Even though the term of information acquisition is not something new, it creates new perceptions in such a vastly connected world in the beginning of the 3rd decade in the XXI century. The American Library Association (ALA, 1989) defines information literacy as being able to ascertain what information is needed, understand how the information is […]
Read More

Information evaluation
Why do we need to evaluate the information? Once you have found information that matches the topic and requirements of your research, you should analyse or evaluate these information sources. Evaluating information encourages you to think critically about the reliability, validity, accuracy, authority, timeliness, point of view or bias of information sources. Just because a […]
Read More
Digital information creation as a learning process
Information in any format is produced to convey a message and is shared via a selected delivery and distribution method. The iterative processes of researching, creating, revising, and sharing the information vary, therefore the whole process itself is a big part of the constant learning process while the information is being both created, consumed and […]
Read More
Digital literacy as cultural approach
We are viewing a period of technological development that is both unprecedented and widely disruptive. In the short time since the Internet was created, much has changed, including the design of computer interfaces, the processing speed and portability of devices, the accessibility of information and knowledge, our methods of communication, the maintenance of our relationships, […]
Read More
Reducing anxiety while developing digital skills and teaching
For some adults – including young adults – their incomplete use of the internet is linked with low literacy and numeracy, and to lacking the confidence and motivation to learn new skills and apply them in their lives. Digital skills are key to inclusion in society. Gaining these skills, along with the confidence and motivation […]
Read More
Smart consumer concept
The fast development of user-friendly tech and immediate access to information has made the clients of today smart and aware. With ever increasing possibilities available at a tap of the touchscreen, consumer behaviour and preferences are forever in flux. When you hear the word consume – where does your mind go to? It probably starts […]
Read More
Critical thinking and evaluation techniques
Using the Internet is probably a daily activity for many of you, but sometimes it’s such second nature we don’t stop to think about what underlies the information we use. We are now living in an era when information is widely available. Whenever people are faced with a question, their default response is ‘Google it’ […]
Read More
Cultural perception and social understanding
Digital technologies have transformed the cultural scene profoundly. That technology has infiltrated our lives, you can now shop, bank, communicate, socialise, browse and collaborate with people on your smartphone or device. In this sense, we must know that digital culture is not only connected with the digitization of analogue terms, but it also refers to […]
Read More
Virtual identity creation, management and implications
Our identity is, literally, who we are and presenting oneself online using a personal blog, webpage or social networking site needs a purposeful selection of text, pictures, graphics and audio to generate an impression. This is not done by chance. The online world requires people to write themselves into existence and so their profiles provide […]
Read More
Basic software and communication tools
The basic software and computer programs allowing the execution of the majority of common tasks for computer users can be split into two groups: free software and paid one. We would like to emphasize free software, however paid and licensed products have their own advantages, for example support and a wider range of additional tools […]
Read More
Search engines
A search engine is a website through which users can search internet content. Search engines allow users to search the internet for content using keywords. Each search engine works in a similar way. If you go to a search engine’s homepage, you will find a single box. You simply type whatever you want to search for into that box. Search engines […]
Read More
Electronic mail (email or e-mail) is a method of exchanging messages (“mail”) between people using electronic devices. It is like traditional mail, but it also has some key differences. For example: Traditional mail is addressed with the recipient ‘s name, street, address, city, state or province and zip code. E-mails are delivered electronically across the Internet. An e-mail […]
Read More
Business software
Business software is in many cases either a fuel for the success of the business or a necessary tool for a wide range of business operations. Therefore, basically all positions of most businesses that exist, require at least basic knowledge and proficiency in most commonly used business tools. We won’t cover the basic software that […]
Read More
Social networks
A social network is defined as a chain of individuals and their personal connections. Alternatively referred to as a virtual community or profile site, a social network is a website that brings people together to talk, share ideas and interests, or make new friends. This type of collaboration and sharing is known as social media. […]
Read More
Websites development, blogging and marketing
Websites are without doubt the most important element of the internet, enabling content such as texts, images, and videos to be displayed on the internet. The central page of a website is called home page, or start page/index page. The user then delves into the site’s subpages. Depending on the size of the website, site visitors […]
Read More
Personal Storytelling
Storytelling is the ability to captivate someone or a group of people with an engaging narrative that influences them and makes them feel like they were a part of the story. People remember stories much better than facts and figures. It is one of the most important skills you can learn to master. Key points: Storytelling influences […]
Read More
Security software
Any connected device may be a gateway for a security threat. The best way to secure a device, especially one connected to the internet, is to use proper and up to date security software, usually known as antivirus. Extra layer of personal data security and both to the information transferred over the internet or the […]
Read More
Physical device security and hardware
We all know how annoying it is to lose a phone, get it stolen or simply drop it on the ground and get its screen broken to a level the device becomes unusable. The issue is usually not considered as important until it happens. In order to avoid all sorts of damage to a device. […]
Read More
Internet of things (IoT)
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. This new wave of connectivity is going beyond laptops and smartphones, it’s going towards connected cars, […]
Read More
Privacy breaches and theft of data
What is data privacy breach? A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. A privacy breach occurs when someone accesses information without permission. It starts with a security […]
Read More
Hacking and cyber extortion
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. Cyber extortion is an internet crime in which someone holds electronic files or your business data hostage until you pay […]
Read More
Identity thefts
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. Identity theft occurs when […]
Read More
Cyberbullying
Cyberbullying can be defined as an aggressive, intentional and repeated act carried out by a group or individually, performed via electronic means such as mobile phones or the internet, against a victim who cannot easily defend himself or herself (Slonje, Smith and Frisén, 2013). Bullying, in general, is separated from other aggressive behaviors based on two […]
Read More
Phishing techniques
Phishing – fraudulent activities designed to steal personal and / or other confidential information (e.g. identity data, passwords, payment card details, etc.). Usually, the main goal of phishing is to get personal data and login credentials for online banking. User IDs, passwords and other credentials enable fraudsters to access individuals’ bank accounts and dispose of […]
Read More
Financial crimes and investments frauds
Financial crimes are crimes in which criminal organizations benefit financially. In financial crimes, usually, one party provides a financial benefit, and the other party suffers a financial loss. These are frequently committed for the personal benefit of the criminal and involve the illegal conversion of ownership of the property involved. When we talk about ‘consumer […]
Read More
Fake news and propaganda
Propaganda is defined as deliberate and consistent dissemination of theories and ideas in philosophy, science, religion, etc., in order to educate people using them, influence people’s views, moods, manipulate with, promote certain actions that would contribute to the goals pursued by the propagandist. Propaganda aims to affect the emotions and opinions of the target group. […]
Read More
Fraud advertising (fake products, supplements)
Whenever money is involved, there is always an opportunity for a fraud. From a technical perspective, online advertising fraud has been relatively easy (and yes – lucrative) business for fraudsters and a financial disaster for advertisers, publishers and online ad platforms themselves. Online ad business was built on a number of Internet Open Standard technologies […]
Read More
PC/online gaming, casino, addiction
Play is an innate human drive, which appears in early childhood (Kuss & Griffiths, 2012, p. 5). After the millennium internet gaming has increased significantly because of the huge technological development. PC gaming and, in general, online gaming gives players the opportunity to experience different gaming environments simultaneously, to design and develop virtual characters they […]
Read More
E-privacy regulation in EU
The ePrivacy Regulation (ePR) is a proposal for the regulation of various privacy-related topics, mostly in relation to electronic communications within the European Union. Its full name is “Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive […]
Read More
GDPR and CCPA
General Data Protection Regulation (GDPR) is a privacy and security law concerning the protection of personal data. Personal data are considered to be any information that can, directly or indirectly, lead to the identification of an individual (Goddard, 2017, p. 703). Personal data include information regarding the location, ethnicity, gender, biometric data, religious beliefs or […]
Read More
State Data Protection Authorities
State Data Protection Authorities (DPAs) are independent public authorities in charge of superintending the implementation of data protection laws, via investigative and corrective powers (What Are Data Protection Authorities (DPAs)? 2018). DPAs offer expert advice concerning data protection matters and they are responsible for dealing with denunciations made due to violations of the General Data […]
Read More
State Consumer Rights Protection Authorities
Every EU Member State has a national authority in charge of consumers rights’ protection, when dealing with credit or financial institutions (National Competent Authorities for Consumer Protection – European, 2020). Consumer protection policy makes sure that the single market can operate properly and successfully (Fact Sheets on the European Union: European Parliament, n.d). The main […]
Read More
Evade mid-career “crisis” – stay up-to date to technology
Technology is becoming more integrated with every aspect of our lives each day. Many people share their concerns regarding the fact that the world is changing so quickly and that they might find themselves out of the loop. This is a very legitimate thought currently, more common than one would assume. No matter which field […]
Read More
Interactive games and apps
DUOLINGO helps you learn a foreign language. STUDYBLUE is a mobile study buddy designed to help you “conquer your course” using flashcards, notes, study guides, and more. Freckle Rich with content-aligned assessments, printable worksheets, and progress analytics. TYPINGCLUB Gamified, data-driven activities help mastery of keyboarding skills. SEESAW: THE LEARNING JOURNAL A powerful multimedia learning and […]
Read More
E-signature and e-services
Electronic signatures Electronic signatures deliver a way to sign documents in the online world, much like one signs a document with a pen in the real (offline) world. In the past, only hand-written signatures were legally valid. The Directive on a Community framework for electronic signatures (eSignatures directive), adopted in 1999, extended that recognition to […]
Read More