Week 7 Q1 MIL 2024 PDF
Document Details
Uploaded by Deleted User
Joey G. Pasion
Tags
Related
- Legal, Ethical, and Societal Issues in Media and Information Literacy PDF
- MIL-Lesson-8-1: Legal and Ethical Issues in Media and Information Literacy PDF
- Media and Information Literacy Grade 12 Past Paper PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
- Media and Information Literacy (2nd Quarterly) PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
Summary
This document is a week 7 quarter 1 learning material on legal, ethical, and societal issues in media and information. It includes activities and questions related to identifying and discussing these issues.
Full Transcript
MR. JOEY G. PASION W e e k 7 Quarter 1 MR. JOEY G. PASION LEARNING COMPETENCIES: The learners will be able to… 1. identify, discuss and explain the Legal, Ethical, and Societal Issues in Media and Information; 2. discuss current issues related to Legal, Ethical, and Societal Issues in...
MR. JOEY G. PASION W e e k 7 Quarter 1 MR. JOEY G. PASION LEARNING COMPETENCIES: The learners will be able to… 1. identify, discuss and explain the Legal, Ethical, and Societal Issues in Media and Information; 2. discuss current issues related to Legal, Ethical, and Societal Issues in Media and Information; 3. value the importance of understanding the different Legal, Ethical, and Societal Issues in Media and Information; 4. Cite practical situation when to apply knowledge in intellectual property, copyright, & fair use guidelines; 5. Create a campaign ad to combat any digital issue in the Philippines. TOPIC OUTLINE: Week 7 I. Legal, Ethical, and Societal Issues in Media and Information A. Intellectual property B. Fair use and creative commons C. Digital Citizenship D. Netiquette E. Digital Divide F. Addiction G. Bullying H. Plagiarism I. Digital Footprints II.Tasks WRITTEN WORK 7.1 Activity: Focus your attention on the following and give the correct answer. Activity: 1 C_ _E_S_X sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet. Activity: 2 _CA_ _ER a person who commits or participates in a fraudulent scheme or operation insurance/credit card/online selling Activity: 3 A_DI_T_O_ refers to the compulsive need to spend a great deal of time on the Internet, to the point where relationships, work and health are allowed to suffer Activity: 4 _L_N_ER the action or crime of making a false spoken statement damaging to a person's reputation. Activity: 5 _R_L_ online bully, deliberately tries to offend, cause trouble or directly attack people by posting derogatory comments on Facebook posts, blogs, under YouTube videos, on forums and other social media, such as Twitter and Instagram Activity: 6 P_I_H_N_ when attackers send malicious emails designed to trick people into falling for a scam. Activity: 7 _O_E_ "a person who pretends to be what he or she is not : an affected or insincere person." Activity: 8 C_O_T _H_S_R A person who dates, talks about, or hangs around one who is very popular just to make them look better. Activity: 9 H_C_I_ _ an attempt to exploit a computer system or a private network inside a computer; it is the unauthorized access to or control over computer network security systems for some illicit purpose Activity: 10 I_EN_IT_ T_EF_ Terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab t i o n : s t r ac A b i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab WRITTEN WORK 7.2 TEST OF UNDERSTANDING GIVE WHAT ARE ASKED IN THE FOLLOWING ITEMS. 1. What protects the intellectual property created by artists? 2. What protects the intellectual property created by designers? 3. What protects the intellectual property created by inventors? 4. Which of these is a geographical indication? A. C. B. D. 5. What does a trademark protect? A. An invention B. A work of art C. Logos, names and brands D. The look, shape and feel of a product WHAT IS REPRESENTED BY EACH OF THE FOLLOWING TRADEMARKS? 6 7 8 9 10 11 12 13 14 15 A … T ’ S HAVE L E RECALL! WRITTEN WORK 7.3 GUESS THE BRAND THROUGH THESE TAGLINES! NAKASISIGURO GAMOT AY LAGING BAGO Creating a Wonderful World Abot Mo ang Mundo i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab WRITTEN WORK 7.4 What the CRIME! Cyberstalking Malware Prank call Troll Farm Hacking Trafficking Fraud Website Spoofing Pervert Harassment 1. the use of the Internet or other electronic means to follow or harass an individual, group, or organization 2. the act of recruiting, transporting, transferring, harbouring or receiving a person; By means of e.g. coercion, deception or abuse of vulnerability; For the purpose of exploitation, such as sexual exploitation, slavery and forced labour, among others 3. the creation of a replica of a trusted location with the intention of misleading visitors to a phishing site 4. a person whose sexual behavior is considered not normal or acceptable 5. when someone who makes a telephone call pretending to be someone they are not, or saying something that is not true, usually as a joke 6. include slander, libel, false accusations, threats, or any other behavior that demeans or embarrasses someone 7. a deliberate act (or failure to act) with the intention of obtaining an unauthorized benefit, either for oneself or for the institution, by using deception or false suggestions or suppression of truth or other unethical means, which are believed and relied upon by others 8. Illegally gaining access to your email account containing all your most personal information 9. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants 10. an institutionalized group of internet monsters that seeks to interfere in political opinions and decision- making v i t y : A cti Have you been… ? I have stalked someone. I have copied, pasted someone’s work but did not give due credits. I have entered an adult entertainment site out of curiosity. I have videotaped myself and posted online. I have multiple accounts. A digital self is generated through social media and online activities, using content (what we post, such as social media, blog posts and playlists) and the associated metadata (where, when and how we post, as well as the frequency). i o n : s t r act Ab i o n : s t r act Ab i o n : s t r act Ab t i o n : l i ca App WEEK 7 TASK 1: Draw your digital footprint. You may trace your actual footprint if you wish. Then creatively present your activities on the Internet. What is your digital footprint? What do you want your digital footprint to say about you? Is a positive digital reputation important? Why?