COMM 311 Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

media-supply side

abundant supply in media content and services

age (cybersecurity)

differences by age are less dramatic than those related to educational attainment 18-29 year olds: 6/13 65+ 5/13 modest differences in cybersecurity knowledge by age

how about privacy?

few express confidence that their records will remain private and secure

polarization

increasing ignorance of the views and logic of those with whom we disagree or of different cultural traditions because people behave homophilically and expose themselves to opinions reinforcing their own views but people do not necessarily avoid opposing views new media algorithms

the widening gap between limitless media and limited attention

makes it a challenge for anything to attract an audience

results what style receives the most attention

post with pictures> links> status-only

three main goals for uses and gratifications modified for the current study

social->social entertainment->news informational->political

pluralism

the media have hegemonically distorted the flow of information and public discussion to reinforce and reproduce their position of dominance because of the historical dominance of the capitalist elite

underestimation

(I.e., participants say they do not attend to these content/styles a lot, but actually their eyeballs attend to these more than they say) content (social) & style (links, status-only)

capital one data breach according to the clip, how can we safeguard personal data when something like this happens?

-check credit report annually -freeze credit account -file taxes early -change online logins & passwords -close compromised account or credit card/reopen one

profusion when information is abundant, the problem is:

-finding the wanted information -who controls the search process? (e.g., google) -privacy in a networked world -can citizens control access to the private details of their lives?

potential problems with self-reporting when it comes to exposure to different content on social media?

-high risk of incidental exposure -blurred lines between different types of content -what is social? What is news? What is political content? -people may inaccurately recall their social media use -social desirability bias

revival of uses and gratifications research across different platforms thanks to the internet and the personal choice that has come with it

-in a broad sense we seek out and spend more time with media that fulfills our goals -these goals should not differ dramatically across platforms

audiences-demand side

-interoperable media, seamless access -impossible to know all the options at their disposal -audience engagement

uses and gratification on social media

-mainly for social purposes -news -politics

uses and gratification on social media -news

-not primary purpose, ancillary experience -exposure to news on social media is unavoidable -majority of americans say they at least somewhat enjoy following the news

uses and gratifications of social media -politics

-rarely a motivation for facebook users -few people engage with political content on social media -although large proportion reports seeing political content, such content is generally disliked or ignored

results what content receives the most attention

-social=news > political -furthermore, links exacerbate the differences between social & news vs. political

uses and gratification on social media -mainly for social purposes

-staying in touch with friends and families -seeing/sharing photographs/videos -reconnecting/staying connected with old friends

what can we do? (cybersecurity)

-talking about security can be complicated, and conversations are usually reactive, not proactive civic education -awareness -literacy/knowledge

Turning off the GPS function of your smartphone prevents any tracking of your phone's location.

False

If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?

No, it is not safe

Which of the following is an example of a "phishing" attack?

Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called

Ransomware

What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")?

That information entered into the site is encrypted

Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?

This is the only example of two-step authentication listed - true two-step authentication requires the user to enter a one-time code each time they log in to their account, in addition to their regular username and password. While the other answers may require users to perform two separate operations to gain access to a site, they are not examples of two-step authentication.

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

Use of insecure Wi-Fi networks

Which of the following four passwords is the most secure?

WTh!5Z It contains a combination of letters, numbers and symbols; it includes both upper and lower case letters; and it does not contain any words from the dictionary.

"Private browsing" is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

Yes

profusion

an abundance of information and channels for communication

objective

an attempt to produce a more accurate measurement of individuals' social media usage by using eye tracking technology to determine what content they attend to

education (cybersecurity)

the most consistent differences are related to educational attainment college degrees or higher: 7/13 high school diplomas or less 4/13 broad differences in cybersecurity knowledge by educational attainment

polysemy the difficulty of trying to apply hard and fast bureaucratically enforced rules

to censor one category of speech and protect another

uber data breach

uber hid 2016 breach, paying hackers to delete stolen data what do you think is a bigger problem: data breach or the fact that Uber hid it for a year?

polysemy

what one says and what another hears can be different due to words of ambiguity of words and images

overestimation

(I.e., participants say they attend to these content/styles a lot, but actually their eyeballs don't attend to these as much) content (news, political) & style (picture)

case study: toyota and eyetracking

?

A group of computers that is networked together and used by hackers to steal information is called a

Botnet


संबंधित स्टडी सेट्स

Principles of Information Security (Sixth Edition): 1601

View Set

Chapter 13 Using Technology To Manage Information

View Set

EXAM 4 : Chapter 40 (Nursing Assessment: Musculoskeletal Function)

View Set