Legal, Ethical, and Societal Issues in Media and Information Literacy PDF

Summary

This document explores legal, ethical, and societal issues related to media and information literacy. It covers topics such as digital citizenship, intellectual property rights, and various types of cybercrimes. The document is suitable for use in educational settings and for those interested in learning more.

Full Transcript

**LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MEDIA AND INFORMATION LITERACY** **DIGITAL CITIZENSHIP** \- Ability to find, access, use, and create information effectively; engage with other users and with content in an active, critical, sensitive and ethical manner; and navigate the online and ICT envi...

**LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MEDIA AND INFORMATION LITERACY** **DIGITAL CITIZENSHIP** \- Ability to find, access, use, and create information effectively; engage with other users and with content in an active, critical, sensitive and ethical manner; and navigate the online and ICT environment safely and responsibly, being aware of one\'s own rights (UNESCO, 2016) **INTELLECTUAL PROPERTY** \- Refers to the \"creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce" **TYPES OF INTELLECTUAL PROPERTY** - COPYRIGHT - PATENT - TRADEMARK - INDUSTRIAL DESIGN - GEOGRAPHICAL INDICATIONS AND APPELATIONS OF ORIGIN 1. **COPYRIGHT** \- A legal term used to describe the rights that creators have over their literary and artistic works and gives the creator the sole right to publish and sell that work. - Protects the form of material expression and is only available for works that are fixed in tangible form. - Not mandatory but recommended **PLAGIARISM** An act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of the author's work as one's pwn, as by not crediting the original author. **EXAMPLES OF ACTS OF PLAGIARISM** - Copying media(especially images) from other websites to paste them into your own papers or websites. - Making a video using footage from others' videos or using copyrighted music as part of the soundtrack. - Performing another person's copyrighted music (i.e., playing a cover) - Composing a piece of music that borrows heavily form another composition **WHAT IS FAIR USE?** \- A legal principle stating that one can use a copyrighted work without a license for the following purposes: commentary, criticism, reporting, research, and teaching. 2. **PATENT** \- Exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem. - Provides the right to consent on the invention or a way for others to use it (functional use) - Technical information about the invention must be disclosed to the public 3. **TRADEMARK** \- Distinguished sign of goods or services that identifies and differentiates from one enterprise to another; a signature mark. 4. **INDUSTRIAL DESIGN** \- Protects only the appearance or aesthetic features of a product such as shape, surface, patterns, lines, or color. 5. **GEOGRAPHICAL INDICATIONS AND APPELATION OF ORIGIN** \- Signs used on products possessing qualities, a status, or characteristics that are essentially attributable to that location of origin. **COMMON ISSUES ON DATA PRIVACY** - HACKING - PISHING - IDENTITY THEFT 1. **HACKING** \- Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even, entire networks. - An attempt to exploit a computer system or a private network inside a computer. - Unauthorized access to or control over computer network security systems for some illicit purpose. 2. **PISHING** \- A type of social engineering attack often used to steal user data, including login credentials and credit card numbers. - As with real fishing, there\'s more than one way to reel in a victim - Unlike other kinds of online threats, phishing does not require particularly sophisticated technical expertise 3. **IDENTITY THEFT** \- Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way. **CYBERCRIME** \- Also called computer crime; any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends. **OTHER FORMS OF CYBERCRIMES** Piracy and Illegal Downloads Cybersquatting Online Drug Trafficking Cyber Libel or Cyber Defamation Online Harassment (Cyberstalking, Internet Trolls, etc.) Internet Pornography Online Predators and Other Sex Crimes **CYBERBULLYING** \- The use of digital means of communication thatcould hurt or harass a person such as intentionally sending hurtful texts or SNS messages, posting embarrassing photos or videos, and spreading malicious rumors online. **FAKE INFORMATION** \- News, stories, or hoaxes created to deliberately misinform or deceive readers and created to either influence people\'s views, push a political agenda, or cause confusion and can often be a profitable business for online publishers **TYPES OF FALSE INFORMATION** 1. False context 2. Manipulated Content **COMPUTER ADDICTION** \- An overdependence or a damaging need to do something on computer or internet; excessive use of computers to the extent that it interferes with daily life. **TRIGGERS FOR COMPUTER ADDICTION** 1. Computer Gmaes 2. Online Shopping 3. Social Media **EFFECTS OF COMPUTER ADDICTION** 1. Sleep deprivation 2. Anxiety 3. Depression 4. Relationship problems **NETIQUETTE** \- Defined as a set of rules for proper and acceptable online behavior; denotes the proper attitude that one should have and observed when communicating online **CORE RULES OF NETIQUETTE (SHEA, 1994)** 1\. Remember the Human 2\. Adhere to the same standards of behavior online that you follow in real life 3\. Know where you are in cyberspace 4\. Respect other people\'s time and bandwidth 5\. Make yourself look good online 6\. Share expert knowledge 7\. Help keep flame wars under control 8\. Respect other people\'s privacy 9\. Don\'t abuse your power 10\. Be forgiving of other people\'s mistakes

Use Quizgecko on...
Browser
Browser