The document discusses media and information literacy, including the importance of being able to evaluate information critically and communicate information through various formats. It outlines several types of internet crimes such as phishing scams, romance scams, and fake antivirus software scams. Common internet crimes include fraud, sexual abuse, bullying, and identity theft. The document also summarizes four cases involving internet crimes in the Philippines.
The best way to protect ourselves from scams is to be aware of the type of scams that exist. Once we are familiar with the techniques scammers use, we can start to prepare ourselves to respond to the threat of scams effectively.
There are countless types of scams, and while it isn’t possible to cover every type of scam used, scams can be easy to spot once we know the signs to look for.
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
Smishing and vishing are phishing attacks that lure victims via SMS messages and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method.
“Cyberthieves can apply manipulation techniques to many forms of communication because the underlying principles remain constant,” explains security awareness leader Stu Sjouwerman, CEO of KnowBe4. “Lure victims with bait and then catch them with hooks.”
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesOluwatobi Olowu
Senior Citizens are hot targets for hackers. A number of factors come into play. First, unlike many younger users online, they may have savings built up over their lifetimes. Physically they are susceptible to giving their personal banking information without knowing the consequences. There is a high probability of Trust and susceptibility while interacting online.
The best way to protect ourselves from scams is to be aware of the type of scams that exist. Once we are familiar with the techniques scammers use, we can start to prepare ourselves to respond to the threat of scams effectively.
There are countless types of scams, and while it isn’t possible to cover every type of scam used, scams can be easy to spot once we know the signs to look for.
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
Smishing and vishing are phishing attacks that lure victims via SMS messages and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method.
“Cyberthieves can apply manipulation techniques to many forms of communication because the underlying principles remain constant,” explains security awareness leader Stu Sjouwerman, CEO of KnowBe4. “Lure victims with bait and then catch them with hooks.”
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesOluwatobi Olowu
Senior Citizens are hot targets for hackers. A number of factors come into play. First, unlike many younger users online, they may have savings built up over their lifetimes. Physically they are susceptible to giving their personal banking information without knowing the consequences. There is a high probability of Trust and susceptibility while interacting online.
"Web of Deception" exposes the dark side of the internet, delving into cyberbullying, online scams, privacy breaches, and the spread of misinformation. This eye-opening book reveals the dangers lurking in the digital realm and offers valuable insights on safeguarding ourselves in the online world.
Social Engineering CSO Survival Guide, designing leading edge 21st Century Business Models go to www.esgjrconsultinginc.com to learn more about Software/Network Engineering Solutions.
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
The presentation on phishing scam offenses by Internet 2.0 Conference offers a comprehensive overview of this prevalent form of cybercrime. It covers the nature of phishing scams, various types including spear phishing, whaling, smishing, and vishing, and highlights legit ways of avoiding such scams.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
"Web of Deception" exposes the dark side of the internet, delving into cyberbullying, online scams, privacy breaches, and the spread of misinformation. This eye-opening book reveals the dangers lurking in the digital realm and offers valuable insights on safeguarding ourselves in the online world.
Social Engineering CSO Survival Guide, designing leading edge 21st Century Business Models go to www.esgjrconsultinginc.com to learn more about Software/Network Engineering Solutions.
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
The presentation on phishing scam offenses by Internet 2.0 Conference offers a comprehensive overview of this prevalent form of cybercrime. It covers the nature of phishing scams, various types including spear phishing, whaling, smishing, and vishing, and highlights legit ways of avoiding such scams.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2. LEARNING OUTCOME
Able to know the importance of media and information to an individual and the society;
Able to outline pros and cons of the social media.;
Able to differentiate between fact and opinion; and
Able to give a brief summary of the different crimes committed on the internet.
3.
4.
5.
6.
7.
8.
9.
10. MEDIAAND INFORMATION LITERACY
"Media and Information Literacy consists of the
knowledge, the attitudes, and the sum of the skills
needed to know when and what information is
needed; where and how to obtain that information;
how to evaluate it critically and organize it once it
is found; and how to use it in an ethical way.
11. IMPORTANCE OF MEDIA LITERACY
Media literacy is essential because it helps people
understand the messages that are being
communicated to them. With so many sources of
information today, media literacy can help people
identify reliable sources and filter through the
noise to get at the truth.
12. MEDIAAND INFORMATION LITERATE INDIVIDUAL
Media and information literate individuals have the
ability to find, evaluate, and use reliable
information, and communicate it through various
formats and media. Such literacy is important for
learning, making sound decisions and solving
problems.
13. THE INTERNET
As defined in the Oxford Dictionary, the Internet is “a
global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.”
14. SOCIAL MEDIA
Social media refers to the means of interactions among
people in which they create, share, and/or exchange
information and ideas in virtual communities and
networks. Sample forms of social medias are Facebook,
Twitter, Instagram, LinkedIn and YouTube.
15.
16. Observable that social media present enormous risks
for individuals, communities, firms, and even for.
society as a whole. Examples for this “dark side” of
social media include cyberbullying, addictive
use, trolling, fake news, and privacy abuse.
20. FAKE NEWS
Wikipedia states that "fake news is a type of yellow
journalism or propaganda that consists of deliberate
misinformation or hoaxes spread via traditional print and
broadcast news media or online social media. Fake news is
written and published with the intent to mislead in order to
gain financially or politically, often with sensationalist,
exaggerated, or patently false headlines that grab attention.
21.
22.
23.
24. CASE # 1 - ENCHONG DEE VS CLAUDINE BAUTISTA-
LIM
25.
26.
27. Most common among internet crimes are fraud,
sexual abuse and exploitation, bullying, and
identity theft. Before the COVID-19 pandemic,
the country already saw a rise in cybercrime cases,
as the Philippine National Police (PNP) recorded
only 42 cases of online scam in 2013, compared to
550 in June 2019.
28.
29. The Internet is a useful way to reach a mass audience
without spending a lot of time or money. Crime in
which the perpetrator develops a scheme using one or
more elements of the Internet to deprive a person of
property or any interest, estate, or right by a false
representation of a matter of fact, whether by providing
misleading information or by concealment of
information
30. PHISHING EMAIL
SCAMS
Phishing scams are based on
communication made via email or on
social networks. In many cases, cyber
criminals will send users messages/emails
by trying to trick them into providing them
valuable and sensitive data ( login
credentials – from bank account, social
network, work account, cloud storage) that
can prove to be valuable for them.
31. THE NIGERIAN
SCAM
A typical Nigerian scam involves an emotional
email, letter, text message or social
networking message coming from a scammer
(which can be an official government member,
a businessman or a member of a very wealthy
family member – usually a woman) who asks
you to give help in retrieving a large sum of
money from a bank, paying initially small fees
for papers and legal matters. In exchange for
your help, they promise you a very large sum of
money. They will be persistent and ask you to
pay more and more money for additional
services, such as transactions or transfer costs
32. LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
33. LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
34. HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This type
of online scam may come in various forms, such
as the one threatening that they will kidnap a
family member unless a ransom is paid in a time
frame provided by the scammers. To create the
appearance of real danger, the message is filled
with details from the victim’s life, collected from
an online account, a personal blog or from a
social network account.
35. HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This
type of online scam may come in various
forms, such as the one threatening that they
will kidnap a family member unless a ransom
is paid in a time frame provided by the
scammers. To create the appearance of real
danger, the message is filled with details from
the victim’s life, collected from an online
account, a personal blog or from a social
network account.
36. ONLINE DATING
(ROMANCE) SCAMS
A romance scam usually takes
place on social dating
networks, like Facebook, or
by sending a simple email to
the potential target, and
affects thousands of victims
from all over the world.
37. FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
38. FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
39. MAKE MONEY FAST SCAMS
(ECONOMIC SCAMS)
This scamming method is similar to the
romance scam mentioned above, where the
cyber attackers address the emotional side
of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part
of the online criminals’ arsenal. Using
various job types, such as work-at-home
scams, the victim is lured into giving away
personal information and financial data with
the promise of a well-paid job that will
bring lots of money in a very short period of
time.
40. MAKE MONEY FAST
SCAMS (ECONOMIC
SCAMS)
This scamming method is similar to the romance scam
mentioned above, where the cyber attackers address the
emotional side of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part of the online
criminals’ arsenal. Using various job types, such as work-
at-home scams, the victim is lured into giving away
personal information and financial data with the promise of
a well-paid job that will bring lots of money in a very short
period of time.
41. PONZI
SCHEMES
A Ponzi scheme is an investment
fraud that pays existing
investors with funds collected
from new investors. Ponzi
schemes are named after Charles
Ponzi. In the 1920s, Ponzi
promised investors a 50% return
within a few months for what he
claimed was an investment in
international mail coupons.
42. FAKE SHOPPING
WEBSITES
There are thousands of websites out
there that provide false information
and might redirect you to malicious
links, giving hackers access to your
most valuable data. If you spot a
great online offer which is “too
good to be true”, you might be
tempted to say “yes” instantly, but
you need to learn how to spot a
fake shopping site so you don’t get
scammed.
43. FAKE SHOPPING
WEBSITES
There are thousands of websites out there that provide
false information and might redirect you to malicious
links, giving hackers access to your most valuable data.
If you spot a great online offer which is “too good to be
true”, you might be tempted to say “yes” instantly, but
you need to learn how to spot a fake shopping site so
you don’t get scammed.
44. JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct
message on LinkedIn) from
someone claiming to be a recruiter
from a well-known company who
saw your CV and saying they are
interested in hiring you.
45. JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct message
on LinkedIn) from someone claiming
to be a recruiter from a well-known
company who saw your CV and
saying they are interested in hiring
you.
46. SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
47. SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
48.
49. POVERTY PORN
A form of exploitation that has been defined as "any type of media,
be it written, photographed or filmed, which exploits the poor's
condition in order to generate the necessary sympathy for selling
newspapers, increasing charitable donations, or support for a given
cause". It also suggests that the viewer of the exploited protagonists
is motivated by gratification of base instincts. It is also a term of
criticism applied to films that objectify people in poverty for the
sake of entertaining a privileged audience
50. SEXUAL ABUSE
Sexual abuse is unwanted sexual activity, with
perpetrators using force, making threats or taking
advantage of victims not able to give consent. Most
victims and perpetrators know each other. Immediate
reactions to sexual abuse include shock, fear or
disbelief.
51. SEXUAL EXPLOITATION
Sexual exploitation is defined as an actual or
attempted abuse of someone's position of
vulnerability (such as a person depending on you for
survival, food rations, school, books, transport or other
services), differential power or trust, to obtain sexual
favours, including but not only, by offering money or
other social, economic or political advantages. It includes
trafficking and prostitution.
57. ONLINE HARASSMENT
Cyber Harassment is the use of Information and
Communications Technology (ICT) to harass, control,
manipulate or habitually disparage a child, adult, business or
group without a direct or implied threat of physical harm. Unlike
physical harassment involving face-to-face contact, cyber
harassment requires the use of ICT and is verbal, sexual,
emotional or social abuse of a person, group or organization. The
cyber harasser’s primary goal is to exert power and control over
the targeted victim(s).
58. CYBERSTALKING
The use of the Internet, email, or other
electronic communications to stalk; generally
refers to a pattern of threatening or malicious
behaviors, including communicating a credible
threat of harm.
59. CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
60. CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
66. IDENTITY THEFT
From a legal perspective, identity theft means that
someone has stolen your personal information. This
could be personal information like your name, address,
date of birth, Social Security number, credit card
number, etc. They are stealing your personally
identifiable information, and using it (typically) for
financial gain.
67. IMPERSONATION
is when someone pretends to be someone else. A
person could pretend to be you to do a job, or to
get information. However, impersonation does not
always involve your identity being stolen.
71. TAKE AWAY LESSON
Media and information literate individuals have the ability to interpret
and make informed judgments as users of information and media, as
well as to become skillful creators and producers of information and
media messages in their own right. And aware of the different crimes
that exist within the internet to avoid being targeted by these illegal acts.
Editor's Notes
What is MIL
Importance of learning MIL - Media literacy is the ability to think critically about what you are seeing, reading, and hearing. It helps us to analyse information from a variety of viewpoints. With so many sources of information today, critical thinking skills can help people identify reliable sources and filter through the noise to get at the truth. For example, we may spot fake news faster or understand why certain products are advertised more than others on social media sites like Facebook or Instagram. We might also notice that content shared on those platforms often comes with an agenda – such as promoting an organisation’s political ideology or persuading someone to buy something they don’t need.