How to become Media and Information Literate
What is Media and Information Literacy?
Media Literacy is the ability to critically think, access, evaluate, and create information across various media platforms.
Key Steps To Consider:
- Be critical: Don’t take information at face value. Question the source, purpose, and accuracy.
- Verify information: Check multiple sources to confirm facts and debunk misinformation.
- Know your likes: Notice what you like and be careful – what you read or hear might be showing only one side.
- Understand biases: Recognize your own preference and be aware of potential preferences in the information you consume.
- Evaluate sources: Check their credibility, reliability, and expertise.
- Create responsibly: When creating content, ensure it is accurate, respectful, and considerate of your audience.
Practical Tips:
- Use different news sources. Diversify your news sources.
- Be cautious of sensational or provocative headlines.
- Engage in respectful online discussions.
Digital Security: How to stay safe on the internet
Staying safe online is like locking your doors at night. While online, you need to take simple steps to protect yourself from harm. There are several ways in which this can be done, like using strong passwords, and being smart about what you click on. Once this is done, you are good to enjoy the benefits of the internet while remaining safe.
Digital Security is the practice of protecting digital assets such as data information (text, audios, pictures, documents, video and files), data systems from unauthorized access,theft or damage.
How to prevent Data Theft
Fraudsters use various methods such as “phishing” to access online accounts on the internet. They use fake emails and login pages to trick you into revealing their sensitive data. With stolen credit card and banking information, they can deplete your funds with stolen private photos and e-mail addresses or confidential information in your private messages, which they can use to blackmail you.
This is how you can protect yourself:
Use strong passwords
- Create passwords that are long, unique, and hard to guess.
- Use a mix of capital and small letters, numbers, and symbols.
- Avoid using personal information like your name, birthdate, or “123456”.
- Your password must not be so complicated that you forget it. Use tricks such as coming up with a sentence that you can remember and the password from the first letters of the words, mixed with numbers and/or punctuation. Using local language is an additional method. If you use whole words, be sure to insert numbers and/or punctuation.
- A strong password will contain no words that can be found through a Google search.
- Avoid using the same password for multiple accounts, as this puts all accounts at risk when one is discovered.
- Avoid using mobile numbers when creating an account. Instead, try using your email because mobile numbers are easily hacked.
Use a password manager
This is a safe tool that stores all your passwords. It helps you to create strong passwords and remember them for different accounts. A selection of password managers:
- Bitwarden
- LastPass
- 1Password
- KeePass.
Enable Two-factor Authentication (2FA)
“2FA” adds an extra step to logging in, usually offered by the services you use (look in “security” in your account information). It’s a code that is either sent to your phone or a code generated in an app like Google Authenticator.
Even if someone steals your password, they can’t get in without the second code. Turn on 2FA on email, social media, banking apps, and cloud services.
Be wary of suspicious links and emails
Avoiding clicking on suspicious links and emails to protect yourself from online threats and risks such as phishing, accessing malware, information or identity theft.
- Don’t click on suspicious links or download attachments from unknown contacts. Check the sender’s email address carefully before opening the email.
- If it looks strange, it’s probably fake.
- Also, if it seems too good to be true, it’s probably fake.
- Be wary of fake websites and pages. Check the address of login pages in the address field of the browser. Does it begin with the real address (URL) of the service?
- Don’t enter any sensitive login information if the address of the page does not exactly match that of the service, even if the page looks identical
- Don’t disclose sensitive data in phone calls. Scammers may pretend to be from a bank or service provider and ask for your PIN, passwords, or ID numbers. Legitimate companies will never ask for sensitive information over a phone call or WhatsApp. When in doubt, hang up and call the official number from the company’s website.
- Be aware of viruses. Websites, apps and photos may be contaminated. Think twice before downloading and installing apps or visiting websites you don’t know.
- Use antivirus software and update it regularly.
- Turn on automatic updates for the operating system of your phone and computer.
- Lock your phone and laptop with a PIN, fingerprint, or face ID.
- Avoid using public WIFI when accessing sensitive information, for example whilst online banking.
- If you suspect anything unusual, change your password immediately.
- Avoid using “save for me” for your password on Google every time you log in using different devices such as a cafeteria, library and office computers.
How to deal with Cyber Bullying
Becoming a victim of harassment and threats on social media can be very harmful. It can happen to anybody – and the offenders are not always aware of the harm they cause.
This is how you can protect yourself and act if you are bullied:
- Think before you post. Avoid sharing content that might attract negative attention or be used against you.
- Don’t respond to bullies. Don’t react when you feel hurt or angry. Engaging can make the situation worse.
- Block the person who is displaying the bullying behavior.
- Monitor your child’s social media use and know what sites they use.
- Talk to someone you trust. If you’re being targeted, speak to someone or a counselor.
- Record the bullying material, for example through screenshots, audio/video recordings, pictures etc and report it to the Police and Zambia Information and Communications Technology Authority (ZICTA). Call their toll free line on 7070.
How to tell if someone has become a victim:
- Being emotionally upset during or after using the Internet or the phone.
- Being very secretive or protective of one’s digital life.
- Suddenly wanting to stop using the computer or device.
- Spending more time than usual in their room.
- Withdrawal from or lack of interest in family members, friends, and activities.
- Avoiding school or group gatherings.
- Mood swings, change in behavior, loss of sleep, or appetite.
- Being nervous or jumpy when getting a message, text, or email.
- Avoiding discussions about computer or phone activities.
Fake News and Fact Checking: How to debunk Fake News
What is fake news?
Fake news is false or misleading information that is made to look real. It is often shared to trick people, make them believe something that isn’t true, or cause confusion. It can be presented in the form of misinformation which is news that is inaccurate or exaggerated, and disinformation which is completely made up to mislead people.
With Artificial Intelligence (AI) it has become increasingly easy to fake photos, voices and videos. Platforms such as Tiktok are being flooded with fake photos and videos. Rule No 1 shoul be: Use your common sense and check, whether reliable sources run the same information.
How to Debunk Fake Photos
- Look at the visuals carefully: Photos can be edited or taken out of context. Use tools like Google Reverse Image Search, Tineye or Yandex to check if the image has been shared elsewhere or if it is original.
- Check the date and context: Sometimes old stories or photos are reshared as if they are new. Make sure the content matches the current event or claim.
How to Debunk Fake Text
- Look out for sources in the story: Does the writer cite sources or does the story sound like gossip? If there are no sources cited, it should raise suspicions.
- Look for evidence: Does the text have verifiable data, quotes, or links to original sources. Beware of “Anonymous“ or “Insider” claims without proof.
- Verify with different sources: Check the story with other trusted platforms reporting the same story.
- Watch for manipulation tricks:
- Overuse of CAPITAL LETTER, excessive punctuation (!!!!), or emotional language.
- Claims with no data, location or specific details.
How to Debunk Fake Videos
- Look for clues in images and videos: Do the buildings, signposts, car number plates and other markings look similar as those in the town or country where the story is located?
- Judge Hard: If a post seems sensational, weird or too good to be true, don’t take it as a fact. If a post seems sensational, weird or too good to be true, don’t take it as fact. This is one of the most important tips to consider. (In times of AI it is increasingly hard to find clues like sign posts and number plates, as images can look perfectly real. It’s the common sense that counts, the critical thinking – and checking back whether there are sources that confirm or rebut the image.
- Reverse image search: Use tools like InVID, Google Images or TinEye to check if it has been used elsewhere.
Getting Information: How to find valid sources
Valid sources are trusted pieces of information that come from people or organizations with knowledge and experience. They help us learn the truth and avoid being misled. Valid sources are often well-researched, balanced, and updated. Using them helps us make good decisions and understand issues clearly.
Valid information can come from credible sources like government websites, universities, research institutions, and well-known news organizations. On the other hand, unreliable information may come from unknown websites, biased blogs, or social media pages that don’t show where they got their facts.
How to get credible information
Check for Bias:
- Ask: Is the information one-sided?
- Does the source support only one opinion or group?
- Be careful with content that tries to convince you without giving all sides of the story.
Look for Credible Sources
- Use sources like official websites, news from well-known media houses, academic articles, or expert opinions.
- Avoid gossip blogs, random social media posts, or unverified WhatsApp messages.
Check the Author
- Who wrote the information?
- Are they an expert or do they have experience in the topic?
Check the Date
- Is the information recent?
- Old info might be out of date or no longer true.
Compare Different Sources
- Don’t rely on one source.
- Look at 2 or 3 others to see if they say the same thing.
Check the Website Address
- Trust websites that end with .org, .gov, or .edu more than those with strange or unknown addresses.
Content Production: How to create Great Content for Social Media
Why Create great Social Media Content?.
- It helps increase the participant’s civic awareness in the community.
- Creating relevant community content helps community members participate in developmental and political issues affecting them.
- It sparks conversations, build relationships and foster a sense of community.
- It enables participants to be active participants of civic matters directly affecting them in the community.
Why Be Careful with Social Media Content?
- Social media content can impact community decision making i.e positively or negatively.
- Social media content can persist online indefinitely, and careless content can have long-term consequences.
- Social media content must comply with relevant laws, regulations, and industry standards.
- Social media content can spread quickly, and creators should be careful to verify information to avoid spreading misinformation.
Consider:
- Pay attention to tone, language, and images when producing social media content.
- Be mindful of the potential impact of your content on individuals and communities.
Tips and Tricks to Creating Great Content For Social Media
How to create engaging social media text:
- Keep your posts short, but aim for clarity. Stick to one main idea per post. Use simple, correct language.
- Interesting content is the key: Don’t use attention-grabbing language to impose meaningless content on users. At the same time, don’t hide your meaningful content: Use the first lines to spark curiosity and interest.
- Use hashtags to boost your presence online. 2-3 key hashtags relevant to the subject you are writing about – avoid cluttering your message with too many.
- Provide links to your sources and further information. This makes your message trustworthy and validates it.
- When you combine text and images, provide relevant information about the image (names of people and places, date, who shot the photo).
How to take compelling social media photographs:
- Capture real moments and action. Show faces instead of backs. Show emotions. Let your picture tell a story even without the help of a caption.
- Be creative. Look for good and unusual angles.
- Get close to the subject to capture emotions and reactions on their faces.
- Ensure your subjects are in sharp focus.
- Use natural light. Shoot near windows or outside.
- Avoid shooting at mid-day when the sun is overhead because that creates shadows on the face.
- Do not shoot against the light.
- Avoid editing your pictures. You can enhance them, but don’t distort them.
- Create content that matches with your audience needs. For instance, if you’re targeting the youth, your content must be youthful as opposed to creating content deemed for kids.
How to shoot videos that are appropriate for social media
- Keep your subject in focus. Make sure the person or thing you’re filming is clear, not blurry.
- Don’t leave too much space above the head. The head should be close to the top of the screen—not too much empty space.
- Put the subject in the center (when needed). Centering works if you want people to focus on one thing.
- Leave space in front. If your subject is looking or moving in one direction, leave some space in front of them.
- When filming with a smartphone, be aware that the microphone is in the phone. Therefore hold the phone away from you and have the interviwee stand close to the phone for good audio.
- Block unwanted noise such as car sounds, music, people etc. when interviewing a person. Be aware of sounds in the background. Look for a quiet environment before you begin shooting.
- Keep your videos short for attention retention. For platforms like Instagram Reels, X (Twitter) or TikTok, aim for 30–60 seconds. For Facebook or YouTube, limit your video to 1–3 minutes to keep the viewer hooked. If the content is really interesting, viewers will watch longer videos, too.
- Capture attention within the first 3 seconds with an action, a question, or captivating images.
- Ensure that the background is clear of distractions or unwanted appearances.
- “Sun kissed”: Your subject must always face the light. But avoid bright sunlight in faces as it will create strong contrasts. Also avoid bright light in the background, as this will put you subject in the dark.
- Hold the recording device steady. Do not create shaky videos. Do not zoom in and out. Do not pan back and forth.
Advanced Tips
- Use Subtitles where necessary. Sometimes, it is okay to use Subtitles in instances where you feel your audience might need clarity on what is in the video, for instance accent barriers.
- Audios such as narration or music add to the overall experience and keep the audience engaged. It also helps to explain more about what’s going on in the video.
- Use clear and simple words when creating an audio to accompany a video.
- Depending on the type of story you want to tell, you can either use a calm, sorrowful, loud or excited voice.
- Always make sure that the audio you use resonates with your audience. For instance, if you’re talking about nature, add sound effects such as birds, wind or water.
- Use your smart phone voice recorder to record your voice. The idea is to know how to record a decent voice without the help of external applications.
Cyber Law (How to stay on the safe side legally)
Understanding Zambian Cyber Laws: Tips for Citizens
These laws aim to establish a framework for addressing cybercrime, protect individuals and infrastructure and safeguard children online.
Cyber Security Act, 2025:
This law protects Zambia’s critical systems (like banks and power grids) and allows monitoring of communications to prevent cyber threats. It establishes the Zambia Cyber Security Agency and requires warrants for most surveillance.
Protect Your Personal Information
- The law allows interception of calls, texts, or emails if they involve “critical information” (Section 39–40). A court warrant is needed, except in emergencies.
Tip: Be cautious in private chats, as they could be monitored with a warrant.
Report Cyber Threats Promptly
- Section 6 establishes the Zambia Cyber Incident Response Team to handle cyber threats like hacking.
Tip: If your phone or account is hacked, report it to ZICTA or the Cyber Incident Response Team to avoid legal issues.
Know When Your Devices Can Be Searched
- A law enforcement officer with a warrant can search and seize devices suspected of containing evidence of a crime (Section 5).
Tip: Ask to see a warrant if authorities request your phone or computer.
Cyber Crimes Act, 2025:
This law criminalizes cyber offenses like hacking, fraud, and harmful online content. It protects citizens, especially children, but has strict penalties for violations.
Think Before You Post
- Section 22 prohibits electronic communications that “harasses” or “humiliates” others, with penalties up to 200,000 penalty units or 2 years in jail.
- Section 19 bans the publishing of misleading information (up to 7 years in prison).
Tip: Avoid sharing unverified news, insults, or offensive posts on WhatsApp, Facebook, or X. Double-check before forwarding messages.
Protect Children Online
- Sections 15–17 criminalize child pornography, solicitation, and grooming, with penalties of 15–25 years or life imprisonment.
Tip: Monitor your children’s internet use. Teach them not to chat with strangers online. Report harmful content to ZICTA or police.
Avoid Illegal Access or Fraud
- Section 14 bans identity-related crimes (like using someone’s password without permission), with up to 10 years in jail. Unauthorized access to data or systems is also illegal.
Tip: Never use someone else’s account or share login details. Don’t click suspicious links promising money or rewards.
How you can stay safe without violating the law
- If your phone account gets hacked, report to;
- Zambia Police.
- Zambia Information and Communications Technology Authority (ZICTA) through Zambia Computer Incident Response Team (ZMCIRT) by dialing 7070 or emailing info@zicta.zm
- For online scams, including those involving mobile money, you can dial *707#.
- If asked to disclose information from your phone, ask for a warrant.
NOTE: Only authorised officers (with a warrant) are allowed to do that.
Jusof Facebook, WhatsApp.
- Artificial intelligence like ChatGPT,Meta AI are some new media supplementing access
I therefore advise young people to treat each other as usual both online and offline.
d fake-news especially.