Syllabus

ICT and Psychology
Negative and uncomfortable psychological phenomena in our online lives.

External Mediator of Desire / Internal Mediator of Desire
<aside>
<img src="/icons/conversation_green.svg" alt="/icons/conversation_green.svg" width="40px" />
FUD (Fear Uncertainty Doubt)
</aside>
<aside>
📺
Amy Web
https://ftsg.com/wp-content/uploads/2025/03/FTSG_2025_TR_FINAL_LINKED.pdf
</aside>
Artificial intelligence in relationship management (AI companions, social bots).
<aside>
<img src="/icons/conversation_green.svg" alt="/icons/conversation_green.svg" width="40px" />
discussion
[character.ai - caused suicide?](https://rural-actor-0bf.notion.site/character-ai-caused-suicide-14fa0abef981800aa13cca2a8a0c44cd)
how can we trust in internet content?
everybody lies on the internet
bot are posting
Internet lies
<aside>
❗
Tom Cross
“(...) people don't come to the internet because they want to get smarter.
They come to the internet because they want to be told that they're already smart.”
</aside>
Report strategy 2050 mental health education
</aside>
- Phubbing – Ignoring someone during a conversation by focusing on your phone.
- Sexting – Sending or sharing sexually explicit content online.
- Digital Littering – Leaving unnecessary or harmful content online.
- Trolling – Deliberately provoking or insulting others on the internet.
- Doxing – Publishing private data without consent.
- Cyberbullying – Harassing or humiliating others online.
- Catfishing – Pretending to be someone else to manipulate others.
- Cyberstalking – Persistent harassment or tracking using digital tools.
Exponential Growth
Uncanny Valley - Halloween material
Filter Bubble
Security_2025/2026
BIG DATA
LMS / ERP
<aside>
<img src="/icons/robot_red.svg" alt="/icons/robot_red.svg" width="40px" />
Cryptocurrency
NFT
Blockchain
</aside>
<aside>
📌 self check questions - click to generate new set of questions
</aside>
- What is the difference between Pharming and Phishing attacks?
- What are the key characteristics of a Man in the Middle attack and how does it differ from a Watering Hole attack?
- Define OSINT and explain its significance in the context of cybersecurity.
- Explain the concept of ransomware and why it's classified under the "AIM" category of attacks.
- What is the difference between rootkits, trojans, and worms in the context of malware?
- Describe the purpose of a VPN i
- n relation to internet security and personal privacy.
- What are the security implications of first-party cookies versus third-party cookies?
- Explain why security should be considered as a process rather than a one-time implementation.
Dissinformation
cognitive biases.
<aside>
<img src="/icons/robot_red.svg" alt="/icons/robot_red.svg" width="40px" />
Dead Internet Theory
</aside>
technology shapes us
Ai distorts reality