Digital Labels
Information Wars
Cyber Security
Privacy
Social Media
100

This concept refers to an individual's ability to find, evaluate, and compose clear information through writing and other media on various digital platforms

Digital Literacy

100

This is a method of research where you seek out other sources while you are reading and you are checking for currency, relevancy, authority, accuracy, and purpose by reading what other sites say about your source

Lateral Reading

100

This is a fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication

Phishing

100

Is a small delicious piece of data stored on the user's computer by the web browser while browsing a website. They were designed to be a reliable mechanism for websites to remember stateful information or to record the user's browsing activity.

Cookies

100

This a form and pattern of harassment using electronic means.

Cyberbullying

200

This shadow like phenomena is a trail of data or posts you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

Digital Footprint

200

This is the process through which information is filtered for dissemination, whether for publication, broadcasting, the Internet, or some other mode of communication.

Gate Keeping
200

This deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud. The practice may be used for financial gain, to compromise a victim in some way, or simply as forms of trolling or wish fulfillment

Cat Phishing

200

This is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data.

Privacy Policy

200

This is a type of neurotransmitter your body makes to send messages between nerve cells. It plays a role in how we feel pleasure and co-opted by social media via design choices. 

Dopamine

300

This is a person born or brought up during the age of digital technology and therefore familiar with computers, social media, and the internet from an early age.

Digital Native
300

This is a metaphorical description of a situation in which beliefs are amplified or reinforced by communication and repetition inside a closed system and insulates them from rebuttal.

Echo Chamber

300

This is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types exist, including computer viruses, worms, Trojan Horses, etc.

Malware

300

This can be a form of false advertisement, uses hyperlink text or a thumbnail link that is designed to attract attention and to entice users to follow that link and read, view, or listen to the linked piece of online content, with a defining characteristic of being deceptive, typically sensationalized or misleading.

Clickbait

300

Abusive or threatening writing or conduct that expresses prejudice against a particular group, especially on the basis of gender, race, religion, sexual orientation, or other immutable characteristic. 

Hate Speech

400

This is a person using information technology in order to engage in society, politics, and government.

Digital Citizen

400

Misinformation is false or inaccurate information that is communicated regardless of an intention to deceive.

Misinformation

400

This is an electronic authentication method in which a computer user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.

Two Step Verification or Multi-factor authentication

400

Advertisers in online social networks have some preferred set of users they wish to reach by showing their ads based career, wealth, education information, gender, age etc. They use these in order to focus on a specific demographic of users. 

Targeted algorithms 

400

This is the phenomena of only posting, posturing, or presenting the best parts of your life to social media. It's also what other may see on the opposite end.

Curated Social Media Life

500

This a person opposed to new technology or ways of working. This term comes from a secret oath-based organization of English textile workers in the 19th century, a radical faction which destroyed textile machinery as a form of protest.

Luddite

500

False or misleading information that is spread deliberately to deceive..

Disinformation

500

This is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer.

Spear Phishing

500

This is any data that could potentially be used to reveal significant and specific data about a person. Examples include a full name, Social Security number, phone number, driver's license number, bank account number, passport number, and email address.

Personal identifiable information

500

This is the overall concept that what you post or do on online is immortal. 

The Internet Is Forever

M
e
n
u