You are on page 1of 40

Media and information

literacy (mil)
Opportunities, Challenges, and Power
of Media and Information
Formative assessment:
recitation

As a student, what do you


consider is the biggest
challenge and ,on the
other hand, the best
opportunity offered to you
by the new media?
Photo Credit:
http://dsuonenergy.com/b
log/?p=136
Opportunity

 Job hiring
 Freedom of Expression
 Informing and keeping the mass up to
date
 Inspire
 Empower citizen
 Faster and free communication
Challenge

 Fake news
 Unreliable
Power

 Influence
 Distribution of information
 Avail names
Economic

 IMPACT
Economic actors need accurate and timely information
to allocate resources and efficiently. Investor and other
groups increasing value and demand a governance-
monitoring role from the media. A free and
independent press can provide information and
monitoring to the economic policies. It can also reduce
political task and increase good governance-
conditions that are important for robust economic
development.
Media improves the efficiently of the
economy by providing actors more and
better information with which to make
decisions and improving stability.
 Media enhances political coordination in
the development of sound economic
policy
 Media sector development can reduce
political risk, increasing stability for
higher risk countries.
NEWS INDUSTRY
FILM PRODUCTION
BROADCAST
EDUCATION
SOCIAL

Social Network: sites that allow users to


connect and share with people who have
similar interests and background.
Example: Facebook
Media Sharing: sites that allow users to share
different types of media, such as pictures and
video
Example: YouTube
Microblogging- sites that allow users to submit
short written entries, which can include links to
products and service sites as well as links to
other social media sites
Example: Twitter
Social Media Opportunities for
Business
 Home computers, laptops, tablets,
smartphones, even internet enabled
televisions mean people can easily access the
web from anywhere at anytime. Faster
connections, new devices and new online
applications have all helped to change the
way people work, socialize and shop.
 Directly target customers with marketing
campaigns
 Promote new products or services
 Build brand awareness
 Personality interact with existing and
potential customers
 Measure referrals from your social media
activity to sales
Political

 Personal communication via social media


brings politicians and parties closer to their
potential voters
 It allows politicians to communicate faster
and reach citizens in a more targeted manner
and vice versa, without the intermediate role
of mass media.
 Reaction, feedback, conversations and
debates are generated online as well as
support and participation for offline events.
 Messages posted to personal networks are
multiplied when shared, which allow new
audiences to be reached.
Formative assessment:
BOARDWORK
MEDIA AND INFORMATION
OPPORTUNITIES CHALLENGES
• Faster and “free” • Fake news in social
communication via media.-Albert
Messenger and Viber-
Liza
Cybercrime

the use of a computer as an


instrument to further illegal ends

criminal activity or a crime that


involves the Internet, a computer
system, or computer technology
HUMAN TRAFFICKING
“The recruitment, transportation, transfer, harboring
or receipt of persons, by means of the threat or use of
force or other forms of coercion, of abduction, of
fraud, of deception, of the abuse of power or of a
position of vulnerability or of the giving or receiving of
payments or benefits to achieve the consent of a
person having control over another person, for the
purpose of exploitation.”
- The United Nations
The 3 most common types of Human
Trafficking

1.Forced labor

2.Debt bondage

3. Sex trafficking
Forced Labor

also known as involuntary servitude,

is the biggest sector of trafficking in


the world, according to the U.S.
Department of State.
Debt bondage

is another form of human trafficking

in which an individual is forced to

work in order to pay a debt.


Sex trafficking
disproportionately affects women and children
and involves forced participation in commercial
sex acts. In the United States, any child under the
age of 18 who has been involved in a commercial
sex act is considered a trafficking victim. Women
and girls make up 80% of the people trafficked
transnationally. Yearly, traffickers exploit 1
million children in the commercial sex trade.
Citizen Journalism

refers to the reporting of news


events by members of the public
using the Internet to spread the
information.
Phishing
is a fraudulent activity to trick you into revealing
your personal and confidential information.

This information usually includes bank account


details, net banking details, credit/debit card
numbers, login ID and passwords.
3 Common Types of Phishing Attacks

#1. Phishing by EMAIL

#2. Phishing by CALL

#3. Phishing by SMS


#1. Phishing by EMAIL

A phishing email is a fake email that


looks likes crucial communication
send by a bank or a popular website.
This email carries a tone of urgency so
that it tricks you into taking an action
like clicking on a link or downloading
an attachment.
[Source: http://www.banksafeonline.org.uk]
#2. Phishing by CALL

 In a phishing call scam, you will receive a


phone call from a person posing as a bank
manager (in most cases), an employee of a
software firm, or any other known
organization. The purpose of the caller is to
trick you into sharing confidential
information (debit card number, ATM PIN,
expiry date, CVV and OTP).
#2. Phishing by CALL
 This is how a phishing call (that looks like it is from
a bank employee) might go:

 “Isthis Mr. Brown? This is a call for you from (a


popular) Bank. We have received reports of illegal
withdrawals from your bank account. In order to
contain the situation, and safeguard your account,
we need to confirm your account number, expiration
date, four digits at the back…” and so on.
#3. Phishing by SMS

 The third common type of phishing attack uses


SMS and is called SMiShing.

 You will receive an SMS (WhatsApp message in


most cases) informing you about an unbelievable
offer (from an online store, about flight or movie
tickets, etc.). This message will ask you to redeem
the offer by clicking on a link.  Again, this will take
you to a fake website that might ask you to share
confidential information or infect your device with
a virus
Easy tips to avoid phishing attacks:

 Never respond to unwanted,


unexpected emails, calls or SMSs –
especially those that ask for personal
or confidential information.
Easy tips to avoid phishing attacks:

Your bank will never ask you for


confidential information via emails,
calls or texts. If you do receive any
such communication, do not
respond; even better, report the
incident to your bank.
Easy tips to avoid phishing attacks:

 Avoid accessing websites via


links in email messages/SMS;
especially those asking for
personal information.
Easy tips to avoid phishing attacks:

 Do not fill any kind of form that


comes along with an email.
Easy tips to avoid phishing attacks:
 Ensure the website that you are sharing
your personal/financial information with
is secure. A secure website’s URL should
always begin with “https” instead of
“http”. Also important is the presence of a
lock symbol on the website (see figure a).
Clicking on the lock icon should display
the digital certificate that verifies the
authenticity of the website.

You might also like