Chapter 8 Information Age Part 4 of 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

collective term for

websites and
applications which focus
on communication and
sharing of information,
ideas, personal
messages, etc.
Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1167618">Gerd
Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1167618">Pixabay</a>
first introduced in 1997 with the launching of
Six Degrees, a smaller version of AOL Instant Messenger
Facebook, allowed users to create and allowed users to talk in
a profile and connect with friends real time

Since then a host of different platforms have become available


for news sources, chat rooms, spurring creativity,
sharing personal information, dating, etc.
In 2012, Facebook became the
1st social media platform to
surpass 1 billion users.
As of April 2020, it is the most
popular social media platform
worldwide with 2.5 billion
monthly active users.
online platform for building social
networks or social relationships with
Social
other people who share similar personal
Networking
Site or career interests, activities,
backgrounds or real-life connections
online platform for publishing or
Image transferring digital photos online;
Sharing & includes uploading, hosting,
Messaging Site managing and sharing of photos
(publicly or privately)

SNAPCHAT
online platform for uploading, sharing
Video
Sharing
videos or live streaming their own
Site videos to the internet; can be for the
general public to watch, or particular
users on a shared network
an online publishing platform
that blend features of both
Social
Blogging traditional blogging and
Site social networking

WordPress.org
online discussion forum that
Social provides platform for different
Community
online communities where users can
& Discussion
Site anonymously share content and
discuss various subjects
Group work
Brainstorm on the 5 members
advantages and
disadvantages of
social media use
to students.
Prepare a list.
Crime that use Crime that
computer to target computer
advance other networks or
illegal activities devices

v cyberstalking
v identity theft v viruses attack
v spamming v Malware attack
v hacking v denial-of-service
v phishing (DoS) attacks
Social Engineering
ü manipulation of people into divulging
confidential or sensitive information
ü most done over email but regularly
carried out over the phone
unsolicited bulk messages sent to multiple
recipients who did not ask for them
Distribute advertisement: Distribute malware
Commercial spam or virus
religious spam
political spam
What spam does
Phishing Hacking
Physhing is masquerading as a trustworthy source in an
spamming
attempt to bait a user to surrender sensitive information
such as a username, password, credit card number, etc.
phishing
Vishing/smishing Hacking is using exploits to
is phishing done via gain access to something you do
hacking
voice calls or text not normally have access to
messaging to trick
users in giving personal A phish, which is ultimately a hack, occurs when a user is
information. baited with an email, phone call, or, perhaps, a text message
and tricked into “voluntarily” responding with information.
Cybercrime
President
Benigno Aquino Republic Act
Prevention
signed into law No. 10175 Act of the
in 2012 Philippines

RA 10175 intends to penalize acts like cybersex, child pornography,


identity theft and unsolicited electronic communication in the country
also known as information privacy

Data privacy is the the necessity to


preserve and protect any personal
information, collected by any organization,
from being accessed by a third party.

Any personal data that could be sensitive or can be used maliciously


by someone is included when considering data privacy .
President Benigno
Data Republic Act Aquino signed into
No. 10173
Privacy Act law in 2012

of 2012 RA 10173 intends to protect the personal


information of its citizens from being
disclosed without its consent.
The National Privacy Commission (NPC) is an independent body created under the RA
which is mandated to administer & implement its provisions and monitor/ensure
compliance of the country with international standards set for data protection
All personal information must be
The National Privacy
v collected for reasons that are Commission has defined
specified, legitimate, and reasonable data privacy as the right of
v kept accurate and relevant, used only an individual not to disclose
for the stated purposes his information and to live
v discarded in a way that does not free from surveillance.
make it visible and accessible to
unauthorized third parties
From mid-March to late May Some of the data breaches were allegedly
2020, the National Privacy committed by health workers. In one instance, a
Commission (NPC) had been hospital staff took a photo of the death certificate
investigating 22 complaints of of a suspected COVID-19 patient and posted it in
privacy breaches involving their department group chat. One of the
COVID-19 patients. members sent that photo to her own family group
chat, from which her father forwarded it to
another group chat. The photo of the death
certificate ended up in several group chats.
Let’s have a debate!
Mandatory disclosure
of COVID-19 patients’
identities
junk news
pseudo-news
Stories written with the intent to
mislead in order to damage an entity
or person or gain financially or
politically, often using sensationalist,
dishonest or fabricated headlines to
increase readership
https://www.wearefalls.com/insights/posts/what-are-the-effects-of-fake-news
MAL-information
MIS-information
Sharing of ‘genuine’
False information
information with
disseminated DIS-information the intent to cause
without harmful
Created and harm
intent
shared by people
with harmful
intent
(1) The illusory effect: the fact that if a lie is repeated enough times, you’ll
begin to believe it’s true. This may lead to unexpected consequences.

(2) The impact on the public relations profession.


It would be unfair to those journalists who hold to a higher standard of
reporting while others can publish completely false information.

(3) The impact on consumers’ views of news media.


With so much false information, consumers will become skeptical
which will erode the trust they should have in the mass media.
CRAP test (Kunkel, 2018) Examine the following questions:

C urrency
When was the article written?
What about the sources they are using?

R elevancy/Reliability
Are they using appropriate sources & data?
Are there quotations with references?
Who wrote it?
A uthority Are they credible?
Are they a real person?
P urpose/Point of view
Why is it being written?
Is it fact or opinion?
President Duterte on
I N F O D E M I C

One suspect, a public school teacher wrote on March 24 signed a bill


Facebook on March 27 that food supplies in granting him emergency
General Santos City were running low. He powers to combat the
allegedly urged the public to seize food that Covid-19 crisis, which
included a section that
was being stored in a gym.
imposed jail time and a
fine of up 1 million pesos
Another suspect posted a list of people he said for spreading false
had contracted COVID-19 on Facebook to help information about the
in contact tracing. disease on social media or
other platforms.
Digital divide is a term that refers to Technophobia which merely means “a
the gap between demographics and fear of technology,” including the use of
regions that have access to modern computers and similar electronic devices,
information and communications is one of the most common anxieties
technology, and those that don't or produced by the information age.
have restricted access. If a person shows dread or panic and
uncontrolled reaction in response to the use
Information overload (cognitive
of technology, he may be a technophobic.
overload) is a situation in which
Technology strategists have compared information
too much information is given at
overload to physical obesity, as “infobesity”. Just as our
one time which can cause the eyes are sometimes larger than our stomachs, our interest
inability to think clearly. can be significantly greater than our brain capacity.
Class Work
Newscasting or documentary video on:
Ø cyber crime incidents Divide the
Ø data privacy breaches class into
Ø accidents due to distracted driving groups
Ø spotting and hampering fake news
Ø addressing any of the other issues in
information age
Answer the following questions:
1. What role has the internet played in establishing the information age?
2. How does social media affect your life as a teenager? Include both the
good and the bad effects.
3. What is the importance of data privacy? Identify possible scenarios.
4. How can you avoid falling into a victim of cybercrime such as identity
theft, spamming and phishing? Enumerate some practical ways.
5. What are the fines and penalties under the following laws?
(a) Data Privacy Act of 2012
(b) Anti-Distracted Driving Act of 2016
(c) Cybercrime Prevention Act of the Philippines
Multiple Choice. Choose the letter of the correct answer.

3. In the 2019 survey,


1. Information age is 2. He is considered as the what country topped
also known as father of information age the worldwide social
A. computer age A. Johannes Gutenberg media users?
B. digital age B. Steve Jobs A. China
C. new media age C. Tim Berners-Lee B. Korea
D. All of these are D. James Messenger C. Philippines
correct
D. United States
4. Which of the following is the 5. This is the first widely accepted
most popular social media or laptop or portable computer that
social networking site according included a monitor, disk drive and
to the survey in 2020? other components.
A. Facebook A. Altair 8800
B. Google B. ENIAC
C. Messenger C. Olivetti Programma 101
D. Youtube D. Osborne-1
6.All of the following 7. Identify the correct statements
statements are correct except I. The radio is also known as the wireless
A. The first information telegraph.
revolution was print-based. II. The printing press is recognized as an
B. The second information invention that forever changed the world.
revolution began in the III. The telephone first appeared during
development of the internet. the first information revolution.
C. The third information IV. The first commercial mobile phone
revolution started when social was built by Nokia.
media was introduced. A. I and IV C. II and IV
D. All of these are correct. B. I and II D. I, II, III
8. Which of the following statements is true? 9. The manipulation of
A. Cell phones emit low levels of ionizing people into divulging
radiation while in use. confidential or sensitive
B. The brain has the capacity to process two information via the phone
tasks simultaneously and effectively. or email is termed as
C. The use of headphones for more than A. hacking
5min/day at high volume puts people at an B. social engineering
increased risk for permanent hearing loss. C. spamming
D. All of these are correct. D. None of these.
10. Which of the following statements are true?
I. The Data Privacy Act is a law that seeks to protect all
forms of information, be it private, personal, or sensitive.
II. The Cybercrime Prevention Act is a law that seeks to
address legal issues concerning internet usage and online
interactions in the Philippines.
III. The Anti-Distracted Driving Act aims to prohibit the use
of mobile phones, texting, talking or surfing while in
control of an automobile.
A. I and II only C. II and III only
B. I and III only D. I, II, III

You might also like