bg‑azure

The picture below shows a person who is about to use their credit card online. Do you think it’s always safe? When might it be dangerous to give our personal details online? In this section, you are going to read a text dealing with the possible consequences of revealing our personal data online. Before you read it, think of what some of the consequences may be.

Poniższa ilustracja przedstawia osobę, która ma zamiar użyć w internecie swojej karty kredytowej. Czy uważasz, że zawsze jest to bezpieczne? Kiedy podawanie naszych danych osobowych online może być groźne? W tej sekcji przeczytasz tekst dotyczący możliwych konsekwencji ujawniania danych osobowych w sieci. Zanim się z nim zapoznasz, zastanów się, jakie mogą być niektóre z tych konsekwencji.

R1N9OO3jgtfwh
Are you sure it’s safe?
Czy to na pewno bezpieczne?
Źródło: dostępny w internecie: www.pixabay.com [dostęp 6.09.2022], domena publiczna.
R17SBd7KIYtp2
Exercise 1
Drag and drop the expressions into the correct category. The number of elements in each set is equal. 1. Risky behaviour online Możliwe odpowiedzi: 1. following only your instinct and feelings without checking facts, 2. applying the ‘limited trust’ rule, 3. giving our personal data every time we are asked for it, 4. posting everything we do online (holidays, meals, places we visit, etc.), 5. trusting everyone and everything we encounter online, 6. checking security filtres, 7. thinking twice before making a decision e.g. what to click on, etc., 8. following your reasonable thinking and experience, 9. acting spontaneously, 10. checking sources of information and people’s credibility 2. Safe behaviour online Możliwe odpowiedzi: 1. following only your instinct and feelings without checking facts, 2. applying the ‘limited trust’ rule, 3. giving our personal data every time we are asked for it, 4. posting everything we do online (holidays, meals, places we visit, etc.), 5. trusting everyone and everything we encounter online, 6. checking security filtres, 7. thinking twice before making a decision e.g. what to click on, etc., 8. following your reasonable thinking and experience, 9. acting spontaneously, 10. checking sources of information and people’s credibility
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.

Read the text and do the exercises below.

Scammers? Trolling? Phishing? Never heard of them before
Anna Caruk Scammers? Trolling? Phishing? Never heard of them before

Do you remember what your parents told you every time you wanted to use the computer? Don’t post personal details online! Well, there is a very good reason for this advice. With the popularity of the Internet growing rapidly over the past decades, more and more people are sharing personal information. Most of them have social mediasocial mediasocial media accounts, where they post anything and everything about their lives, even their real names, addresses, phone numbers, and more! Why is this a problem, you might ask? There are hundreds of thousands of Internet users who can use this data to try and take advantage of it.

Today, most teenagers and young adults have acquired digital citizenshipdigital citizenshipdigital citizenship, which means that they are able to use the Internet and other technologies in a responsible manner and that they are part of an online communityonline communityonline community. However, not everybody can be trusted with all your information. Not everyone you engage withengage withengage with online has good intentions when it comes to the data shared. Some people might attempt different forms of identity theftidentity theftidentity theft, claiming to be someone they are not, often for monetary gain, but sometimes just to trolltrolltroll. TrollingtrollingTrolling is a very common practice on social media. People spread fake newsfake newsfake news in order to push an agendapush an agendapush an agenda or just out of boredom - the reasons can vary. This is where sometimes a grey areagrey areagrey area appears in terms of laws, because we have digital rightsdigital rightsdigital rights, which are quite complex. The concept of digital rights means that every single person has the right to be able to use, create, and publish mediamediamedia online. It also involves rights to privacyprivacyprivacy, meaning that you can withhold personal details from companies if you wish.

Not allowing certain companies or websites access to your personal details can improve your online safety. One of the threats in the virtual world is phishingphishingphishing, a type of social engineeringsocial engineeringsocial engineering attack often used to steal user data, which is a very common way for hackers to obtain personal information such as credit card numbers and account details by pretending to be a trusted source. These phishing attacks can lead to identity theft and loss of large amounts of money. There are ways to preventpreventprevent the attacks, such as never revealing sensitive information to people you do not know or to sites you are unsure of. However, phishing attackers will often pretend to be a trusted site to trick people into revealing their sensitive datasensitive datasensitive data. Phishers will often choose specific demographicsdemographics demographics who may be an easier target for them. People who are more likely to be targeted are the elderly, as they can often be more trusting of these scammersscammers [scammer]scammers. However, there are many older people who use the internet safely and responsibly. These seniors are often referred to as grey surfersgrey surfers [grey surfer]grey surfers.

Another phrase you may have heard your parents say to you while you were browsing the web is “don’t believe everything you read on the Internet.” This is a very important thing to keep in mind, as the Internet is a very powerful tool, especially in the age of social media.  As more and more people spread misinformation, fake news, or just lies in general, it has made it incredibly important for the Internet users to have good critical thinkingcritical thinkingcritical thinking skills. This means being able to recognise which information posted online is true and which is false. This is now more important than ever, with most of us getting at least some of their news from digital textsdigital texts [digital text]digital texts which could be written by anyone. Finding credible sourcescredible sources [credible source]credible sources of news online is difficult as the number of people who can post things on the web is in the hundreds of millions. Many people are still unable to determine which sources are credible and which are not because of the digital dividedigital dividedigital divide, that is the lack of equality in the access to the Internet.  Thus, it might be hard to get better at using something you hardly ever have the opportunity to use.

1 Źródło: Anna Caruk, licencja: CC BY-SA 3.0.
R1BVuJ4Wwtlsg
Exercise 2
Read the text above and choose the correct answer. There is only one correct answer in each point.
  1. According to the article, many people
    a) don’t care about what they post.
    b) are eager to share information about their lives.
    c) are not capable of protecting themselves online.

  2. According to the author of the article
    a) most people online have bad intentions.
    b) there are people online who shouldn’t be trusted.
    c) the worst online practice is trolling.

  3. You are likely to experience trolling
    a) if you go offline.
    b) if you get bored online.
    c) on social networking sites.

  4. Digital rights mean that
    a) everyone has the right to do whatever they want online.
    b) everyone has the right to use some media online.
    c) everyone can use, create and publish media online.

  5. Phishing is a common practice to steal people’s
    a) name, surname, e-mail address, pin code for their bank account.
    b) computer data, files, browser’s history.
    c) photos, posts on social networking sites, opinions.

  6. People who are often targeted for phishing are
    a) under 10 years old.
    b) between 20-30 years old.
    c) over 60 years old.

  7. Grey surfers are people who
    a) are old but can use the Internet safely.
    b) are young but do not use the Internet safely.
    c) are old and do not know how to use the Internet safely .

  8. Finding credible sources online
    a) is close to impossible because of hundreds of millions of users.
    b) is quite challenging because of the number of Internet users.
    c) is moderately hard because of a digital divide.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
R1Xdj4X6tiJeD
Exercise 3
Read the text above. Then, drag and drop the elements below to fill in the definitions.

  1. 1. Digital divide, 2. Digital rights, 3. Digital texts, 4. Digital citizenship is the state of being skilled at using the internet in order to communicate with others.
  2. 1. Digital divide, 2. Digital rights, 3. Digital texts, 4. Digital citizenship are those human and legal rights that allow individuals to access, use, create, and publish digital media or to access and use computers, other electronic devices, and telecommunications networks.
  3. 1. Digital divide, 2. Digital rights, 3. Digital texts, 4. Digital citizenship are audio, visual or multimodal texts produced through digital or electronic technology which may be interactive and include animations and / or hyperlinks.
  4. 1. Digital divide, 2. Digital rights, 3. Digital texts, 4. Digital citizenship: the problem of some members of society not having the opportunity or knowledge to use computers and the internet that others do.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
R1d6WOhgwO1Lr
Exercise 4
Read the text above. Then, type in the missing words to complete the text below in the right form. When my grandma joined the 1.     oTu uzupełnij cTu uzupełnij,     I was terrified! I was so afraid she was going to 2.     eTu uzupełnij wTu uzupełnij     the wrong people online and some of them might be willing to 3.     tTu uzupełnij her or that she’s going to be a victim of 4.     pTu uzupełnij, iTu uzupełnij tTu uzupełnij     or some other 5.     sTu uzupełnij. I reminded her to never share her 6.     sTu uzupełnij dTu uzupełnij     with anyone online, and not to believe any 7.     fTu uzupełnij nTu uzupełnij.     Fortunately, she knows how to use 8.     cTu uzupełnij tTu uzupełnij, which means that she recognises which information is true, and turned out to be a responsible 9.     gTu uzupełnij sTu uzupełnij     who does her best to use 10.     cTu uzupełnij sTu uzupełnij only. What a relief!
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.

Indeks dolny Słownik Indeks dolny koniec

agenda
agenda

/ əˈdʒendə /

RNbGsIUoS4Lal1
Nagranie dźwiękowe

plan, program (a secret aim or reason for doing something or a list of items to do during a meeting)

R8WscXBHXNLxS1
Nagranie dźwiękowe
credible sources [credible source]
credible sources [credible source]

/ ˈkredəbl̩ ˈsɔːsɪz / / ˈkredəbl̩ sɔːs /

R1Lvf1oamT0oG1
Nagranie dźwiękowe

wiarygodne źródła [wiarygodne źródło] (a place, person, or thing whose information you can trust)

R5tFBaUfejpi91
Nagranie dźwiękowe
critical thinking
critical thinking

/ ˈkrɪtɪkl̩ ˈthetaɪŋkɪŋ /

R1P4PpVfV2hni1
Nagranie dźwiękowe

krytyczne myślenie (the ability to think clearly and rationally, understanding the logical connection between ideas)

R15HMeh3yb41e1
Nagranie dźwiękowe
demographics
demographics

/ deməˈgræfɪks /

RzanNv1FAyBYE1
Nagranie dźwiękowe

profil demograficzny (ludności) (statistical data relating to the population and particular groups within it)

RjXRVkfIpSQqd1
Nagranie dźwiękowe
digital citizenship
digital citizenship

/ ˈdɪdʒɪtl̩ ˈsɪtɪzənʃɪp /

ROZlHwij1kwKW1
Nagranie dźwiękowe

cyfrowe obywatelstwo (the responsible use of technology by anyone who uses computers, the Internet, and digital devices)

RdKwYuGOkAHgM1
Nagranie dźwiękowe
digital divide
digital divide

/ ˈdɪdʒɪtl̩ dɪˈvaɪd /

R1VScsfAOxI1E1
Nagranie dźwiękowe

dyskryminacja cyfrowa (the gulf between those who have ready access to computers and the internet, and those who do not)

R1F3nXZjw1cI31
Nagranie dźwiękowe
digital rights
digital rights

/ ˈdɪdʒɪtl̩ raɪts /

ROUmLsM1DG1VT1
Nagranie dźwiękowe

prawa cyfrowe (human rights online that concern access, participation, data security, and privacy)

R1EKXVhRr8nZe1
Nagranie dźwiękowe
digital texts [digital text]
digital texts [digital text]

/ ˈdɪdʒɪtl̩ teksts / / ˈdɪdʒɪtl̩ tekst /

R1MldHrTKmYS61
Nagranie dźwiękowe

teksty cyfrowe [tekst cyfrowy] (texts you can only access online)

Rfqj8tnH4Z5Qy1
Nagranie dźwiękowe
engage with
engage with

/ ɪnˈɡeɪdʒ wɪð /

RjupDYxBPhd9h1
Nagranie dźwiękowe

mieć z kimś do czynienia (to become involved with)

R1SXeYvMGI4NQ1
Nagranie dźwiękowe
fake news
fake news

/ feɪk njuːz /

RNirACBxwg1Tp1
Nagranie dźwiękowe

fałszywe informacje (information that is untrue)

R1OS0S1S4VpHQ1
Nagranie dźwiękowe
grey area
grey area

/ ˈgreɪ ˈeəriə /

R1UpE78SJ26JJ1
Nagranie dźwiękowe

szara strefa, niejasna sytuacja (a situation that is not clear or where the rules are not known)

R1CHqnSFWm1IO1
Nagranie dźwiękowe
grey surfers [grey surfer]
grey surfers [grey surfer]

/ ˈgreɪ ˈsɜːfəz / / ˈgreɪ ˈsɜːfə /

RC6wxPoFeLhTu1
Nagranie dźwiękowe

seniorzy internauci [senior internauta] (elderly people online)

RK4NjUCplganm1
Nagranie dźwiękowe
identity theft
identity theft

/ aɪˈdentɪti thetaeft /

R1cEYMRyM10UG1
Nagranie dźwiękowe

kradzież tożsamości (the crime of obtaining the personal or financial information of another person to use their identity to commit fraud)

R1ZtntAyQgxtG1
Nagranie dźwiękowe
media
media

/ ˈmiːdɪə /

R1UiagZoFXNx71
Nagranie dźwiękowe

Media (the main means of mass communication)

RKaOXt9deQc8R1
Nagranie dźwiękowe
online community
online community

/ ˈɒnˌlaɪn kəˈmjuːnɪti /

RCdsgua2mJDvT1
Nagranie dźwiękowe

społeczność internetowa (a community whose members interact with each other primarily via the Internet)

R17rcRif11DN31
Nagranie dźwiękowe
phishing
phishing

/ ˈfɪʃɪŋ /

RzOMPZo3TgDyM1
Nagranie dźwiękowe

wyłudzanie poufnych informacji osobistych przez podszywanie się pod jakąś osobę lub instytucję (a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of communication)

RyDjcKzL8QZjS1
Nagranie dźwiękowe
prevent
prevent

/ prɪˈvent /

R2t5DFufXLlvc1
Nagranie dźwiękowe

powstrzymywać, zapobiegać (keep from happening)

R1QFPxB6gi7Ll1
Nagranie dźwiękowe
privacy
privacy

/ ˈprɪvəsi /

RjCPmLyPhYC6n1
Nagranie dźwiękowe

Prywatność (the state of being alone, or the right to keep one's personal matters and relationships secret)

R14M7fogIV2bA1
Nagranie dźwiękowe
push an agenda
push an agenda

/ pʊʃ ən əˈdʒendə /

RxU6ryd5wb4eR1
Nagranie dźwiękowe

przeforsować opinię/zdanie (to strongly promote the things you want to get done)

R1B1PukB7D2QZ1
Nagranie dźwiękowe
scammers [scammer]
scammers [scammer]

/ ˈskæmərz / / ˈskæmə /

RCg6PX7NyjcB31
Nagranie dźwiękowe

oszuści, naciągacze [oszust/oszustka, naciągacz/naciągaczka] (a person who commits fraud or participates in a dishonest scheme)

R1OSUBVN71i221
Nagranie dźwiękowe
sensitive data
sensitive data

/ ˈsensətɪv ˈdeɪtə /

RctgfbMzbBsIW1
Nagranie dźwiękowe

dane wrażliwe (information that must be protected against unauthorized disclosure)

R1ZyJgi32VAWg1
Nagranie dźwiękowe
social engineering
social engineering

/ ˈsəʊʃl ˌendʒɪˈnɪərɪŋ /

RmAoCdA6K54Vk1
Nagranie dźwiękowe

inżynieria społeczna, socjotechnika; metody manipulowania ludźmi w celu wykorzystania ich słabości (a manipulation technique that exploits human error to gain private information, access, or valuables)

RugQy1YleR3551
Nagranie dźwiękowe
social media
social media

/ ˈsəʊʃl ˈmiːdɪə /

R1YKWKAqQFN0R1
Nagranie dźwiękowe

media społecznościowe (websites and applications that enable users to create and share content or to participate in social networking)

R1AfMGZ79KVCE1
Nagranie dźwiękowe
troll
troll

/ trəʊl /

Re78vDDlduiBQ1
Nagranie dźwiękowe

udzielać się np. na forach internetowych w celu ośmieszania lub obrażania innych użytkowników (to leave an intentionally annoying or offensive message on the internet, in order to upset someone)

R1URMKRoDb5ZF1
Nagranie dźwiękowe
trolling
trolling

/ ˈtrəʊlɪŋ /

RgjYzDLjz4pcL1
Nagranie dźwiękowe

ośmieszanie lub obrażanie innych użytkowników, np. w mediach społecznościowych (leaving an intentionally annoying or offensive message on the internet, in order to upset someone)

R1BCChJn50rX71
Nagranie dźwiękowe

Źródło: GroMar Sp. z o.o., licencja: CC BY‑SA 3.0

RnX2wrJ4RTeRR
(Uzupełnij).
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.