Elternguide Logo

What actually is … a hashtag?

Hashtags are single words or groups of words under posts on social media, usually in the image description or title of a post. They work like a keyword or filter: when you click on a hashtag , all posts that have been tagged with that hashtag are displayed.

Where does the hashtag come from?

Twitter (now X) was the first to introduce the hashtag so that users can follow all posts on a topic that interests them. Whether under pictures on Instagram or video posts on TikTok and YouTube – it’s hard to imagine all the world’s popular social platforms today without hashtags.

How do you set hashtags?

A hashtag always consists of the hash sign “#” and a description behind it (tag = keyword). Word groups are written one after the other without spaces or punctuation. Mostly, several hashtags are used under or behind a post. This increases the likelihood that others will take notice of the post. Since the Internet is a space without national borders, English hashtags are often used, so people from many countries can search for them.

What is the significance of a hashtag in social media?

Hashtags are a good way to reach many people. Influencers use them to become better known. The hashtags with the most posts on Instagram include #fashion and #style, under which mostly new outfits are presented. For many fashion brands, Instagram is therefore also an important channel for advertising.

But hashtags are also used for political topics, e.g. to draw attention to a social problem and to encourage people to think and act. Entire movements have been created through hashtags , such as #bodypositivity, under which pictures of real bodies are collected to counter unrealistic beauty ideals. The climate movement was also able to reach many people online with #fridaysforfuture and make the issue of climate change a topic around the world. Hashtags are therefore also a means of stimulating discussions on topics that otherwise receive little attention. Many women around the world have shared their experiences of sexual harassment via #metoo. It quickly became a big issue in the public eye. This also allowed cases of harassment and abuse to be made public. The boundaries of the online world and the world outside the Internet are increasingly interconnected and influence each other.

Hashtags can motivate people and create a sense of belonging: During the corona crisis, users posted pictures and Stories shared under #westayhome of their time at the home office or at home with family. So hashtags are also a way to feel connected to each other, which can be nice and fun during a difficult time.

What is actually… a social bot?

Bot comes from robot – the English word for robot. Social bots are virtual user accounts in social networks such as Facebook or YouTube. They are programmed to perform certain activities, e.g., to post many likes or comments or to respond to certain keywords with pre-programmed texts. Social bots are used to create attention for certain topics so that media report on them and the public talks about them. These bots are also used for advertising and marketing purposes (spam) and for spreading political opinions, false news and hate messages. In this way, they are supposed to influence the opinion of real users and users. If a piece of information is clicked on or shared particularly frequently on the Internet, it is possible that social bots and not real users are behind it.

How can you recognize social bots?

Most of the time, social bots have neither a profile picture nor personal posts in their profile. Instead, they often post on the same topic. Their language is often flawed and consists of repetitive words. They do not address responses to comments or complex questions.

What is actually… GPS tracking?

The English word “tracking” means something like “to follow” in German. GPS tracking makes it possible to track where a device currently is. With GPS technology, the position at which an object is located can be determined using satellite technology. GPS stands for “Global Positioning System”. The position where a person is located can also be determined in this way, as most smartphones are equipped with this technology and GPS data is collected via apps such as Google Maps. In this way, it is possible to track where the person is at the moment, but also where he or she has been in the past.

The GPS function in smartphones is practical because you can, for example, display supermarkets in the vicinity and use the cell phone as a navigation system. However, the location data is always passed on to the provider of the respective app. What happens to this data, however, is difficult to understand. They can tell the provider where someone lives and works. GPS data is also used in forensics.

To protect data: disable location

GPS services can usually be disabled in the device’s settings. When a cell phone is turned off, the location can no longer be determined via GPS. To see for sure that no unnecessary data is collected about you and your family, you should disable location data for those apps that work without GPS. You can also turn off the GPS by default and only enable it when you use Google Maps, for example.

By the way, the location can also be determined via cell phone data. Apps can recognize which cell of the mobile network you have “dialed in” to with your device.

Unboxing – entertainment, information or product promotion?

At Christmas, we not only unwrap presents ourselves, but we also watch others do so time and time again. This can be really fun. What is in the gift box and how does the person react to it? Something similar happens in so-called unboxing videos throughout the year. In the videos, people show how they unpack something. Mostly products that they have previously ordered. On video portals like YouTube, such videos are particularly popular and are watched by millions of people. But anyone who has seen an unboxing video will quickly realize that it is not always easy to distinguish between advertising and entertainment.

What is an unboxing video?

Unboxing videos (to unbox = to unpack) are online videos in which a person unboxes a product from its original box. The video shows up close how the specific product is removed from the packaging and then presented to the viewers down to the smallest detail, commented on and usually tried out.

Unboxing videos often appear in the so-called vlogging style and have characteristics of an explainer video. Technical devices such as smartphones, consoles or tablets are often unpacked in the videos, but toys, food or items of clothing also find a place of presentation in them.

Why are unboxing videos fascinating?

The reasons for the fascination with unboxing videos are very different. One of the reasons might be that viewers can’t get enough of the feeling of being able to unpack something, even to the point of watching other people do it – which incidentally even saves time and money. But it’s also about getting a first impression of a new product that viewers are interested in. But unlike advertisements from the manufacturer, the “unboxing producers” comment and rate in a seemingly open and honest way. Another motive is the possibility of interaction in a community, where queries about the product, comments as well as opinions can be shared. This also helps to identify with a product or to clearly differentiate from it.

What should you look for when your child wants to create unboxing videos on their own?

There’s not much to look for in an unboxing video as a parent. Basically, it is important that your child presents an original product and not, for example, a counterfeit, since the trademark owner has a vested interest in ensuring that foreign or counterfeit products are not attributed to him and could thus damage the trademark. If your child is interested in creating a video, accompany him/her in the process, present for example. a game you are convinced of and experience the world of games in a completely different way.

Conclusion

Unboxing videos offer many opportunities. From the fascination of unpacking, to pure information, to interaction, various interests can be served. Nevertheless, a watchful eye should always be kept when children use such videos or create them themselves. After all, unboxing videos are also advertising and consumer intentions can quickly reach their child unfiltered. So discuss what you’ve seen and make your child aware of any advertising intentions. Many influencers also refer to creating their videos as a job, as they are paid by companies to show and try out their products. As with many other activities online, be sure to accompany your child as they watch the videos. If you keep this in mind, nothing will stand in the way of fun watching. Pack – uh – try it out, too!

As an aside…

  • The information website Yahoo Tech launched the first real unboxing video back in 2006 and presented the Nokia E61 cell phone in it.
  • The interest in unboxing now seems so great that a private television station has already taken notice and is dedicating its own unboxing show for children to the whole topic.

The digitalization of family life – apps for everyday organization

One’s own schedule is often full enough, but coordinating the schedules of all family members turns mothers and fathers into true family managers. Who brings the children to daycare and school and when and picks them up again? The son has regular guitar lessons, the daughter has soccer practice several times a week and a game on the weekend, in between is grandma’s birthday and the fridge also needs to be filled. Apps programmed specifically for this purpose can help to better organize everyday family life.

Some of these apps work like a calendar that each family member can access with their own smartphone and add or modify appointments. This allows upcoming appointments and tasks to be coordinated without being in the same location. Some of the apps also offer additional functions such as sending photos or voice messages.

There are also digital shopping planners that all family members can view and modify. If you spontaneously finish work early, you can simply check the app to see what still needs to be purchased. Or you can order the groceries you want directly to your home via app, which eliminates the need to go to the supermarket and leaves time for other things.

For longer-term meal planning and buying the groceries you need, there’s Our Groceries. The app is available for both Apple and Android devices. There are also special family planners that combine various functions such as calendars, shared lists and chat functions. Among the best known are Famanice and Cozi Family Organizer.

What should you pay attention to?

Consider together as a family whether using such apps makes sense for you. Look at the capabilities of each app and decide how and what to use it for.

Some applications require a lot of personal data and permissions to install, and it is often not clear why they are needed. You still want to use the app? Find out whether the permissions are actually necessary for the app to function and whether they can possibly be deactivated in the settings. You should also be aware that access rights give app providers and third parties access to personal data. Also find out if there are any hidden costs for extensions within the app or if there may be costs at a later date.

To help you select and evaluate the various apps, the Internet Guide for Parents will in the future present a series of apps with answers to the following questions, among others: What functions do they offer? What are the possible risks?

What is actually… phishing?

Phishing refers to the theft of personal data, especially passwords. This can happen, for example, via an e-mail or text message asking you to click on a link and enter your password, credit card number or even a tan number. The emails usually pretend to be a well-known company (e.g. Amazon or PayPal) or a bank. With the stolen data, the thieves then have access to the person’s account and can perform actions in their name, such as ordering expensive goods or making bank transfers.

Such messages usually contain links to the websites of the supposed companies, which can look very genuine. Don’t let that fool you! If you are very unsure if it is a genuine request, contact your bank or the company’s customer support to resolve any potential issues with your account in person and in a secure manner. Even if the person pretends to be a friend or acquaintance, it could be a fake. Do not respond to it and, if necessary, address it with the person later in a personal conversation. Possibly their account was unknowingly hacked.

It is important to educate your child about this type of scam. Explain to him never to give personal information or passwords anywhere or to give them to anyone when asked for them in an email or Messenger message.

What is actually… a Lootbox?

A Lootbox is a special type of in-app purchase. The term Lootbox can be translated as “loot box”. Such a box can be acquired in many console games or game apps. It resembles a grab bag because its contents are not known before purchase. Often, these paid in-game purchases are items that are not relevant to the game, such as a new outfit for the character or additional equipment. A player can purchase a Lootbox for real money or in-game currency. Particularly valuable items are rare and the percentage of rivets is high. That’s why a Lootbox is like a game of chance and has been under critical scrutiny for some time. It has even been considered to ban them, as gambling should not be accessible to children and teenagers under the age of 18. The Entertainment Software Self-Regulation Body (USK) does not consider Lootboxes to be gambling, but advises parents to take a closer look.

To make sure your child doesn’t fall into the cost trap, you should discuss with him or her what Lootboxes are and how game makers plan to make money with them. It’s best to try out a new game together with your child, as it’s sometimes impossible to tell beforehand if lootboxes play a role.

If your child absolutely wants to buy a Lootbox, you can agree on rules for this. Just as with the allocation of media use time, you can, in consultation with your child, convert some of the pocket money into virtual play money that can be used for such purposes. In this way, your child learns bit by bit how to handle his or her pocket money responsibly.

What is actually… a router?

A router is a network device that provides a stable Internet connection and can connect computers together. Most often it is connected to the DSL connection. The router shares the Internet signal with other computers and smartphones via a WLAN signal. To be able to receive the WLAN signal, a password or so-called WLAN key must usually be entered in the device settings. The devices are then all on the same network. This allows information to be exchanged via the WLAN among the devices registered in the home network.

What is actually… a server?

A server is a storage on which contents of web pages, e-mails or files are stored. Every program or app needs servers in the background to store and process its users’ data, including WhatsApp, for example.

When sending messages, it then works like this: When person A sends a message, the first thing that happens is that it is sent to WhatsApp’s servers. They ensure that the exchange of messages works. This is comparable to a post office, where all letters are collected before they are delivered. The message is then forwarded to person B from the WhatsApp servers. Afterwards, person B can read the message on his smartphone. Compared to letter mail, the exchange happens online in just a few seconds.

What is actually… End-to-end encryption?

Parents and children communicate not only in person, but also via smartphone. Text and voice messages, photos and videos are sent daily. WhatsApp is the most popular way to do this. Since April 2016, the app uses the so-called end-to-end encryption. But what is it actually?

What happens when I write messages with my smartphone?

Let’s imagine the following situation: Mom and Ben both use WhatsApp. Mom writes a message to Ben: “Hi Ben, is school over already?”. When mom sends the message, the first thing she does is send it to WhatsApp’s servers. From there, the message is then forwarded to Ben. He can then read the message on his smartphone. Compared to letter mail, the exchange happens online in just a few seconds.

What is (end-to-end) encryption?

When a message is encrypted, the content can no longer be read. Only with the appropriate key can the message be restored. You can compare this to a letter that has a lock on it. Only the person with the right key can open the letter to read what it says. So when Mom sends an encrypted message to Ben, no one but him can read what it says. This is important because a lot can happen on the way from Mom’s smartphone to the WhatsApp servers and from there on to Ben’s smartphone. The message could be read along the way by hackers and surveillance services, for example. To prevent this and to preserve the secrecy of correspondence, messages should be encrypted. By the way, not only text messages can be encrypted, but also voice, calls, photos and videos.
With end-to-end encryption, Mom’s message is encrypted all the way to Ben’s smartphone. The content can only be read on Mom and Ben’s devices. Only they have the necessary key. The entire encryption process runs automatically. It is best to use applications that use end-to-end encryption. Especially when it comes to messenger apps for the smartphone, there is a wide choice. Among them are many good alternatives to WhatsApp that also encrypt end-to-end and also protect users’ data, e.g. Threema, Telegram or Hoccer. However, group messages are often not encrypted.

When does encryption make sense?

It generally makes sense to send information over the Internet in encrypted form. Especially when it comes to sensitive information such as names, addresses and bank data. When visiting websites, it is recommended that you always access them via “https://”. The “s” after the “http” stands for “secure”. It means that the information is exchanged in encrypted form. Not all websites offer this security. Payment data and other important information should only be entered on websites that can be accessed via “https”. With minimal effort, e-mails can also be provided with end-to-end encryption. For this, it is useful to look for instructions for the mail program you are using.

What is actually… Open Source?

Children are inquisitive and want to understand things. Perhaps your child has also asked you how the Internet actually works, what structures and processes are behind it. Adults and children come into contact with the Internet every day and are on the move online. For an enlightened approach to it, computer science lessons are increasingly on the agenda in schools as well. For example, children learn how to construct their own programs, known as software, and use them to build robots or transmit messages using small mini-computers called CALLIOPE.

Calliope-mini|Source: https://pixabay.com/de/calliope-mini-calliope-computer-2755554/

But what is software anyway? In order to work on the computer or tablet, it is necessary to install various programs or software. On mobile devices, these are called apps. For example, there are writing programs like Microsoft Word or Internet browsers like Google Chrome. Many of us use so-called “free software” such as Firefox, Chrome, OpenOffice or the VLC media player. Such programs are also installed on many school computers, since free software is mostly available free of charge and has a high level of quality. “Free” means that the program is mostly free to use and you can give away as many copies as you want. So anyone can use this software. The software of the mini-computer CALLIOPE is also included, so that all students can have access to it.
In this context, one often speaks of “open source”. This means the same as Free Software, but focuses on a different aspect. Translated, open source means “free source”. This means that it is disclosed how the software is programmed or how the hardware (i.e. the components of a computer) is assembled. Anyone can access the source and develop it further, modify it or draw attention to errors in the software or hardware. Among other things, students can use computers like CALLIOPE to learn how well-known open source programs like Firefox work. Very many people work on the same program, which allows it to constantly evolve and improve. Despite the mostly free use, there are various license conditions that must be observed (often related to the editing of the source code). A counter-model to open source is “proprietary software”, such as Microsoft Office. With these pay programs, you don’t know what programming is behind them. Also, you can often only install them on one computer – depending on which license you bought.

 

 

Project partners
Supporter