SlideShare a Scribd company logo
MEDIAAND INFORMATION
TECHNOLOGY
MODULE 9 MEDIAAND INFORMATION LITERATE INDIVIDUAL
LEARNING OUTCOME
Able to know the importance of media and information to an individual and the society;
Able to outline pros and cons of the social media.;
Able to differentiate between fact and opinion; and
Able to give a brief summary of the different crimes committed on the internet.
MEDIAAND INFORMATION LITERACY
"Media and Information Literacy consists of the
knowledge, the attitudes, and the sum of the skills
needed to know when and what information is
needed; where and how to obtain that information;
how to evaluate it critically and organize it once it
is found; and how to use it in an ethical way.
IMPORTANCE OF MEDIA LITERACY
Media literacy is essential because it helps people
understand the messages that are being
communicated to them. With so many sources of
information today, media literacy can help people
identify reliable sources and filter through the
noise to get at the truth.
MEDIAAND INFORMATION LITERATE INDIVIDUAL
Media and information literate individuals have the
ability to find, evaluate, and use reliable
information, and communicate it through various
formats and media. Such literacy is important for
learning, making sound decisions and solving
problems.
THE INTERNET
As defined in the Oxford Dictionary, the Internet is “a
global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.”
SOCIAL MEDIA
Social media refers to the means of interactions among
people in which they create, share, and/or exchange
information and ideas in virtual communities and
networks. Sample forms of social medias are Facebook,
Twitter, Instagram, LinkedIn and YouTube.
Observable that social media present enormous risks
for individuals, communities, firms, and even for.
society as a whole. Examples for this “dark side” of
social media include cyberbullying, addictive
use, trolling, fake news, and privacy abuse.
vs
FACT
Opinion
FACT
Opinion
vs
Opinion
vs
FACT
FAKE NEWS
Wikipedia states that "fake news is a type of yellow
journalism or propaganda that consists of deliberate
misinformation or hoaxes spread via traditional print and
broadcast news media or online social media. Fake news is
written and published with the intent to mislead in order to
gain financially or politically, often with sensationalist,
exaggerated, or patently false headlines that grab attention.
CASE # 1 - ENCHONG DEE VS CLAUDINE BAUTISTA-
LIM
Most common among internet crimes are fraud,
sexual abuse and exploitation, bullying, and
identity theft. Before the COVID-19 pandemic,
the country already saw a rise in cybercrime cases,
as the Philippine National Police (PNP) recorded
only 42 cases of online scam in 2013, compared to
550 in June 2019.
The Internet is a useful way to reach a mass audience
without spending a lot of time or money. Crime in
which the perpetrator develops a scheme using one or
more elements of the Internet to deprive a person of
property or any interest, estate, or right by a false
representation of a matter of fact, whether by providing
misleading information or by concealment of
information
PHISHING EMAIL
SCAMS
Phishing scams are based on
communication made via email or on
social networks. In many cases, cyber
criminals will send users messages/emails
by trying to trick them into providing them
valuable and sensitive data ( login
credentials – from bank account, social
network, work account, cloud storage) that
can prove to be valuable for them.
THE NIGERIAN
SCAM
A typical Nigerian scam involves an emotional
email, letter, text message or social
networking message coming from a scammer
(which can be an official government member,
a businessman or a member of a very wealthy
family member – usually a woman) who asks
you to give help in retrieving a large sum of
money from a bank, paying initially small fees
for papers and legal matters. In exchange for
your help, they promise you a very large sum of
money. They will be persistent and ask you to
pay more and more money for additional
services, such as transactions or transfer costs
LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
LOTTERY SCAM
A lottery scam comes as
an email message
informing you that you
won a huge amount of
money and, in order to
claim your prize or
winnings, you need to pay
some small fees.
HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This type
of online scam may come in various forms, such
as the one threatening that they will kidnap a
family member unless a ransom is paid in a time
frame provided by the scammers. To create the
appearance of real danger, the message is filled
with details from the victim’s life, collected from
an online account, a personal blog or from a
social network account.
HITMAN SCAM
Cybercriminals will send you an email
threatening to extort money from you. This
type of online scam may come in various
forms, such as the one threatening that they
will kidnap a family member unless a ransom
is paid in a time frame provided by the
scammers. To create the appearance of real
danger, the message is filled with details from
the victim’s life, collected from an online
account, a personal blog or from a social
network account.
ONLINE DATING
(ROMANCE) SCAMS
A romance scam usually takes
place on social dating
networks, like Facebook, or
by sending a simple email to
the potential target, and
affects thousands of victims
from all over the world.
FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
FAKE ANTIVIRUS
SOFTWARE
Many of these pop-ups were very well created to
look like legitimate messages that you might get
from Windows or any other security product. If
you are lucky, there is nothing more than an
innocent hoax that will bother you by displaying
unwanted pop-ups on your screen while you
browse online. If you are not so lucky, your
system can end up getting infected with malware,
such as a Trojan or a keylogger. This kind of
message could also come from one of the most
dangerous ransomware threats around, such as
CryptoLocker, which is capable of blocking and
encrypting your operating system and requesting
you a sum of money in exchange for the
decryption key.
MAKE MONEY FAST SCAMS
(ECONOMIC SCAMS)
This scamming method is similar to the
romance scam mentioned above, where the
cyber attackers address the emotional side
of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part
of the online criminals’ arsenal. Using
various job types, such as work-at-home
scams, the victim is lured into giving away
personal information and financial data with
the promise of a well-paid job that will
bring lots of money in a very short period of
time.
MAKE MONEY FAST
SCAMS (ECONOMIC
SCAMS)
This scamming method is similar to the romance scam
mentioned above, where the cyber attackers address the
emotional side of victims. The fraudulent posting of non-
existent jobs for a variety of positions is part of the online
criminals’ arsenal. Using various job types, such as work-
at-home scams, the victim is lured into giving away
personal information and financial data with the promise of
a well-paid job that will bring lots of money in a very short
period of time.
PONZI
SCHEMES
A Ponzi scheme is an investment
fraud that pays existing
investors with funds collected
from new investors. Ponzi
schemes are named after Charles
Ponzi. In the 1920s, Ponzi
promised investors a 50% return
within a few months for what he
claimed was an investment in
international mail coupons.
FAKE SHOPPING
WEBSITES
There are thousands of websites out
there that provide false information
and might redirect you to malicious
links, giving hackers access to your
most valuable data. If you spot a
great online offer which is “too
good to be true”, you might be
tempted to say “yes” instantly, but
you need to learn how to spot a
fake shopping site so you don’t get
scammed.
FAKE SHOPPING
WEBSITES
There are thousands of websites out there that provide
false information and might redirect you to malicious
links, giving hackers access to your most valuable data.
If you spot a great online offer which is “too good to be
true”, you might be tempted to say “yes” instantly, but
you need to learn how to spot a fake shopping site so
you don’t get scammed.
JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct
message on LinkedIn) from
someone claiming to be a recruiter
from a well-known company who
saw your CV and saying they are
interested in hiring you.
JOB OFFER
SCAMS
• They use fake and “attractive” job
opportunities to trick people. It starts
with a phone call (or a direct message
on LinkedIn) from someone claiming
to be a recruiter from a well-known
company who saw your CV and
saying they are interested in hiring
you.
SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
SMS SCAMMING
(SMSHING)
Smishing (using SMS text messages) is a
similar technique to phishing, but, instead of
sending emails, malicious hackers send text
messages to their potential victims. How
does this happen? You receive an urgent text
message on your smartphone with a link
attached saying that it’s from your bank and
you need to access it in order to update your
bank information or other online banking
information.
POVERTY PORN
A form of exploitation that has been defined as "any type of media,
be it written, photographed or filmed, which exploits the poor's
condition in order to generate the necessary sympathy for selling
newspapers, increasing charitable donations, or support for a given
cause". It also suggests that the viewer of the exploited protagonists
is motivated by gratification of base instincts. It is also a term of
criticism applied to films that objectify people in poverty for the
sake of entertaining a privileged audience
SEXUAL ABUSE
Sexual abuse is unwanted sexual activity, with
perpetrators using force, making threats or taking
advantage of victims not able to give consent. Most
victims and perpetrators know each other. Immediate
reactions to sexual abuse include shock, fear or
disbelief.
SEXUAL EXPLOITATION
Sexual exploitation is defined as an actual or
attempted abuse of someone's position of
vulnerability (such as a person depending on you for
survival, food rations, school, books, transport or other
services), differential power or trust, to obtain sexual
favours, including but not only, by offering money or
other social, economic or political advantages. It includes
trafficking and prostitution.
CASE # 2 – IVANAALAWI
CASE # 2 – IVANAALAWI
CASE # 2 – IVANAALAWI
CASE # 2 – IVANAALAWI
ONLINE HARASSMENT
Cyber Harassment is the use of Information and
Communications Technology (ICT) to harass, control,
manipulate or habitually disparage a child, adult, business or
group without a direct or implied threat of physical harm. Unlike
physical harassment involving face-to-face contact, cyber
harassment requires the use of ICT and is verbal, sexual,
emotional or social abuse of a person, group or organization. The
cyber harasser’s primary goal is to exert power and control over
the targeted victim(s).
CYBERSTALKING
The use of the Internet, email, or other
electronic communications to stalk; generally
refers to a pattern of threatening or malicious
behaviors, including communicating a credible
threat of harm.
CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
CYBERBULLYING
Cyberbullying is the use of
Information and Communications
Technology between minors to
humiliate, taunt and disparage one
another. Cyberbullying is intended
to tease, embarrass, deprecate &
defame a targeted minor with the
assailant’s developmental needs
for peer acceptance and
recognition being a priori.
Dissimilar to physical bullying,
cyberbullying does not involve
face-to-face contact and primarily
occurs online using electronic
devices as the tools for
information dissemination.
CASE #3 - FREDRICK MARK BICO ALBA
CASE #3 - FREDRICK MARK BICO ALBA
CASE #3 - FREDRICK MARK BICO ALBA
CASE #3 - FREDRICK MARK BICO ALBA
IDENTITY THEFT
From a legal perspective, identity theft means that
someone has stolen your personal information. This
could be personal information like your name, address,
date of birth, Social Security number, credit card
number, etc. They are stealing your personally
identifiable information, and using it (typically) for
financial gain.
IMPERSONATION
is when someone pretends to be someone else. A
person could pretend to be you to do a job, or to
get information. However, impersonation does not
always involve your identity being stolen.
CASE #4 - HUGO WRAY
CASE #4 - Hugo Wray
CASE #4 - HUGO WRAY
TAKE AWAY LESSON
Media and information literate individuals have the ability to interpret
and make informed judgments as users of information and media, as
well as to become skillful creators and producers of information and
media messages in their own right. And aware of the different crimes
that exist within the internet to avoid being targeted by these illegal acts.

More Related Content

Similar to cot-2022.pptx

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdf
M. R.
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
E.S.G. JR. Consulting, Inc.
 
cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
Vishwanath976500
 
123.pptx
123.pptx123.pptx
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
remisisdulawan22
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
ssuser482fec
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ChrisSosaJacob
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
Mike Bike
 

Similar to cot-2022.pptx (19)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdf
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
123.pptx
123.pptx123.pptx
123.pptx
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Facebook
FacebookFacebook
Facebook
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 

Recently uploaded

Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

cot-2022.pptx

  • 1. MEDIAAND INFORMATION TECHNOLOGY MODULE 9 MEDIAAND INFORMATION LITERATE INDIVIDUAL
  • 2. LEARNING OUTCOME Able to know the importance of media and information to an individual and the society; Able to outline pros and cons of the social media.; Able to differentiate between fact and opinion; and Able to give a brief summary of the different crimes committed on the internet.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. MEDIAAND INFORMATION LITERACY "Media and Information Literacy consists of the knowledge, the attitudes, and the sum of the skills needed to know when and what information is needed; where and how to obtain that information; how to evaluate it critically and organize it once it is found; and how to use it in an ethical way.
  • 11. IMPORTANCE OF MEDIA LITERACY Media literacy is essential because it helps people understand the messages that are being communicated to them. With so many sources of information today, media literacy can help people identify reliable sources and filter through the noise to get at the truth.
  • 12. MEDIAAND INFORMATION LITERATE INDIVIDUAL Media and information literate individuals have the ability to find, evaluate, and use reliable information, and communicate it through various formats and media. Such literacy is important for learning, making sound decisions and solving problems.
  • 13. THE INTERNET As defined in the Oxford Dictionary, the Internet is “a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.”
  • 14. SOCIAL MEDIA Social media refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks. Sample forms of social medias are Facebook, Twitter, Instagram, LinkedIn and YouTube.
  • 15.
  • 16. Observable that social media present enormous risks for individuals, communities, firms, and even for. society as a whole. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, fake news, and privacy abuse.
  • 20. FAKE NEWS Wikipedia states that "fake news is a type of yellow journalism or propaganda that consists of deliberate misinformation or hoaxes spread via traditional print and broadcast news media or online social media. Fake news is written and published with the intent to mislead in order to gain financially or politically, often with sensationalist, exaggerated, or patently false headlines that grab attention.
  • 21.
  • 22.
  • 23.
  • 24. CASE # 1 - ENCHONG DEE VS CLAUDINE BAUTISTA- LIM
  • 25.
  • 26.
  • 27. Most common among internet crimes are fraud, sexual abuse and exploitation, bullying, and identity theft. Before the COVID-19 pandemic, the country already saw a rise in cybercrime cases, as the Philippine National Police (PNP) recorded only 42 cases of online scam in 2013, compared to 550 in June 2019.
  • 28.
  • 29. The Internet is a useful way to reach a mass audience without spending a lot of time or money. Crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person of property or any interest, estate, or right by a false representation of a matter of fact, whether by providing misleading information or by concealment of information
  • 30. PHISHING EMAIL SCAMS Phishing scams are based on communication made via email or on social networks. In many cases, cyber criminals will send users messages/emails by trying to trick them into providing them valuable and sensitive data ( login credentials – from bank account, social network, work account, cloud storage) that can prove to be valuable for them.
  • 31. THE NIGERIAN SCAM A typical Nigerian scam involves an emotional email, letter, text message or social networking message coming from a scammer (which can be an official government member, a businessman or a member of a very wealthy family member – usually a woman) who asks you to give help in retrieving a large sum of money from a bank, paying initially small fees for papers and legal matters. In exchange for your help, they promise you a very large sum of money. They will be persistent and ask you to pay more and more money for additional services, such as transactions or transfer costs
  • 32. LOTTERY SCAM A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.
  • 33. LOTTERY SCAM A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.
  • 34. HITMAN SCAM Cybercriminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers. To create the appearance of real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.
  • 35. HITMAN SCAM Cybercriminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers. To create the appearance of real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.
  • 36. ONLINE DATING (ROMANCE) SCAMS A romance scam usually takes place on social dating networks, like Facebook, or by sending a simple email to the potential target, and affects thousands of victims from all over the world.
  • 37. FAKE ANTIVIRUS SOFTWARE Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product. If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.
  • 38. FAKE ANTIVIRUS SOFTWARE Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product. If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.
  • 39. MAKE MONEY FAST SCAMS (ECONOMIC SCAMS) This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non- existent jobs for a variety of positions is part of the online criminals’ arsenal. Using various job types, such as work-at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well-paid job that will bring lots of money in a very short period of time.
  • 40. MAKE MONEY FAST SCAMS (ECONOMIC SCAMS) This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non- existent jobs for a variety of positions is part of the online criminals’ arsenal. Using various job types, such as work- at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well-paid job that will bring lots of money in a very short period of time.
  • 41. PONZI SCHEMES A Ponzi scheme is an investment fraud that pays existing investors with funds collected from new investors. Ponzi schemes are named after Charles Ponzi. In the 1920s, Ponzi promised investors a 50% return within a few months for what he claimed was an investment in international mail coupons.
  • 42. FAKE SHOPPING WEBSITES There are thousands of websites out there that provide false information and might redirect you to malicious links, giving hackers access to your most valuable data. If you spot a great online offer which is “too good to be true”, you might be tempted to say “yes” instantly, but you need to learn how to spot a fake shopping site so you don’t get scammed.
  • 43. FAKE SHOPPING WEBSITES There are thousands of websites out there that provide false information and might redirect you to malicious links, giving hackers access to your most valuable data. If you spot a great online offer which is “too good to be true”, you might be tempted to say “yes” instantly, but you need to learn how to spot a fake shopping site so you don’t get scammed.
  • 44. JOB OFFER SCAMS • They use fake and “attractive” job opportunities to trick people. It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you.
  • 45. JOB OFFER SCAMS • They use fake and “attractive” job opportunities to trick people. It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you.
  • 46. SMS SCAMMING (SMSHING) Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims. How does this happen? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information or other online banking information.
  • 47. SMS SCAMMING (SMSHING) Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims. How does this happen? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information or other online banking information.
  • 48.
  • 49. POVERTY PORN A form of exploitation that has been defined as "any type of media, be it written, photographed or filmed, which exploits the poor's condition in order to generate the necessary sympathy for selling newspapers, increasing charitable donations, or support for a given cause". It also suggests that the viewer of the exploited protagonists is motivated by gratification of base instincts. It is also a term of criticism applied to films that objectify people in poverty for the sake of entertaining a privileged audience
  • 50. SEXUAL ABUSE Sexual abuse is unwanted sexual activity, with perpetrators using force, making threats or taking advantage of victims not able to give consent. Most victims and perpetrators know each other. Immediate reactions to sexual abuse include shock, fear or disbelief.
  • 51. SEXUAL EXPLOITATION Sexual exploitation is defined as an actual or attempted abuse of someone's position of vulnerability (such as a person depending on you for survival, food rations, school, books, transport or other services), differential power or trust, to obtain sexual favours, including but not only, by offering money or other social, economic or political advantages. It includes trafficking and prostitution.
  • 52. CASE # 2 – IVANAALAWI
  • 53. CASE # 2 – IVANAALAWI
  • 54. CASE # 2 – IVANAALAWI
  • 55. CASE # 2 – IVANAALAWI
  • 56.
  • 57. ONLINE HARASSMENT Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).
  • 58. CYBERSTALKING The use of the Internet, email, or other electronic communications to stalk; generally refers to a pattern of threatening or malicious behaviors, including communicating a credible threat of harm.
  • 59. CYBERBULLYING Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
  • 60. CYBERBULLYING Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
  • 61. CASE #3 - FREDRICK MARK BICO ALBA
  • 62. CASE #3 - FREDRICK MARK BICO ALBA
  • 63. CASE #3 - FREDRICK MARK BICO ALBA
  • 64. CASE #3 - FREDRICK MARK BICO ALBA
  • 65.
  • 66. IDENTITY THEFT From a legal perspective, identity theft means that someone has stolen your personal information. This could be personal information like your name, address, date of birth, Social Security number, credit card number, etc. They are stealing your personally identifiable information, and using it (typically) for financial gain.
  • 67. IMPERSONATION is when someone pretends to be someone else. A person could pretend to be you to do a job, or to get information. However, impersonation does not always involve your identity being stolen.
  • 68. CASE #4 - HUGO WRAY
  • 69. CASE #4 - Hugo Wray
  • 70. CASE #4 - HUGO WRAY
  • 71. TAKE AWAY LESSON Media and information literate individuals have the ability to interpret and make informed judgments as users of information and media, as well as to become skillful creators and producers of information and media messages in their own right. And aware of the different crimes that exist within the internet to avoid being targeted by these illegal acts.

Editor's Notes

  1. What is MIL
  2. Importance of learning MIL - Media literacy is the ability to think critically about what you are seeing, reading, and hearing. It helps us to analyse information from a variety of viewpoints. With so many sources of information today, critical thinking skills can help people identify reliable sources and filter through the noise to get at the truth. For example, we may spot fake news faster or understand why certain products are advertised more than others on social media sites like Facebook or Instagram. We might also notice that content shared on those platforms often comes with an agenda – such as promoting an organisation’s political ideology or persuading someone to buy something they don’t need.
  3. What is MI Literate Individual
  4. The internet
  5. The dark side of social media
  6. Facts and Opinion
  7. Facts and Opinion
  8. Facts and Opinion
  9. Case number 1
  10. Facts and opinion