Media and Information Literacy Reviewer PDF
Document Details
Uploaded by EasiestCoconutTree
Iloilo National High School
Mary Joyce
Tags
Related
- Grade 12 Media and Information Literacy (MIL) Past Paper PDF 2020
- Legal, Ethical, and Societal Issues in Media and Information Literacy PDF
- MIL-Lesson-8-1: Legal and Ethical Issues in Media and Information Literacy PDF
- Media and Information Literacy Grade 12 Past Paper PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
- Media and Information Literacy (2nd Quarterly) PDF
Summary
This document is a reviewer for a Media and Information Literacy class. It covers topics such as digital citizenship, intellectual property, fair use, patents, trademarks, industrial designs, cybercrime, and data privacy.
Full Transcript
the original work or idea -- you are presenting the idea or thought as your own. LESSON 6 LEGAL, ETHICAL, AND SOCIETAL ISSUES IN...
the original work or idea -- you are presenting the idea or thought as your own. LESSON 6 LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MEDIA AND INFORMATION LITERACY Digital Citizenship Digital citizenship is the ability to use technology responsibly, safely and respectfully. It refers to the ability to protect private information online, ❖ Fair Use mitigate risks associated with Fair use permits a party to use a cyberthreats or online threats and copyrighted work without the utilizing information and media in a copyright owner's permission for respectful, knowledgeable and legal purposes such as criticism, comment, way. news reporting, teaching, scholarship, or research. These purposes only Key Principles of Digital Citizenship illustrate what might be considered as fair use and are not examples of what Respect Yourself/ Respect Others will always be considered as fair use. Digital Etiquette Digital Access Digital Law 4 MAIN TYPES OF INTELLECTUAL Educate Yourself/ Connect with Others PROPERTY Digital Literacy Digital Communication PATENT Digital Commerce A patent is an exclusive right granted for a Protect Yourself/ Protect Others new, inventive, & useful product. It can take Digital Rights and Responsibility the form of a new product, process or Digital Safety (Security) technical improvement to existing inventions. Digital Health and Welfare TRADEMARK ISSUES IN MEDIA AND INFORMATION A trademark is a word, a group of words, sign, LITERACY symbol, logo or a combination thereof that 1) Intellectual Property identifies and differentiates the source of the goods or services of one entity from those of Intellectual property refers to creations others. of the mind. It can be an invention (patent / utility model), a design (industrial design), a brand name (trademark, or a literary and artistic work (copyright). TYPES OF INTELLECTUAL PROPERTY ❖ Copyright Copyright is a legal term describing ownership of control of the rights to INDUSTRIAL DESIGNS the use and distribution of certain An industrial design is the ornamental or works of creative expression, including aesthetic aspect of an article. Design, in this books, video, motion pictures, musical sense, may be three-dimensional features compositions and computer programs. (shape or surface of an article), or the ❖ Plagiarism two-dimensional features (patterns or lines of Plagiarism is using someone else's color). Handicrafts, jewelry, vehicles, work or ideas without giving proper appliances - the subject of industrial designs credit. In other words, because you are range from fashion to industrial goods. not giving attribution to the owner of GEOGRAPHICAL INDICATIONS AND CYBERCRIME APPELLATIONS OF ORIGINS Cybercrime is criminal activity that either GIs and appellations of origin require a targets or uses a computer, a computer qualitative link between the product to which network or a networked device. Most they refer and its place of origin. Both inform cybercrime is committed by cybercriminals consumers about a product's geographical or hackers who want to make money. origin and a quality or characteristic of the However, occasionally cybercrime aims to product linked to its place of origin. damage computers or networks for reasons other than profit. COMMON ISSUES ON DATA PRIVACY 1) Hacking THE CYBERCRIME PREVENTION ACT OF Hacking (also called cyber hacking) is 2012 the use of unconventional or illicit Officially recorded as Republic Act No. 10175, means to gain unauthorized access to is a law in the Philippines that was approved a digital device, computer system or by President Benigno Aquino III on computer network. The classic September 12, 2012. It aims to address legal example is a cybercriminal who issues concerning online interactions and the exploits security vulnerabilities to Internet in the Philippines. break into a network and steal data. 2) Phishing CYBERBULLYING A technique for attempting to acquire Cyberbullying is the use of technology to sensitive data, such as bank account harass, threaten, embarrass, or target another numbers, through a fraudulent person. Online threats and mean, aggressive, solicitation in email or on a web site, in or rude texts, tweets, posts, or messages all which the perpetrator masquerades as count. a legitimate business or reputable person. FAKE INFORMATION 3) Identity theft Fake news or information disorder is false or Identity theft happens when someone misleading information (misinformation, takes your name and personal including disinformation, propaganda, and information (like your social security hoaxes) presented as news. Fake news often number) and uses it without your has the aim of damaging the reputation of a permission to do things like open new person or entity, or making money through accounts, use your existing accounts, advertising revenue. or obtain medical services. TYPES OF FALSE INFORMATION DATA PRIVACY ACT OF 2012 Clickbait Propaganda Satire/Parody False Context Manipulated Content Misleading Headlines Biased/Slanted News COMPUTER ADDICTION Computer addiction is a form of behavioral addiction that can be described as the excessive or compulsive use of the computer, which persists despite serious negative consequences for personal, social, or occupational function. TRIGGERS FOR COMPUTER ADDICTION Computer Games Online Shopping Social Media Video Streaming Online Gambling EFFECTS OF COMPUTER ADDICTION DIGITAL ISSUES IN THE PHILIPPINES Sleep Deprivation ADDICTION Anxiety Is a chronic dysfunction of the brain Depression system that involve reward, and Relationship Problems memory DIGITAL DIVIDE TYPES OF ADDICTION The digital divide is the gap between those SUBSTANCE who have access to technology, the internet Is a neuropsychiatric disorder and digital literacy training and those who do characterized by a recurring desire to not. It affects all generations – both rural and continue taking the drug despite urban communities – and a wide variety of harmful consequences. industries and sectors. BEHAVIORAL Covers pathological gambling, food CAUSES AND TYPES OF DIGITAL DIVIDE addiction, internet addiction, and mobile phone addiction. USE DIVIDE It refers to the lack of digital skills, 5 ACTION STEPS FOR QUITTING AN which impedes the handling of ADDICTION technology. ACCESS DIVIDE 1. Set a quit date. It refers to the possibilities that people It might be helpful to choose a must access this resource. This is meaningful date like a special event, where socio-economic differences birthday, or anniversary. between people and between 2. Change your environment. countries come into play, since Remove any reminders of your digitalization requires very costly addiction from your home and investments and infrastructure for less workplace. developed regions for rural areas. 3. Distract yourself. QUALITY OF USE GAP Instead of giving in to an urge to use, Sometimes they have the digital skills come up with alternative activities, to find their way around the internet, such as going for a walk or calling a but not the knowledge to make good friend or family member to talk, so that use of and get the most out of it. For you keep busy until the urge passes. example, regarding access to quality Be prepared to deal with things that information. trigger your cravings, such as being in an environment where others are CONSEQUENCES OF THE DIGITAL using. DIVIDE 4. Review your past attempts at 1) Lack of communication and isolation quitting. 2) Barrier to studies and knowledge Think about what worked and what 3) Accentuates social differences did not. Consider what might have 4) Gender Discrimination contributed to relapse and make changes accordingly. STRATEGIES ON BRIDGING THE DIGITAL 5. Create a support network. DIVIDE Talk to your family and friends and ask for their encouragement and support. Let them know you are quitting. If they ❖ DIGITAL LITERACY PROGRAMS use your object of addiction, ask them ❖ ALLIANCE FOR AFFORDABLE not to do so in front of you. If you buy INTERNET (A4AI) drugs, you should consider telling your ❖ FREE BASICS dealer that you are quitting; ask your ❖ STARLINK dealer not to call you and not to sell you drugs anymore. WHAT IS BULLYING? internet. Netiquette is often referred to as Bullying is the use of force, coercion, hurtful etiquette for the internet. teasing or threat, to abuse, aggressively dominate or intimidate. The behavior is often CORE RULES OF NETIQUETTE repeated and habitual. One essential 1. Remember the human prerequisite is the perception of an 2. Adhere to the same standards of imbalance of physical or social power. This behavior online that you follow in real imbalance distinguishes bullying from life conflict. 3. Know where you are in cyberspace 4. Respect other people’s time and TYPES OF BULLYING bandwidth ❖ Physical bullying 5. Make yourself look good online Includes hitting, kicking, tripping, 6. Share expert knowledge pinching and pushing or damaging 7. Help keep flame wars under control property. Physical bullying causes both 8. Respect other people’s privacy short term and long term damage. 9. Don’t abuse your power ❖ Verbal bullying 10. Be forgiving of other people’s mistake Verbal bullying includes name calling, insults, teasing, intimidation, DIGITAL FOOTPRINT homophobic or racist remarks, or A digital footprint is the trail of verbal abuse. While verbal bullying can data you leave behind when you start off harmless, it can escalate to use the internet. This can include levels which start affecting the anything from the websites you visit, the individual target. emails you send, and the information you ❖ Social bullying share on social media, to the search Social bullying, sometimes referred to queries you make and the online as covert bullying, is often harder to recognize and can be carried out purchases you complete. behind the bullied person’s back. It is designed to harm someone’s social 2 TYPES OF DIGITAL FOOTPRINTS reputation and / or cause humiliation. 1. Active Digital Footprint The data you intentionally leave Social bullying can include: behind. This includes the content you lying and spreading rumors create and share online, such as social negative facial or physical gestures, media posts, comments, photos, and menacing or contemptuous looks videos. It also includes actions like playing nasty jokes to embarrass and filling out online forms, subscribing to humiliate newsletters, and logging into websites. mimicking unkindly Examples: encouraging others to social exclude Posting a photo on Instagram. someone Commenting on a blog. damaging someone’s social Sending an email. reputation or social acceptance. 2. Passive Digital Footprint The data collected about you without ❖ Cyber bullying your explicit knowledge or effort. This includes data gathered by websites, The Cyberbullying Research Centre apps, and online services about your defines cyber bullying as: Intentional online behavior, such as your browsing and repeated harm inflicted through habits, IP address,and location data. the use of computers, phones, and Examples: other electronic devices. Websites tracking your browsing history through Cookies. NETIQUETTE Apps collecting location data in the Netiquette is a made-up word from the background. words net and etiquette. Netiquette thus Advertisers using your search history describes the rules of conduct for respectful to show targeted ads. and appropriate communication on the