• APPLICATIONS
• VIDEOS or video tutorials
• SOCIAL
• SOCIAL NETWORKS: sites that allow users to connect
and share with people who have similar interests and
backgrounds. Example: Facebook.
• BOOKMARKING SITES: sites that allow users to save and
organize links to any number of online resources and
websites. Example: Stumble Upon.
• SOCIAL NEWS: sites that allow users to post news links
and other items to outside articles. Example: Reddit.
• MEDIA SHARING: sites that allow users to share
different types of media, such as pictures and video.
Example: YouTube.
• MICROBLOGGING: sites that allow users to submit
short written entries, which can include links to
products and service sites as well as links to other social
media sites. Example: Twitter.
• BLOG COMMENTS AND FORUMS: sites that let users
engage in conversations by posting and responding to
community messages.
• ELECTRONIC TECHNOLOGY includes devices and
equipment such as cell phones, computers, and tablets
as well as communication tools including social media
sites, text messages, chat, and websites.
• CYBERBULLYING is bullying that takes place using
electronic technology.
DIFFERENT TYPES OF BULLYING
1. Flaming: Online fights using electronic messages with
angry and vulgar language
2. Harrassment and stalking: Repeatedly sending cruel,
vicious and/or threatening messages
3. Denigration: Sending or posting gossip or rumors
about a person to damage his or her reputation or
friendships
4. Impersonation: Breaking into someone's email account
and using it to send vicious or embarrassing material to
others
5. Outing and trickery: Engaging someone in instant
messaging, tricking him or her into revealing sensitive
information, and forwarding that information to others
6. Exclusion: Intentionally excluding someone from an
online group
7. Cyberstalking: Repeated, intense harassment and
denigration that includes threats or creates significant
fear.
CYBERSEX
can be defined as those sexual acts that are derived
from surfing electronic media sites that would titillate the
sexual mind and that satisfies the erotic needs of an
individual, who constantly watches explicit sexual sites.
2. FIVE TYPES OF CYBERSEX ADDICTED USERS
1. Recreational (appropriate) are generally the users that
use cybersex as an enhancement to their real life sexual
lives and are very seldom users.
2. Recreational (inappropriate) users are those that find it
amusing to show sexual images to others and may
sometimes unintentionally embarrass someone with
their antics.
3. Problematic (discovery )the users in the discovery
group are people who compulsively visit adult dating
sites in the hope of meeting a partner, while avoiding
real-life opportunities to meet people or have multiple
partners in a manipulative or in dishonest way.
4. Problematic Users (Predisposed Group)- the user
accessing internet-based sexual material. They might
have thought about going to strip clubs or seeing
prostitutes for sex, but not taken any action to do so,
perhaps for fear of recognition or other consequences.
5. Problematic Users – (Lifelong Sexually Compulsive
Group) Their sexual acting out occurs with or without
access to the internet - the online world simply adds
another avenue to explore sexually inappropriate
material.
TYPE OF CYBERCRIME
1. Computer Fraud: Intentional deception for personal
gain via the use of computer systems.
2. Privacy violation: Exposing personal information such as
email addresses, phone number, account details, etc. on
social media, websites, etc.
3. Identity Theft: Stealing personal information from
somebody and impersonating that person.
4. Sharing copyrighted files/information: This involves
distributing copyright protected files such as eBooks
and computer programs etc.
5. Electronic funds transfer: This involves gaining an un-
authorized access to bank computer networks and
making illegal fund transfers.
6. Electronic money laundering: This involves the use of
the computer to launder money.
7. ATM Fraud: This involves intercepting ATM card
details such as account number and PIN numbers.
These details are then used to withdraw funds from the
intercepted accounts.
8. Denial of Service Attacks: This involves the use of
computers in multiple locations to attack servers with a
view of shutting them down.
9. Spam: Sending unauthorized emails. These emails
usually contain advertisements.
WHAT IS A COPYRIGHT ? copyright is a law that gives
you ownership over the things you create
The right to reproduce the work
to prepare derivative works
to distribute copies
to perform the work
and to display the work publicly
COPYRIGHT LAW OF THE PHILIPPINES
Republic Act No. 8293 or the Intellectual Property
Code of the Philippines which took effect on January 1,
1998, under the presidency of Fidel V. Ramos.
PLAGIARISM is the "wrongful appropriation" and "stealing
and publication" of another author's "language, thoughts,
ideas, or expressions" and the representation of them as
one's own original work.
COPYRIGHT INFRINGEMENT is the use of works protected
by copyright law without permission, infringing certain
exclusive rights granted to the copyright holder, such as the
right to reproduce, distribute, display or perform the
protected work, or to make derivative works.
MORAL RIGHTS are a set of rights that are separate from
the author’s copyright on a piece.
--As defined by the Berne Convention, the moral rights of
an author are as follows:
The right to claim authorship of the work
The right to object to any distortion, mutilation or
modification of the work
The right to object to any derogatory action that may
damage the authors honor or reputation.
A HACKER is a person who finds and exploits the weakness
in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with
knowledge of computer security.
TECHNIQUES IN HACKING
1. Vulnerability scanner: checks computers on networks
for known weaknesses
2. Password cracking: the process of recovering passwords
from data stored or transmitted by computer systems
3. Packet sniffer: applications that capture data packets in
order to view data and passwords in transit over
networks
4. Spoofing attack: involves websites which falsify data by
mimicking legitimate sites, and they are therefore
treated as trusted sites by users or other programs
3. 5. Root kit: represents a set of programs which work to
subvert control of an operating system from legitimate
operators
6. Trojan horse: serves as a back door in a computer
system to allow an intruder to gain access to the
system later
7. Viruses: self-replicating programs that spread by
inserting copies of themselves into other executable
code files or documents
8. Key loggers: tools designed to record every keystroke
on the affected machine for later retrieval.
CLASSIFICATION OF HACKERS ACCORDING
TO THEIR INTENTION.
1. Ethical Hacker (White hat): A hacker who gains access
to systems with a view to fix the identified weaknesses.
They may also perform penetrationTesting and
vulnerability assessments.
2. Cracker (Black hat): A hacker who gains unauthorized
access to computer systems for personal gain. The intent
is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
3. Grey hat: A hacker who is in between ethical and black
hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and
reveal them to the system owner.
4. Script kiddies: A non-skilled person who gains access to
computer systems using already made tools.
5. Hacktivist: A hacker who use hacking to send social,
religious, and political, etc. messages. This is usually done
by hijacking websites and leaving the message on the
hijacked website.
6. Phreaker: A hacker who identifies and exploits
weaknesses in telephones instead of computers.
What is Ethical Hacking?
ETHICAL HACKING is identifying weakness in computer
systems and/or computer networks and coming with
countermeasures that protect the weaknesses. Ethical
hackers must abide by the following rules.
Get written permission from the owner of the
computer system and/or computer network before
hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in
the computer system to the organization.
Inform hardware and software vendors of the identified
weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an
organization. Keeping information secure can protect an
organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that
deal in finance such as PayPal. Ethical hacking puts them a
step ahead of the cyber criminals who would otherwise lead
to loss of business.
Legality of Ethical Hacking
ETHICAL HACKING is legal if the hacker abides by the rules
stipulated in the above section on the definition of ethical
hacking. The International Council of E-Commerce
Consultants (EC-Council) provides a certification program
that tests individual’s skills. Those who pass the examination
are awarded with certificates. The certificates are supposed
to be renewed after some time.