6:33
1.0.Protection from misinformation and exposing fake news: benefits of "Information Security" course
Prometheus
2:03
1.1. How to protect yourself from fakes and lies in the media? Maintaining information hygiene
3:43
1.2. Manipulative content and types of disinformation. How to recognize a lie?
3:01
1.3. How do emotions interfere with content consumption? Rational thinking and filtering information
2:16
1.4. Information bubbles and algorithms on the Internet. What kind of information do we consume?
1:51
1.5. How to check information for accuracy? Finding the truth and the importance of primary sources
1:57
1.6. How do conspiracy theories work? Lazy thinking and simplification of the world picture
1:15
1.7. How are we manipulated by numbers? A common tool of disinformers
2:46
1.8. Between truth and fake. How to believe the media and not be deceived?
1:11
1.9. How can I protect myself from online intruders? Personal data and online fraud
1:39
1.10. Don't be a fanatic, but don't be a cynic either
2:34
2.1. How to recognize manipulation in medicine?
2:11
2.2. How do the media misinform? Imposing ready-made solutions and manipulative advertising
2:50
2.3. Manipulation with a serious face. How to disinform with scientific data
2:59
2.4. How do marketers manipulate? Imposing desires, artificial demand, and the illusion of economy
2:49
2.5. How does advertising manipulate? Illusion of care and appeal to eternal values
3:32
2.6 How are talk shows manipulated? Playing on emotions, pseudo-experts, lies on the air
3:31
2.7. How do friends and family manipulate you? Unconscious emotional influence, playing on feelings
4:43
3.1 How to avoid manipulations in Google? Search engine algorithms and formation of search results
3:36
3.2. How to avoid manipulation on YouTube? Fake content and pseudo-popular videos
4:16
3.3 How to avoid manipulations on Telegram? Anonymous channels and the illusion of awareness
3:11
3.4 How to avoid manipulations in Viber? Disinformation and bots in the popular messenger
8:31
4.1 Why social networks are dangerous and how to protect yourself from digital threats
5:10
4.2. Bots and trolls in social networks: who they are and how to detect them
4:22
4.3. Ten tools for verifying information on social media
9:37
5.1. What are fakes and how is false information created?
6:46
5.2. How to identify fake photos or videos? Rules for checking visual content
5.3 Digital tools for checking photo and video fakes
5:25
6.1. From the State Statistics Service to the World Bank: where to look for reliable data
10:26
6.2. Information out of context is an effective tool for manipulators
7:42
6.3. Effective fact-checking: how to expose lies in ratings and opinion polls
7:22
6.4. How to verify information: comparing data and finding reliable experts
7:28
7.1. How fraudsters manipulate the topic of health and treatment? Life-threatening false information
7:24
7.2 Mechanisms of disinformation dissemination: how buckwheat and toilet paper defeated common sense
5:22
7.3. Information misrepresentations about medicines: how they get into the media
7:40
7.4. Conspiracy theories: how to speak with those who believe that Gates is chipping by vaccination
9:17
7.5. Overview of fakes about vaccinations. How to convince an opponent of vaccination?
8:08
8.1. What is digital security and how to avoid becoming a victim of cybercrime
10:23
8.2 Digital hygiene and conspiracy theories. Why we distrust scientific and technological progress?
6:23
8.3. How to protect the organization from a cyber attack? Action plan in case of computer hacking
7:21
9.1. Why gadgets became the epicenter of many people's lives? Pros and cons of modern technologies
9:45
9.2. How to protect data on a smartphone? Which is better - Passcode or Face ID?
8:40
9.3. Do mobile apps steal personal data? Truth and myths about apps in your smartphone
10:57
10.1. Is it safe to communicate on social media? Risks of communication on the Internet
9:39
10.2. How to choose a secure messenger? Privacy policy and collection of personal data of users
9:00
10.3. E-mail correspondence. Useful tips for protecting your email
1:06
10.4. Protection against manipulation and digital literacy. About the benefits of the online course