-
Psychological hacking
Psychological hacking is the process of obtaining confidential information from a person through trickery.
-
Ageism online
Ageism refers to the stereotypes (how we think), prejudice (how we feel) and discrimination (how we act) towards others or oneself based on age. Ageism affects everyone.
-
Browser
It is software for accessing the Internet.
-
Clone stamp
Clone stamp tool possibilities us to copy image details and to paste them in the place of our choosing.
-
Cloud
online storage and digital library of files (audio, pics, etc.) from anywhere / anytime protected by access credentials.
-
Communication online
Online communication is a form of communication that consists of using the various existing channels on the Internet to communicate and interact online in order to relay a message adapted to a target audience.
-
Consent
Any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.
-
Controller
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.
-
Contrast
It is the difference in light intensity between the black and white tones of the image. High contrasts darken shadows and dark tones more, which make whites brighter; while the bass contrasts by decreasing the intensity of both ranges.
-
Cultural opportunities online
the events, online exhibitions, photo-art galleries available in social media.
-
Cultural context
Cultural context is related to the society where individuals are raised in and at how the culture affects behavior. It incorporates values that are learned and attitudes that are shared among groups of people. It includes beliefs, meanings, customs, ideas, language, norms. Refers to the symbolic meaning, artistic dimension and cultural values that originate from or express cultural identities.
-
Cyberbullying
is bullying that takes place over digital devices like cell phones, computers, and tablets
-
Digital identity
Digital identity is now often used in ways that require data about persons stored in computer systems to be linked to their civil, or national, identities.
-
Digital Money
any form of currencies that exists only in digital format. Digital money is typically exchanged via credit cards, online payment systems and – most recently – cryptocurrencies in general
-
Data encryption
IT process converting data and information into a code, protecting the access and use of these data from unauthorized sources. Encrypted data can only be read, and accessed, by those owning the correct decrypting key (i.e., password)
-
Export
we will finalize our audiovisual production by giving it the output characteristics of the system in which it will be distributed.
-
Fake news
False news stories, often of a sensational nature, created to be widely shared or distributed for the purpose of generating revenue, or promoting or discrediting a public figure, political movement, company, etc.
-
Fake charity
type of fraud that occurs when charitable organizations solicit funds from the public for philanthropic goals, such as seeking cures for diseases or aiding the families of slain police officers.
-
Hate speech
Hate speech is spoken words that are offensive, insulting, and/or threatening to an individual or group based on a particular attribute of that person or persons being targeted.
-
JPEG
Image compression data standard: reduces the size of the image, but the original quality of the photo (before being compressed) is no longer obtained. JPEG appears at the end of the file, for example "beach.jpeg"
-
Lottery Scam
A lottery scam is a type of advance-fee fraud which begins with an unexpected email notification, phone call, or mailing (sometimes including a large check) explaining that "You have won!" a large sum of money in a lottery.
-
Layers
each part that you add to create your final video. For example, you can have three layers: a video plus a text plus an audio.
-
Missing information
is incomplete or inaccurate information that aims to distract from accurate information, cause confusion, or change the context of a sentence, action, activity, etc.
-
Online security
Internet security consists of a range of security tactics for protecting activities and transactions conducted online over the internet.
-
Online shopping
The activity or action of buying products or services over the Internet. It means going online, landing on a seller’s website, selecting something, and arranging for its delivery.
-
Online subscription
(typically) monthly fee payed by the user to access digital services
-
Online safety
Online Safety is being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet, these could be security threats, protecting and managing your personal data online, and avoiding harmful or illegal content. Online Safety protects the people performing actions online through awareness, education, information and technology.
-
On- Demand
On-Demand (also referred to as Video On Demand or VOD) allows the viewer to watch the selected movie or TV content whenever at his or her schedule’s convenience. With On-Demand, viewers can pause, play, fast-forward, rewind, and re-watch the show On-Demand as much as they would like.
-
Personal data
Any information relating to an identified or identifiable natural person (“data subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
-
Personal data breach
A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.
-
Personal information
In order to create an account and complete an online economic transaction, some personal information will be requested.
-
Phishing
Phishing attacks are a means to persuade potential victims into divulging sensitive information such as credentials, or bank and credit card details. They involve a combination of social engineering and deception. The attack usually takes the form of SPAM mail, malicious Web sites, email messages, or instant messages, appearing to be from a legitimate source such as a bank, or a social network. The attackers often use scare tactics or urgent requests to entice recipients to respond, and these fraudulent messages are usually not personalized and may share similar generic properties. Source: ENISA
-
Phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
-
Photo Retouching
means the elimination of all the imperfections from a photo, which usually includes colour and tone correction, blemishes and under-eye circles removal, change of brightness, contrast and saturation.
-
Podcast
is an episodic series of spoken-word digital audio files that a user can download to a personal device for easy listening. Streaming applications and podcasting services provide a convenient and integrated way to manage a personal consumption queue across many podcast sources and playback devices.
-
Profiling
Any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements.
-
Promoting own cultural activities in social
publishing your own content, photo-video materials on Facebook, instagram, youtube, or post in groups, or using Facebook advertising tools to promote own pages and posts.
-
Processing
Any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as: collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
-
Processor
A natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller.
-
Password
It is secret data, typically a string of characters, usually used to confirm a user's identity.
-
Payment methods
Nowadays, there are many payment methods to buy services and goods online. The most common one is via credit card, but it is also possible to consider, for example PayPal, bank transfer, prepaid card, gift card, cash on delivery.
-
Refresh button
The refresh button, also known as the refresh option, is a function of all Internet browsers. It is used to ask the browser to send you back to the previous page.
-
Registration
Very often it is necessary to register for a personal account in order to buy something (service, good, etc) from a website/online shopping platform.
-
Restriction of Processing
The marking of stored personal data with the aim of limiting their processing in the future.
-
Security Vulnerability
A security vulnerability is a weakness an adversary could take advantage of to compromise the confidentiality, availability, or integrity of a resource. In this context a weakness refers to implementation flaws or security implications due to design choices. For instance, being able to overrun a buffer’s boundaries while writing data to it introduces a buffer overflow vulnerability. Examples of notable vulnerabilities are Heartbleed, Shellshock/Bash and POODLE. Source: ENISA
-
Smart TV
Also known as an Internet TV, a Smart TV is any TV that can provide additional programs through internet connectivity. It's like having a computer built into your TV.
-
Social media
Social media are interactive technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks.
-
Social media
a social network is a service that brings together various people to create an exchange on a particular subject or not
-
Social media profile
Social media profiles are a description of the social characteristics of individuals that identify them on social media sites such as Facebook or Instagram. Profiles describe a number of characteristics of individuals, such as interests, professional affiliations, status, recent activity, and geographical location. Profiles are a person's digital DNA and also display information that helps to understand the type and strength of a person's relationships with others.
-
Social media safety
Social media security refers to all the measures that the user should take to avoid risks, scams, and attacks on their personal account
-
Social media safety
Social media security refers to all the measures that the user should take to avoid risks, scams, and attacks on their personal account.
-
Streaming
The technology of transmitting audio and video files in a continuous flow over a wired or wireless internet connection.
-
Streaming service
A streaming service is an online provider of entertainment services – typically, video & music – that shares the content via web connection to a subscriber profile.
-
Saturation
Intensity of color in a photograph. The higher the saturation, the colors become stronger and brighter. At lower saturation, the image will be more washed out or grayish.
-
Scam
A scam or confidence trick is an attempt to defraud a person or group by gaining their confidence.
-
Scammer
A scammer can research many more people and choose his victim more carefully. This and other factors make online scams more and more common.
-
Third-party products
refers to any product and/or service of a third party which is offered by or through the intermediary of the Bank.
-
Titles
the opportunity to overlay text on your video, it can be an animated text, or a text that does not move
-
Transition
Transition uses cropped frames or animations to move to the next scene in a way other than simple cut/scene skip.
-
Two-step authentication
It is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
-
Url of a page
A URL is nothing more than the address of a given unique resource on the Web.
-
Video editor
handles all recorded audiovisual material to transform it into a finished product ready for playback.
-
Website security
Before buying online, it is important to make sure the website is reliable and safe.
-
Identity theft
The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
-
Online Reputation
It is the reputation of a company, person, product, service, or any other element on the Internet and digital platforms.