You are on page 1of 11

"Opportunities,

Challenges and
Power of Media and
Information"
Opportunit
y Challenge
-A time or set of - A challenge is
circumstances something new
that makes it and difficult
possible to do which requires
something. great effort and
So, here are the opportunity and challenges in media and information.First,we
will take a look in the opportunity. There are two opportunities;

A.Television Broadcaster
A television presenter
presents information
relating to subjects such
as news and sports,and
may also be responsible
for planning the creative
B.Mobile Communication
A means of technology mediated
communication that allows the user of a mobile
device to connect with someone else at a
different location,such as texting from a
cellphone and sending email from a computer
device equipped with WiFi(e.g. laptop, iPad).

A mobile phone is a wireless portable device


that allows users,to make and received calls,and
send text messages.The first mobile phone
generation would only be able to make and
received calls. Today's mobile phones are
packed with many additional features like web
browsers, games,cameras,video players and even
And now let's move on to the next which is the challenges in media and
information;
There are also two challenges;

A.Cybercrime
-is defined as a crime in which a computer is
the object of the crime(hacking, Free images

phishing,spamming)or is used as a tool to


commit an offense (child pornography,hate
crimes). Cybercriminals may use computer
technology to access personal information,
business trade secrets or use the internet the
internet for exploitative or malicious
purposes.
1. Hacking 2. Cyber stalking
Four types of
cybercrimes

3. Virus 4. E-mail Spoofing


dissemination
1. Hacking- is the most 2. Cyber stalking - is use of
common type of cybercrime internet or other electronic means
committed across the to stalk someone. It is online
world.It is a crime which harassment and online abuse.
entails cracking systems Mostly cyber stalking involves
and gaining unauthorized following a person's movement
access to the data stored in across the internet by posting
them. Hacker is a person threatening messages to the victim
who breaks into a computer or by entering the chat rooms
system. frequented by the victim or by
constantly bombarding the victim
with the
3. Virus
dissemination - virus 4. E-mail
is the programs which Spoofing - An
attach themselves to the email that appears to
computer or file and then originate from one
circulate themselves to source but actually has
other files and to other been sent from another
components on a network. source. This can also
They usually affect the data be termed as e-mail
on the computer, either by forging.
altering or deleting it.
B.Phishing
-is a cybercrime in which a
target or targets are
contacted by email,
telephone or text messages
by someone posing as a
legitimate institution to lure
individuals into providing
sensitive data such as
personally identifiable
information, banking and
credit card details, and
The Power of Media
and Information

Students Business Society


The power of While in business, The power of media
media and the power of media and information in our
and information is society is huge.
information in the
very strong. Using Through media,the
side of the students media, the business society can easily get
is that, now a days owner can easily and understand the
the information is market their information related to
easy to get. products. what is happening.
THANK
YOU!

You might also like