0% found this document useful (0 votes)
70 views8 pages

Chapter 8 - Media Trends

This module discusses opportunities and challenges in media and information literacy. It describes how mobile communication and television broadcasting provide opportunities while phishing, cybercrime, and lack of privacy pose challenges. New technologies like smartwatches and fitness trackers are current trends that both empower users and raise privacy and security issues.

Uploaded by

Jhondale Agpaoa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views8 pages

Chapter 8 - Media Trends

This module discusses opportunities and challenges in media and information literacy. It describes how mobile communication and television broadcasting provide opportunities while phishing, cybercrime, and lack of privacy pose challenges. New technologies like smartwatches and fitness trackers are current trends that both empower users and raise privacy and security issues.

Uploaded by

Jhondale Agpaoa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

MODULE: MEDIA AND INFORMATION LITERACY

At the end of this module, learners will be able to:


1. Describe what is massive open on-line course
2. Examine the possible threats of the Internet to banking through
phishing and cybercrime
3. Evaluate the opportunities and challenges in media and
information

Opportunities, Challenges and Power of Media and Information In the world


of media and information there are a lot of opportunities and challenges. What
is the meaning of the word’s opportunity and challenges? Below is the meaning
of the two words. Take a look!
So, here are the opportunity and challenges in media and information. First, we
will take a look in the opportunity.
Television Broadcaster
A television presenter presents information
relating to subjects such as news and sports,
and may also be responsible for planning the
creative content of a series. Such experts will
work with news programs and help to discuss
important topics in reporting, as well as
provide comments on various events.
They might also formulate interview
questions, read scripts, and reveal details
about the show, such as commercial breaks.
Example: TV broadcaster
MODULE: MEDIA AND INFORMATION LITERACY

Mobile Communication
A means of technology mediated
communication that allows the
user of
a mobile device to connect with
someone else at a different
location,
such as texting from a cell phone
and
sending email from a computer
device
equipped with WiFi (e.g. laptop,
iPad).
A mobile phone is a wireless
portable
device that allows users, to make
and
receive calls, and send text messages.
The first mobile phone generation
would only be able to make and
receive calls. Today’s mobile phones
are packed with many additional
features like web browsers, games,
cameras, video players and even navigation systems.
Cybercrime is defined as a
crime in which a computer is the
object of the crime (hacking,
phishing, spamming) or is used
as a tool to commit an offense
(child pornography, hate
crimes). Cybercriminals may use
computer technology to access
personal information, business
trade secrets or use the internet
for exploitative or malicious
purposes.
Here are the four types of cybercrime.
Hacking is the most common type of cybercrime committed across the world.
Hacking is a crime which entails cracking systems and gaining unauthorized
access to the data stored in them. Hacker is a person who breaks in to a
computer system.
Virus dissemination. Virus is the programs which attach themselves to the
computer or file and then circulate themselves to other files and to other
components on a network. They usually affect the data on the computer, either
by altering or deleting it.
MODULE: MEDIA AND INFORMATION LITERACY

Cyber stalking is use of internet or other electronic means to stalk someone. It


is online harassment and online abuse. Mostly cyber stalking involves following
a person’s movement across the internet by posting threatening messages to the
victim or by entering the chat rooms frequented by the victim or by constantly
bombarding the victim with the e-mails etc.
E-mail Spoofing. An e-mail that appears to originate from one source but
actually has been sent from another source. This can also be termed as e-mail
forging.
Phishing Phishing is a cybercrime in
which a target or targets are contacted
by email, telephone or text message by
someone posing as a legitimate
institution to lure individuals into
providing sensitive data such as
personally identifiable information,
banking and credit card details, and
passwords.

After you read about the two


challenges,
let us dig deeper what makes phishing
and cybercrime a challenge in media
and
information. Here is the answer.
Phishing
is an illegal action or crime. Where in
the
hacker will hack or get all your
information’s over the internet. For
example, your bank account details, your
personal information’s and even your
credit card details. So, for you to be safe
in phishing avoid posting your personal
information’s over the internet.
How about cybercrime? Cybercrime is another problem that we are facing
today. Like phishing, the hacker can access your information’s over the
internet. You should always remember your personal information’s are
considered confidential.
Always remember, your personal information’s are always confidential. No
sharing and posting personal information’s over the internet. For the last topic,
let me show you the examples of the power of media and information to affect
change.
MODULE: MEDIA AND INFORMATION LITERACY
CURRENT AND FUTURE TRENDS OF MEDIA AND INFORMATION
Today, we will discuss about the current and future trends of media and
information. I will show you some examples of current technologies and even in
the future.
Before we will start, I want you to think a technology that will help you in the
future and write it in the piece of paper. Describe what the uses of that
technology is and how it works. Just keep the paper.
Now, let’s move on to our discussion. We will evaluate current trends in media
and information and how it will affect/how they affect individuals and the
society. So, here are the examples of current trends in media and information.
Wearable technology (also called wearable gadgets) is a category of technology
devices that can be worn by a consumer and often include tracking information
related to health and fitness. Other wearable tech gadgets include devices that
have small motion sensors to take photos and sync with your mobile devices.
Smartwatch is a wearable computing
device that closely resembles a
wristwatch or other time-keeping
device. In addition to telling time, many
smartwatches are Bluetooth-capable.
The watch becomes, in effect, a wireless
Bluetooth adaptor capable of extending
the capabilities of the wearer’s
smartphone to the watch.
MODULE: MEDIA AND
INFORMATION LITERACY
Practical Uses of Smartwatch
1. Notifications. One of the main reasons you would buy one is a Smartwatch
displaying notifications. It’s invaluableto have messages sent to your wrist and
to be able to recognize their significance without removing your phone from a
pocket or bag. It makes your life simpler, and saves time.
2. Battery Life. A huge, highresolution monitor is often one of the biggest
drains in battery life for your smartphone. Use smartwatch this reduces the
amount of time, and it can have a significant impact on battery life.3
3. Music. Most smartwatches come with a music player feature in them,
enabling you to listen to music in your pocket on the phone. For example, if a
music track comes on that you don not particularly like, then you can simply
hit ‘next’ on your smartwatch.
Smartwatch is not only for checking time and date. Today, you can use
smartwatch for checking your email, if you have a text message or even a call.
Let us dig deeper, the following are some examples of wearable technology.
Cellphone versus Smart Phone

Mind Mapping
MODULE: MEDIA AND INFORMATION LITERACY

The third wearable technology is fitness tracker. This technology will tell you
how fit you are. Take a look!
Fitness tracker is the best way to monitor your movement and health with
unrivaled accuracy and effortlessness. A wrist-worn device that can detect some
combination of walking steps, running distance, heart rate, sleep patterns and
swimming laps. Fitness bands interact via Bluetooth with an app in a mobile
device that configures the device and downloads the wearer’s activity data.
Below are the list of the best fitness tracker.
Heart Rate Monitoring
Device. A technology that will
calculate and monitor your
heart rate.
Fitbit Charge. This watch is good for
exercise. It can count your running
time and the distance.

Misfit Phase Hybrid. This watch can


count your steps and your heart rate.

Smartglass. This smart glass can collect


information’s from external and internal.
You can listen to music too while
searching
informations.
MODULE: MEDIA AND INFORMATION LITERACY

Now, let us explore the future technologies.


Here are the following future technologies, let’s
take a look!
5G Smartphone and Network. 5G is the fifth
generation of internet speed. This is the new
fastest speed of internet connection. The
successor of 4G.

Hologram. It is a pattern of
interference produced by a split
coherent beam.
Avatars, Surrogates, Robotic. This is a
mechanical robot. It is having the
characteristics of a robot. They can do
things like humans.
MODULE: MEDIA AND INFORMATION LITERACY

Please click the link


below for the Course
Overview:

https://www.youtube.com/watch?v=wxciHo72zEM
https://www.youtube.com/watch?v=BvDaG8n0lKc
https://www.youtube.com/watch?v=4gQteePjvOo
https://www.youtube.com/watch?v=KzcQzM8CgIc
https://www.youtube.com/watch?v=NAcN93O8b6w
https://www.youtube.com/watch?v=KPwrsCRdlFw
https://www.youtube.com/watch?v=pWvSwX-jq7o

Phishing.org.” What is Phishing”. Accessed at January 17,2020,


http://www.phishing.org/what-is-phishing
Vangie, Beal. “Wearable Technology”. Access at January 17,2020,
https://www.webopedia.com/TERM/W/wearable_technology.html
Margareth , Rouse . “Smart Watch”. Access at January 16, 2020,
https://internetofthingsagenda.techtarget.com/definition/smartwatch
Margareth , Rouse . “Smartphone”. Access at January 16, 2020,
https://searchmobilecomputing.techtarget.com/definition/smartphone

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy