Media and Information Literacy Guide Questions:
Module 9 1. Discuss how cybercrime becomes a national concern.
- Cybercrime has become a national concern as the use of electronic devices and
media platforms, particularly social media, has become prevalent, with half of the
population using them to commit crimes. As a result of the misuse of those devices
Rojielynne T. Yusay 12-AQUINAS and platforms, cybercrime is rapidly increasing, including identity theft, which
involves stealing someone's identity by using his name and personal information to
obtain goods, money, and services from others. Identity thieves might use your
personal information to obtain money and services from people you know if you are
not careful with the information you post online. They could take without you
What I Know realizing it because they aren't your friends. Cyberterrorism is when a group of
hackers vandalizes a website because the information or individuals on the website
I. contradict their beliefs or they simply despise it. They could alter the website's
1. True content to vandalize it. This is seen as a cyber-attack and, on occasion, a crime
2. False against other countries. Phishing is comparable to identity theft in that a user is
3. False presented with a website that appears to be legitimate and from a trusted source in
4. True order to obtain his personal information. Credit card numbers and other essential
5. False information are examples of this type of data. These particulars can be exploited to
II. defraud someone of money, products, and services. phishing can also be
6. D distributed via email, in addition to websites.
7. F
2. What makes computer addiction a problem?
8. E
9. A - Computer addiction has become a problem since it is extremely detrimental to our
10. B health and has effects that influence our academic performance, social
interactions, and physical health. Poor eye sight, obesity and weight loss, and
What’s New accelerated aging are all effects of computers on our physical health. All of these
things have to do with your physical appearance and wellbeing. Computer
Activity 1 addiction has a negative impact on our academic achievement. Studying is very
important in a person's life, and if we don't study well, we may have difficulty
1. Cybercrime completing duties at school, receive poor results, and, of course, have to repeat a
subject. Last but not least, being an addict has a negative impact on social
- Cybercrime is any crime committed employing or involving the use of electronic interactions. Being alone and not speaking with others can lead to alienation from
devices or media platforms. family, friends, and God, as well as fear of conversing with others and discomfort in
public places.
2. Computer addiction
3. Explain how somebody can be a victim of cyber bullying?
- Compute addiction is a sort of behavior enslavement that can be defined as the
- Cyberbullying is defined as the use of social media, instant messaging, texts,
unneeded or impulsive use of computer.
websites, and other online platforms to send abusive or hurtful texts, emails, posts,
images, or videos; intentionally exclude others online; spread nasty gossip or
3. Cyber bullying rumors; or impersonate someone online or use their log-in. Anyone can be a victim
of cyberbullying, and the perpetrator may act anonymously or openly if they believe
they will not be punished. Bullying can also occur online among groups of people,
- Cyberbullying is a form of torture or provocation by the use of electronic devices or such as students or members of an online community.
media platforms.
What I Have Learned
What’s More 1.
Cybercrime is defined as a crime committed using a computer and a network. It's possible
Activity: that the computer was used to commit a crime or that it was the intended target.
2. We can protect ourselves against cybercrime by following safe cyber hygiene practices such as using
- Phishing two-factor authentication. Using a trustworthy password manager. Checking your apps' and social
- Cyberbullying accounts' security and privacy settings. Ascertain that the information being provided is acceptable to
- Harassment you. Be cautious with what you put on the internet. Answering your security questions might be as
- Ransomware simple as a picture of your pet with the name of your pet as the description. Understand how to spot
- Prostitution complex phishing emails. Be cautious with public WiFi and avoid using it to access important
information. Make sure your antivirus, firewall, and VPN are all up to date. Keep up with the latest
- Child pornography and Solicitation
strategies, schemes, and tricks by staying informed.
- Intellectual property theft
- Account hacking
- Drug trafficking What I Can Do
3.
The more we do online, the greater the increase in cybercrimes increases not only in scale but in
frequency. Cybercrime includes online fraud, identity theft, cyber stalking, cyberbullying, email scams,
phishing & more. Here are a few helpful tips to help combat cybercrime:
Cybercriminals look for weak passwords, weak privacy settings & outdated security software
Phishing emails are often the way thieves access your online accounts. If an email looks suspicious, it’s
best to delete it
Avoid free Wi-Fi networks. Sensitive info can be compromised on public W-Fi
Always keep your mobile devices & apps updated to protect yourself
Unencrypted Wi-Fi networks are open to anyone—including cyber criminals—so keep sensitive data
safe by never transmitting credit card numbers or other personal information on an unencrypted
network
Is your connected refrigerator putting your home network on risk? Any devices connected to the
Internet – like smart thermostats, coffee pots, health trackers, and refrigerators – need to be updated to
protect the network to which they are connected.
Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected
devices. Secure your Wi-Fi network, and your digital devices, by changing the factory set default
password.
Keep your operating system, browser, and other critical software optimized by installing updates.
Cybercriminals look for weak passwords, weak privacy settings, and outdated security software. Protect
yourself from cybercrime by using strong passwords and enabling multi-factor authentication. It requires Assessment
an additional step after passwords, often a PIN texted to your cell.
Is your connected refrigerator putting your home network on risk? Any devices connected to the Activity 1: Solve Me!
Internet – like smart thermostats, coffee pots, health trackers, and refrigerators – need to be updated to
protect the network to which they are connected. Problem
4.
Digital Divide Since user data is used in decision-making, the data collected may not be suitable enough for
proper decision making hence leading to poor decisions that may lead to huge
Effect consequences. To avoid this, the public needs to be educated on the benefits and value of
utilizing the internet and the various resources within it to achieve economic and social
growth. Furthermore, the public should be encouraged to share opinions and any other
Technological discrimination is a form of poverty and social exclusion, depriving some relevant user data online to aid the government and other organizations make informed
citizens of essential resources for development and wealth generation. We have seen this a decisions that serve the people’s needs better.
lot during the COVID-19 pandemic, as many students and workers found it difficult to work
from home and follow classes online. The main effects of the digital divide below: Improve the relevance of online content
Lack of communication and isolation According to research, the top barrier to internet penetration in developing countries is
relevance. This is because, in most cases, people cannot find content, online services or web
and mobile applications in their primary language. Moreover, most people in rural areas lack
People in remote areas who do not have access to the Internet are disconnected. Something
the necessary prerequisite education to understand a lot of online content.
similar happens to urban residents who are disconnected which causes social isolation.
To encourage internet adoption in such places, local content and applications need to be
Barrier to studies and knowledge developed in local languages that can be understood by the local populace. Besides to this,
privacy, trust, and data security issues that tend to scare away many potential users need to
The coronavirus crisis has shown the effects of the digital divide in education: teachers and be addressed by formulating policy frameworks that ensure online websites protect their
students out of the loop because they lack sufficient technology and digital skills. It also users’ data and online activity.
increases lack of knowledge by limiting access to knowledge.
Internet infrastructure development
Accentuates social differences The internet relies on infrastructure to relay information between two or more computers
located in different parts of the world. Lack of proper internet infrastructure, which is the case
Digital illiteracy reduces the chances of finding a job and accessing quality employment, in many 3rd world countries, means either poor internet connection or no internet connection
which has a negative impact on the workers' economy. at all in those parts of the world.
Gender discrimination
With the inception of the broadband internet which is much faster and reliable than the
As we saw at the beginning, the digital divide negatively affects women more than men, traditional dial-up connection, this challenge has become even more pronounced especially
which violates the principles of gender equality. in rural areas. This is because of the costly nature of the systems and technologies that relay
broadband internet making it uneconomical to establish in rural areas. Luckily, large-scale
cost-effective solutions that are suited for rural environments have been developed such as
Solution:
the use of satellite broadband technologies, drones, and earth-orbiting balloons.
Increase affordability Address gender gap in internet access
One of the chief internet adoption barriers in both developed and developing countries in the Statistics on internet usage carried out in 2016 showed that there are 250 million fewer
world is affordability. A large group of people cannot access the internet because of the high women online than men. The majority of these women live in Africa and the Arab states. This
costs involved. The cost of smartphones and laptop computers are expensive, despite means that in order to overcome the digital divide, a special focus has to be placed on
technology being a basic need. Taxes, patent fees and electricity are contributors to the high women to bring their usage closer to or at par with that of men.
prices of technology. To help this, we can offer financing to help lower income earners afford
new technology. Governments can give tariff subsidies to encourage them to buy these The fact that in low and middle-income countries there are more women without mobile
digital tools. phones than men further exacerbate the problem. The effort to close this gender gap lies
squarely on both government and non-governmental organizations which must partner up
Empowering users and work together. Addressing the issues of poverty, relevance and public awareness will
also considerably address the plight of women without access to the internet.
To see the full potential of the internet and its impact on the world, we must take advantage
of its capabilities. Most of the people who use the internet have a limited understanding of
some of its use cases. For instance, Google helps people find information that they would not
have access to. An issue that broadens the digital divide is ‘participation inequality’ where sProblem
users lack the skills to use it.
BULLYING
Effect Only use the computer for necessary tasks. You may need a computer for work or for
school. If this is the case, use the computer as much as you need to for those particular
Bullying can have an impact on a person's entire life, including how they view themselves, applications. Otherwise, put it away.
their friends, their school, and their future. Bullied students frequently endure sadness, long- - You can uninstall programs that aren’t necessary to your work, such as games or
term low self-esteem, shyness, loneliness, physical issues, and threats or attempts at self- software for entertainment.
harm. Because they have been bullied, some students miss school, see their grades slip, or - You can ask friends or family to set a password or “parental controls” to block you
even drop out. Bullying that is verbal, social, or relational can be as harmful as physical from accessing websites or programs that aren’t related to your work.
bullying.
Try a new hobby. Take up a creative pursuit such as music or art. If you're unsure where to
Solution begin you could sign up for a class. You can also ask friends to do the activity with you if you
don't want to do it alone.
As a victim of bullying, you can take measures to protect yourself from being bullied. First of - If you like doing design work on the computer, you might enjoy an art class.
all, you need to understand your strengths and concentrate on them rather than weaknesses - If you use the computer to read and learn about the world, try going to a
that a bully highlight. With this knowledge, you will be able to implement the other anti- museum or a lecture.
- If you do a lot of online shopping, head downtown or to the local mall.
bullying tactic of walking away from the bully. This way, you will deny the bully an opportunity
to have control over your emotions as would be the case if you get angry. You could even
Spend time with friends. Choose friends who have a healthy relationship with their
make this more interesting by adding humour to the situation or just smiling at it. In the even computer. Make plans to spend time together out of the house, doing things that don’t involve
whereby you cannot walk away, keep yourself safe as you get bullied. In addition, you should or require computers.
know that it is never right to get bullied. Therefore, report it whenever it happens. These steps - If you want to play games together, play board games or games outdoors.
and many others need to be done repeatedly. This way, the bully will leave you alone at - If you want to watch a film, go to your local movie theater.
some point. - You can also prepare meals together or go to a restaurant, take a walk, or even
listen to music on a CD or record player.
Problem
Recognize symptoms of computer addiction. It’s not always easy to know if you’re indeed
Computer Adduction addicted to the computer. You may simply want to use the computer less than you do.
However, the degree of your addiction will likely affect how difficult it is to quit or cutback on
Effect your computer usage. Symptoms of computer addiction include:
- Preoccupation with the Internet, including social media presence and future
The effects of internet addiction are extremely harmful to our lives, affecting our physical online activity
health, academic performance, and social interactions. Poor eye sight, obesity and weight - Becoming moody, restless, or depressed when unable to use the computer
loss, and accelerated aging are all effects of computers on our physical health. All of these - Computer usage negatively affecting significant relationships, family life, or
things have to do with your physical appearance and wellbeing. The impact of computer work life
addiction on our academic achievement is significant. Studying is very important in a person's - Using the computer to escape from real-life problems or difficult emotional
life, and if we don't study well, we may have difficulty completing duties at school, receive states
poor results, and, of course, have to repeat a subject. It's all about social contacts when - Spending significantly more time on the computer than intended
you're an addict. Being alone and not interacting with others can lead to alienation from - Concealing the extent of your computer usage from family and friends
family, friends, and God, as well as fear of engaging with others and discomfort in public - Needing to be on the computer to feel satisfied
places.
Solution Additional Activities
Limit your time on the computer. This may seem difficult at first, but it’s the first step to
recovering from computer addiction. Remember that you don’t need to stop using the
computer altogether, just set reasonable limits for now. Hello and welcome to the internet,
- You can set a limit by setting a timer. When it goes off, close and turn off your
computer. Walk away and go do something else. Where everyone is brave enough
- You can ask family, friends, or roommates to help you enforce the limit. They
might take the computer away from you for designated periods of time or make To say what a face wouldn't,
sure you’re staying away from it during designated hours.
- Try making more activities for yourself. The busier you are, the less time you have Because looking into tears,
to go on the computer.
- Ask friends or family how much time they think is reasonable for you to spend on Makes it much harder to hate,
the computer each day. Try to limit your computer time to two hours or less.
But a glaring screen and autocorrect,
Gives you cowardice coated in bravery.
Just a thought, everyone goes on about how it’s easier to tell someone they're loved if you
can't actually see them but we tend to forget that the anonymity of the internet that makes
people 'brave' enough to say the horrible things, even though the result is always the same.
Misery.
References
http://www.digitaldividecouncil.com/top-five-digital-divide-solutions/
https://bullyingfree.nz/about-bullying/the-effects-of-bullying/
https://nursinganswers.net/essays/negative-effects-computer-addiction-6170.php
https://www.joeducation.eu/what-is-the-digital-divide-and-how-to-reduce-it/