Media and Information Literacy (2nd Quarterly) PDF
Document Details
Uploaded by Deleted User
Dela Torre, Jackie
Tags
Related
- Grade 12 Media and Information Literacy (MIL) Past Paper PDF 2020
- Legal, Ethical, and Societal Issues in Media and Information Literacy PDF
- Media and Information Literacy Reviewer PDF
- MIL-Lesson-8-1: Legal and Ethical Issues in Media and Information Literacy PDF
- Legal, Ethical, and Societal Issues in Media and Information PDF
- Group 6 Report on Legal, Ethical, and Societal Issues in Media and Information Literacy PDF
Summary
This document covers legal, ethical, and societal issues in media and information literacy for a second-quarter course. Topics include fair use, parody, intellectual property, types of plagiarism, and etiquette. It also includes examples of different types of intellectual property rights and common issues concerning them.
Full Transcript
1 Media and Information Literacy Types of Intellectual Property Common Types of Plagiarism (2nd Quarterly) 1. Copyright 1. Global Plagiarism M.E.T 5 - CHUNK 1: Legal, Ethical, - a legal device that give...
1 Media and Information Literacy Types of Intellectual Property Common Types of Plagiarism (2nd Quarterly) 1. Copyright 1. Global Plagiarism M.E.T 5 - CHUNK 1: Legal, Ethical, - a legal device that gives the - also called as “Complete and Societal Issues in Media and creator of a literary, artistic, Plagiarism” Information musical, or other creative works - where an individual takes an Fair Use the sole right to publish and sell entire work of someone else and - copying of a copyrighted that work submits it under his name material with the purpose of Infringement - violation of a using it for a review, copyright 2. Paraphrasing Plagiarism commentary critic, or parody, - also called as “Idea Plagiarism” without the need to ask for 2. Patent - when an individual rephrases a permission from the copyright - an exclusive right granted to an piece of text in his own words owner invention as if it is his idea Parody 3. Trademark 3. Direct Plagiarism - a work which ridicules another - a specific sign associated with a - also called as “Verbatim in a funny, inoffensive and particular brand of goods and Plagiarism or Word-for-word non-derogatory manner services Plagiarism” Fraud - imitation of brand - when an author copies the text Intellectual Property names with a trademark is of another author, word for - output of a person’s intellectual considered illegal word, without the use of pursuit, such as his literary and quotation marks artistic works, logos, symbols, Plagiarism inventions, names and images - a fraud which refers to the form 4. Mosaic Plagiarism which are used for commercial of stealing wherein a person did - also called as “Patchwork purposes or advertisements not acknowledge the original Plagiarism” ★ copyrights, patents, trademarks author of the work and claimed - when an individual copies the material as his own phrases, passages, and ideas 2 from different sources and put it Spam Mail 9. Even though a person is entitled to together to create a new text - a form of commercial freedom of expression, obscene advertising which companies messages, derogatory remarks on one’s Etiquette send in bulk through e-mail to race or religion, and vulgar photos and - it means the person has proper prospective customers videos should not be publicly posted as decorum and behaves according Chain Mail this is unlawful. to what society dictates to be - an e-mail which requires to 10. Don’t get cute with text colors. right send the same message to Stick to the basic black text color. If another person you need to emphasize something in Netiquette your sentence, use bold or italicized - denotes the proper attitude that 5. Ask permission first before sharing words. one should observe when someone’s personal post, photo and 11. Brevity rules. Keep email messages communicating online video on social media, as this could short and to the point. violate the person’s right to privacy. 12. Don’t over share. Personal Here are some guidelines to remember 6. As a sign of respect, personal photos information is valuable to identity as an internet user with netiquette: or videos of private individuals should thieves, so try not to share more than is 1. Observe politeness when responding not be tampered out of fun or parody, necessary. to or sending messages. nor disseminated in public, as this can 13. Be kind. Make a point to be 2. When you receive a message, be offensive. respectful in your comments, even if especially if it is from your superior at 7. In public forums or chat rooms, it you disagree or dislike someone’s work or a client, it would be polite to would be deemed impolite to ask for stance on a topic. reply urgently. one’s personal information. Public 3. Review first the intended message forums or chat rooms are meant to Digital Divide before sending it so that you can be discuss common interest. - refers to the economic, sure that it is the exact message that 8. Before sending a private message to educational, and social you want to convey. someone who is not on your contact inequalities experienced by 4. As a sign of respect, do not send list, it would be appropriate to those who cannot afford to have spam or chain messages to your list of introduce first yourself politely and computer and Internet access contacts. state your reason for communication. 3 Virtual Self 2. Vulnerability to Online Crimes affect his/her relationship with - pertains to one’s representation Cyberbullying others in the virtual world, which - harm is done when the bully 4. Outing exists online and is only tells something derogatory - act of publicly humiliating a available once a person is about someone and posts and person by posting sensitive or connected to the Internet shares it using social media personal information about someone without their consent Avatar Common Types of Cyberbullying - associated with Hinduism, 1. Exclusion 5. Catfishing specifically the God Vishnu, - act of deliberately excluding - setting up a fake social media who can assume both human someone from an online group account or impersonating and animal forms someone that you’re not, 2. Harassment usually for deceptive purposes Emojis - a repeated, intentional and - part of a feature when sending strong form of bullying, 6. Cyberstalking an electronic message manifesting mainly through - when someone sends unwanted - Moji in Nihongo (Japanese posting or sending offensive, or intimidating messages, which language) means “character” rude and insulting messages to may include threat to someone the victim else Dangers of the Internet 1. Internet and Computer Addiction 3. Fraping Laws in the Philippines Regarding Addiction - when somebody breaks or logs Media and Information - a condition in which a person into someone’s e-mail or social 1. Intellectual Property Rights seems to have lost control over networking account and posts - Republic Act No. 8293 an action or behavior, which inappropriate content and 2. Anti-Bullying Act of 2013 mental health practitioners messages that will cause - Republic Act No. 10627 deemed as self-destructive embarrassment or damage to the 3. Cybercrime Prevention Act person’s reputation and may - Republic Act No. 10175