COMM 311 Exam
media-supply side
abundant supply in media content and services
age (cybersecurity)
differences by age are less dramatic than those related to educational attainment 18-29 year olds: 6/13 65+ 5/13 modest differences in cybersecurity knowledge by age
how about privacy?
few express confidence that their records will remain private and secure
polarization
increasing ignorance of the views and logic of those with whom we disagree or of different cultural traditions because people behave homophilically and expose themselves to opinions reinforcing their own views but people do not necessarily avoid opposing views new media algorithms
the widening gap between limitless media and limited attention
makes it a challenge for anything to attract an audience
results what style receives the most attention
post with pictures> links> status-only
three main goals for uses and gratifications modified for the current study
social->social entertainment->news informational->political
pluralism
the media have hegemonically distorted the flow of information and public discussion to reinforce and reproduce their position of dominance because of the historical dominance of the capitalist elite
underestimation
(I.e., participants say they do not attend to these content/styles a lot, but actually their eyeballs attend to these more than they say) content (social) & style (links, status-only)
capital one data breach according to the clip, how can we safeguard personal data when something like this happens?
-check credit report annually -freeze credit account -file taxes early -change online logins & passwords -close compromised account or credit card/reopen one
profusion when information is abundant, the problem is:
-finding the wanted information -who controls the search process? (e.g., google) -privacy in a networked world -can citizens control access to the private details of their lives?
potential problems with self-reporting when it comes to exposure to different content on social media?
-high risk of incidental exposure -blurred lines between different types of content -what is social? What is news? What is political content? -people may inaccurately recall their social media use -social desirability bias
revival of uses and gratifications research across different platforms thanks to the internet and the personal choice that has come with it
-in a broad sense we seek out and spend more time with media that fulfills our goals -these goals should not differ dramatically across platforms
audiences-demand side
-interoperable media, seamless access -impossible to know all the options at their disposal -audience engagement
uses and gratification on social media
-mainly for social purposes -news -politics
uses and gratification on social media -news
-not primary purpose, ancillary experience -exposure to news on social media is unavoidable -majority of americans say they at least somewhat enjoy following the news
uses and gratifications of social media -politics
-rarely a motivation for facebook users -few people engage with political content on social media -although large proportion reports seeing political content, such content is generally disliked or ignored
results what content receives the most attention
-social=news > political -furthermore, links exacerbate the differences between social & news vs. political
uses and gratification on social media -mainly for social purposes
-staying in touch with friends and families -seeing/sharing photographs/videos -reconnecting/staying connected with old friends
what can we do? (cybersecurity)
-talking about security can be complicated, and conversations are usually reactive, not proactive civic education -awareness -literacy/knowledge
Turning off the GPS function of your smartphone prevents any tracking of your phone's location.
False
If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?
No, it is not safe
Which of the following is an example of a "phishing" attack?
Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.
Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called
Ransomware
What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")?
That information entered into the site is encrypted
Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?
This is the only example of two-step authentication listed - true two-step authentication requires the user to enter a one-time code each time they log in to their account, in addition to their regular username and password. While the other answers may require users to perform two separate operations to gain access to a site, they are not examples of two-step authentication.
What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Which of the following four passwords is the most secure?
WTh!5Z It contains a combination of letters, numbers and symbols; it includes both upper and lower case letters; and it does not contain any words from the dictionary.
"Private browsing" is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
Yes
profusion
an abundance of information and channels for communication
objective
an attempt to produce a more accurate measurement of individuals' social media usage by using eye tracking technology to determine what content they attend to
education (cybersecurity)
the most consistent differences are related to educational attainment college degrees or higher: 7/13 high school diplomas or less 4/13 broad differences in cybersecurity knowledge by educational attainment
polysemy the difficulty of trying to apply hard and fast bureaucratically enforced rules
to censor one category of speech and protect another
uber data breach
uber hid 2016 breach, paying hackers to delete stolen data what do you think is a bigger problem: data breach or the fact that Uber hid it for a year?
polysemy
what one says and what another hears can be different due to words of ambiguity of words and images
overestimation
(I.e., participants say they attend to these content/styles a lot, but actually their eyeballs don't attend to these as much) content (news, political) & style (picture)
case study: toyota and eyetracking
?
A group of computers that is networked together and used by hackers to steal information is called a
Botnet