Syllabus

image.png

ICT and Psychology

Negative and uncomfortable psychological phenomena in our online lives.

 - visual selection.png

External Mediator of Desire / Internal Mediator of Desire

<aside> <img src="/icons/conversation_green.svg" alt="/icons/conversation_green.svg" width="40px" />

FUD (Fear Uncertainty Doubt)

</aside>

<aside> 📺

Amy Web

https://ftsg.com/wp-content/uploads/2025/03/FTSG_2025_TR_FINAL_LINKED.pdf

</aside>

Artificial intelligence in relationship management (AI companions, social bots).

<aside> <img src="/icons/conversation_green.svg" alt="/icons/conversation_green.svg" width="40px" />

discussion

[character.ai - caused suicide?](https://rural-actor-0bf.notion.site/character-ai-caused-suicide-14fa0abef981800aa13cca2a8a0c44cd)

how can we trust in internet content? everybody lies on the internet

bot are posting

Internet lies

<aside> ❗

Tom Cross

“(...) people don't come to the internet because they want to get smarter. They come to the internet because they want to be told that they're already smart.”

</aside>

Report strategy 2050 mental health education

</aside>

Exponential Growth

Uncanny Valley - Halloween material

Filter Bubble

Security_2025/2026

BIG DATA

LMS / ERP

<aside> <img src="/icons/robot_red.svg" alt="/icons/robot_red.svg" width="40px" />

Cryptocurrency NFT

Blockchain

</aside>

<aside> 📌 self check questions - click to generate new set of questions

</aside>

  1. What is the difference between Pharming and Phishing attacks?
  2. What are the key characteristics of a Man in the Middle attack and how does it differ from a Watering Hole attack?
  3. Define OSINT and explain its significance in the context of cybersecurity.
  4. Explain the concept of ransomware and why it's classified under the "AIM" category of attacks.
  5. What is the difference between rootkits, trojans, and worms in the context of malware?
  6. Describe the purpose of a VPN i
  7. n relation to internet security and personal privacy.
  8. What are the security implications of first-party cookies versus third-party cookies?
  9. Explain why security should be considered as a process rather than a one-time implementation.

Dissinformation

cognitive biases.

<aside> <img src="/icons/robot_red.svg" alt="/icons/robot_red.svg" width="40px" />

Dead Internet Theory

</aside>

technology shapes us

Ai distorts reality