Glossary

Psychological hacking is the process of obtaining confidential information from a person through trickery.
Ageism refers to the stereotypes (how we think), prejudice (how we feel) and discrimination (how we act) towards others or oneself based on age. Ageism affects everyone.
It is software for accessing the Internet.
Clone stamp tool possibilities us to copy image details and to paste them in the place of our choosing.
online storage and digital library of files (audio, pics, etc.) from anywhere / anytime protected by access credentials.
Online communication is a form of communication that consists of using the various existing channels on the Internet to communicate and interact online in order to relay a message adapted to a target audience.
Any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.
It is the difference in light intensity between the black and white tones of the image. High contrasts darken shadows and dark tones more, which make whites brighter; while the bass contrasts by decreasing the intensity of both ranges.
the events, online exhibitions, photo-art galleries available in social media.
Cultural context is related to the society where individuals are raised in and at how the culture affects behavior. It incorporates values that are learned and attitudes that are shared among groups of people. It includes beliefs, meanings, customs, ideas, language, norms. Refers to the symbolic meaning, artistic dimension and cultural values that originate from or express cultural identities.
is bullying that takes place over digital devices like cell phones, computers, and tablets
Digital identity is now often used in ways that require data about persons stored in computer systems to be linked to their civil, or national, identities.
any form of currencies that exists only in digital format. Digital money is typically exchanged via credit cards, online payment systems and – most recently – cryptocurrencies in general
IT process converting data and information into a code, protecting the access and use of these data from unauthorized sources. Encrypted data can only be read, and accessed, by those owning the correct decrypting key (i.e., password)
we will finalize our audiovisual production by giving it the output characteristics of the system in which it will be distributed.
False news stories, often of a sensational nature, created to be widely shared or distributed for the purpose of generating revenue, or promoting or discrediting a public figure, political movement, company, etc.
type of fraud that occurs when charitable organizations solicit funds from the public for philanthropic goals, such as seeking cures for diseases or aiding the families of slain police officers.
Hate speech is spoken words that are offensive, insulting, and/or threatening to an individual or group based on a particular attribute of that person or persons being targeted.
Image compression data standard: reduces the size of the image, but the original quality of the photo (before being compressed) is no longer obtained. JPEG appears at the end of the file, for example "beach.jpeg"
A lottery scam is a type of advance-fee fraud which begins with an unexpected email notification, phone call, or mailing (sometimes including a large check) explaining that "You have won!" a large sum of money in a lottery.
each part that you add to create your final video. For example, you can have three layers: a video plus a text plus an audio.
is incomplete or inaccurate information that aims to distract from accurate information, cause confusion, or change the context of a sentence, action, activity, etc.
Internet security consists of a range of security tactics for protecting activities and transactions conducted online over the internet.
The activity or action of buying products or services over the Internet. It means going online, landing on a seller’s website, selecting something, and arranging for its delivery.
(typically) monthly fee payed by the user to access digital services
Online Safety is being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet, these could be security threats, protecting and managing your personal data online, and avoiding harmful or illegal content. Online Safety protects the people performing actions online through awareness, education, information and technology.
On-Demand (also referred to as Video On Demand or VOD) allows the viewer to watch the selected movie or TV content whenever at his or her schedule’s convenience. With On-Demand, viewers can pause, play, fast-forward, rewind, and re-watch the show On-Demand as much as they would like.
Any information relating to an identified or identifiable natural person (“data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.
In order to create an account and complete an online economic transaction, some personal information will be requested.
Phishing attacks are a means to persuade potential victims into divulging sensitive information such as credentials, or bank and credit card details. They involve a combination of social engineering and deception. The attack usually takes the form of SPAM mail, malicious Web sites, email messages, or instant messages, appearing to be from a legitimate source such as a bank, or a social network. The attackers often use scare tactics or urgent requests to entice recipients to respond, and these fraudulent messages are usually not personalized and may share similar generic properties. Source: ENISA
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
means the elimination of all the imperfections from a photo, which usually includes colour and tone correction, blemishes and under-eye circles removal, change of brightness, contrast and saturation.
is an episodic series of spoken-word digital audio files that a user can download to a personal device for easy listening. Streaming applications and podcasting services provide a convenient and integrated way to manage a personal consumption queue across many podcast sources and playback devices.
Any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements.
publishing your own content, photo-video materials on Facebook, instagram, youtube, or post in groups, or using Facebook advertising tools to promote own pages and posts.
Any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as: collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
A natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller.
It is secret data, typically a string of characters, usually used to confirm a user's identity.
Nowadays, there are many payment methods to buy services and goods online. The most common one is via credit card, but it is also possible to consider, for example PayPal, bank transfer, prepaid card, gift card, cash on delivery.
The refresh button, also known as the refresh option, is a function of all Internet browsers. It is used to ask the browser to send you back to the previous page.
Very often it is necessary to register for a personal account in order to buy something (service, good, etc) from a website/online shopping platform.
The marking of stored personal data with the aim of limiting their processing in the future.
A security vulnerability is a weakness an adversary could take advantage of to compromise the confidentiality, availability, or integrity of a resource. In this context a weakness refers to implementation flaws or security implications due to design choices. For instance, being able to overrun a buffer’s boundaries while writing data to it introduces a buffer overflow vulnerability. Examples of notable vulnerabilities are Heartbleed, Shellshock/Bash and POODLE. Source: ENISA
Also known as an Internet TV, a Smart TV is any TV that can provide additional programs through internet connectivity. It's like having a computer built into your TV.
Social media are interactive technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.
a social network is a service that brings together various people to create an exchange on a particular subject or not
Social media profiles are a description of the social characteristics of individuals that identify them on social media sites such as Facebook or Instagram. Profiles describe a number of characteristics of individuals, such as interests, professional affiliations, status, recent activity, and geographical location. Profiles are a person's digital DNA and also display information that helps to understand the type and strength of a person's relationships with others.
Social media security refers to all the measures that the user should take to avoid risks, scams, and attacks on their personal account
Social media security refers to all the measures that the user should take to avoid risks, scams, and attacks on their personal account.
The technology of transmitting audio and video files in a continuous flow over a wired or wireless internet connection.
A streaming service is an online provider of entertainment services – typically, video & music – that shares the content via web connection to a subscriber profile.
Intensity of color in a photograph. The higher the saturation, the colors become stronger and brighter. At lower saturation, the image will be more washed out or grayish.
A scam or confidence trick is an attempt to defraud a person or group by gaining their confidence.
A scammer can research many more people and choose his victim more carefully. This and other factors make online scams more and more common.
refers to any product and/or service of a third party which is offered by or through the intermediary of the Bank.
the opportunity to overlay text on your video, it can be an animated text, or a text that does not move
Transition uses cropped frames or animations to move to the next scene in a way other than simple cut/scene skip.
It is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
A URL is nothing more than the address of a given unique resource on the Web.
handles all recorded audiovisual material to transform it into a finished product ready for playback.
Before buying online, it is important to make sure the website is reliable and safe.
The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
It is the reputation of a company, person, product, service, or any other element on the Internet and digital platforms.
The European Commission's support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
Legal description – Creative Commons licensing: The materials published on the SOS Creativity project website are classified as Open Educational Resources' (OER) and can be freely (without permission of their creators): downloaded, used, reused, copied, adapted, and shared by users, with information about the source of their origin.