GROUP 6- DIGITAL LITERACY Flashcards
ability to locate, evaluate, create and
communicate information various digital
platforms. Put more broadly, it is the
technical, cognitive, and sociological skills
needed to perform tasks and solve problems
in digital environments.
cyber/digital literacy
individuals’ responsibilities when using
the internet. These responsibilities include
following the law, respecting others’ rights, and being aware of the risks associated with using the internet.
cyber citizenship
one who knows what is right and wrong, exhibits intelligent technology behavior, and
makes good choices when using technology.
good cybercitizen
what are the roles of a good cybercitizen
- use respectful and kind language
- treat others the way you want to be treated
- do not share private info
- do not plagiarize
- follow security measures
what are the characteristics of a good cybercitizen
- confident and capable of using information communication technologies
- using technology to participate in educational, cultural, and economic activities
- developing and using critical thinking in cyberspace
- using technology to relate to others in positive and meaningful ways
- respecting concept of privacy and freedom of speech
- contributing to and actively promoting the values of digital citizenship
has become a fundamental topic in our digital world and includes knowing about one’s internet privacy and how one’s behaviors can support a healthy interaction with the use of the internet
internet or e-safety
tips for ensuring e-safety
- be careful what you put in the web
- keep track of who you interact with on the internet
- know that privacy is just an illusion
- do not open any links in emails or chat rooms that look suspicious or unfamiliar
is when someone repeatedly and intentionally harasses, mistreats, or makes fun of another
person online or while using cellphones or other electronic devices
cyberbullying
what are types of cyberbullying (9)
- harassment
- doxing
- cyberstalking
- revenge porn
- swatting
- corporate attacks
- account hacking
- false profiles
- slut shaming
When someone is being harassed
online, they are being subjected to a
string of abusive messages or efforts to
contact them by one person or a group
of people
harassment
when an individual distribute another person’s personal information such as their home address, phone number or place of
work onto social media or public forums
without that person’s permission to do so.
doxing
Involves the perpetrator making persistent
efforts to gain contact with the victim.
People will cyberstalk another person due to
deep feelings towards that person, whether
they are positive or negative.
cyberstalking
Is when sexually explicit or compromising
images of a person have been distributed
onto social media or shared on revenge
porn specific websites without their
permission to do so
revenge porn
when someone calls emergency
responders with claims of dangerous events
taking place at an address. People swat
others with the intention of causing panic
and fear when armed response units arrive at
their home or place of work
swatting
In the corporate world, attacks can be
used to send masses of information to a
website in order to take the website down
and make it non-functional
corporate attacks
Cyberbullies can hack into a victim’s
social media accounts and post abusive or
damaging messages. This can be
particularly damaging for brands and
public figures
account hacking
Fake social media accounts can
be setup with the intention of
damaging a person or brand’s
reputation
false profiles
when girls are called out and labelled as “slut” for the way they look, the way they dress, and their presumed level of sexual activity.
slut shaming
why do people cyberbully
- they’ve been bullied themselves
- to fit in
- home life
- power
- jealousy
- cyberbullying and video games
what to do when you are being cyberbullied
- tell someone
- walk away
- resist the urge to retaliate or respond
- report bullying
- block the bully
- be safe online
- was introduced after the latest evolution in the computer industry and networks
- the illegal usage of any communication device to commit or facilitate in committing any illegal act
cybercrime
what are the most common cybercrimes (11)
- phishing
- identity theft
- ransomware
- hacking
- internet fraud
- software piracy
- social media fraud
- online drug trafficking
- intellectual property infringements
- online recruitment fraud
- child pornography
when criminals send fraudulent emails
pretending to be from legitimate businesses, in an attempt to collect sensitive, personal
information.
phishing