Chapter 5: The Digital World and Globalization

studied byStudied by 12 people
5.0(2)
Get a hint
Hint

Digital World

1 / 68

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

69 Terms

1

Digital World

The availability and use of digital tools to communicate on the internet, digital devices, smart devices, and other technologies. (Information Society)

The articulation of the dominance of the use of technology in the modern-day society.

New cards
2

human world

existing, emerging and probable – being driven and transformed by technology, and by digitized ICTs, in particular.

New cards
3

Productivity and Connectivity

Opportunities of a Digital World

New cards
4

Digital Citizen

a person utilizing information technology (IT) in order to engage in society, politics, and government.

New cards
5

Digital Literacy

refers to an individual's ability to find, evaluate, and compose clear information through writing and other mediums on various digital platforms.

New cards
6

Internet

the global system of interconnected computer networks that use the internet protocol suite (TCP/IP) to link devices worldwide.

A global network of thousands of computer networks linked by data lines and wireless systems.

New cards
7

Facebook and Twitter Revolutions

Role of Social Media in sparking protests and political revolutions across Middle East

New cards
8

The Stag Hunt Coordination Game

The easiest way to access the efficient equilibrium is for the poor to communicate via social and for this reason, repressive regimes limit its citizens’ freedom of expression.

New cards
9

Social Model Characteristics

1. Society consists of the rich and poor

2. The rich set the tax rate and the degree of political inclusiveness; the

poor learn these parameters and then decides whether to revolt or

compromise

3. If revolutions are organized, it may succeed with 100% probability, but it

may also permanently destroy a portion of the country’s economic

capacity

New cards
10

Social Media

an immensely powerful tool today. With a click of a button, it makes it possible for any individual to contact, reach, and share information with thousands and even millions of people in the world

refers to various websites and applications whose main purpose is to support and facilitate online social networking. The most popular examples include Twitter, Facebook, Instagram, and Reddit.

New cards
11

Fake news

news, stories or hoaxes created to deliberately misinform or deceive readers.

New cards
12

Clickbait

These are stories that are deliberately fabricated to gain more website visitors and increase advertising revenue for websites.

use sensationalist headlines to grab attention and drive click-through to the publisher website, normally at the expense of truth or accuracy.

New cards
13

Propaganda

Stories that are created to deliberately mislead audiences, promote a biased point of view or particular political cause or agenda.

New cards
14

Satire / Parody

Lots of websites and social media accounts publish fake news stories for entertainment and parody. For example; The Onion, Waterford Whispers, The Daily Mash, etc.

New cards
15

Sloppy Journalism

Sometimes reporters or journalists may publish a story with unreliable information or without checking all of the facts which can mislead audiences. For example, during the U.S. elections, fashion retailer Urban Outfitters published an Election Day Guide, the guide contained incorrect information telling voters that they needed a ‘voter registration card’. This is not required by any state in the U.S. for voting.

New cards
16

Misleading Headings

Stories that are not completely false can be distorted using headlines. These types of news can spread quickly on social media sites where only headlines and small snippets of the full article are displayed on audience newsfeeds.

New cards
17

Biased / Slanted News

Many people are drawn to news or stories that confirm their own beliefs or biases and fake news can prey on these biases. Social media news feeds tend to display news and articles that they think we will like based on our personalized searches.

New cards
18

Dark Web

encrypted online content that is not indexed by conventional search engines.

New cards
19

Confirmation Avoidance

People avoids information that opposes their preference and beliefs

New cards
20

Confirmation Bias

People can either accept only the information that validates their preference and other beliefs

New cards
21

Decision Theory

Rational individuals either prefer to consume more information or they update their beliefs in a Bayesian probability

New cards
22

Identifiable Victim Effect

Tendency of individuals to offer larger aid to a specific, identifiable person as opposed to a vaguely large or statistically defined group with the same need

New cards
23

Megaphone Effect

People outside the country where the protests are happening are more likely to click on the information than from local citizens themselves

New cards
24

Regret Avoidance / Hindsight Bias

People try to avoid decisions they anticipate as regrettable to avoid personal misery

New cards
25

Too Much Choice Effect

How the mind attempts to sift through the overwhelming availability of information and how emotions or affects serve as the primary mechanism in selecting types of information to be accepted

New cards
26

Apps

a program designed to operate within a mobile system

New cards
27

Bandwidth

The capacity of an electronic line, such as a communications network or computer channel, to transmit bits per second (bps).

New cards
28

Blog

a website consisting of articles, or “posts,” typically associated with a single person or organization.

can address a wide range of topics from politics to food culture to the arts.

New cards
29

Bookmark

a way of storing your favorite sites on the Internet. Browsers like Netscape or Internet Explorer let you to categorize your it into folders.

New cards
30

Browser

software program that allows users to access the Internet.

New cards
31

Chat

real-time, synchronous, text-based communication via computer.

New cards
32

Cookie

Information (in this case URLs, Web addresses) created by a Web server and stored on a user's computer. This information lets Web sites the user visits to keep of a user's browsing patterns and preferences.

New cards
33

Cyber culture

"a collection of cultures and cultural products that exist on and/or are made possible by the Internet, along with the stories told about these cultures and cultural products."

New cards
34

Domain Name

A method of identifying computer addresses. Your e-mail address has a domain address. If you have an "edu" at the end of your e-mail address that means your account is affiliated with an educational institution. A "com" extension means you have a business account. A government account has a .gov suffix.

New cards
35

Download

refers to copying data from one computer system to another via a computer network. In general, it refers to copying a file from a remote server onto a user’s local machine.

New cards
36

Ecommerce

refers to the buying and selling of items on the internet. Popular online retailers include Amazon, Etsy, and Ebay.

New cards
37

Email

refers to electronic messages sent between two or more parties.

New cards
38

Encryption and Authentication

helps ensure that data transmitted over the internet remains secure and protected from possible interception.

New cards
39

FAQs

A list of questions and answers to explain products and troubleshoot problems.

New cards
40

Firewall

piece of software that blocks unwanted traffic a computer and intranet.

New cards
41

.gif

the usual format for a graphic that is not a photo.

New cards
42

Graymail

refers to unwanted email messages that do not otherwise meet the criteria of spam.

New cards
43

Hashtag

used to label keywords or phrases in a tweet or other social media message. The use of the tag converts these keywords and phrases into active links to a dynamic feed which is updated in real time to list all recent post containing it.

New cards
44

Home page

Generally the first page retrieved when accessing a Web site.

New cards
45

HTML

type of text code, when embedded in a document, allows that document to be read and distributed across the Internet.

It is a kind of coding language used to design and create websites.

New cards
46

HTTP

enables html documents to be read on the Internet.

New cards
47

Hyperlink

Text, images, graphics that, when clicked with a mouse (or activated by keystrokes) will connect the user to a new Web site.

New cards
48

Instant Messaging

a text-based computer conference over the Internet between two or more people who must be online at the same time.

New cards
49

IP Address

The number or name of the computer from which you send and receive information on the Internet.

New cards
50

ISP

a company that delivers internet access to subscribing customers.

New cards
51

JAVA

a computer language, developed by Sun Microsystems, that lets you encode applications, such as animated objects or computer programs, on the Internet

New cards
52

JavaScript

A Web scripting language developed by Netscape.

New cards
53

.jpg

a file format for photographs on Web pages

compresses large photo files so they don't take up as many kilobytes of memory.

New cards
54

Keywords

words or phrases that describe the focus of webpages.

New cards
55

Link

typically pieces of text embedded in larger bodies of content which, when clicked, take the user to a different web page or website. As a general rule they are highlighted in blue and underlined. However, they can be any color and don’t have to be underlined. It can also be images.

New cards
56

Malware

software specifically designed to damage or disrupt a computer system. There are many different types, but the most common are designed to access and collect sensitive data or to force access into a protected computer system.

New cards
57

Multimedia

Web's integration of audio, video, graphics and text.

New cards
58

Network Router

connects two or more computers to an internet connection, allowing multiple users to access the internet and move data between connected computing devices.

New cards
59

Portal

A Web site "gateway" that provides multiple services, which could include Web searching capability, news, free-email, discussion groups, online shopping, references and other services.

New cards
60

Search Engine

specialized software, such as AltaVista and Yahoo, that lets WWW browser users search for information on the Web by using keywords, phrases, and Boolean logic.

New cards
61

Spam / Spamming

typically refers to unsolicited junk mail and blog comments.

can consist of legitimate advertisements for products and services, or may be part of an online scamming operation.

New cards
62

Tag

a formatting tool used in HTML and XML markup languages to indicate how content will be displayed on a given web page.

New cards
63

Modem

A device that connects your computer to the Internet, when you are not connected via a LAN (local area network, such as at work or on a campus.) Most URL - A universal resource locator (a computer address) that identifies the location and type of resource on the Web. A URL generally starts with "http.“

New cards
64

Virtual Community

a term commonly used to describe a group of people who exchange ideas through computer networks, listservs, newsgroups, and Web-based bulletin boards. They might not ever meet face-to-face.

New cards
65

Virus

a computer program usually hidden in an existing program. Once the existing program is executed, the program is activated and can attach itself to other programs or files.

New cards
66

Website

a virtual location on the internet typically consisting of one or more web pages.

New cards
67

Wiki

meaning fast or quick, any website that allows or encourages users to add or modify online content.

encyclopedia

New cards
68

World Wide Web (WWW)

A hypermedia information storage system which links computer-based resources around the world.

New cards
69

Worm

A destructive computer program that replicates itself throughout your computer's hard drive and memory.

use up the computers resources and pull the system down

can be spread in mass-e-mailing if the user opens an attachment.

New cards

Explore top notes

note Note
studied byStudied by 143 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 13017 people
Updated ... ago
4.8 Stars(55)

Explore top flashcards

flashcards Flashcard87 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard82 terms
studied byStudied by 161 people
Updated ... ago
5.0 Stars(7)
flashcards Flashcard381 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard111 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard37 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(2)