!Cyber-Vigilantism! red highlighted post <– 4.1 due before June 9th (EDTC300 SPRING2025)

Cyber-Vigilantism:

According to academia, the internet began in the early 1980’s. During this time, the sole purpose for the production of the internet was for research, data-sharing, and computer accessibility (ScienceandMediaMuseum, 2020). Nowadays, the internet is widely used as a resource not only for studying and entertainment, but there are a variety of negative influences that occur throughout the online world such as cyber-vigilantism and cyber-shaming. Prior to the recent week’s class lecture, I have never heard about the term cyber-vigilantism. Before indulging in some research through articles as well as course readings and lecture slideshows, I perceived that the above-mentioned terms would somewhat refer to concepts along the lines of internet bullying.

Cyber-vigilantism is widely known as internet vigilantism. This widespread term is referred to as the process of an individual or group of people who utilize technology for the sole purpose of taking law into one’s own hands or possession (NordVPN, n.d.). The above-mentioned concept, cyber-vigilantism, commonly takes place across the online world. Some of the platforms that cyber-vigilantism can take place on is through online social media software applications and forums. In other terms, this wrongdoing can hinder people as it publicly discloses individuals, firms, or a country (NordVPN, n.d.). For example, if an individual asks “Hey Siri” on their iPhone, that individuals’ phone tends to listen to specific key terms of what was asked to Siri (TimesofIndia.Com, 2024). After hearing certain phrases or keywords of what was asked to Siri, the phone will disclose certain advertisements on other software applications either on the reels category of Instagram or on YouTube (uOttawa, n.d.). A final way to demonstrate an example of cyber-vigilantism is through TikTok. There are multiple community members and account users of the previously mentioned software application that strive to attack influencers either by asking the influencers’ information through their comments section or within their livestreams and public posts (uOttawa, n.d.). Not only this, but the TikTok app itself, has the ability to disclose a user’s data without that account user providing any information to begin with (uOttawa, n.d.). In essence, cyber-vigilantism is important to grasp as it tells us to be more aware regarding our time being spent on technology, the information individuals publicly reveal, and how daunting the online world is. 

How Can I Teach Cyber-Vigilantism:

There are several methods regarding how an individual can implement cyber-vigilantism within their classroom. One such way through explaining tips in order to stay safe (Poth, 2024). With respect to this, one of the lessons can consist of how to create strong and unique passwords. A second lesson can consist of explaining the process of two-factor authentication. Additional lessons can include navigating through the settings of your mobile device or laptop and delving into what each feature of the settings application is used for (Poth, 2024). This way students will have the ability to apply their safety knowledge to the real world.

 

References

NordVPN. (n.d.). Cyber Vigilantism. Retrieved June 9, 2025, from 

https://nordvpn.com/cybersecurity/glossary/cyber-vigilantism/#:~:text=Cyber%20vigilant

ism%20refers%20to%20the,people%2C%20companies%2C%20and%20countries.

 

Office of the Privacy Commissioner of Canada. (2023, February 23). Announcement: Commissioners launch joint investigation into TikTok. Retrieved June 9, 2025, from  https://www.priv.gc.ca/en/opc-news/news-and-announcements/2023/an_230223/.

 

P, Rachel. (2024, February 5). Teaching Students the Cyber Safety Basics. Retrieved June 9, 2025, from https://www.edutopia.org/article/teaching-students-cyber-safety/. 

 

ScienceandMediaMuseum. (2020, December 3). A short history of the internet. Retrieved June 9, 2025, from https://www.scienceandmediamuseum.org.uk/objects-and-stories/short-history-internet. 

 

TimesofIndia.Com. (2024, February 23). Is Your Phone Secretly Hearing all your conversations? Here’s what to do. Retrieved June 8, 2025, from https://timesofindia.indiatimes.com/etimes/trending/is-your-phone-secretly-hearing-all-your-conversations-heres-what-to-do/photostory/107940821.cms

uOttawa. (n.d.). Recommendations regarding TikTok use and privacy risk. Retrieved June 8, 2025, from https://www.uottawa.ca/about-us/information-technology/services/security/tiktok-use-privacy-risks. 

Woods, M. (2023, February 27). This may be a 1st step’: Canada bans TikTok from federal government devices. Retrieved June 9, 2025, from https://www.ctvnews.ca/ottawa/article/this-may-be-a-1st-step-canada-bans-tiktok-from-federal-government-devices/. 

Leave a Reply

Your email address will not be published. Required fields are marked *