Irex logo Media logo
  • About the course
  • Learning Process
  • Units
  • en
    EN LV LT EE RU
| |
  • Units
  • |
    • About the course
    • Learning format
    • Units
    |Unit 3: Social media
    |
    • Unit 1: Media landscape
    • Unit 2: Types of media
    • Unit 4: Disinformation and manipulation
    • Unit 5: Wrapping up
    |Part A: How Social Media Works
    |
      |Quiz: Are You in a Filter Bubble?
      |
      • Quiz: Are You in a Filter Bubble?
      • Personalized Algorithms and Filter Bubbles
      • Inside the Filter Bubble
      • Beware Online Filter Bubbles
      • Algorithms in Social Media
      • Who Creates Popular Content on Social Media?
      • Data Protection and Safety Online
      • Social Media as a News Source
      |
      Units
      |
      Unit 3: Social media
      • Unit 1: Media landscape
      • Unit 2: Types of media
      • Unit 4: Disinformation and manipulation
      • Unit 5: Wrapping up
      |
      Part A: How Social Media Works
      • Part B: Cognitive Distortions
      |
      Quiz: Are You in a Filter Bubble?
      • Quiz: Are You in a Filter Bubble?
      • Personalized Algorithms and Filter Bubbles
      • Inside the Filter Bubble
      • Beware Online Filter Bubbles
      • Algorithms in Social Media
      • Who Creates Popular Content on Social Media?
      • Data Protection and Safety Online
      • Social Media as a News Source
      |
      Small cup
      Small cup marked
      Up to 5 minutes
      Middle cup
      Middle cup marked
      Up to 15 minutes
      Large cup
      Large cup marked
      15 minutes or more

      Unit 3

      Social media

      Part A: How Social Media Works

      Is social media a trustworthy source of information? Learn how social media algorithms work, how filter bubbles are created, and how they can isolate us from different points of view. We will also explore how content creators on social media influence their followers, as well as how to stay safe online and protect your personal information.

      Quiz: Are You in a Filter Bubble?

      Are You in a Filter Bubble?

      Read about these two hypothetical scenarios and tell us what you think is happening. 

      1 / 2

      You and your friends just discussed how great it would be to go on a trip. Now, your newsfeed is full of tourism advertisements — flights, hotel reservations, and articles about places worth visiting. What do you think is the reason for this? Are your gadgets listening to you?

      Algorithms process user information and behavioral patterns every day — what you “like,” where you are and what places you usually visit, what you are interested in, and what pages you follow. In addition, social networks recognize text and graphic content, such as photos you share with your friends. This information helps not only to analyze the user but also to predict his or her online behavior. No one needs to tap the microphones of your devices to know all that.

      Algorithms process user information and behavioral patterns every day — what you “like,” where you are and what places you usually visit, what you are interested in, and what pages you follow. In addition, social networks recognize text and graphic content, such as photos you share with your friends. This information helps not only to analyze the user but also to predict his or her online behavior. No one needs to tap the microphones of your devices to know all that.

      2 / 2

      You have never been interested in politics, but before elections, you see posts about candidate X more and more often. Look, here he gives an interview to a famous blogger on Instagram Reels, and here is his photo with a puppy. Your friend just shared his TikTok on your group's WhatsApp chat. What's going on?

      This is not fate, but targeted advertising. Algorithms in social networks analyze not only your behavior and interests but also your friends, through shared photos and geotags. This allows them to categorize information and group users to show them the most relevant information. Social networks can sell this information to advertisers to make their campaigns more successful. If you like coffee and cats, don’t be surprised when the social network shows you messages about a new cat cafe next to your home. You will find out more on this unit, so stay tuned!

      This is not fate, but targeted advertising. Algorithms in social networks analyze not only your behavior and interests but also your friends, through shared photos and geotags. This allows them to categorize information and group users to show them the most relevant information. Social networks can sell this information to advertisers to make their campaigns more successful. If you like coffee and cats, don’t be surprised when the social network shows you messages about a new cat cafe next to your home. You will find out more on this unit, so stay tuned!

      / 2

      Thank you for the answers!

      If you want to, you can try doing the quiz again or proceed with the course.

      Thank you for the answers!

      If you want to, you can try doing the quiz again or proceed with the course.

      Thank you for the answers!

      If you want to, you can try doing the quiz again or proceed with the course.

      Social Media as a News Source

      We spend a lot of time on social media either sharing personal information, communicating with friends, or reading the news. But do you ever think about why we sometimes only see certain kinds of posts in our news feed? 

      Learn how Facebook, Instagram and other popular social media platforms work in the video below. 

      Personalized Algorithms and Filter Bubbles

      Social media aims to keep you on the platform as long as possible, so they want to be sure you are seeing only the things you want to see and not what you don’t. Meta, which owns Facebook and Instagram, and Google, which owns YouTube, have mastered the art of showing you just what you want to see based on past browsing or viewing habits. For example, if you have googled climate change, your newsfeed might become full of posts, articles, and videos from environmental organizations, as well as advertisements related to this topic.  
        
      Everything that contradicts your beliefs is filtered out, placing you in a filter bubble. This term was coined by internet activist Eli Pariser. He even wrote a book about this phenomenon: The Filter Bubble: What the Internet Is Hiding from You.  

      Being inside a filter bubble means that you are in intellectual isolation, which seems surprising when you are thinking about the internet.  

      It’s not completely clear to what extent divisive content on social media translates to more polarized societies in the real world, but social media and search engines can isolate you from online content that contains alternative views or different information. As a result, this can limit your awareness about the diversity of opinions and perspectives on events, trends, and problems that are happening in the world around you.  
        
      In his book, Eli Pariser says, “Democracy requires citizens to see things from one another’s point of view, but instead, we’re more and more enclosed in our own bubbles. Democracy requires a reliance on shared facts; instead, we’re being offered parallel but separate universes.“  
        
      Because of filter bubbles, you may start to think that almost everyone thinks the way you do. This is rarely the case. You are likely just shielded from other points of view because they’re outside of your filter bubble. Over time, this can lead to greater political polarization of society, and to people having more extreme political views.

      Inside the Filter Bubble

      This interactive tool shows how social media feeds look for people in different filter bubbles, including vastly different news stories, hashtags, and group suggestions. Play around with it a little bit and see how the feed looks like for a woman vs. a man, a millennial vs. someone from the boomer generation, or a Democratic, liberal voter in the US vs a Republican, conservative voter. What you will see is not fictional but created from actual user data gathered by the media outlet, The Markup.

      Click here

      Algorithms in Social Media

      Algorithms in Social Media

      Do You Depend on Algorithms?

      You already know a lot about algorithms in social media. Take a look at the following questions.

      1 / 7

      Who are these old people in my newsfeed? Well, my friends used FaceApp to make their faces look older. You can change your picture for free, just install the app and give it access to your camera and photos. Would you give this app access to your photos and other data?

      Warning! Users often “pay” for free apps and popular Facebook tests like “Who you were in a past life” with their private information. Web development companies can even sell this information to third parties. It sounds scary, doesn’t it? So before checking out what you will look like in 40 years or trying a new hairstyle through an app, find out what kind of access you are giving the app.

      Warning! Users often “pay” for free apps and popular Facebook tests like “Who you were in a past life” with their private information. Web development companies can even sell this information to third parties. It sounds scary, doesn’t it? So before checking out what you will look like in 40 years or trying a new hairstyle through an app, find out what kind of access you are giving the app.

      2 / 7

      Lately, most of the posts I see on Facebook are from five of my friends. Why?

      Social media algorithms can track who you communicate with more often and show you their updates more frequently. This is a kind of information bubble.

      Social media algorithms can track who you communicate with more often and show you their updates more frequently. This is a kind of information bubble.

      Social media algorithms can track who you communicate with more often and show you their updates more frequently. This is a kind of information bubble.

      3 / 7

      People on social networks are posting the message: "Tomorrow a new Facebook rule will come into force. Everything you've ever posted becomes public. I do not give Facebook or any entities associated with Facebook permission to use my pictures, information, messages or posts."  Should you post this as well?

      It seems that not everyone read Facebook’s terms and conditions. When you create an account on Facebook, you agree to share some personal data. This information is necessary for algorithms to work. Advertisers can also get this information to plan their targeted campaigns. Relax, none of your rebellious posts will help.

      It seems that not everyone read Facebook’s terms and conditions. When you create an account on Facebook, you agree to share some personal data. This information is necessary for algorithms to work. Advertisers can also get this information to plan their targeted campaigns. Relax, none of your rebellious posts will help.

      4 / 7

      Sugar is the white death. It's so cool that my favorite influencers on Instagram are always talking about it.

      Welcome to the filter bubble! Filters in social networks work almost as filters in coffee machines: they do not allow unwanted particles to get into your cup (read: news feed). Algorithms used by social networks analyze your activity and your preferences in order to filter out the information which they think isn’t relevant for you. In this way, they hide different points of view and isolate you intellectually. To break free from your filter bubble, seek out information about different topics, but always think critically and check the facts.

      Welcome to the filter bubble! Filters in social networks work almost as filters in coffee machines: they do not allow unwanted particles to get into your cup (read: news feed). Algorithms used by social networks analyze your activity and your preferences in order to filter out the information which they think isn’t relevant for you. In this way, they hide different points of view and isolate you intellectually. To break free from your filter bubble, seek out information about different topics, but always think critically and check the facts.

      5 / 7

      Your friend has sent you a link with the message, "Wow, I can’t even believe you were able to do this. There are even photos of it." Your reaction?

      Always think critically about the information on social media. Even if you receive a message like this from a person you know pretty well, it’s best to ask them first if they really sent it. You can fall victim to phishing on social networks — if you click on the link, someone could gain access to your private information.

      Always think critically about the information on social media. Even if you receive a message like this from a person you know pretty well, it’s best to ask them first if they really sent it. You can fall victim to phishing on social networks — if you click on the link, someone could gain access to your private information.

      Always think critically about the information on social media. Even if you receive a message like this from a person you know pretty well, it’s best to ask them first if they really sent it. You can fall victim to phishing on social networks — if you click on the link, someone could gain access to your private information.

      6 / 7

      Let's be honest now. Do you really consider it necessary to read the policies before registering somewhere?

      Yes, terms and conditions are unlikely to be made into a plot for a Hollywood action film. However, we still recommend that you read them to be aware of what personal information the site will have access to, how it can use this data, and who it can share the information with.

      Yes, terms and conditions are unlikely to be made into a plot for a Hollywood action film. However, we still recommend that you read them to be aware of what personal information the site will have access to, how it can use this data, and who it can share the information with.

      7 / 7

      Many of the videos you see on TikTok use the same song. Why is that?

      TikTok tailors the “For You” page to the interests of each user. If you see a lot of videos using a particular sound, it’s because you have engaged with this content a lot and TikTok hopes to keep your attention by showing you more.

      TikTok tailors the “For You” page to the interests of each user. If you see a lot of videos using a particular sound, it’s because you have engaged with this content a lot and TikTok hopes to keep your attention by showing you more.

      TikTok tailors the “For You” page to the interests of each user. If you see a lot of videos using a particular sound, it’s because you have engaged with this content a lot and TikTok hopes to keep your attention by showing you more.

      / 7

      You know a lot about algorithms used by social networks. Keep it up! Technology is always developing, and new terms and conditions are regularly introduced, so keep up with the changes! Stay alert and share your knowledge with friends.

      Thank you for your answers! If you want to, you can try doing the quiz again or proceed with the course.

      You generally know how social media works and how they disseminate information. But maybe you have taken a few Facebook personality tests and given some apps access to your photos. Think critically and remember to review terms of use and to protect your information!

      Thank you for your answers! If you want to, you can try doing the quiz again or proceed with the course.

      To feel safe driving, learn the rules of the road. It’s the same with social networks. Understanding how social networks and the internet work is very important — your information security depends on it. We recommend that you review Unit 3.

      Thank you for your answers! If you want to, you can try doing the quiz again or proceed with the course.

      Who Creates Popular Content on Social Media?

      Social media is a great way to bring people together and build a network between followers and content creators. The most popular creators often use their popularity to make money by promoting brands, lifestyles, and products. But can you always trust glowing posts about a new make-up brand or a video game? We asked two influencers about their experience in content creation.

      Data Protection and Safety Online

      The internet is never going to be 100% safe. While this is very unfortunate, there are steps we can take to reduce our vulnerability online. 

      Privacy Settings 

      Go to the settings of all the social media platforms you use and take some time to go through the sections on privacy. Who can see your birthday? The city you live in? Your photos? Is it just your friends, or anyone? Should all of them be able to? Also, revise the data that you have allowed social media apps to gather on you. Do you want them to be able to use facial recognition tools that would allow them to identify your face in photos, for example? If not, it is important to opt out of this. 

      Social media companies rely on your personal data to target content and advertisements, but there is a thin line between how much information they protect and how much they share with others. For example, in 2019 TikTok was fined millions for collecting names, email addresses, and locations of kids under the age of 13. A 2021 change to the privacy policy allowed the app to also collect “biometric identifiers and biometric information” from its users, including faceprints and voiceprints.   

      Facebook and Instagram are also able to scan photos that users upload for advertising opportunities (for example, if there is a Kentucky Fried Chicken bag in your photo, you might receive targeted ads the next time you log in). Recently, Facebook decided to stop their facial recognition program and announced they will delete the face scan data they collected on millions of users. But there’s still plenty of other data they gather, so check the settings on the app and evaluate what you want to share.  


      The General Data Protection Regulation (GDPR) is an important European Union regulation that came into force in 2018, with the aim of allowing internet users to control their own data. This regulation makes it mandatory that websites make it very clear what data they collect and how it will be used, or face large fines. Google was among the first companies to receive a fine (50 million EUR) after they used consumer data for personalized advertising without consent. The regulation also provides for the “right to be forgotten”- meaning that a user can request that their personal data is erased from internet searches.  

      Public Wi-Fi 

      Openly available Wi-Fi is not secure. Joining an unsecured network leaves you vulnerable because the information you send and receive, like your web traffic (pages, passwords, etc.), could potentially be viewed by anyone on the network. When connecting to Wi-Fi in public places, avoid checking personal or financial information, log out of sites when you are done using them, and use only encrypted sites (those with an https, not just http). Be sure to change your phone settings so it does not automatically connect to open networks.  


      For personal hotspots, check the name. Is yours named “Martin Saar’s Wi-Fi”? Consider going into the settings to change it to something more anonymous. If you wouldn’t stand up and announce your name in a café, don’t let your phone do it for you.    

      Geolocation 

      Sometimes, it’s important for our phones to know where we are – like when we need to use a map or get recommendations based on what is nearby. But you should know that geolocation shares a lot about our lives. Once your location data is collected, there is no getting it back.  A simple step in seeing what programs or apps use your location information is to look at your phone’s settings and permissions. Does your calculator app need to know your location in order to function?  

      While you may think that your social data alone isn’t all that important, together with other data it can become quite dangerous.

      Case in point, Fitbit, a fitness tracker, collected information on users’ jogging routes and transferred that data to third parties, often without the fully informed consent of users. Strava, an associated fitness app, ended up giving away the location of a secret army base in Afghanistan, mapped solely from users wearing their fitness trackers and jogging the perimeter of the base. Previously, these locations were not even visible on Google Maps or satellite imagery.  

      Identity 

      Scammers often use fake profiles to gain information from others, often by using existing profile pictures and creating duplicate accounts. Sometimes, pictures may even be used under the same person’s name.  


      Is your identity being used elsewhere? Here’s how to find out: 


      1) Search for your name in quotes (example: “Jonas Varnas”) on Google. What is your name associated with? Anything unfamiliar? 

      2) Next, go to the image search. Upload your photo and see if any of your old profile pictures are being used elsewhere. If photos are being used without your permission, or appear in Google searches when you don’t want them to, you can use the EU Personal Information Removal form on Google to fill out a removal request. 

      Phishing 

      Often scammers don’t have to hack someone to gain their private information. A large share of them simply trick people into giving away their information, even passwords and banking details! This is called phishing.  The trick is to make it look like you are being contacted by someone you know or trust – your bank, colleague, or a social networking site.

      Scammers do this by imitating their email address, for example. When you receive an email from someone, do you usually check if they used the exact same email address as usual or compare it to the address indicated on the company website? You should! For example, if your colleague’s name is Jānis Bērziņš and his email address is jberzins@email.lv, the scammer might send an email from j.berzins@email.lv.  

      The scammer might try to create a sense of urgency to get you to act quickly and be less cautious. For example, you might get an email that seems like it was sent from Instagram saying that someone has hacked into your account and you should change your password fast by clicking on a link. Since you’re nervous, you might not notice that the email was sent from a suspicious email address and the link you just opened is not the real Instagram website but simply looks a lot like it. Then you insert your password and send it to the scammers.  

      Therefore, it is very important to be attentive when you receive e-mails, messages, and phone calls, especially if you are told there’s an emergency and you should reveal your information quickly to solve it. 

      Passwords 

      A strong password can help keep you and your information safe. While it’s important to remember your passwords, the easier they are to guess, the more easily your accounts could be hacked by others. Choose wisely, change them frequently, and don’t share them with others. 


      Tips for creating a strong password: 
      1) The more characters, the better! It’s best to aim for 12 or more. 
      2) Use a variety of symbols, numbers, and letters (both upper and lower case) 

      3) Try using a passphrase that only you can make sense of (example: W@yDecayTrans!ate SecretaryBalt1c8#) 

      4) Don’t use one password for several accounts. If you do, all your accounts are compromised after just one lucky guess or a hack. 
      A strong password is great, but you should also use two-factor authentication when available. For example, you can connect your phone number to your email or social media accounts to receive a code you will have to type in if you want to access your account from a new device.

      Further Reading

      If you want to find out more about this topic, Data Detox Kit could be a good place to start!

      Click here

      Beware Online Filter Bubbles

      If you would like more information on filter bubbles, watch this speech by the activist who coined this term.

      Algorithm/ˈælɡərɪðəm/a set of rules that must be followed when solving a particular problem
      Controversy/ˈkɒntrəvɜːsi/public discussion and argument about something that many people strongly disagree about, disapprove of, or are shocked by
      Deliberately/dɪˈlɪbərətli/done in a way that was planned, not by chance  Synonym: intentionally, on purpose
      Dissenting/dɪˈsentɪŋ/having or expressing opinions that are different from those that are officially accepted
      Encounter/ɪnˈkaʊntə(r)/to experience something, especially something unpleasant or difficult, while you are trying to do something else
      Evaluate/ɪˈvæljueɪt/to form an opinion of the amount, value or quality of something after thinking about it carefully
      Filter Bubble/ˈfɪltə(ɹ) ˈbʌb.əl/a situation in which someone only hears or sees news and information that supports what they already believe and like, especially a situation created on the internet as a result of algorithms (= sets of rules) that choose the results of someone's searches
      Influencer/ˈɪnflu.ənsə(ɹ)/a person or thing that influences somebody/something, especially a person with the ability to influence potential buyers of a product or service by recommending it on social media
      Intellectual isolation/ˌɪn tlˈɛk tʃu əl ˌaɪ səˈleɪ ʃən/state caused by filter bubbles in which users get significantly less contact with contradicting viewpoints
      Misinformation/ˌmɪsɪnfəˈmeɪʃn/the act of giving wrong information about something; the wrong information that is given
      Phenomenon/fəˈnɒmɪnən/a fact or an event in nature or society, especially one that is not fully understood
      Phishing/ˈfɪʃɪŋ/the activity of tricking people by getting them to give their identity, bank account numbers, etc. over the internet or by email
      Polarization/ˌpəʊləraɪˈzeɪʃn/the act of separating or making people separate into two groups with completely opposite opinions
      Reliance/rɪˈlaɪəns/dependence or trust in something or someone
      Tailored/ˈteɪləd/made for a particular person or purpose
      oxfordlearnersdictionaries
      cambridge dictionary
      technopedia
      < Unit 3Part B >
      Developed by Supported by
      Irex logo Media logo DoS logo

      Very Verified: An Online Course on Media Literacy was developed by Media Literacy in the Baltics, a program of the U.S. Department of State, administered by global development and education organization IREX, using Learn to Discern (L2D) approach to building citizen resilience against disinformation and manipulation.

      Sign up
      • About the course
      • Learning format
      • Units
      • FAQ
      • Blended learning
      • Terms and conditions

      IREX
      info@veryverified.eu

      This website uses cookies to improve user experience.
      Read more: Terms and conditions

      Customize selection