Media & Information Literacy For Teachers

UNESCO UNAOC

Languages

  • English
    • Français (French)
    • Español (Spanish)
    • Русский (Russian)
    • العربية (Arabic)
  • Home
  • Introduction
  • Modules
    • Module 1 : Citizenship, Freedom of Expression and Information, Access to Information, Democratic Discourse and Life-long Learning
      • Unit 1: Understanding Media and Information Literacy – An Orientation
      • Unit 2: MIL and Civic Participation
      • Unit 3: Interactive with Media and Other Information Providers such as Libraries, Archives and the Internet
      • Unit 4: MIL, Teaching and Learning
    • Module 2: Understanding the News, Media, and Information Ethics
      • Unit 1: Journalism and Society
      • Unit 2: Freedom, Ethics and Accountability
      • Unit 3: What Makes News – Exploring the Criteria
      • Unit 4: The News Development Process – Going Beyond the 5Ws and 1H
    • Module 3: Representation in Media and Information
      • Unit 1: News Reporting and the Power of the Image
      • Unit 2: Industry Codes on Diversity and Representation
      • Unit 3: Television, Films, Book Publishing
      • Unit 4: Representation and Music Videos
      • Unit 5: Digital Editing and Computer Retouching
    • Module 4: Languages in Media and Information
      • Unit 1: Reading Media and Information Texts
      • Unit 2: The Medium and the Message – Print and Broadcast News
      • Unit 3: Film Genres and Storytelling
      • Unit 4: Camera Shots and Angles – Conveying Meaning
    • Module 5: Advertising
      • Unit 1: Advertising, Revenue and Regulations
      • Unit 2: Public Service Announcements
      • Unit 3: Advertising – the Creative Process
      • Unit 4: Advertising and the Political Arena
      • Unit 5: Transnational Advertising and ‘Superbrands’
    • Module 6: New and Traditional Media
      • Unit 1: From Traditional Media to New Media Technologies
      • Unit 2: Uses of New Media Technologies in Society – Mass and Digital Communications
      • Unit 3: Use of Interactive Multimedia Tools, Including Digital Games in Classrooms
    • Module 7: Internet Opportunities and Challenges
      • Unit 1: Young People in the Virtual World
      • Unit 2: Challenges and Risks in the Virtual World
    • Module 8: Information Literacy and Library Skills
      • Unit 1: Concepts and Applications of Information Literacy
      • Unit 2: Learning Environments and Information Literacy
      • Unit 3: Digital Information Literacy
    • Module 9: Communication, MIL and Learning – a Capstone Module
      • Unit 1: Communication, Teaching and Learning
      • Unit 2: Learning Theories and MIL
      • Unit 3: Managing Change to Foster an Enabling Environment for MIL in Schools
    • Module 10: Audience
    • Module 11: Media, Technology and the Global Village
      • Unit 1: Media Ownership in Today’s Global Village
      • Unit 2: Socio-Cultural and Political Dimensions of Globalized Media
      • Unit 3: Commoditization of Information
      • Unit 4: The Rise of Alternative Media
    • Module 12: Freedom of Expression Toolkit
  • Resources
  • Submit a Resource
Home / Modules / Module 7: Internet Opportunities and Challenges / Unit 2: Challenges and Risks in the Virtual World

Module 7: Internet Opportunities and Challenges

Unit 2: Challenges and Risks in the Virtual World

Duration: 3 hours

KEY TOPICS

  • Understanding the challenges and risks of Internet use
  • Empowerment and responsible use of the Internet
  • Privacy and security

LEARNING OBJECTIVES

After completing this unit, teachers should be able to:

  • List and describe the challenges/risks of Internet use and where they are most likely to occur
  • Develop knowledge about risks and threats that potentially accompany newly developed Internet applications
  • Understand the interdependencies between users’ behaviour and the likelihood of them being a victim or a perpetrator
  • Apply this knowledge to enable teachers to use the Internet more responsibly

PEDAGOGICAL APPROACHES and ACTIVITIES

Challenges and risks related to online content

Challenges and risks related to online content

Adapted from Youth Protection Roundtable Tool Kit – Stiftung Digitale Chancen 2009

Age-inappropriate content: The Internet provides a wealth of content for all groups of users. Mainstream interests are served as well as special interest groups. Nevertheless, not all content should be accessible for children and young people. So it has to be carefully decided which content is appropriate to which age group. Special attention should be given to content that is not illegal in general but might harm younger users. Age-inappropriate content like adult pornography might especially harm younger children when exposed to it unintentionally. The risk of facing age-inappropriate content can result from the user’s own conduct when searching for it deliberately, as well as stumbling across it without intending to. Content that is not appropriate for all age groups might be provided for commercial reasons, but can also be generated by users themselves. Access to the former might be restricted to closed user-groups only, while user-generated content is mostly publicly available and therefore needs special attention. Since today many children and young people have a mobile phone with multimedia functionalities and access to the Internet at their fingertips, it must be considered that they might access age-inappropriate content when on their own and not having an adult for guidance at their side. Mobile devices also enable children to produce their own digital content in any life situation, thus contributing to the increasing volume of user-generated content.

Illegal content (i.e. racism and child pornography): The type of content classified as illegal depends foremost on national laws, although some type of content is outlawed in most countries. Nevertheless, illegal content is available and can be accessed unintentionally or deliberately by children and young people. Attention should also be paid to children and young people as potential victims of illegal content, e.g. by taking and publishing pictures or videos of child abuse.

Lack of verification of content: Given that content available through the Internet is often not verified by an independent source, it is important that young people learn to read content with a critical eye and not take everything that is said at face value. User-generated content, characteristic of the Web 2.0 environment, can often be partial, biased or inaccurate. Younger users need to be aware of the dangers of simply believing anything they read online.

Incitement of harm: There are many sites on the web inciting users to harm themselves (e.g. websites promoting suicide, anorexia or sectarianism). With Web 2.0 and the increasing possibilities to publish user’s own content, the risk of being exposed to content inciting harm is growing. In particular children and young people are in many cases not able to make a realistic assessment of the risks arising from following the instructions given in such websites.

Infringement of human rights / defamation: In the anonymity of the web, propaganda against certain population groups or individuals can easily be widespread. In addition, one can presume that people act differently online when they do not have to face their counterparts or victims directly and therefore are not immediately confronted with the consequences of their conduct. Thus the risk of infringement of human rights and being a victim of defamation is much more likely online than in reality. Also, defamatory content is harmful to children and young people whose opinion might be influenced by misleading information.

Inappropriate advertisement and marketing to children: Inappropriate advertisement means the risks of receiving or being exposed to advertising for products and/or services that are inappropriate to children like cosmetic surgery. The more users give away private information (i.e. name, age or gender), the more likely they are to receive advertisements or be asked to participate in lotteries. Since children are in many cases unaware of the consequences of typing their names into forms and boxes on the web, they are profoundly at risk. Considering the high penetration rate of mobile phones among children and young people, attention should also be paid to this additional channel for the dissemination of advertisement.

Privacy: Once published on the web, content can spread rapidly around the world and remain in existence indefinitely. Users, and in particular children and young people, are often unaware of the short-and long-term consequences of publishing texts and pictures they may not want to make available publicly later. Data stored on a server or a platform can be easily accessed by others and people may not be aware of how unprotected their personal data can be. It is important when using the Internet that people fully understand the environment they are working in.

Copyright infringement: Copyright infringement is a risk mostly related to the conduct of users themselves. Irrespective of whether a copyright has been infringed deliberately or accidentally, the infringement is seen as fraud by the holder and puts the violator at risk of penalty.

Risks related to online contact

Risks related to online contact

Adapted from Youth Protection Roundtable Tool Kit – Stiftung Digitale Chancen 2009

Harmful advice: Forums, blogs and other contact-related areas of the Internet provide a platform for the exchange of information and advice between users. This can be valuable assistance but can also facilitate contact with inappropriate or even more harmful advisors. The risk of receiving harmful advice, in particular for children and young people, is greater in social community platforms or other Web 2.0 applications than on regular websites.

Identity theft: Getting hold of, and making use of, other people’s electronic identity (e.g. user name and password) with the intent to commit commercial or other fraud and to benefit from it is called identity theft. Identity theft is a growing risk as the number of virtual identities is increasing with the number of people online and particularly those using personalized services.

Money theft/phishing: Phishing refers to the process of harvesting bank details, in particular personal identification numbers (PINs) and transaction authentication numbers (TANs), with the intent to ransack other people’s bank accounts. Young people are more likely to not recognize a fake website and to give away their bank details.

Commercial fraud: Commercial fraud happens when sellers pretend to sell goods or services which, after payment, either do not show the promised attributes or are not delivered at all. It can also result from identity theft and phishing. Another source of commercial fraud can be the sale of digital services (e.g. a ring tone) at an unreasonable and unfair price, often bound to a permanent subscription to the service that was not intended by the buyer. In the majority of cases, users (and in particular young people and children) are unaware of the consequences of such contracts concluded online.

Grooming: Grooming refers to paedophiles using the Internet as a means to contact children and young people while concealing their adult identity. They often build their strategy on children’s longing for friendship and familiarity. All areas of the Internet that provide platforms for personal contact and exchange are likely to provide a basis for grooming attacks. As mentioned before, the mobile phone (as an additional device to contact others and to access social networks) should be taken into strong consideration here, especially as children look at their mobile phone as a particular part of their private life and are mostly on their own when using it. Thus, with the increase of mobile communication technologies and social networks, the risk of falling prey to a grooming attack and then accepting a dangerous invitation has become much greater.

Bullying: Various types of bullying seem always to be part of people’s lives. Bullying one another is certainly simplified by the Internet due to the anonymity provided by the medium. Children and young people in particular risk being both victims of bullying and offenders. Hence bullying is related to one’s own conduct as well as to the conduct of others. Even though publishing content like defamatory pictures can be part of bullying, the phenomenon is chiefly related to online contact. As mentioned before, multifunctional mobile phones are often used for taking pictures with the intention of bullying and then uploading the pictures to the Internet or sending them via multimedia messaging (MMS) to others. Since many children and young people have a mobile phone equipped with a digital camera, bullying is becoming easier.

Disclosing private information: When setting up a profile on a social community platform, users are invited to disclose private information to present themselves to the community. Also in chat rooms and forums users may disclose private data to others, such as their address or telephone number. Young people in particular, are unable to foresee the consequences of publishing their private data. They are often unaware that a chat room is not a private but a public area.

Profiling: With the increasing number of profiles a person can publish on different platforms, there is a greater risk that personal data published on one platform will be merged with data published on other platforms or given away elsewhere (e.g. in polling or raffles). Thus profiles are created that make it possible to directly address the person with potentially unwanted content, services and advertisements. Profiling can be carried out from the website when personal data are displayed publicly, but a more dangerous practice is when profiles of users (or their partial profiles) are harvested from the database behind the website and sold by the platform provider to third parties.

  • It is important to understand what is meant by harmful online content. International human rights law specifies a number of acceptable restrictions upon freedom of expression – particularly when freedom of speech conflicts with other rights. Examples of matters that might be restricted include incitement to violence or racial hatred, child sex images and defamation. In each case, international law stipulates that restrictions should be finely detailed and supervised by the courts
    • Ask teachers to share any experience that they or a friend have had with any one of the challenges outlined above. How did they deal with it? What was the final outcome? What lessons did they learn?
  • Consider, for example, identity theft, monetary theft/phishing, infringement of human rights, defamation or any other abuse on the Internet. Through research, or using resources provided in the Media and Information Literacy curriculum for Teachers, identify and list steps to be taken and exact characteristics that teachers should look for to recognize fraudulent online requests for information, fraudulent websites, and content that breaches human rights. What are some of the benefits of electronic banking and commerce? Resources used for this activity should be practical and represent real cases as far as possible. Teachers could carry out this activity for all the risks listed above
  • Do an online search of the wealth of medical (or other category) information available on the Internet. Can medical websites help you diagnose any health problems you are having? Is it safe to take actions concerning your health based on advice from the web? List and discuss the main ways to determine the authenticity and authority of a medical website
  • If you are part of social network, carry out a Google search of your name. How much personal information about you is available in the public domain? Can you still find information about you that you deleted from your social network? Which of the risks mentioned above is this related to?
  • Take an extract from Facebook’s Statement of Rights and Responsibilities, Article 2,7 ‘Sharing Your Content and Information’ (or from any other social network or even software that comes with your computer). In small groups, analyze whether the extract you selected may have an effect on someone’s privacy and possibly security. How can users control the content posted on them online? Analyze and discuss who holds the copyright for certain types of content (photos, videos, etc.) posted on social networks or on the web
  • Examine the United Nations Convention on the Rights of the Child. It sets out the basic human rights that children everywhere have:
    the right to survival; to develop to the fullest; to protection from harmful influences, abuse and exploitation; and to participate fully in family, cultural and social life. Are there Convention articles that require the development of appropriate guidelines for protecting children from information and material that could harm to their well-being?
  • According to the International Telecommunication Union’s Technology Watch Report 10, actions to address the concerns of privacy and security are the number one priority to improve life in the digital world and on the Internet (ITU 2009). The absence of robust security inevitably presents a risk to all systems and processes that rely on electronic communication, including the media (ITU 2006). Weak (or absent) security leads to growing occurrences of cyber crimes. This threat is so serious that the International Multilateral Partnership Against Cyber-Threats (IMPACT) was created to promote international cooperation to make cyberspace more secure. Dr Hamadoun Touré, ITU Secretary-General, states that ‘access to communication is useless if peace and safety online cannot be guaranteed…’, and adds that we should see the digital world as a ‘gated community, where users may have to sacrifice certain freedoms and anonymity in return for better security…’ (ITU News).
    However, many activists for freedom on the Internet are concerned about government interference and control. There is growing concern that the Internet is becoming a closed controlled space rather than an open public-interest space, and is increasingly dominated by governments and corporations. It may be that for some governments and businesses, security is the dominant concern, while this is not the case for many citizens
    • Discuss the statements above made by Dr Touré. Do you think governments need to take steps to make the virtual world more secure? Why or why not?
  • Do you agree that privacy will have to be sacrificed to some extent? What are some of the implications? Why do you think it is not possible or desirable to regulate the Internet like television and radio? What would happen if the Internet were controlled by any one country or region of the world?
  • Carry out a search on several (5 – 10) types of tools being used for Internet security – blocking, filtering, legal controls and so on. Discuss their benefits and disadvantages
  • Select any social network website or software that you use. Experiment with the privacy settings. Search in the ‘terms of use’ for the terms ‘privacy and security’. Do you think that the privacy safeguards are sufficient to help you avoid some of the risks described in this section (see boxes on risks related to Internet content and contact)? What are some of the repercussions when you put the privacy settings to the maximum level?
  • Unit 1: Young People in the Virtual World
  • Unit 2: Challenges and Risks in the Virtual World

Modules

  • Module 1 : Citizenship, Freedom of Expression and Information, Access to Information, Democratic Discourse and Life-long Learning
  • Module 2: Understanding the News, Media, and Information Ethics
  • Module 3: Representation in Media and Information
  • Module 4: Languages in Media and Information
  • Module 5: Advertising
  • Module 6: New and Traditional Media
  • Module 7: Internet Opportunities and Challenges
  • Module 8: Information Literacy and Library Skills
  • Module 10: Audience
  • Module 11: Media, Technology and the Global Village
  • Module 12: Freedom of Expression Toolkit

Copyright © 2025 United Nations Alliance of Civilizations (UNAOC) United Nations Educational, Scientific and Cultural Organization (UNESCO)