SOCIAL MEDIA ETHICS

Czarina Joy Pangda
27 Nov 202216:09

Summary

TLDRThe video script delves into social media ethics, emphasizing the importance of authenticity, transparency, and communication. It outlines best practices and discusses the negative behaviors such as cyberbullying and trolling, highlighting their psychological impacts. The script also addresses gender sensitivity, security, privacy, and the dangers of fake news, urging viewers to maintain online privacy and be vigilant against clickbait and misinformation.

Takeaways

  • πŸ˜€ Social media ethics are about adopting the right perspective and thinking, and engaging with communities respectfully.
  • πŸ”‘ Authenticity in social media involves being true to one's personality, values, and spirit, and taking responsibility for one's actions.
  • πŸ“’ Transparency is key in communication, sharing both good and bad information openly to encourage collaboration and honesty.
  • πŸ—£οΈ Effective communication on social media requires honesty and openness, which can lead to respect and trust from others.
  • 🚫 Annoying behaviors on social media include cyberbullying, hacking, trolling, and swatting, which can have severe psychological effects.
  • πŸ”’ To protect oneself from online threats, it's important to maintain privacy, set strong passwords, and avoid clickbait.
  • πŸ³οΈβ€πŸŒˆ Gender sensitivity in reporting involves promoting gender equality and educating about the gender spectrum, as exemplified by platforms like TikTok.
  • 🚨 Criminal behavior on social networks includes actions that violate others' freedom, steal money, or damage reputations through various forms of cyber abuse.
  • πŸ•΅οΈβ€β™‚οΈ Invasion of privacy and identity theft are serious cybercrimes where personal information is misused for profit or to harm individuals.
  • 🎣 Social engineering, or phishing, tricks people into revealing sensitive information, often by posing as trustworthy entities.
  • πŸ“° The spread of fake news and misinformation can be driven by propaganda, hate, or political influence, and it's crucial to verify the information we consume.

Q & A

  • What is the main topic of the group's presentation?

    -The main topic of the group's presentation is social media ethics.

  • What are the three main principles of social media ethics mentioned in the presentation?

    -The three main principles of social media ethics mentioned are authenticity, transparency, and communication.

  • What does authenticity mean in the context of social media ethics?

    -Authenticity means being true to your own personality, values, and spirit, being honest with yourself and others, and taking responsibility for your mistakes.

  • Why is transparency important in social media communication?

    -Transparency is important because it increases collaboration, embraces honesty and open communication, and allows everyone to understand the reasons behind actions and words.

  • What are some examples of annoying behaviors in social media ethics?

    -Examples of annoying behaviors include cyberbullying, hacking, and trolling.

  • How can one protect their online privacy according to the presentation?

    -One can protect their online privacy by setting strong passwords, avoiding clickbait, and being cautious about what they click on social media.

  • What is gender-sensitive reporting in the context of social media?

    -Gender-sensitive reporting refers to promoting gender equality and educating and empowering people about the gender spectrum through social media content.

  • What are some criminal behaviors on social networks mentioned in the presentation?

    -Criminal behaviors mentioned include cyberbullying, cyber harassment, identity theft, and social engineering (phishing).

  • What is the impact of fake news and disinformation on social media?

    -Fake news and disinformation can mislead people, influence their opinions or behaviors, and cause harm by spreading false information.

  • What are some reasons people spread fake news and disinformation on social media?

    -People spread fake news and disinformation for propaganda, hate, and political influence.

Outlines

00:00

πŸ€” Social Media Ethics: Best Practices and Annoying Behaviors

The first paragraph introduces the topic of social media ethics, focusing on best practices and the importance of authenticity, transparency, and good communication. It defines social media ethics as the right perspective and thinking in leveraging social media appropriately. The speaker, Ronaldinh Mata, discusses the necessity of treating community members with respect and kindness. Three main principles are highlighted: authenticity, which involves being true to oneself and honest with others; transparency, which means sharing both good and bad information openly; and effective communication, which is built on the first two principles. The paragraph also touches on the negative aspects of social media, such as cyberbullying, hacking, trolling, and the psychological effects of such behaviors.

05:00

πŸ›‘οΈ Protecting Against Cyber Threats and Gender Sensitivity

The second paragraph delves into the issues of cyber threats and gender sensitivity in social media. It advises on self-care and evidence preservation in the face of online harassment, and discusses the phenomenon of 'swatting,' where false emergency calls are made to law enforcement against online gaming opponents. The paragraph emphasizes the importance of setting strong passwords, avoiding clickbait, and being cautious with online interactions. It also addresses gender-sensitive reporting, advocating for gender equality and education about the gender spectrum, using the influence of platforms like TikTok as an example. The speaker encourages the creation of content that promotes gender rights and challenges societal opposition.

10:02

🚨 Confronting Cyberbullying, Privacy Invasion, and Identity Theft

This paragraph discusses the harmful effects of cyberbullying, including harassment, stalking, and the invasion of privacy. It explains how these actions can lead to self-harm and mental health issues among victims. The text also covers the concept of identity theft, where personal information is stolen and misused, often with severe consequences for the victims. Social engineering, or phishing, is identified as another form of cybercrime, where scammers pretend to be trustworthy entities to deceive users into revealing sensitive information. The paragraph concludes with a warning about the dangers of fake news and misinformation, urging caution and critical thinking when consuming online content.

15:03

πŸ›οΈ The Impact of Fake News and the Importance of Ethical Online Behavior

The final paragraph wraps up the discussion on social media ethics by addressing the spread of fake news and its potential for causing harm. It outlines the motivations behind the creation and dissemination of fake news, such as propaganda, hate, and political influence. The speaker warns of the potential for fake news to manipulate public opinion and behavior, and emphasizes the need for ethical consumption of online information. The paragraph concludes with a reminder of the importance of protecting oneself online and avoiding the temptation of clickbait, reinforcing the overarching theme of responsible and ethical engagement in social media.

Mindmap

Keywords

πŸ’‘Social Media Ethics

Social Media Ethics refers to the principles and values that guide appropriate behavior and interaction on social media platforms. It is the focus of the video, emphasizing the importance of treating others with respect and kindness within online communities. The script discusses various aspects of social media ethics, including authenticity, transparency, and communication, as well as the negative behaviors that contradict these principles.

πŸ’‘Authenticity

Authenticity in the context of the video means being true to one's personality, values, and beliefs when engaging on social media, regardless of external pressures. It is one of the three main principles of social media ethics mentioned in the script. Authenticity is important for personal well-being, as it encourages honesty, responsibility, and alignment between actions and one's true nature.

πŸ’‘Transparency

Transparency is the act of openly sharing both good and bad information in a way that is accessible to all, allowing for a clear understanding of the reasons behind actions or decisions. It is another key principle of social media ethics highlighted in the script. Transparency fosters trust and collaboration by promoting open and honest communication, even when it is uncomfortable to do so.

πŸ’‘Communication

Effective communication is essential for maintaining ethical standards on social media. The script emphasizes the need for honesty and openness in interactions, suggesting that when people communicate their true selves and beliefs, they earn respect and trust from others. Good communication is intertwined with authenticity and transparency.

πŸ’‘Cyberbullying

Cyberbullying is a form of online harassment that involves posting threatening messages, causing embarrassment, or revealing personal information to harm others. The script identifies cyberbullying as an unethical behavior on social media, which can have severe psychological impacts on victims, such as sleep disturbances, depression, and low self-esteem.

πŸ’‘Hacking

Hacking, as mentioned in the script, is the illegal access to someone's social media accounts to collect information or impersonate them. It is a significant security threat, especially on platforms like Facebook, where compromised accounts can lead to access to other services and personal information.

πŸ’‘Trolling

Trolling is defined in the script as the act of posting abusive, insulting, or off-topic messages in an online community with the intent to provoke or upset others. It is an annoying behavior that can cause harm to others and is considered unethical in the context of social media interactions.

πŸ’‘Gender Sensitivity

Gender Sensitivity in the video script refers to the awareness and respect for gender diversity and equality. It is particularly relevant in the context of social media, where content creators have the power to influence perceptions and promote understanding of gender issues, such as LGBTQ+ rights and women's empowerment.

πŸ’‘Security and Privacy

Security and Privacy are crucial aspects of social media ethics discussed in the script. They involve protecting personal information from unauthorized access and ensuring that users are not subjected to identity theft or invasion of privacy. The script advises on setting strong passwords, avoiding clickbait, and being cautious about the information shared online.

πŸ’‘Criminal Behavior

Criminal Behavior on social networks, as described in the script, encompasses a range of activities intended to harm others, such as cyberbullying, harassment, invasion of privacy, identity theft, and social engineering. These behaviors are unethical and illegal, causing damage to individuals and society.

πŸ’‘Fake News

Fake News, according to the script, is misleading information that is circulated online with the intent to deceive or manipulate public opinion. It is a form of unethical behavior that can have serious consequences, such as influencing elections or inciting hatred. The script warns about the dangers of consuming unverified information and the importance of ethical research and verification.

Highlights

Group Eight's presentation on social media ethics emphasizes the importance of best practices, annoying behavior, gender sensitivity, security and privacy, and criminal behavior on social networks.

Social media ethics are defined as the right perspective and thinking for appropriate use and engagement on social platforms.

Authenticity is the first principle of social media ethics, urging individuals to be true to their personality and values.

Transparency in communication is crucial for sharing both good and bad information openly and honestly.

Good communication requires authenticity and transparency to build trust and respect among social media users.

Cyberbullying, including posting threatening messages or causing embarrassment, is highlighted as an annoying behavior on social media.

Hacking is identified as a criminal behavior, where unauthorized access to accounts can lead to identity theft and privacy invasion.

Trolling is described as abusive and inflammatory messaging that can have severe psychological and physiological effects on victims.

Swatting is a dangerous form of online harassment that involves making false reports to law enforcement, putting victims at risk.

Gender sensitive reporting is discussed as a way to promote gender equality and educate about the gender spectrum.

The influence of social media platforms like TikTok on promoting gender sensitive content is underscored.

Setting strong passwords and avoiding clickbait are recommended as methods to protect oneself online.

Criminal behavior on social networks includes violating freedom, scamming money, and causing damage to others.

Cyber threats, harassment, and stalking are elements of cyberbullying that can lead to self-harm and mental health issues.

Invasion of privacy and identity theft are highlighted as serious cybercrimes with severe consequences for victims.

Social engineering, or phishing, is identified as a method to scam people by pretending to be a reliable company or agency.

Fake news and misinformation are discussed as dangerous, with motivations including propaganda, hate, and political influence.

The importance of ethical consumption of online information and research to avoid the spread of fake news is emphasized.

The presentation concludes with a reminder of the threats and harmful activities that can occur online, urging caution and protection.

Transcripts

play00:00

good morning sir good morning blessed

play00:02

mates we are group eight and our topic

play00:04

is all about social media ethics

play00:07

we will be discussing the best practices

play00:10

annoying Behavior gender sensitivity

play00:13

security or privacy

play00:16

criminal behavior on social networks

play00:18

fake news in this information and others

play00:21

of social media ethics

play00:24

I am ronaldinh Mata and I will be

play00:26

discussing the best practices and

play00:28

annoying behavior of social media ethics

play00:32

so first let's define what is social

play00:34

media

play00:36

social media is to write ethic equals

play00:39

the right perspective and the right

play00:40

thinking and how to leverage social

play00:43

media appropriately and how to engage

play00:46

people in the right manner

play00:48

it is very important to remember that

play00:51

whenever we connect with a social media

play00:54

Network

play00:55

we are joining a community we need to be

play00:58

sure to treat the people in our

play01:01

community with respect and kindness

play01:03

there are three main principles of

play01:06

social media ethics and the first one is

play01:09

authenticity authenticity means you are

play01:13

due to your own personality values and

play01:16

spirit regardless of the pressured you

play01:19

are under to act otherwise

play01:21

you're honest with yourself and with

play01:24

others and you take responsibility for

play01:26

your mistakes being authentic is

play01:29

important because it contributes to your

play01:31

holistic well-being encouraging

play01:34

happiness

play01:35

fulfillment and high self-esteem when

play01:39

your actions align with your true nature

play01:41

you are more likely to pursue your

play01:44

passions believe in yourself and feel

play01:47

confident in your opinions the second

play01:49

one is transparency transparent

play01:52

communication is the act of both good

play01:55

and bad information being shared upward

play01:58

downward and literally in a way that

play02:01

allows all to see the why behind the

play02:04

words benefits of transparent

play02:06

communication increases collaboration

play02:10

transparency embarrassed honesty and

play02:13

open communication because to be

play02:15

transparent someone must be willing to

play02:17

share information when it is

play02:19

uncomfortable to do so the inspires

play02:22

transparency is an individual being

play02:25

honest with himself about the actions he

play02:28

is taking

play02:30

and the last one is communication you

play02:33

need to have authenticity and

play02:35

transparency in order to have a good

play02:38

communication

play02:39

you should always communicate in an

play02:41

honest and open manner if you show

play02:44

others who you are and what you stand

play02:46

for truthfully people will respect you

play02:49

and become fond of you you will

play02:51

establish report

play02:53

the root is an ethical value that other

play02:56

people respect let's proceed to the next

play02:58

which is the Annoying behavior in social

play03:01

media ethics

play03:03

cyber bullying can include posting meme

play03:06

or threatening text or messages causing

play03:10

embarrassment to others by posting

play03:12

pictures creating a website or revealing

play03:16

personal information

play03:18

pretending to be someone by using their

play03:20

name

play03:21

hacking is illegally accessing someone's

play03:25

accounts to collect information or

play03:27

impersonate them

play03:30

usually accounts are hacked because

play03:32

someone gets a hold of your password

play03:35

that's bad for Facebook in particular

play03:38

because people often use Facebook to log

play03:42

in in other things so if someone gets

play03:45

into your Facebook account they have

play03:47

access to a bunch of other things too

play03:51

whenever something weird happens through

play03:53

security and or social media change your

play03:56

email password it's bad enough to use

play03:59

access to your social accounts but your

play04:02

email is the Holy Grail for hackers so

play04:05

rotating that password regularly every

play04:09

one to three months and changing it

play04:12

whenever something strange happens is a

play04:16

very good idea controlling generally

play04:18

defined as a person who posed abusive

play04:21

insulting inflammatory

play04:24

off-topic or aggressive messages in an

play04:27

online community

play04:29

crawling can cause significant negative

play04:31

effects and harm others it significantly

play04:35

affects physiological and psychological

play04:37

Health such as disturbing sleep

play04:41

depression low self-esteem self harm and

play04:45

suicidal addition

play04:47

and in some cases it may lead to stupid

play04:51

what can you do if you are being thrown

play04:54

first is to take care of yourself talk

play04:57

to someone talking to someone can help

play05:00

you feel supported

play05:02

don't respond with board or block it

play05:06

prints out the evidence and log of your

play05:09

account so what they refused to a

play05:11

harvesting picnic most often perpetrated

play05:14

by members of the online gaming

play05:16

community so a thing entails generating

play05:19

an emergency law enforcement response

play05:22

against a Target victim under Fool's

play05:25

presences so others do this by making a

play05:29

co-host emergency Alliance like 9-1-1

play05:31

and false the reporting a violent

play05:34

emergency emergency

play05:36

situation such as a shopping or hostage

play05:40

situation or the victims of swapping by

play05:44

enlarged both the perpetrators and

play05:47

victims of swapping are players of

play05:50

online games such as Call of Duty

play05:54

counter-strikes in DotA

play05:56

how to prevent

play05:58

well everyone should become full to

play06:01

maintain their online privacy online

play06:04

Gamers should take extra care to ensure

play06:07

work they won't be victims of shortly

play06:10

good day everyone my name is

play06:14

discussing about gender sensitive

play06:16

reporting and security and privacy in

play06:18

social media let us first talk about

play06:20

gender sensitive reporting gender

play06:23

sensitive reporting refers to promoting

play06:25

gender equality and contributing to

play06:27

educating and empowering people about

play06:29

gender Spectrum an example of a social

play06:33

media platform that has a big or great

play06:36

influence

play06:37

to people is tick tock tick tock is now

play06:40

the most popular social media platform

play06:43

in the world it has millions of users

play06:46

across every country so for example I am

play06:49

a famous content creator in tiktok

play06:51

with referring to gender sensitive

play06:54

reporting I will do content and post

play06:57

matters issues and things about women

play07:02

lgbtq plus rights and the gender

play07:04

Spectrum I will be fighting with the

play07:08

opposed through social media I will post

play07:11

facts I will post

play07:14

um

play07:15

the things that people need to know

play07:17

about women empowerment about young

play07:20

children who are opposed in every other

play07:24

country because of their gender and of

play07:27

course

play07:29

um about the lgbtq plus rice

play07:32

now how can we protect ourselves through

play07:34

online

play07:35

first is setting a strong password

play07:37

second avoid clickbait and lastly be

play07:41

cautious social media is now the

play07:43

greatest form of data communication

play07:45

however it is also susceptible to

play07:49

explode exploitation

play07:51

let us all be cautious and not be

play07:54

tempted

play07:55

two things that we see on social media

play07:57

for example if something pops up in our

play08:00

notification stating that we have won an

play08:03

iPhone we have won a great amount of

play08:05

money let us not be tempted to click

play08:08

that that is what we call clickbait

play08:11

because some hackers

play08:14

um

play08:15

use that as a bait to steal information

play08:18

from you to get data informations in

play08:21

your from your device or from your other

play08:24

social media platforms so let us all be

play08:27

car be careful and be cautious to what

play08:29

we click on social media

play08:31

criminal behavior on social networks or

play08:35

crimes being done by these individuals

play08:38

wants to violate someone else's Freedom

play08:41

or to

play08:43

still or scam people's money away from

play08:45

them and to cause damage to someone else

play08:48

this includes cyber bullying and or

play08:51

cyber harassment where people cause harm

play08:54

to someone

play08:56

through the means of media or by using

play09:00

these gadgets that we call intentionally

play09:02

humiliate or annoy someone will attack

play09:05

them verbally or threaten them verbally

play09:08

in by using these cell phones with some

play09:12

image images or obscene images and

play09:14

messages to them and this

play09:17

it is considered a side management and

play09:20

cyber bullying

play09:22

mixes the elements of cyber bullying

play09:25

or yes it is it consists of cyber

play09:29

threats online harassments and cyber

play09:31

stalking

play09:33

cyber threats are common when someone is

play09:37

trying to help or open your social media

play09:40

accounts without your concern and this

play09:43

because this becomes threat to you when

play09:47

someone is

play09:48

destroying to

play09:50

hack your account and

play09:52

hopefully they they don't open it and

play09:56

next is online harassment where most

play09:58

people who experience this unaffected

play10:01

psychologically and mentally

play10:03

and because of what's Happening

play10:07

on social media that are related to them

play10:10

this leads them to harm themselves

play10:13

because of these things that are

play10:15

circulating online there is

play10:18

someone is harassing them

play10:20

and the next is cyber stalking cyber

play10:24

stalking is also a form of

play10:27

foreign

play10:29

by sending these unwanted images also

play10:32

frightening them pranking someone else

play10:35

or targeting victims to send this

play10:38

inappropriate images

play10:41

and this makes them also

play10:45

mentally affected by

play10:48

by being curious who is doing these

play10:51

things to them

play10:52

and these are the elements of cyber

play10:55

bullying the next is invasion of privacy

play10:59

invading someone else's private personal

play11:01

or private information

play11:04

invading someone's private

play11:06

this private information or privacy is

play11:09

common to hackers where they gather

play11:12

information and sell to the black market

play11:14

especially in

play11:16

at Urban in advertising where people use

play11:19

your information to

play11:21

in order to make profit and sell new

play11:24

products that you have been searching

play11:25

for some time

play11:27

all of us and all of a sudden it just

play11:30

popped up in your messages like that the

play11:33

next is identity theft identity thefts

play11:37

is stealing someone else's personal

play11:40

identifying information

play11:41

[Music]

play11:43

and using it publicly

play11:45

this is a very dangerous type of cyber

play11:48

crime where people pretends to be

play11:51

someone

play11:52

else to destroy someone's reputation and

play11:56

to scam people for money and this is a

play11:59

very dangerous one because

play12:01

people are getting victimized by these

play12:03

scammers using someone else's

play12:05

identification and

play12:08

this gives a huge problem also to those

play12:12

people who got stolen their identity

play12:17

next is social engineering social

play12:19

engineering is also known as fishing

play12:22

this is by when this is when a in a

play12:25

group of people or people pretending to

play12:28

be a reliable company and agency to scum

play12:32

and still confidential users information

play12:35

such as

play12:36

credit cards login informations or and

play12:40

and many more

play12:42

this social media this social

play12:45

engineering or fishing

play12:47

can be a combination of

play12:49

identity theft and invasion of privacy

play12:53

this is commonly this is the they use

play12:56

this community

play12:58

gain financial and then Financial

play13:01

Freedom or I want to to scam people but

play13:05

for money

play13:07

and that that is what one of the most

play13:09

reasons why they use this

play13:13

crime

play13:14

like six fake news and this information

play13:16

it is a misleading information presented

play13:19

us on news it is not also misleading but

play13:22

it is dangerous these informations are

play13:26

circulating online being consumed by us

play13:29

and and if we are not careful this lead

play13:32

us to do

play13:34

something extremely wrong

play13:36

and that's why we have to be careful on

play13:39

what we are consuming online and we have

play13:42

to do

play13:43

we have those we have to

play13:46

come the ethics if we have to research

play13:48

these things that we are consuming

play13:51

and and there are reasons why people do

play13:54

this fake news and this information it

play13:57

is because of number one propaganda this

play14:00

is common for

play14:01

for for politicians yes for politicians

play14:05

not only for politician but

play14:08

for many people who are ambitious to to

play14:10

gain something out from this society and

play14:13

propaganda is to influence someone

play14:15

else's opinion or to behavior Behavior

play14:19

or their behaviors actively

play14:22

when you use this propaganda is when you

play14:24

use these fake news is you want the

play14:26

society to

play14:28

to behave in to behave according to what

play14:31

is written in this in this fake news or

play14:33

this information

play14:35

and next is hate when the reason of why

play14:39

people use this this information fake

play14:41

news is hate

play14:43

you can use this hate for personal

play14:46

for personal reasons they use this to

play14:49

attack someone verbally and destroy

play14:52

their images to

play14:54

through spreading this fake news and

play14:56

this information about them and I don't

play14:59

know whether people are doing this and

play15:03

then the third reason is for political

play15:05

influence this is to

play15:06

gain gain your gain boost for political

play15:10

influence

play15:12

you use these dirty tricks such as fake

play15:15

news and propagandas and this

play15:18

information to destroy your your your

play15:21

your enemies reputation and you lift up

play15:24

your yours and so you can have the upper

play15:27

hand when it comes to election

play15:30

and that is all for today we have

play15:33

discussed about social media ethics the

play15:35

best practices the annoying behaviors

play15:38

gender sensitivity security and privacy

play15:41

criminal behaviors and such let us not

play15:45

forget that threats and harmful

play15:47

activities are not only done in physical

play15:49

but can also be done through online or

play15:53

social media let us not forget to

play15:56

protect ourselves online and do not

play15:59

be tempted by clickbaits that is all for

play16:03

today thank you for listening

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Social MediaEthicsAuthenticityTransparencyCommunicationCyberbullyingGender SensitivityOnline PrivacySecurity TipsFake News