Unit 2: Challenges and Risks in The Virtual World
Last update:29 March 2024
Key Topics
- Understanding the challenges and risks of Internet use
- Empowerment and ethical obligations when using the Internet
- Privacy and security
UNESCO
Learning Objectives
After completing this unit, educators should be able to:
- List and describe the challenges/risks of Internet use and where they are most likely to occur
- Develop knowledge about risks and threats that potentially accompany newly developed Internet applications
- Understand the interdependencies between usersā behaviour and the likelihood of them being a victims or a perpetrators of abuse, or an unconscious effect of interests that pay for opportunities to precisely tweak or nudge users towards certain values or behaviours
- Apply this knowledge to enable educators and learners to use the Internet with greater awareness of the environment and businesses underpinning it, as well as with enhanced awareness of own rights and care about the rights of others
- Define the difference between privacy and security online
Pedagogical Approaches and Activities
In summary: as discussed earlier in this Curriculum (Part 1) various pedagogical approaches are possible. Please review the list in Part 1 and decide which approach to apply to the suggested Activities below and others that you may formulate.
Suggested Activities
- Educator should guide learners to research and consider other international norms framework as listed below. Pay close attention to the key recommendations and action points in each of these documents. Is your country a signatory to the covenant mentioned below and other related conventions? Do the United Nations resolution, reports and guides relevant to your country? Are the recommendations and actions points being implemented in your country? Research these and ask why, why not or with what effect? Who are the key stakeholders on these issues in your country? Do they exist? How is civil society engaged in these processes? Are they consulted? Are they involved in the implementation, monitoring and decision-making? Are youth, women and various marginalize groups involved in the process? Why not? What can be done?
- International Covenant on Civil and Political Rights (),
- Article 19 of the
- United Nations Resolution A/HRC/32/L.20 on āā
- United Nations Resolution A/RES/64/211 on ā"
- United Nations A/74/486 āā in the context of tackling hate speech offline and online
- United Nations A/HRC/39/29 āReport of the United Nations High Commissioner for Human Rightsā on āā
- United Nations Development Group
- It is important to understand what is meant by harmful online content. International human rights law specifies a number of acceptable restrictions upon freedom of expression - particularly when freedom of speech conficlts with other rights. Examples of matters that might be restricted include incitement to violence or racial hatred, child and sex images. In each case, international law stipulates that restrictions should be finely detailed and supervised by the courts. However, treading on sensitivities which are not per se related to human rights, should not be regarded as harm as such. If this were the case, expressions against a musical style could be taken as harming its fans, etc. Triggering shock and offence is not, on its own, enough to constitute harm, in terms of international standards. Against this background, organize a learning space debate about these international standards and highlight examples of different types of content including those that might fall in a grey area.
- It is important to avoid assuming that potential harm is actual harm. The effects of content on society are much more complex than the commonly-held stimulus-response model suggests. First, as the theorist Stuart Hall showed, different people respond differently - accepting, rejecting or negotiating meanings, and processing at cognitive, affective and practical levels in different ways. Second, there is a wide a range of possible impacts such as legitimation and reinforcement, as well as framing and agenda-setting, which are all much more subtle than cases of content that triggers fear, arousal, hope or anger. In this context, nuance is needed in order to understand and react based on more than the apparent intrinsic harm that a given text may lead to. MIL is one way to identify when potential harm might result in real harm. For example, MIL can also provide insights as to the conditions when speech can actually have dangerous impact and needs to be addressed urgently, compared to other contexts. Such skills draw from the Rabat Plan on countering hate speech, which draw attention to looking at key features such as the status and influence of the speaker, the spread of the speech, the volatility of the context, etc. MIL can also assist with understanding the role of digital communications companies in the amplification and repetition of content, including "dog-whistles" which are seemingly legitimate but which can constitute content that is actually a coded call for harmful action.
- Ask educators to share any experience that they or a friend has had with any one of the challenges outlined above regarding potentially or really harmful content. How did they deal with it? What was the final outcome? What lessons did they learn?
- Consider, for example, identity theft, monetary theft/phishing, infringement of human rights or any other abuse on the Internet. Through research, or using resources provided in this Media and Information Literacy Curriculum, identify and list steps to be taken and exact characteristics that educators and learners should look for to recognize fraudulent online requests for information, fraudulent websites, and content that breaches human rights. Resources used for this activity should be practical and represent real cases as far as possible. Educators could carry out this activity for all the risks listed above.
- In the context of the COVID-19 pandemic, do an online search of the wealth of medical (or other category) information available on the Internet. Can medical websites help you diagnose any health problems you are having? Is it safe to take actions concerning your health based on advice from the web? List and discuss the main ways to determine the authenticity and authority of a medical website.
- If you are part of a social network, carry out a search for your name using DuckDuckGo, Google, Yandex, Baidu, or other search engines. How much personal information about you is available in the public domain? Can you still find information about you that you had deleted from your social network? Which of the risks mentioned above is this related to?
- Take an extract from Facebookās Statement of Rights and Responsibilities, Article 2, āSharing Your Content and Informationā (or from any other social network or even software that comes with your computer). In small groups, analyse whether the extract you selected may have an effect on someone's privacy and possibly security. How can users control the content posted about them online? Analyse and discuss who holds the copyright for certain types of content (photos, videos, etc.) posted on social networks or on the web. See more about privacy in Module 8.
- Discuss the asymmetry between what users can recall about themselves, their history and geography, and what Internet companies know about them.
- Examine the United Nations Convention on the Rights of the Child. It sets out the basic human rights that children everywhere have: the right to survival; to develop to the fullest; to protection from harmful infuences, abuse and exploitation; and to participate fully in family, cultural and social life. Are there Convention articles that require the development of appropriate guidelines for protecting children from information and material that could harm their well-being?
- The International Telecommunication Unionās Technology Watch Report 10 has argued that the need to address the concerns of privacy and security is the No. 1 priority to improve life in the digital world and on the Internet (ITU 2009). The absence of robust security inevitably presents a risk to all systems and processes that rely on electronic communication (ITU 2006). Weak or absent security leads to growing occurrences of cybercrimes. Some have argued that āaccess to communication is useless if peace and safety online cannot be guaranteedā¦ā, and proposed that we should see the digital world as a 'gated community, where users may have to sacrifice certain freedoms and anonymity in return for better securityā¦ā (ITU News)
- However, many activists for freedom on the Internet are concerned about government interference and control. There is growing concern that the Internet is becoming a closed controlled space rather than an open public-interest space and is increasingly dominated by governments and corporations. It may be that for some governments and businesses, security is the dominant concern, while this is not the case for many citizens. The right to privacy, which is supported by anonymity and encryption, is seen as important to avoid persecution for certain views, to ameliorate the tracking of surveillance business models, and to not open back doors to cybercriminals.
- Discuss the statements in quotes above. Do you think governments need to take steps to make the virtual world more secure? Why or why not?
- Do you agree that privacy will have to be sacrificed to some extent in some situations? What are some of the implications? What would happen if the Internet were controlled by any one country or region of the world?
- Carry out a search on several types of tools being used for Internet security ā encryption; password protection; monitoring the disclosure of security breaches by governments and companies that are hacked. Discuss their benefits and disadvantages.
- Select any social network website or software that you use. Experiment with the privacy settings. Search in the āterms of useā for the terms āprivacy and securityā. Do you think that the privacy safeguards are sufficient to help you avoid some of the risks described in this section (see boxes on risks related to Internet content and contact)? What are some of the repercussions when you put the privacy settings to the maximum level? See more about privacy in Module 8 and social media in Modules 7 and 11.
Assessment & Recommendations
- Written examinations
- Essays, refection and reaction papers to lectures, case studies, audiovisual presentations/viewings
- Participation in group learning activities
- Production of information-education-communication materials (e.g. posters, brochures, infographics, social media cards, vlogs)
- Research paper
- Investigative story/report