The cloud provides storage space, computing power and executable software in a remote data center. The English term takes into account the fact that the server used for this purpose is not directly visible to users, but is hidden as if behind a cloud.
Tendencies inherent in human thinking that can lead to errors in judgment. Awareness of cognitive biases is critical to critically evaluate information and recognize potential disinformation.
Cyber security refers to the practice of protecting computer systems, networks, and digital information from unauthorized access, theft, and damage. It involves implementing measures to prevent cyber threats, such as hacking, data breaches, and malware attacks. The goal of cybersecurity is to ensure the confidentiality, integrity, and availability of digital assets, safeguarding individuals and organizations against potential risks and vulnerabilities in the interconnected digital world.
In a data backup, data is copied to an external storage medium. In this way, the data can be restored promptly if a data loss occurs.
Data Management is the practice of ingesting, processing securing and storing an organization's data.
Potential hazards or uncertainties associated with using digital financial services, including online fraud, identity theft, data breaches, scams, or unauthorized access to financial accounts.
The trail of information and data that is left behind by an individual's online activities, including social media posts, online purchases, and website visits.
Digital literacy refers to the ability to effectively navigate, evaluate, and utilise digital technologies and information in various contexts. It encompasses the skills and knowledge required to critically assess digital content, understand online privacy and security, communicate and collaborate online, and make informed decisions in the digital realm. Digital literacy is essential for individuals to participate fully in the digital age and effectively engage with digital tools and platforms.
False or misleading information deliberately disseminated to deceive or manipulate people, with adverse effects on individuals and society.
False or misleading information that is intentionally disseminated to deceive or manipulate people, with negative effects on individuals and society (in this case, health).
The process of assessing the credibility of sources and verifying the accuracy of health information through additional research and analysis (health experts on specialized websites - health portals), checking references.
Ability to read, use a computer, search for information, understand and contextualize health information.
It is the process of converting plain text or data into a coded message that can only be read by authorised parties. It is used to protect sensitive information from unauthorised access, as it requires a decryption key to access the original data.
The process of verifying the accuracy and credibility of information through thorough research and analysis. Fact-checking helps distinguish between reliable sources and misleading content.
Financial literacy encompasses awareness, knowledge, skills, attitudes, and behaviors needed to make good financial decisions and improve your financial well-being.
FOMO refers to the fear or anxiety of not being included or missing out on exciting experiences or opportunities, often fuelled by social media and the constant need to stay connected and updated with others' activities.
Personal, cognitive, and social skills that determine a person's ability to access, understand, and use (medical) information to promote and maintain good health.
Identify theft refers to the fraudulent acquisition and use of someone's personal information, such as their name, social security number, or financial details, without their consent. It involves impersonating the victim to carry out various illegal activities, including financial fraud, making unauthorized purchases, or committing other forms of identity-related crimes.
Malicious apps are applications that are designed to harm or compromise the security of a device or user's data. Installing apps from untrusted sources increases the risk of downloading malicious apps that can steal personal information or perform unauthorized actions.
A digital financial service that allows you to conduct banking transactions, such as checking account balances, transferring funds, paying bills, and managing financial accounts, through an internet-based platform provided by your bank.
Digital platforms or services that enable you to make payments electronically, including online purchases, money transfers, and bill payments, often using secure and convenient methods such as credit cards, digital wallets, or bank transfers.
Online safety refers to the measures and precautions taken to protect individuals and their personal information while using the internet and engaging in online activities. It encompasses practices and guidelines that aim to prevent various online risks such as cyberbullying, identity theft, fraud, hacking, and exposure to inappropriate content. Online safety involves understanding and implementing strategies to safeguard privacy, security, and well-being while using digital platforms.
A password is a secret combination of characters used to authenticate and gain access to a device or an account. It is recommended to set a strong password to protect sensitive information.
It refers to the process of creating and managing a unique and authentic image or identity for oneself in the digital world. It involves identifying one's strengths, values, and goals, and communicating them effectively. Personal branding is essential for establishing a positive online reputation, building credibility and trust, and creating opportunities for personal and professional growth. It includes activities such as creating a personal website, developing a social media presence, and engaging in online networking and collaboration.
Applications that provide tools and resources for managing finances, including expense tracking, bill reminders, goal setting, and credit score monitoring, helping you stay organized and make informed financial decisions.
They are common mistakes or challenges that individuals may encounter while engaging in digital sharing. They include sharing sensitive information with the wrong recipients, falling victim to phishing attacks, or unintentionally granting unauthorised access, among others.
Controls and options that allow individuals to manage the visibility and accessibility of their personal information on online platforms, ensuring that only desired individuals or groups can access it.
Developing the ability to resist and counter the influence of disinformation by developing critical thinking skills, being open to different perspectives, and actively seeking reliable sources of information.
Responsible behavior on the Internet, which includes verifying information. Use reliable sources to obtain health information. Follow specialized fact-checking websites and experts in various health fields.
Ethical and prudent behaviour when navigating the digital world. Responsible online behaviour includes verifying information, watching out for emotional triggers, and critically evaluating content before sharing or believing it.
Search service in the World Wide Web realized via an HTML document, with the help of which HTML documents can be found for a previously specified term.
Sensitive information refers to any data or details that, if disclosed or accessed by unauthorized individuals, could pose a risk to an individual's privacy, security, or well-being. It includes personally identifiable information (PII) such as full names, addresses, phone numbers, social security numbers, financial information, login credentials, and medical records. Sensitive information requires special protection and handling to prevent misuse, identity theft, fraud, or other harmful consequences.
Social engineering is a manipulative technique used by cybercriminals to deceive individuals and exploit their trust and emotions. It involves psychological manipulation rather than technical methods to trick people into revealing sensitive information or performing actions that may compromise their security. Examples of social engineering techniques include phishing emails, phone scams, pretexting, and impersonation. The goal of social engineering is to manipulate human behavior to gain unauthorized access to systems, networks, or personal information.
It refers to online platforms and websites that enable users to create and share content, connect with others, and engage in social networking. They are often used for sharing photos, videos, and updates, and include platforms such as Facebook, Twitter, Instagram, TikTok and LinkedIn.
Social media refers to online platforms and technologies that enable users to create, share, and exchange information, ideas, and content with others. These platforms typically involve user-generated content and facilitate communication, networking, and interaction among individuals or groups.
It is a document that individuals or businesses are required to file with the tax authorities to report their income, expenses, and other relevant financial information for a specific tax year. It serves as a formal declaration of one's taxable income and allows the tax authorities to calculate the amount of tax owed or the refund due.
An additional layer of security that requires users to provide two different forms of identification, typically a password and a unique code sent to their mobile device, to access their online accounts.
Accessibility means creating websites and mobile (web) applications in such a way that more people can use them without restriction. In this context, accessibility refers first and foremost to people with disabilities.