{"id":15365,"date":"2025-04-24T08:36:11","date_gmt":"2025-04-24T08:36:11","guid":{"rendered":"https:\/\/youthdemocracycohort.com\/decoder-le-numerique\/"},"modified":"2025-04-24T08:36:11","modified_gmt":"2025-04-24T08:36:11","slug":"decoder-le-numerique","status":"publish","type":"page","link":"https:\/\/youthdemocracycohort.com\/fr\/decoder-le-numerique\/","title":{"rendered":"D\u00e9coder le num\u00e9rique"},"content":{"rendered":"<div class=\"cm-glossary\"><div class=\"glossary-container \"><input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"glossary_index_style\" value=\"classic\">        <div class=\"progress-indicator\" style=\"display:none\">\r\n                            <img decoding=\"async\" src=\"https:\/\/youthdemocracycohort.com\/wp-content\/plugins\/TooltipProPlus\/assets\/css\/images\/ajax-loader.gif\" alt=\"AJAX progress indicator\"\/>\r\n                    <\/div>\r\n\t\t<div class=\"glossary_top_filter\">\r\n\t\t\t<div class=\"left\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"cmtt_help glossary-search-helpitem\" data-cmtooltip=\"The search returns the partial search for the given query from both the term title and description. So it will return the results even if the given query is part of the word in the description.\"><\/div>\r\n\t\t\t\t\t\t\t\t\t\t<span class=\"glossary-search-label\">Search:<\/span>\r\n\t\t\t\t\t<div class=\"glossary-search-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<input value=\"\" placeholder=\"\" class=\"glossary-search-term \" name=\"glossary-search-term\" id=\"glossary-search-term\" aria-label=\"Search\">\r\n\t\t\t\t\t\t<button type=\"submit\" id=\"glossary-search\" class=\"glossary-search button\">Search<\/button>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<a class=\"glossary-search-clear\" title=\"Clear the input\" href=\"\">\r\n\t\t\t\t\t\t(clear)\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"disable_listnav\" value=\"1\">\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"exact_search\" value=\"0\">\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"show_search\" value=\"1\">\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-terms\" name=\"glossary-hide-terms\" value=\"0\">\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-categories\" name=\"glossary-hide-categories\" value=\"0\">\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-abbrevs\" name=\"glossary-hide-abbrevs\" value=\"0\">\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-synonyms\" name=\"glossary-hide-synonyms\" value=\"0\">\r\n\t\t<input type=\"hidden\" class=\"glossary-perpage\" name=\"glossary-perpage\" value=\"0\">\r\n\t\t<input type=\"hidden\" name=\"tooltip_language\" value=\"\">\r\n\t\t<input type=\"hidden\" name=\"language_dropdown\" value=\"\">\r\n\t\t<input type=\"hidden\" name=\"languages_for_table\" value=\"\">\r\n\t\t<div id=\"glossaryList-nav\" class=\"listNav small\" role=\"tablist\"><\/div><ul class=\"glossaryList\" role=\"tablist\" id=\"glossaryList\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTermSet\"><li class=\" ln-0\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/activisme-numerique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Utilisation de plateformes en ligne pour d&eacute;fendre des causes et mobiliser des soutiens.&lt;\/div&gt;\"><span itemprop=\"name\">Activisme num&eacute;rique<\/span><\/a><\/li><li class=\" ln-0\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/amplification\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Les algorithmes augmentant la visibilit&eacute; des contenus, qu&amp;#039;ils soient bons ou mauvais.&lt;\/div&gt;\"><span itemprop=\"name\">Amplification<\/span><\/a><\/li><li class=\" ln-1\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/bien-etre-numerique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Un &eacute;quilibre sain entre l&amp;#039;activit&eacute; num&eacute;rique et la sant&eacute; mentale\/&eacute;motionnelle.&lt;\/div&gt;\"><span itemprop=\"name\">Bien-&ecirc;tre num&eacute;rique<\/span><\/a><\/li><li class=\" ln-1\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/bot\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Logiciel automatis&eacute; qui peut effectuer des t&acirc;ches utiles ou nuisibles en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Bot<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/cheap-fakes\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Des m&eacute;dias manipul&eacute;s simples et moins sophistiqu&eacute;s, comme des photos ou des textes modifi&eacute;s.&lt;\/div&gt;\"><span itemprop=\"name\">Cheap Fakes<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/clickbait\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Titres sensationnels ou trompeurs utilis&eacute;s pour attirer les clics.&lt;\/div&gt;\"><span itemprop=\"name\">Clickbait<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/competences-numeriques\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Comp&eacute;tences pour naviguer, &eacute;valuer et cr&eacute;er du contenu en ligne de mani&egrave;re responsable.&lt;\/div&gt;\"><span itemprop=\"name\">Comp&eacute;tences Num&eacute;riques<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/confidentialite-en-ligne\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Droit de contr&ocirc;ler la mani&egrave;re dont les informations personnelles sont consult&eacute;es et utilis&eacute;es en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Confidentialit&eacute; en ligne<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/contenu-nuisible\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Mat&eacute;riel causant des dommages &eacute;motionnels\/psychologiques, souvent non ill&eacute;gal.&lt;\/div&gt;\"><span itemprop=\"name\">Contenu nuisible<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/contenu-viral\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Contenu populaire qui se propage rapidement en ligne, qu&amp;#039;il soit exact ou trompeur.&lt;\/div&gt;\"><span itemprop=\"name\">Contenu viral<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/cyberintimidation\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Le harc&egrave;lement en ligne ou l&amp;#039;intimidation via les m&eacute;dias sociaux, les applications ou les jeux.&lt;\/div&gt;\"><span itemprop=\"name\">Cyberintimidation<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/cybersecurity\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Protection des syst&egrave;mes et des donn&eacute;es contre les menaces num&eacute;riques gr&acirc;ce &agrave; des pratiques s&eacute;curis&eacute;es.&lt;\/div&gt;\"><span itemprop=\"name\">Cybers&eacute;curit&eacute;<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/dark-web\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Partie non index&eacute;e de l&amp;#039;internet utilis&eacute;e pour des activit&eacute;s anonymes et parfois illicites.&lt;\/div&gt;\"><span itemprop=\"name\">Dark Web<\/span><\/a><\/li><li class=\" ln-15\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/data-privacy\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;&amp;lt;div class=&amp;quot;cmtt_meaning_label&amp;quot;&amp;gt;1&amp;lt;\/div&amp;gt;Veiller &agrave; ce que les donn&eacute;es &agrave; caract&egrave;re personnel soient prot&eacute;g&eacute;es contre tout acc&egrave;s non autoris&eacute; ou toute utilisation abusive.&amp;lt;div&amp;gt;&amp;lt;div class=&amp;quot;cmtt_meaning_label&amp;quot;&amp;gt;2&amp;lt;\/div&amp;gt;&amp;lt;!-- wp:separator {&amp;quot;className&amp;quot;:&amp;quot;is-style-wide&amp;quot;} --&amp;gt;\n&amp;lt;hr class=&amp;quot;wp-block-separator has-alpha-channel-opacity is-style-wide&amp;quot;\/&amp;gt;\n&amp;lt;!-- \/wp:separator --&amp;gt;&amp;lt;!-- wp:columns --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-columns&amp;quot;&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;D&eacute;finition :&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;Prot&eacute;ger les donn&eacute;es personnelles par des lois et des pratiques s&ucirc;res.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Le saviez-vous ?&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;En 2024, le r&egrave;glement g&eacute;n&eacute;ral sur la protection des donn&eacute;es (RGPD) a donn&eacute; lieu &agrave; des amendes d&amp;#039;environ 2,1 milliards d&amp;#039;euros dans l&amp;#039;UE pour violation des r&egrave;gles de protection des donn&eacute;es.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Source :&amp;lt;\/strong&amp;gt;&amp;lt;em&amp;gt; &amp;lt;\/em&amp;gt;Usercentrics : Confidentialit&eacute; des donn&eacute;es&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:columns --&amp;gt;&amp;lt;\/div&amp;gt;&lt;\/div&gt;\"><span itemprop=\"name\">Protection des donn&eacute;es<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/deepfakes\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;M&eacute;dias synth&eacute;tiques g&eacute;n&eacute;r&eacute;s par l&amp;#039;IA, manipulant des vid&eacute;os\/audios pour montrer de fausses actions ou de fausses paroles.&lt;\/div&gt;\"><span itemprop=\"name\">Deepfakes<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/demonetisation\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Suppression des recettes publicitaires provenant de contenus en ligne violents ou pr&eacute;judiciables.&lt;\/div&gt;\"><span itemprop=\"name\">D&eacute;mon&eacute;tisation<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/design-addictif\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Fonctionnalit&eacute;s num&eacute;riques visant &agrave; accro&icirc;tre l&amp;#039;engagement des utilisateurs, parfois de mani&egrave;re nuisible.&lt;\/div&gt;\"><span itemprop=\"name\">Design addictif<\/span><\/a><\/li><li class=\" ln-4\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/digital-footprint\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Traces de donn&eacute;es laiss&eacute;es par l&amp;#039;activit&eacute; en ligne, qui peuvent &ecirc;tre utilis&eacute;es pour &eacute;tablir le profil des individus.\n&lt;\/div&gt;\"><span itemprop=\"name\">Empreinte num&eacute;rique<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/disinformation\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Fausses informations d&eacute;lib&eacute;r&eacute;ment cr&eacute;&eacute;es et partag&eacute;es pour tromper les gens, souvent avec une intention malveillante.&lt;\/div&gt;\"><span itemprop=\"name\">D&eacute;sinformation<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/donnees-ouvertes\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Donn&eacute;es librement disponibles pour un usage public, souvent fournies par les gouvernements.&lt;\/div&gt;\"><span itemprop=\"name\">Donn&eacute;es ouvertes<\/span><\/a><\/li><li class=\" ln-3\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/doxxing\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Publier des informations priv&eacute;es en ligne sans consentement, souvent &agrave; des fins de harc&egrave;lement.&lt;\/div&gt;\"><span itemprop=\"name\">Doxxing<\/span><\/a><\/li><li class=\" ln-2\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/echo-chamber\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Environnement dans lequel les croyances sont renforc&eacute;es par une exposition r&eacute;p&eacute;t&eacute;e &agrave; des points de vue similaires.&lt;\/div&gt;\"><span itemprop=\"name\">Chambre d'&eacute;cho<\/span><\/a><\/li><li class=\" ln-\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/education-aux-medias\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Capacit&eacute; &agrave; interpr&eacute;ter et &agrave; analyser de mani&egrave;re critique le contenu des m&eacute;dias.&lt;\/div&gt;\"><span itemprop=\"name\">&Eacute;ducation aux m&eacute;dias<\/span><\/a><\/li><li class=\" ln-5\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/fake-news\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Contenu faux ou trompeur pr&eacute;sent&eacute; comme une information l&eacute;gitime, diffus&eacute; intentionnellement ou non.&lt;\/div&gt;\"><span itemprop=\"name\">Fake News<\/span><\/a><\/li><li class=\" ln-1\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/filter-bubble\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Espace cr&eacute;&eacute; par un algorithme montrant un contenu conforme aux pr&eacute;f&eacute;rences de l&amp;#039;utilisateur, limitant la perspective.&lt;\/div&gt;\"><span itemprop=\"name\">Bulles de filtres<\/span><\/a><\/li><li class=\" ln-11\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/fracture-numerique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;&Eacute;cart entre ceux qui ont acc&egrave;s aux technologies num&eacute;riques et ceux qui n&amp;#039;y ont pas acc&egrave;s.&lt;\/div&gt;\"><span itemprop=\"name\">La fracture num&eacute;rique<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/ia-a-usage-general\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;IA polyvalente capable d&amp;#039;effectuer des t&acirc;ches multiples dans diff&eacute;rents domaines.&lt;\/div&gt;\"><span itemprop=\"name\">IA &agrave; usage g&eacute;n&eacute;ral<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/ia-generative\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;IA qui cr&eacute;e de nouveaux contenus (texte, vid&eacute;o, musique, etc.) &agrave; partir de donn&eacute;es apprises.&lt;\/div&gt;\"><span itemprop=\"name\">IA g&eacute;n&eacute;rative<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/identite-numerique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Pr&eacute;sence personnelle et professionnelle sur internet.&lt;\/div&gt;\"><span itemprop=\"name\">Identit&eacute; num&eacute;rique<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/interface-truquee\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Tactiques de conception trompeuses pour manipuler les d&eacute;cisions des utilisateurs en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Interface Truqu&eacute;e<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/internautes\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;&amp;lt;!-- wp:separator {&amp;quot;className&amp;quot;:&amp;quot;is-style-wide&amp;quot;} --&amp;gt;\n&amp;lt;hr class=&amp;quot;wp-block-separator has-alpha-channel-opacity is-style-wide&amp;quot;\/&amp;gt;\n&amp;lt;!-- \/wp:separator --&amp;gt;&amp;lt;!-- wp:columns --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-columns&amp;quot;&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;D&eacute;finition :&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;Participants actifs &agrave; des communaut&eacute;s en ligne jouant un r&ocirc;le dans le discours num&eacute;rique.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Le saviez-vous ?&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;Plus de 5,3 milliards de personnes sont des internautes actifs, qui s&amp;#039;engagent quotidiennement dans les m&eacute;dias sociaux, les forums et les plateformes en ligne.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Source : Union internationale des t&eacute;l&eacute;communications (UIT)&amp;lt;\/strong&amp;gt;&amp;lt;em&amp;gt; &amp;lt;em&amp;gt;&amp;lt;em&amp;gt;&amp;lt;em&amp;gt;Union internationale des t&eacute;l&eacute;communications (UIT)&amp;lt;\/em&amp;gt;&amp;lt;\/em&amp;gt;&amp;lt;\/em&amp;gt;&amp;lt;\/em&amp;gt;&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:columns --&amp;gt;&lt;\/div&gt;\"><span itemprop=\"name\">Internautes<\/span><\/a><\/li><li class=\" ln-12\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/microciblage\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Cibler des individus avec des publicit&eacute;s sp&eacute;cifiques bas&eacute;es sur leurs donn&eacute;es en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Microciblage<\/span><\/a><\/li><li class=\" ln-12\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/misinformation\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Informations fausses ou inexactes communiqu&eacute;es sans intention de tromper.&lt;\/div&gt;\"><span itemprop=\"name\">M&eacute;sinformation<\/span><\/a><\/li><li class=\" ln-12\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/moderation-de-contenu\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Processus de r&eacute;vision\/suppression d&amp;#039;un contenu en ligne pour respecter des r&egrave;gles ou des lois.&lt;\/div&gt;\"><span itemprop=\"name\">Mod&eacute;ration de contenu<\/span><\/a><\/li><li class=\" ln-17\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/online-radicalization\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Processus d&amp;#039;adoption de croyances extr&ecirc;mes par le biais de l&amp;#039;exposition en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Radicalisation en ligne<\/span><\/a><\/li><li class=\" ln-19\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/online-trolls\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Les personnes qui publient des contenus offensants pour provoquer ou contrarier les autres en ligne.&lt;\/div&gt;\"><span itemprop=\"name\">Trolls en ligne<\/span><\/a><\/li><li class=\" ln-15\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/parametres-de-confidentialite\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Outils pour l&amp;#039;utilisateur permettant de contr&ocirc;ler la visibilit&eacute; des informations personnelles sur les plateformes num&eacute;riques.&lt;\/div&gt;\"><span itemprop=\"name\">Param&egrave;tres de confidentialit&eacute;<\/span><\/a><\/li><li class=\" ln-15\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/pensee-critique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;La capacit&eacute; d&amp;#039;&eacute;valuer et d&amp;#039;analyser objectivement les informations.&lt;\/div&gt;\"><span itemprop=\"name\">Pens&eacute;e critique<\/span><\/a><\/li><li class=\" ln-7\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/phishing\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Escroquerie consistant &agrave; se faire passer pour une entit&eacute; de confiance afin de voler des donn&eacute;es personnelles par des moyens num&eacute;riques.&lt;\/div&gt;\"><span itemprop=\"name\">Hame&ccedil;onnage<\/span><\/a><\/li><li class=\" ln-15\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/protection-des-donnees\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;&amp;lt;div class=&amp;quot;cmtt_meaning_label&amp;quot;&amp;gt;1&amp;lt;\/div&amp;gt;&amp;lt;!-- wp:separator {&amp;quot;className&amp;quot;:&amp;quot;is-style-wide&amp;quot;} --&amp;gt;\n&amp;lt;hr class=&amp;quot;wp-block-separator has-alpha-channel-opacity is-style-wide&amp;quot;\/&amp;gt;\n&amp;lt;!-- \/wp:separator --&amp;gt;&amp;lt;!-- wp:columns --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-columns&amp;quot;&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;D&eacute;finition :&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;Prot&eacute;ger les donn&eacute;es personnelles par des lois et des pratiques s&ucirc;res.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:column --&amp;gt;\n&amp;lt;div class=&amp;quot;wp-block-column&amp;quot;&amp;gt;&amp;lt;!-- wp:heading {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;h2 class=&amp;quot;wp-block-heading&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Le saviez-vous ?&amp;lt;\/strong&amp;gt; &amp;lt;\/h2&amp;gt;\n&amp;lt;!-- \/wp:heading --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;En 2024, le r&egrave;glement g&eacute;n&eacute;ral sur la protection des donn&eacute;es (RGPD) a donn&eacute; lieu &agrave; des amendes d&amp;#039;environ 2,1 milliards d&amp;#039;euros dans l&amp;#039;UE pour violation des r&egrave;gles de protection des donn&eacute;es.&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;br \/&amp;gt;&amp;lt;!-- wp:paragraph {&amp;quot;translatedWithWPMLTM&amp;quot;:&amp;quot;1&amp;quot;} --&amp;gt;\n&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Source :&amp;lt;\/strong&amp;gt;&amp;lt;em&amp;gt; &amp;lt;\/em&amp;gt;Usercentrics : Confidentialit&eacute; des donn&eacute;es&amp;lt;\/p&amp;gt;\n&amp;lt;!-- \/wp:paragraph --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:column --&amp;gt;&amp;lt;\/div&amp;gt;\n&amp;lt;!-- \/wp:columns --&amp;gt;&amp;lt;div&amp;gt;&amp;lt;div class=&amp;quot;cmtt_meaning_label&amp;quot;&amp;gt;2&amp;lt;\/div&amp;gt;Veiller &agrave; ce que les donn&eacute;es &agrave; caract&egrave;re personnel soient prot&eacute;g&eacute;es contre tout acc&egrave;s non autoris&eacute; ou toute utilisation abusive.&amp;lt;\/div&amp;gt;&lt;\/div&gt;\"><span itemprop=\"name\">Protection des donn&eacute;es<\/span><\/a><\/li><li class=\" ln-18\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/securite-en-ligne\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Mesures prises pour se prot&eacute;ger des menaces et des pr&eacute;judices num&eacute;riques.&lt;\/div&gt;\"><span itemprop=\"name\">S&eacute;curit&eacute; en ligne<\/span><\/a><\/li><li class=\" ln-8\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/social-engineering\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Tactiques visant &agrave; inciter les individus &agrave; r&eacute;v&eacute;ler des informations sensibles.&lt;\/div&gt;\"><span itemprop=\"name\">Ing&eacute;nierie sociale<\/span><\/a><\/li><li class=\" ln-18\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/systemes-de-recommandation\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Algorithmes sugg&eacute;rant un contenu bas&eacute; sur le comportement ant&eacute;rieur de l&amp;#039;utilisateur.&lt;\/div&gt;\"><span itemprop=\"name\">Syst&egrave;mes de recommandation<\/span><\/a><\/li><li class=\" ln-19\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/technologie-civique\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Des outils num&eacute;riques qui soutiennent l&amp;#039;engagement civique et la transparence gouvernementale.&lt;\/div&gt;\"><span itemprop=\"name\">Technologie civique<\/span><\/a><\/li><li class=\" ln-5\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/youthdemocracycohort.com\/fr\/glossary\/troll-farms\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt;Des groupes organis&eacute;s ou des robots qui diffusent en ligne des contenus nuisibles ou qui s&egrave;ment la discorde.&lt;\/div&gt;\"><span itemprop=\"name\">Fermes &agrave; trolls<\/span><\/a><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-15365","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/pages\/15365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/comments?post=15365"}],"version-history":[{"count":0,"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/pages\/15365\/revisions"}],"wp:attachment":[{"href":"https:\/\/youthdemocracycohort.com\/fr\/wp-json\/wp\/v2\/media?parent=15365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}