You are on page 1of 6

MALASIQUI AGNO VALLEY COLLEGE

Bonifacio St. Brgy. Poblacion, Malasiqui,Pangasinan


SY 2020- 2021

EMPWERMENT TECHNOLOGY

THE SOCIAL MEDIA


SOCIAL MEDIA

IS A TERM USED TO DESCRIBE A VARIETY OF WEB- BASED PLATFORMS, APPLICATIONS AND


TECHNOLOGIES THAT ENEBLE PEOPLE TO SOCIALLY INTERACT WITH ONE ANOTHER, CREATE,
SHARE OR EXCHANGE INFORMATION, IDEAS AND PICTURES/ VIDEOS IN VIRTUAL
COMMUNITIES AND NETWORKS ONLINE.

7 FUNCTIONAL BUILDING BLOCKS OF SOCIAL MEDIA

1. IDENTITY: THIS BLOCK DENOTES THE EXTENT TO WHICH USERS


REVEAL THEIR IDENTITIES IN A SOCIAL MEDIA SETTING.
2. CONVERSATIONS: THIS BLOCK DESCRIBES HOW USERS
COMMUNICATE WITH OTHER USERS IN A SOCIAL MEDIA SETTING.
3. SHARING: IT IS THE BLOCK THAT DEFINES THE WAY USERS
EXCHANGE, DISTRIBUTE AND RECEIVE CONTENT.
4. PRESENCE: THIS BLOCK REPRESENTS THE RANGE TO WHICH USERS
CAN KNOW IF OTHER USERS ARE ACCESSIBLE.
5. RELATIONSHIPS: THE BLOCK THAT SHOWS THE USERS CAN BE
RELATED TO OTHER USERS.
6. REPUTATION: IT CHARACTERIZES THE SCOPE TO WHICH USERS CAN
IDENTIFY THE STANDING OF OTHERS.
7. GROUPS: IT IS THE BLOCK THAT SHOWS THE RANGE ON HOW USERS
CAN FORM COMMUNITIES AND SUB- COMMUNITIES.

EXAMPLES OF PROMINENT SOCIAL MEDIA

1. FACEBOOK: IS A POPULAR FREE SOCIAL NETWORKING WEBSITE


THAT ALLOWS REGISTERED USERS TO CREATE PROFILES, SHARE
IDEAS, UPLOAD PHOTOS AND VIDEOS, SEND MESSAGES AND KEEP IN
TOUCH WITH FRIENDS, FAMILY AND COLLEAGUES.

2. TWITTER: IS A FREE MICROBLOGGING SERVICE THAT ALLOWS


REGISTERED MEMBERS TO BROADCAST SHORT POSTS CALLED
TWEETS.

3. GOOGLE+ : IS GOOGLE SOCIAL NETWORKINGPROJECT, DESIGNED TO


REPLICATE THE WAY PEOPLE INTERACT OFFLINE MORE CLOSELY
THAN IS THE CASE IN OTHER SOCIAL NETWORKING SERVICES.

4. LinkedIn: IS A SOCIAL NETWORKING SITE DESIGNED SPECIFICALLY


FOR THE BUSINESS COMMUNITY.

5. REDDIT: IS A SOCIAL NEWS WEBSITE AND FORUM WHERE STORIES


ARE SOCIALLY CURATED AND PROMOTED BY SITE MEMBERS.
6. PINTEREST: IS A SOCIAL CURATION WEBSITE FOR SHARING AND
CATEGORIZING IMAGES FOUND ONLINE.

MOBILE SOCIAL MEDIA

REFERS TO THE COMBINATION OF MOBILE DEVICES AND SOCIAL MEDIA.

4 TYPES OF MOBILE SOCIAL MEDIA

1. SPACE- TIMERS(LOCATION AND TIME SENSITIVE): EXCHANGE OF


MESSAGES WITH RELEVANCE FOR ONE SPECIFIC LOCATION AT ONE
SPECIFIC POINT IN TIME. EX. FACEBOOK PLACES, FOURSQUARE

2. SPACE- LOCATORS( ONLY LOCATION SENSITIVE): EXCHANGE MESSAGES,


WITH RELEVANCE FOR ONE SPECIFIC LOCATION, WHICH ARE TAGGED
TO A CERTAIN PLACE AND READ LATER BY OTHERS. EX. YELP, QYPE

3. QUICK- TIMERS( ONLY TIME SENSITIVE): TRANSFER OF TRADITIONAL


SOCIAL MEDIA APPLICATIONS TO MOBILE DEVICES TO INCREASE
IMMEDIACY. EX. POSTING TWITTER MESSAGES, FACEBOOK STATUS
UPDATE

4. SLOW- TIMERS( NEITHER LOCATION, NOR TIME SENSITIVE): TRASNFER


OF TRADITIONAL SOCIAL MEDIA APPLICATIONS TO MOBILE DEVICES. EX.
WATHCING YOUTUBE, READING A WIKIPEDIA ENTRY.
WEB- BASED INFORMATION
SYSTEMS AND PLATFORMS

WEB- BASED INFORMATION SYSTEM

IS AN INFORMATION SYSTEM THAT USES INTERNET WEB TECHNOLOGIES TO


DELIVER INFORMATION AND SERVICES TO USERS OR OTHER INFORMATION SYSTEM/
APPLICATIONS.

PROACTIVELY INTERACTS WITH THE USERS AND PROCESSES THEIR BUSINESS TASKS
TO ACCOMPLISH THEIR BUSINESS GOALS.

TYPES OF WEB- BASED INFORMATION SYSTEM

1. INTRANET: IS A NETWORK BASED ON TCP/ IP PROTOCOLS BELONGING TO AN


ORGANIZATION, USUALLY A CORPORATION, ACCESSIBLE ONLY BY THE
ORGANIZATION’S MEMBERS, EMPLOYEE, OR OTHERS WITH AUTHORIZATION AND
ARE USED TO SHARE INFORMATION.

2. WEB PRESENCE SITE: IS AN INDIVIDUAL OR BUSINESS HAVING AN ESTABLISHED


EXISTENCE IN THE WORLD WIDE WEB, THROUGH A WEBSITE, EMAIL,
ADVERTISING, BLOG, OR A COLLECTION OF WEB FILES.

3. ELECTRONIC COMMERCE( E- COMMERCE): SYSTEM SUPPORT CONSUMER


INTERACTIONS THAT ARE USALLY RELATED TO BUYING AND SELLING OF GOODS
AND SERVICES OR THE TRANSMITTING OF FUNDS OR DATA OVER THE
ELECTRONIC NETWORK, PRIMARILY IN THE INTERNET.

4. EXTRANET: IS A CONTROLLED PRIVATE NETWORK THAT ALLOWS CUSTOMERS,


PARTNERS, VENDORS, SUPPLIERS, AND OTHER BUSINESSES TO GAIN
INFORMATION, TYPICALLY ABOUT SPECIFIC COMPANY OR EDUCATIONAL
INSTITUTITION, AND DO SO W/OUT GRANTING ACCESS TO THE ORGANIZATION’S
ENTIRE NETWORK.
ONLINE SAFETY, SECURITY, ETHICS
AND ETIQUETTE
ONLINE SAFETY: IT IS ALSO CALLED CYBER SAFETY OR DIGITAL SAFETY WHICH REFERS TO PRACTICES AND
PRECAUTIONS ONE SHOULD OBSERVE WHEN USING THE INTERNET.

INTERNET SECURITY:A VERY BROAD ISSUE COVERING SECURITY IN RELATION TO TRANSACTIONS MADE
OVER THE INTERNET.

ETHICS:REFERS TO A SET OF MORAL PRINCIPLES THAT GOVERN AN INDIVIDUAL OR A GROUP ON WHAT IS


CNSIDERED AS ACCEPTABLE RULES FOR ONLINE BEHAVIOR.

NETIQUETTE: MEANS ACCEPTABLE RULES FOR ONLINE BEHAVIOR.

MOBILE LEARNING: LEARNING BY MEANS OF A HAND- HELD DEVICE, SUCH AS MOBILE PHONES OR A
TABLET.

VIRTUAL CLASSROOM: MAY ALSO BE REFERRED TO AS DIGITAL CLASSROOM WHERE LEARNING TAKES PLACE
OVER THE INTERNET AND NOT IN A PHYSICAL CLASSROOM.

FORUM:A PLACE ON THE INTERNET WHERE USERS WITH COMMON INTERESTS INTERACT WITH EACH OTHER
TO FIND INFORMATION AND DISCUSS TOPICS.

KEYWORD: A WORD OR GROUP OF WORDS THAT A PERSON MAY USE TO SEARCH FOR IN A SEARCH ENGINE.

SEARCH ENGINES: ARE SOFTWARE SYSTEMS THAT PEOPLE TO SEARCH FOR THINGS ON THE INTERNET.

WEBINAR: REFERS TO A “ WEB SEMINAR” A WEBINAR IS A SEMINAR CONDUCTED OVER THE INTERNET
MAKING IT POSSIBLE TO “ VIRTUALLY ATTEND “ THROUGH AN INTERNE CONNECTION.

WIKI: A SITE WRITTEN, CONTROLLED, AND EDITED BY THE USERS THEMSELVES.

WEBPAGE: THE WEBPAGE IS THE PAGE SEEN BY THE USER WHEN BROWSING THE INTERNET.

UNIFORM RESOURCE LOCATORS (URL): THESE ARE THE SPECIFIC ADDRESSES OF THE INTEREST PAGES AND
FILES.

E- COMMERCE: IS SHORT FOR ELECTRONIC COMMERCE. THE ACT OF DOING BUSINESS TRANSACTIONS
(BUYING AND SELLING) ONLINE.

DOWNLOADING: IS A TERM THAT GENERALLY APPLIES TO THE TRANSFER OF DATA FROM THE INTERNET
TO THE COMPUER OR MOBILE DEVICE.

FIREWALL: IS A BROAD TERM USED TO DESCRIBE A PROTECTIVE BARRIER AGAINST COMPUTER BUGS OR
VIRUSES.

UNDERSTANDING THE INTERNET THREATS

1. BROWSER HIJACKING: HAPPENS WHEN MALWARE OR PSYWARE REPLACES A WEV


USER’S BROWSER HOMEPAGE THAT REDIRECTS THE USER TO UNWANTED WEBSITES
WHILE CAPTURING SENSITIVE PRIVATE DATA FOR PEROSONAL OR BUSINESS GAIN.

2. IDENTITY THEFT: HAPPENS WHEN A CRIMINAL IMPERSONATES A USER BY STEALING


HIS OR HER PERSONAL INFORMATION TO WITHDRAW MONEY OR PAY GOODS ONLINE.

3. MALWARE: A MALICIOUS SOFTWARE THAT IS INTENDED TO DAMAGE OR DISABLE


COMPUTER SYSTEMS WHICH HAS CODES TO COLLECT INFORMATION WITHOUT ONE’S
KNOWLEDGE.
4. PHARMING: IS A TECHNIQUE WHICH REDIRECTS A LEGITIMATE WEBSITES TRAFFIC TO
AN ILLEGITIMATE WEBSITE TO GAIN ACCESS TO A USER’S PERSONAL INFORMATION.

5. PHISING: IS AN EMAIL OR INSTANT MESSAGE SCAM WHICH LOOKS LIKE AN OFFICIAL


MESSAGE FROM A LEGITIMATE ORGANIZATION LIKE BANK AND CREDIT CARD
COMPANY THAT ASK ABOUT ONE’S PERSONAL INFORMATION SUCH AS
PASSWORDSAND CREDIT CARD DETAIL.

6. SPAM: IS AN IRRELEVANT, INAPPROPRIATE, UNWANTED OR JUNK EMAIL THAT COMES


FROM LEGITIMATE COMPANIES WHICH, IN THE LONG RUN MAY BE USED FOR
PHISHING, SCAM AND MALWARE.

7. SPYWARE: A SOFTWARE THAT ENABLES A USER TO OBTAIN INFORMATION ABOUT


ANOTHER’S COMPUTER ACTIVITIES BY TRANSMITTING DATA CONVERTLY TO ONE’S
HARD DRIVE.

8. TROJAN HORSE: IS A DESTRUCTIVE PROGRAM THAT PRETENDS AS A DESIRABLE


APPLICATION THAT TRICKS THE USER TO ALLOW ACCESS TO THEIR COMPUTERS
THROUGH DOWNLOADS OR EMAIL ATTACHMENTS.

9. WORM: A MALICIOUS PROGRAM THAT COPY’S ITSELF AND SPREADS TO OTHER


COMPUTERS.

10. ADWARE: AN UNWANTED ADVERTISEMENT THAT WILL POP UP SEVERAL TIMES ON


VICTIM’S COMPUTER THEN BEHAVE ABNORMALLY AND TEDIOUS TO CLOSE THEM.

11. KEYLOGGER: A PROGRAM THAT RUNS IN THE BACKGROUND AND STEALS USER
CREDENTIALS AND CONFIDENTIAL INFORMATION AND SEND IT BACK TO THE HACKER
BY RECORDING EVERY KEYSTROKE THAT A USER MAKES ON THEIR COMPUTER OR
DEVICE.

12. BOTNET: A COLLECTION OF INFECTED INTERNET CONNECTED DEVICES SUCH AS PC


AND MOBILE PHONE THAT ARE CONTROLLED BY A COMMON TYPE OF MALWARE.

13. ROOTKIT: A SOFTWARE TOOL USED BY HACKERS TO GAIN CONTROL OVER A


COMPUTER ON A NETWORK WITHOUT BEING EXPOSED.

14. RANSOMEWARE: A RANSOM VIRUS THAT BLOCK THE USER FROM ACCESSING THE
PROGRAMS OR FILES AND DEMANDS TO PAY THE RANSOM THROUGH ONLINE METHOD
FOR THE REMOVAL OF THE VIRUS.

ASIDE FROM THE BENEFITS THAT PEOPLE GET FROM THE INTERNET, IT ALSO OFFERS MANY DIFFERENT RISKS SUCH AS
THE POTENTIAL FOR:

CYBERBULLYING

EXPOSURE TO INAPPROPRIATE MATERIALS

ONLINE PREDATORS

EXPOSURE TO INACCURATE INFORMATION

IDENTITY THEFT

SCAMS

SEXTING

TIPS ON STAYING SAFE ONLINE


1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On


3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

9. Be Careful Who You Meet Online

10. Keep Your Antivirus Program Up To Date

NETIQUETTES
Make Real People a Priority

Use Respectful Language

Share With Discretion

Don't Exclude Others

Choose Friends Wisely

Don't Email Large Files

Respect People's Privacy

Fact Check Before Reposting

Respond to Emails Promptly

Update Online Information

A Word From Very well

You might also like