M.E.T-5-LEGAL-SOCIETAL-AND-ETHICAL-ISSUES PDF
Document Details
Uploaded by BetterTechnetium
Tags
Related
- Legal, Ethical, and Societal Issues in Media and Information - Part 1: Intellectual Property, Fair Use, and Creative Commons PDF
- MIL-Lesson-8-1: Legal and Ethical Issues in Media and Information Literacy PDF
- Lesson 7: Legal, Ethical, and Societal Issues in Media and Information PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
- 2nd Quarter Media and Information Literacy Long Quiz Reviewer PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
Summary
This document includes questions and activities about Media and Information Literacy, particularly focusing on legal, ethical, and social issues relating to the internet.
Full Transcript
Media and Information Literacy Media and Information Literacy MR. DENMARK LACAP MS. KIM MARJORIE S. JESALVA MRS. MERRY JAINE M. LIWANAG...
Media and Information Literacy Media and Information Literacy MR. DENMARK LACAP MS. KIM MARJORIE S. JESALVA MRS. MERRY JAINE M. LIWANAG MRS. FATIMA JOY P. RODRIGUEZ 0 Media and Information Literacy LESSON 5: LEGAL, ETHICAL AND SOCIETAL ISSUES IN MEDIA AND INFORMATION LEARNING OBJECTIVES At the end of this learning experience, you should be able to: 1. put into practice your understanding of intellectual property, copyright, plagiarism and fair use guidelines; 2. demonstrate proper conduct and behavior online; and 3. put into action your personal resolve to combat digital divide, addiction, and bullying. KEY CONCEPTS 5.1 Fair Use 5.2 Intellectual Property 5.3 Plagiarism 5.4 Netiquette 5.5 Digital Divide 5.6 Virtual Self 5.7 Computer and Internet Addiction 5.8 Online Crimes OVERVIEW In today’s time, accessing information is undeniably fast and easy. Information is important because acquiring it makes us knowledgeable in certain fields and help fulfill our duties accordingly. Therefore, both producers of media and netizens should observe ethical and proper use of information. Though many websites provide information about variety of topics, this does not provide users the right to use them without proper acknowledgement or citation. Moreover, users should observe the proper way of sending out information to a person or even to a group. This module discusses various legal, ethical and societal issues in media and information. ENJOY LEARNING! 1 Media and Information Literacy GETTING STARTED Check. Detect. Unfriend. Facebook, the world’s most popular social networking website, is a space which allows users to connect with friends, family, colleagues, or even strangers online. Moreover, it allows users to share pictures and videos, post information, or even respond to people whom you don’t know personally. In line with this, watch the video entitled “Project Unfriend” (Video Source: https://www.youtube.com/watch?v=dYvr2MyK0_Y) and answer the following questions afterwards. 1. Does having more Facebook friends make you feel good? Justify your answer. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 2. How would you know if someone in your friend list is an online predator? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 3. How will you protect yourself online? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 2 Media and Information Literacy GETTING DEEPER LEGAL, ETHICAL AND SOCIETAL ISSUES IN MEDIA AND INFORMATION First, you need to understand that an author’s published work is a product of his effort and intellectual input. It only means that in order to come up with a piece, an individual used his intellect. In line with this, any published work is protected by copyright law to secure the original author’s piece to any plagiaristic act. FAIR USE Fair use refers to the copying of a copyrighted material with the purpose of using it for a review, commentary, critic or parody, without the need to ask for permission from the copyright owner. In here, you don’t really have the intention to somewhat copy everything, rather this will just serve as a guide or reference. Parody refers to a work which ridicules another in a funny, inoffensive and non-derogatory manner. An example of this is taking a screenshot from a famous movie and you turn it into a meme. Fair use is also applicable when you cite few lines from a song of a famous celebrity as an introduction to a book review. A material can also be used for non-profit educational purposes like a graph or an image which can be utilized for a class report or a lecture. However, the source of the material should still be properly cited in endnotes or bibliography. INTELLECTUAL PROPERTY Like what is stated, if you want to use a copyrighted material, you need to secure a copyright permission from its owner because the work of another person is his intellectual property. In its strict sense, intellectual property pertains to the output of a person’s intellectual pursuit, such as his literary and artistic works, logos, symbols, inventions, names and images which are used for commercial purposes or advertisements. Copyrights, patents, and trademarks fall under intellectual property rights. 3 Media and Information Literacy Types of Intellectual Property 1. Copyright Copyright is a legal device that gives the creator of a literary, artistic, musical, or other creative works the sole right to publish and sell that work. Violation of a copyright is called infringement. Copyrighted materials may include printed materials such as books, musical scores, artworks like paintings, sculptures, images and drawings. A copyrighted material is protected by law and cannot just be used and reproduced without permission. Otherwise, violation of such can merit legal sanctions. There are authors who allow others to use their work freely, provided that proper citation is credited to them. Others, however, ask first for an honorarium before allowing the use of their material. EXAMPLES OF COPYRIGHT INFRINGEMENT IN THE PHILIPPINES ❖ ABS – CBN FILES 127 MILLION COPYRIGHT CASE VS. WILLING WILLIE ABS-CBN filed last November 2010 a copyright infringement case versus its former talent, Willie Revillame and TV5. ABS-CBN told that Willie’s new show Willing Willie is a copycat of Wowowee. Similarities between Wowowee and Willing Willie: 1. Opening song and dance number 2. Wowowee’s Biga-TEN vs. Willing Willie’s Big Time Ka 3. Wowowee’s Willie of Fortune vs. Willing Willie’s Willtime Bigtime 4. Dancers are of the same characteristics 5. Set design, stage, seats, lighting and camera angles 4 Media and Information Literacy ❖ NOT EVEN ALEX GONZAGA WAS SPARED BY COPYRIGHT RULES Kapamilya actress Alex Gonzaga’s parody video of Ariana Grande’s “Into You” was apparently taken down on Facebook after being reported for copyright issues. “PANAWAGAN KAY ARIANA: The music that we used in this video is yours not mine. We know it. Atleast there’s the admission so please don’t report this.” – Alex even stated this at the beginning of the video after it was dragged down on Facebook. According to her, its intention is for fun only. 2. Patent How does patent differ from intellectual property? A patent pertains to an exclusive right granted to an invention. Just like the copyright law, a patent protects the owners from other people who deliberately or unintentionally copy his invention. When a scientist is granted a patent, it means that he has exclusive rights to the invention since it his is own original idea. 3. Trademark A trademark refers to a specific sign associated with a particular brand of goods and services. Companies use a trademark to distinguish their products from other available and similar products in the market. If a brand name is followed by the trademark symbol, it means that the brand name has exclusive use of its trademark. Imitation of brand names with a trademark is considered illegal because it is a form of fraud. Doing so is tantamount to deceiving the public that the product they are buying is original. Some imitation products look exactly the same as the original in terms of logo and design. Thus, consumers tend to buy these fake items in the belief that they are also original, 5 Media and Information Literacy but only cheaper in price. Although branded products are at times costly, the presence of the trademark they are known for assure the consumers of the product’s high quality. Starbucks Wins Philippine Case Over “Frap” Trademark Report Global coffee giant Starbucks has won a trademark case against a Philippine company, which tried to register the name “Frap” for a marketing slogan. Café de Manila Corp had filed an application to use the phrase “The Frap Bar Everyone Deserves and Designs” on its coffee products. In line with this, Starbucks owns the trademark to “Frappucino”, which refers to its line of frozen coffee drinks. The Intellectual Property Office’s Bureau of Legal Affairs ruled in favor of Starbucks in the dispute, citing the Intellectual Property Code of the Philippines. Section 123 (d) of Republic Act No. 8293 provides that “a mark cannot be registered if it is identical with a registered mark belonging to a different proprietor or mark with an earlier filing or priority date with respect of the same goods or services, closely related goods or services, or if it nearly resembles such a mark as to be likely to deceive or cause confusion.” PLAGIARISM We have previously mentioned that any printed materials like books are considered as the owner’s intellectual property. If another individual uses it without proper citation, then plagiarism occurs. Plagiarism is a fraud which refers to the form of stealing wherein a person did not acknowledge the original author of the work and claimed the material as his own. In plagiarism, we are imitating the language and thought of the writer without authorization. To avoid plagiarism, proper citation using endnotes or footnotes and listing the materials in the bibliography should be observed. Common Types of Plagiarism 1. Global Plagiarism It is also called as “Complete Plagiarism”. This is the most severe form of plagiarism. This is where an individual takes an entire work of someone else and submits it under his name. It is tantamount to intellect theft and stealing. 6 Media and Information Literacy 2. Paraphrasing Plagiarism It is also called as “Idea Plagiarism”. This is the most common type of plagiarism. This happens when an individual rephrases a piece of text in his own words. Paraphrasing itself is not plagiarism, you just need to properly cite the sources. However, paraphrasing becomes plagiarism when you read a source then rewrite its key points as if they were your own ideas. 3. Direct Plagiarism It is also called as “Verbatim Plagiarism or Word-for-word Plagiarism”. This happens when an author copies the text of another author, word for word, without the use of quotation marks. Moreover, the writer claims that piece of information as his own. It’s like you copy then paste it. 4. Mosaic Plagiarism It is also called as “Patchwork Plagiarism”. It happens when an individual copies phrases, passages and ideas from different sources and put it together to create a new text. EXAMPLES OF PLAGIARISM CASES IN THE PHILIPPINES ❖ SENATOR TITO SOTTO’S RH Speeches During the senate hearing on Reproductive Health Bill or RH Bill, Sen. Sotto delivered a speech wherein it is found out that two of his speeches or stand were lifted from different online sources. On the first speech, they admitted that they copied the work of an American blogger named Sarah Pope. For his second speech, it was also found out that it was copied from different websites. ❖ MVP’s GRADUATION SPEECH Prominent businessman Manuel V. Pangilinan, known to many as MVP, was in hot water after it was found that parts of his speech during Ateneo’s commencement exercises in 2010 were lifted from passages of other graduation marks. It was later discovered that his speech had similarities with those made by other well- known figures such as US President Barack Obama. 7 Media and Information Literacy NETIQUETTE Before we discuss what netiquette means, let us first define what etiquette is. When we refer to someone who has etiquette, it means that the person has proper decorum and behaves according to what society dictates to be right. In school, for an instance, a student who has an etiquette will behave appropriately as a sign of good breeding. He also displays courtesy and respect, which shows his good upbringing. Therefore, netiquette denotes the proper attitude that one should observe when communicating online. Whether one is talking to someone through a video conference, instant messaging, e-mail, or chat, netizens or Internet users should remain polite at all times. Here are some guidelines to remember as an internet user with netiquette: 1. Observe politeness when responding to or sending messages. When you send a message, it would be best to put a brief description of its content on the Subject line so that the receiver will know its content and if it is urgent for him to respond to. 2. When you receive a message, especially if it is from your superior at work or a client, it would be polite to reply urgently. Acknowledging messages sent by a relative or friend usually conveys thoughtfulness or warmth. 3. Review first the intended message before sending it so that you can be sure that it is the exact message that you want to convey. If one is careless, it can lead to miscommunication. For example, if one’s message is typewritten in bold and capital letters and with numerous exclamation points, the receiver of the message might think that the sender is angry when in fact, the sender just wants to highlight or emphasize the text. 4. As a sign of respect, do not send spam or chain messages to your list of contacts. A spam mail is a form of commercial advertising which companies send in bulk through e-mail to prospective customers. A chain mail, on the other hand, refers to an e-mail which requires the receiver to send the same message to another person. Thus, it becomes like a “chain” because the e-mail is continuously forwarded. If the receiver is superstitious, he may be forced to send the e-mail to a lot of people as failure to do such can merit either bad or good luck as indicated in the message. Spam and chain messages can be annoying, as most of their content is irrelevant and they also flood one’s inbox. 8 Media and Information Literacy 5. Ask permission first before sharing someone’s personal post, photo and video on social media, as this could violate the person’s right to privacy. 6. As a sign of respect, personal photos or videos of private individuals should not be tampered out of fun or parody, nor disseminated in public, as this can be offensive. 7. In public forums or chat rooms, it would be deemed impolite to ask for one’s personal information. Public forums or chat rooms are meant to discuss common interest. 8. Before sending a private message to someone who is not on your contact list, it would be appropriate to introduce first yourself politely and state your reason for communication. 9. Even though a person is entitled to freedom of expression, obscene messages, derogatory remarks on one’s race or religion, and vulgar photos and videos should not be publicly posted as this is unlawful. 10. Don’t get cute with text colors. Stick to the basic black text color. If you need to emphasize something in your sentence, use bold or italicized words. 11. Brevity rules. Keep email messages short and to the point. 12. Don’t over share. Personal information is valuable to identity thieves, so try not to share more than is necessary. 13. Be kind. Make a point to be respectful in your comments, even if you disagree or dislike someone’s stance on a topic. DIGITAL DIVIDE Even if we live in the Digital Age, there are still parts of the world that do not have access to Internet because it is either in a remote area or in extreme poverty. Digital divide refers to the economic, educational and social inequalities experienced by those who cannot afford to have computer and Internet access. Digital divide can also pertain to the gap on the kind of information which can be accessed and 9 Media and Information Literacy the available form of communication that is allowed to be distributed. For example, there are other areas where access to communication is restricted. Communist countries, like China, restrict the public from using social media websites like Facebook because in nations under this type of government, the leaders have the complete control of the state. The government puts restriction to information that is not in line with their countries’ stand in political issues. In the Philippines, we do not experience restrictions when it comes to acquiring information and choosing the mode of communication we want. We can communicate with other people through calls, e-mails, texts, video conferences, an even online chatting. Our country, however, has one of the slowest Internet connection compared to other Asian counterparts. This is brought by the limited Internet Service Provider in our country. As we live in the 21st century, having information and technology skills is necessary. Therefore, digital divide could hinder a person to become information, media, and technology literate. VIRTUAL SELF What do you imagine when you are asked to visualize about your virtual self? When we say that something is virtual, it means that it only exists in virtual reality. However, something virtual can resemble and simulate a physical aspect or component. Virtual self pertains to one’s representation in the virtual world, which exists online and is only available once a person is connected to the Internet. If you have Yahoo!, virtual chat rooms and massively multiplayer online role-playing games websites, you can customize your own profile using an avatar icon. If you do not want to use your own picture, you can choose from a set of avatar icons. You can change the avatar’s appearance, including its hair, facial features and complexion so that it can look like your actual self or your preferred appearance online. You can also customize the avatar’s accessories and clothes, as well as the background to match your interests. In its original context, avatar is associated with Hinduism, specifically the God Vishnu, who can assume both human and animal forms. 10 Media and Information Literacy Emojis originated from Japan. They are part of a feature when sending an electronic message. Moji in Nihongo (Japanese language) means “character”. Emojis or emoticons are smileys which represent an emotion or idea. Some people express their message through an emoji instead of verbally stating the message. If a person sends an emoji with tears falling, he/she might be feeling sad. If the eyes of an emoji are heart-shaped, the person might be expressing love to the receiver of the message. DANGERS OF THE INTERNET In these modern times, more and more people are being inclined in using social media such as Facebook, Twitter and Instagram. They tend to neglect their responsibilities and more important needs due to their obsession with such social networking sites. This habit can result to various consequences like computer addiction and vulnerability to online crimes. Internet and Computer Addiction Addiction refers to a condition in which a person seems to have lost control over an action or behavior, which mental health practitioners deemed as self-destructive. For example, when a person who enjoys playing poker or casino develops addiction, he will feel the urge to do it under all circumstances Can addiction be present in different media platforms? A person can be addicted to playing too much computer games. At first, the person sees video games as something interesting, so he plays them during his break time. But once the person feels the urge to be playing computer constantly because it is pleasurable even if he can no longer carry out his responsibilities, he can be perceived as someone who has become addicted to computer gaming. 11 Media and Information Literacy On the other hand, some people become addicted to online shopping. People who have become obsessed with shopping usually end up staying late at night just to wait for discount, promos, or bid for products being sold online. As a result, they become heavily indebted due to their credit card purchases. People addicted to online shopping are obsessive compulsive buyers. This means that they purchase products they actually do not need due to sudden urge or impulse. In the end, their house becomes a mess from the clutter of products they have no use for. In addition, others become hooked to using too much social media. These people tend to be obsessed and updating their status or tweets, and checking out their friends’ posts. They also have the inclination to put comments to almost every online post they see. Hence, people who have become addicted to social media are unable to finish their responsibilities like school assignments, which could result to poor performance. Some of them can even suffer from health deterioration and visual impairment because of their inability to prioritize their condition over their desire to open their social media accounts. Even though virtual gaming, online shopping, and the use of social media do not involve abuse of prohibited drugs, a person who has become addicted to such needs professional help since his action has made him unproductive. Treatments for those who have become computer addicts depend upon the person’s willingness to receive help. They need understanding and support so that they can overcome the addiction and eventually get back to their old self. Vulnerability to Online Crimes Have you ever been bullied? How do you feel when someone bullies you? When one is being bullied, the victim feels helpless and defenseless as the bully is able to hurt him physically and emotionally. Bullying can be physical when a bully bodily harms the victim, such as by way of punching. Name-calling and spreading nasty remarks about someone are also forms of bullying, as the victim will be hurt emotionally. With the advent of technology, bullying now can also be done through the internet. This is known as cyberbullying. In this act, harm is done when the bully tells something derogatory about someone and posts and shares it using social media. There are other cyberbullies who spread gossips about someone to destroy that person’s reputation. In addition, cyberbullying happens when fake profiles are deliberately shared across social media or even when humiliating photos or videos are shared online. 12 Media and Information Literacy Common Types of Cyberbullying 1. Exclusion Exclusion is the act of deliberately excluding someone from an online group. This usually happens when a group of bullies exclude someone from online conversations, groups or from events shared online to hurt their feelings. 2. Harassment It is one of the most serious form of cyberbullying. It refers to a repeated, intentional and strong form of bullying, manifesting mainly through posting or sending offensive, rude and insulting messages to the victim. 3. Fraping This happens when somebody breaks or logs into someone’s e-mail or social networking account and posts inappropriate content and messages that will cause embarrassment or damage to the person’s reputation and may affect his/her relationship with others. 4. Outing It is the act of publicly humiliating a person by posting sensitive or personal information about someone without their consent. Sharing secrets about someone online including private information, pictures, and videos fall under this category. 5. Catfishing To “catfish someone” is setting up a fake social media account or impersonating someone that you’re not, usually for deceptive purposes. It can be achieved through stealing identities and posting pictures. A catfish is a kind of person who will study your social media profile and steal information from it to create a believable fake identity. 6. Cyberstalking Cyberstalking happens when someone sends unwanted or intimidating messages, which may include threat to someone else. In many cases, the stalker will constantly message or harass a victim. These can be threats, sexual advances, or any kind of unwanted attention. Although cyberbullying may not involve actual physical contact, this social problem should be properly addressed because an individual’s overall well-being is affected. Victims of cyberbullying can be given support by showing them care and letting them feel empowered. On the other hand, the bullies also need help so that they can stop bullying and start to realize that their action poses harm to other people. 13 Media and Information Literacy Apart from cyberbullying, frequent use of social media can also result to overexposure to violence and pornography. Nowadays, many unscrupulous websites host, leak, or spread lewd videos and photographs, which can negatively influence minors to behave badly like the ones they see online. This may result to an increase in crime rate due to juvenile delinquency. LAWS IN THE PHILIPPINES REGARDING MEDIA AND INFORMATION 1. Intellectual Property Rights – Republic Act No. 8293 2. Anti-Bullying Act of 2013 – Republic Act No. 10627 3. Cybercrime Prevention Act – Republic Act No. 10175 NOTES _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ 14 Media and Information Literacy CHALLENGE A. Let’s Find Out! Answer each question based on your objective insight and critical thinking. Write your answer on the space provided for each item. Your output will be graded based on the given scoring rubric below: CONTENT 20 points ORGANIZATION OF IDEAS 5 points GRAMMAR 5 points TOTAL 30 points 1. Would you let someone use and claim your own work as his in exchange for a large amount of money? Why or why not? _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ 2. Why should people promote and support ethical use of media and information? _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ 3. Would you support a campaign that will provide free internet to the public? Justify your answer. _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ 15 Media and Information Literacy B. VIRTUAL SELF The following are the guidelines in creating your virtual self: 1. Access avatarmaker.net. This website will give you the opportunity to easily make an avatar that will represent yourself in a unique way, without the need to post a real-life picture of yourself online. 2. Click “Create Cartoon Avatar”. 3. Customize your own avatar. (face shape, complexion, eyes, nose, mouth, ears, eyebrows, hairstyle, clothes, background, etc.) 4. Once done, save the image of your customized avatar by clicking “Download”. 5. Insert the picture of your avatar in Microsoft Word and answer this question – “How would you like to be recognized in the virtual world?” Elaborate your answer through an essay. 6. Font: Times New Roman/ Font size: 12/ Spacing: Single/ Justify/ Short Bond Paper/ Portrait 7. Convert your file to PDF upon submission. 16 Media and Information Literacy C. DANGERS OF THE INTERNET Illustrate the dangers of the internet (computer addiction, online crimes, cyberbullying, etc.) through a poster. Use Oslo paper or bond paper, pencil, coloring materials or any art materials in making your artwork. (Orientation: Landscape) Your output will be graded based on the given scoring rubric below: QUALITY OF THE ILLUSTRATION 20 points CONCEPT 15 points CREATIVITY 15 points TOTAL 50 points An artwork of Mila Joy Morales (HUMSS – Batch 2019-2020) that depicts the dangers of the internet 17 Media and Information Literacy D. AMPLIFYING VOICES! According to UNICEF, social media is a huge influence in children’s lives and being constantly connected to the internet also comes with many risks, including cyberbullying. Violence against children has devastating effects on the physical and emotional well-being of young people. This can create lasting emotional and psychological scars, even physical harm. It is particularly challenging to address since children are vulnerable and have easy access to the internet, making them easy targets of online violence. In line with this, create a five-minute speech with a powerful message to the bullies, victims, and netizens on how cyberbullying can influence and change the lives of its victims. Moreover, provide various ways on how to combat cyberbullying. Here are the guidelines: 1. Record yourself in a portrait orientation (medium close-up). 2. Reading the entire speech while recording is highly discouraged. However, notes and cue cards are allowed just for reference or guide. 3. Editing of recordings are allowed. Moreover, instrumental or musical background can be used to compliment the delivery. 4. Semi-formal attire (or something decent) should be worn while delivering the speech. 5. Encode your speech in MS Word using the following: Font: Times New Roman/ Font size: 12/ Spacing: Single/ Justify/ Short Bond Paper. 6. Your performance will be graded based on the following: Content (30 points), Delivery (Pronunciation, Enunciation and Diction) (20 points), Creativity (10 points). 18