0% found this document useful (0 votes)
3 views

CONCEPT-NOT

The document discusses various aspects of digital media, including convergence, social media types, mobile media, and assistive media. It also covers online safety, threats, and measures to protect personal information while using the internet. Additionally, it emphasizes the importance of evaluating websites for credibility and reliability when conducting online research.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

CONCEPT-NOT

The document discusses various aspects of digital media, including convergence, social media types, mobile media, and assistive media. It also covers online safety, threats, and measures to protect personal information while using the internet. Additionally, it emphasizes the importance of evaluating websites for credibility and reliability when conducting online research.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CONCEPT NOTE 2

CONTENT: Trends, Social, Mobile, And Assistive Media

1. CONVERGENCE
● It is an evolution of technological developments that merge into a new system bringing together different types of applications and
media.
2. SOCIAL MEDIA
● A website, application or online channel that enable web users to create. Co-create discuss, modify and exchange user
generated content.

TYPES OF SOCIAL MEDIA

FACEBOOK - A website which allows users, who sign-up for free profiles, to connect with friends, work colleagues or
people they don't know, online

TWITTER - To connect its users and allow them to share their thoughts with their followers and others through the use of
hashtags.

INSTAGRAM – A free photo and video sharing app available on iPhone and Android. People can upload photos or videos
to our service and share them with their followers or with a select group of friends.

SNAPCHAT- Allows users to send and receive "self-destructing" photos and videos. Photos and videos taken with the app
are called snaps. Snapchat uses the device's camera to capture snaps and send them out to other Snapchat users.

MOBILE MEDIA
● A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, primarily used as personal,
interactive, Internet-enabled and user-controlled portable platforms that allow interconnected users to exchange personal
and nonpersonal information (Wei, 2013).

ASSISTIVE MEDIA
● It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H. Harvey.
● The organization was the first internet-based reading service for persons with visual and reading impairments.
● The produce and publish voice-recorded written materials on cassettes, cds, and in the internet.

CONCEPT NOTE 3
CONTENT: Online Safety and Online Threats
1. Online safety or Internet Safety
- refers to the practice and precaution that should be observe when using the internet to ensure that the users as well as their
computer and personal information are safe from crimes associated with using the internet.
- There are worries concerning safety on the internet such as malicious user, websites and software and numerous types of
offensive content
- Numerous delinquencies can be committed on the internet like stalking, identifying, theft, privacy violation even harassment and
more.
2. Online Threats
- Everyone should be wary enough when using the internet since there are various online threats that you might encounter along the
wants
TYPE OF ONLINE THREATS
1. Phishing - is a type of scam where the scammer disguise as a reliable source in trying to attain the private information like
password and credits card information through internet.
2. Internet Scam – is a type of scam that mislead the user in the many ways attempting to take lead of them. the purpose of
this scam is to cheat the target of their personal property directly rather than private information through fabricated
promises confidence tricks and many more
3. Malware – is a generic term for spyware and adware. It is malicious software disguised as real software often secretly
installed intended to transfer and gather private information like password without the user permission.
4. Key loggers- these are software designed to record the user’s key strokes key logging allow the criminal to look for
significant information that can be used for identifying or intellectual property theft
5. Viruses and Worm- is a program designed to replicate by attaching itself into other computer program, data files, or boot
sector of the hard drive while, Worm can be injected into the network by any type of means, like a USB stick or an email
attachment.
6. Cyber stalking. - is a practice of the Internet or other electronic resource to follow or bother an individual or association. It
may consist making fabricated allegation or detail report, monitoring, bullying, identifying theft, damage to the files or
paraphernalia collecting facts that may be used to bully and solicitation of minor for sex
7. Cyberbullying- is frequently an extension of harassment outside the internet, and may yield in various dissimilar behavior.

Online Safety Measures, Online Ethics, and Netiquette


The development of the internet provided several vital services available to any available to anybody with a connection. Though this
service permitted us to connect with others through internet, likewise this permitted the communication with malicious users.
Although malicious users often use the internet for personal advantage, this may not be restricted to financial/material gain. This is
particularly a worry to parents and children, as children are frequently the aims of these malicious users.
There are safety measures we should all be taking on a consistent basis to guard our computer and keep our personal safety when
connecting to the internet.

Never give any personal information out about yourself over the internet.
1. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure
service.
2. Never open messages or attachments from someone you do not know.
3. Be careful on what you say or post online to protect your reputation.
4. Protect your computer or other personal electronic gadgets with strong password or PIN to lock or use security app. Use
different password for each account.
5. Do not leave your computer or other personal electronic gadgets unattended while log ed in.
6. Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal
information.
7. When using a public computer terminal, be sure to delete your browsing data before leaving.
8. Keep your software updated to avoid security holes.
9. Do not download or install software or anything on your computer or cell phone that is unknown to you.
Netiquette comes from the word network and etiquette, the etiquette of cyberspace. It is a set of rules and norms for acceptable
conduct or behavior online.
Online Etiquette focuses on the acceptable use of online resources in an online social environment.

CONCEPT NOTE 4
CONTENT: Searching the Web and Search Skills and Research Skill

SEARCHING THE WEB - There are billions of information on the web and it is a challenge for us to truly
find which information is reliable and relevant. Here are some tips you may use to be able to look for
relevant and reliable sources:
Search Engines – are websites used for retrieval of data, files, or documents from data bases. Some
search engines we use today are
Anatomy of URL – a URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types
of names and addresses that refer to objects on the world wide web. Knowing the URL endings will give
you clues to who is sponsoring the website and help evaluate the sources.

POPULAR DOMAINS
TOP – LEVEL DOMAINS COUNTRY CODE TOP LEVEL DOMAINS
.edu – educational institution .ph – Philippines
.org – non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

SEARCH SKILLS AND TOOLS


Online Search and Research is more than just ‘googling’ – typing a word in Google and then clicking the
search button. It is a skill that every internet user should know to do smart searching and this starts with
improving search and research skill to get better results. Here are the things that you need to know to
improve your online search and research skill. This will guide you to obtain the most relevant information
that you need.

When searching online, narrow your topic. Identify the key concepts or important ideas.
Put the word AND between each keyword to create a search string.
Identify synonyms of the keywords.
Review the first pages returned.
Use the plus (+) sign for a more specific search.
Use the minus (-) sign for a more specific search.
Use wildcards for a broader search.
Use quotation marks to find phrases or names.
Use several search engines.

CONCEPT NOTE 5
CONTENT: Evaluating Websites

Evaluating websites is also as critical as effective searching. To help you evaluate the website’s
credibility, here are the questions that you need to answer:

1.What is the domain type of the website?


Domain types are .com (commercial), .org (organizational), .edu (educational), .gov (government), .net
(network), and .mil (military). The preferred domain types are educational, government, networks, or
organizational. If it is a personal website, then you should further evaluate the website.

2.Who wrote the article?


Check if the author’s credentials or affiliations are listed so you can tell whether or not the author is
qualified to write the topic. Check also the publisher of the article if it is a reliable publisher. Make sure
that the author provides e-mail or contact address/phone number. Information on the document should
also be cited correctly. Look for “About Us”, “Biography”, “Contact Us” and other related buttons.

3.What is the purpose of the document and why was it produced?


It is also important to check the document’s purpose and why it was produced. The document should
provide accurate information and must be objective in presenting it. The author should at least claim
accountability and responsibility for the information contained in the web page. Some websites produce
documents for the purpose of motivating users to buy products. If this is the case, information might be
biased. However, bias is not necessarily bad, but you need to investigate the author or connection.

4.When was the document published and updated?


The document should be regularly updated. As to the freshness of the date, it depends on the information
needed. For some topics you want current information. For others, you want information near time it
became known. The links should also be up-to-date. There should be no dead links

You might also like