Mil Module 4
Mil Module 4
i
ii
Agenda
1
Exploration
REPUBLIC ACT NO. 10175
Cybercrime Prevention Act of 2012
Is a law in the Philippines approved on September 12, 2012, which aims to address legal issues concerning
online interactions and the Internet.
Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity
theft, illegal access to data and libel.
COPYRIGHT
A legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish
and sell that work. Copyright owners have the right to control the reproduction of their work, including the right to
receive payment for that reproduction. An author may grant or sell those rights to others, including publishers or
recording companies. Violation of a copyright is called infringement.
PLAGIARISM
An act or instance of using or closely imitating the language and thoughts of another author without authorization;
the representation of that author’s work as one’s own, as by not crediting the original.
CYBERBULLYING
Bullying that takes place online, or using electronic technology such as cell phones, computers, and tablets over
communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying:
text messages or emails composed to insult or demean; rumors or false statements spread by email or posted on
social networking sites; and humiliating photos, videos, websites, or fake profiles deliberately shared across so-
cial media.
COMPUTER ADDICTION
The excessive use of computers to the extent that it interferes with daily life. This excessive use may, for exam-
ple, interfere with work or sleep, result in problems with social interaction, or affect mood, relationships, and
thought processes.
2
Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environ-
ment. Consider the following "rules," adapted from Virginia Shea's The Core Rules of Netiquette, whenever you com-
municate in the virtual world.
When communicating electronically, whether through email, instant message, discussion post, text, or some
other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your
written words are read by real people, all deserving of respectful communication. Before you press "send" or
"submit," ask yourself, "Would I be okay with this if someone else had written it?"
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be
lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you be-
have this way in the virtual world.
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same
written communication can be acceptable in one area, where it might be considered inappropriate in another. What
you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another exam-
ple?
Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives,
just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world
communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your
written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments
that may take forever to download.
One of the best things about the virtual world is the lack of judgment associated with your physical appearance,
sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.)
You will, however, be judged by the quality of your writing, so keep the following tips in mind:
3
The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in
fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Inter-
net's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the
results with others. Are you an expert at something? Post resources and references about your subject matter. Re-
cently expanded your knowledge about a subject that might be of interest to others? Share that as well.
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion
without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you
might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the
group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more pro-
ductive direction.
Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an
email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps
someone is sharing some medical news about a loved one or discussing a situation at work. What do you think
would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as
you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of
caution when deciding to discuss or not to discuss virtual communication.
Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have
more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you
who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power
than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the hu-
man.
R
Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of
netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter mis-
spelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you
had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to re-
spond to a mistake, do so in a private email rather than a public forum.
Adapted from The Core Rules of Netiquette Shea, V. (1994). Core rules of netiquette. Netiquette (Online ed., pp.
32-45). San Francisco: Albion Books.
4
Info-Action
Encircle the letter of the correct answer.
1. This refers to the freedom from unauthorized intrusion. What is this?
a. anti-trespassing law c. solitary
b. privacy d. none of the above
6. This is the legal term that applies to anything that is offensive to morals. What is this?
a. obscenity c. addiction
b. disrespect d. none of the above
5
7. This refers to the disparities in access to telephones, personal computers, and the internet
across certain demographic groups. What is this?
a. media differences c. digital divide
b. electronic discord d. none of the above
8. Which of these refers to the aggressive behavior among school aged children that involve a
real or perceived power imbalance?
a. bullying c. derision
b. misdemeanor d. none of the above
9. What is that term that refers to a civil wrong of defamation involving written documents?
a. libel c. slander
b. infringement d. none of the above
6
Info-Add
7
8
9
Info-Action
Answer the following questions briefly.
1. Why is it important to understand the different types of plagiarism?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
10
We seem to favor personal interaction with others. We like talking with our neighbors, we enjoy
having coffee with our friends, and we love to go out for drinks after work. Let's face it, we're a social
bunch. So, being the technology-based society that we are, and with the prevalence of the Internet, it only
makes sense that we would extend that interaction to the electronic world of the web. And in fact, we
have. Many destinations now exist on the worldwide web that provides the interaction we crave. They are
jointly known as social media.
Agenda
11
Exploration
?
Social media is a collection of Internet-based websites that promote the personal and business-focused inter-
action of individuals around the world. The idea is to share various types of information (messages, documents,
videos) collectively known as content, on a variety of topics. Its underlying purpose is to share new ideas, opin-
ions, and thoughts to as many people as possible. There are a number of social media websites out there.
Some of the more prominent ones include:
Facebook - a social media website focused on individuals and businesses from all walks of life; their inter-
ests, activities, and the details that make them who they are.
LinkedIn - a social media website focused on business professionals; their activities, their qualifications, and
the companies that employ them.
YouTube - a social media website focused on video content that covers virtually any topic you can imagine,
from a child's first steps to the latest music video.
Twitter - a social media website that focuses on distributing information in small packages called 'tweets',
with the purpose of giving up-to-the-accounts of things that are happening.
12
We’re all social media darlings in our own right. Social networking sites like Facebook, Twitter, Instagram,
Google +, and many other popular online hubs link us together in a digital society where we can make the most out
of our social liberties. More businesses are also starting to re-allocate budgets towards social media in place of tradi-
tional advertising. While there are numerous benefits to sharing and communicating through social media, it also has
its share of risks. Cybercriminals have taken advantage of the carefree way that people use social media platforms,
usually with bait schemes that puts users at risk with a simple tap or click of a disguised link.
Here are nine widespread cybercriminal schemes that you're most likely to encounter on social networking sites,
what they really do, and tips on how to avoid them.
How to avoid: While Facebook constantly improves its security to address current threats, it's still better to do the
tune-up yourself and know which apps to block. Beef up your security by changing your password regularly and de-
leting unnecessary apps. Do not trust third party notifications and make sure you follow credible sources.
13
2. Who Viewed Your Facebook Profile?
A clever and tempting scheme that would interest a lot of people, this Facebook scam appears as ads or as mes-
sages posted on your wall by your friend (accidental spam) that invites users to check who’s viewing their profiles.
Clicking on them instantly gives spammers access to your Facebook account and network, as well as possible
access to the other people on your friends list.
How to avoid: Always be wary of suspicious links, messages and ads, however tempting they may be. Even if
they're sent by your friends, don’t fall for it unless you get first-hand verification of its legitimacy. After all, if Face-
book really wanted its users to have this functionality, it shouldn’t take a third party app to enable it. All in all, it’s
still best to report this abuse and delete irrelevant links and messages to avoid any kind of malware download.
3. Outrageous and “Shocking!” NSFW (Not Safe For Work) Videos Facebook Scam
Scams that play on our curiosities are popular bait methods used
by scammers and cybercriminals. Explicit videos with outlandish
titles garner a lot of attention and often create a viral frenzy
among unsuspecting netizens. Fake videos that come with
NSFW labels actually point you to random surveys or fake web-
sites that could harvest your personal information and harm not
only your network, but your computer as well.
14
How to avoid: Before clicking on anything, be sure you know where it’s coming from. Or better yet, don’t click on
them at all. As these videos become viral, so does the malware behind it. Even if some posts contain real videos,
there could still be malware embedded, such as rootkits that are more difficult to remove even after you clean out
or reload your computer. To be safe, run a scan with your security software to make sure your computer is clean.
More followers, more likes, and more retweets allegedly lend more credibility to a user’s online image.
Whether you want to promote yourself or simply accumulate thousands of followers, using a service that promises
such can compromise your security. Apps and services that offer instant followers compromise Twitter user ac-
counts by making the user follow other users of the app and send out Twitter spam that advertise the app. Other
spam-related problems could attack the user’s account even from a one-time authorization.
How to avoid: Be cautious about giving unverified apps or services access to your Twitter account--or
any other account, for that matter. Scammers behind malicious activities know exactly what you want based on the
hacked intelligence they gathered from you. Be wary, despite of yourself, of anything that promises quick or on-the
-fly solutions. Additionally, before logging into your account, make sure that you’re logged into the official Twitter
website (https://twitter.com/). Signing into a disguised log-in page is like giving cybercriminals your credentials on
a silver platter.
15
5. "Just Saw This Photo of You" Twitter Bait Scam
Some scams just get so desperate that they’re willing to cramp your personal, intimate space. This Twitter scam is designed by
cybercriminals to compel you to click on malicious links with messages such as “just saw this photo of you”. Whether you have naked pho-
tos or not, it could make you paranoid enough to check it out. This scheme can hijack Twitter accounts and consequently spam followers
and other users or lead them to phishing sites. It is also reported to install spyware.
How to avoid: Don’t be tempted to click on links that speak to you directly. Remember that they are scams that are designed to
invade your privacy and hack into your system and accounts. Increase your security and don’t follow back people you don’t know. Make
your profile private to avoid getting suspicious requests.
16
The fake site will display a message that says your Adobe Flash Player crashed and that you need to
install an update. The fraudulent Flash Player installer then triggers the infection and its malware, usually
a Trojan, installs itself as a browser extension. This malware can then access your Facebook photos and
repeats the malicious activity by inviting your friends to view fake naked videos.
How to avoid: Stay away from so-called scandalous videos. Make sure you use robust security
software that guards you from drive-by downloads and run a regular scan to make certain that your com-
puter isn’t running rogue programs.
Thousands of Instagram users were duped into sharing their account details with the InstLike
scam. In return, they gained plenty of likes and followers. According to reports, this malicious app steals
the user’s password and other information to feed the malware and spread the infection. Despite being
reported and flagged, InstLike is still operational and continues to scam unknowing users.
How to avoid: It’s difficult to avoid getting reeled in by social media scams, so it's important to
be aware of trending cybercrime methods. If you were tricked by this scam, change your password and
delete the app. Use security software to check your system and rid your device of any remnants of the
infection. In a nutshell: don’t download anything that offers quick fixes.
17
8. Tumblr Dating Game
Scammers like to take advantage of the naiveté of uninformed single people. The Tumblr Dating
Game has tricked many such users into clicking on links that appear in messages. Victims are then urged to
make accounts which only led them to adult splash pages and ads. These ads would generate cash for the
scammers, which they get for every sign up.
How to avoid: Cybercriminals go to great lengths to lure people into subscribing to solutions that offer
personal satisfaction. In most cases, they profile their victims so they know how to target you. If you’re not sure
about a website or a mysterious message, don’t click or visit them. It’s also wise to report and block anything
suspicious.
Normally, we wouldn’t think social networking sites like Pinterest would be bombarded by scammers.
But in reality, cybercriminals are as interested in your pins as you are. Apart from using other apps and ser-
vices, these online con artists entice users to click on bogus pins that direct them to fake surveys or other
phishing websites. The pin could be anything from freebie ads to promotional schemes that appear to be from
legitimate companies. Once you fall prey to this scam, your security will be instantly compromised and the ma-
licious code will start spamming your followers.
How to avoid: Think twice before you open notifications from your email or from your Pinterest ac-
count. Always check sources and be careful when viewing pins and boards. Report incidents at once and block
suspicious users. Change your password if you think you’ve been compromised and bookmark the real Pinter-
est website (https://www.pinterest.com/) to avoid visiting counterfeit ones.
18
Scammers are clever and they know just who to target with fake offers that are hard to distinguish
from legitimate ones. This is how they play on our unsuspecting nature and attack us with one scam after
another, stealing our accounts and feeding the spam ecosystem. The best way to avoid scams is to be edu-
cated on such online abuses and secure your devices with a security solution that's designed to protect you
against social media scams. Learn about ongoing Twitter abuses and the various techniques scammers use
to send spam and malicious tweets in the paper “An In-Depth Analysis of Abuse on Twitter”. This research
paper provides insight into the impact of social media phishing and spamming, as well as the best practices
you can employ to protect your online privacy.
19
Info-Challenge
As a student, what do you consider your biggest challenge, and on the other
hand, the biggest opportunity offered to you by the new media? Write your answer on
the box.
20
References
Aboga, Fernando Jr., and Agapay, Rey Christpher N. (2017). Media and
Information Literacy Transforming Society through Student Empowerment.
Quezon City: TechFactors Inc.
Gonzales, Edward G. (2016). Media and Information Literacy. Pasay City:
Arts and Skills through Filipino Literature. Quezon City: Phoenix Publishing
House, Inc.
https://bamil786447613.wordpress.com/2018/10/01/legal-ethical-and-societal-
issues-in-media-and-information-literacy/
https://coursedesign.colostate.edu/obj/corerulesnet.html
https://www.slideshare.net/arnielping/understanding-propaganda-in-the-digital-
world-67804796
https://www.trendmicro.com/vinfo/ph/security/news/cybercrime-and-digital-
threats/9-social-media-threats-you-need-to-be-aware-of
https://www.slideshare.net/arnielping/8-media-and-information-literacy-mil-
opportunities-challenges-and-power-of-media-and-information
21